Essays about: "A Survey On security in cloud computing"

Showing result 1 - 5 of 16 essays containing the words A Survey On security in cloud computing.

  1. 1. Assessing Practices of Cloud Storage Security Among Users : A Study on Security Threats in Storage as a Service Environment

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Hugo Joo Jonsson; Vilgot Karlsson; [2023]
    Keywords : Cloud Computing; Storage-as-a-Service; Security threats; Security practices;

    Abstract : With the immense amount of data generated daily, relying solely on physical storage is insufficient. Therefore, Cloud services have become a big part of our day-to-day life, as they allow users to store data and relieve customers from the burden of maintenance. READ MORE

  2. 2. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Faith Nnenna Onwumere; [2023]
    Keywords : IoT; ABE; Attribute-based Encryption; CP-ABE; KP-ABE; Internet of Things; Cryptography; Smart Devices;

    Abstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE

  3. 3. Investigation of an automatic deployment transformation method for OpenStack

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Sai Vivek Gudipati; Vishwa Mithra Tatta; [2022]
    Keywords : Openstack; Deployment tools; Life-Cycle Management Tools; Migration; Backup and recovery;

    Abstract : Cloud computing is the on-demand availability of computer resources provided as a service over a network. OpenStack is an open-source cloud computing software. Deploying and operating OpenStack manually is a tedious process. To address this,life-cycle management tools have been developed. READ MORE

  4. 4. Check Yourself Before You Wreck Yourself- A study of how to assess security vulnerabilities of web servers through configuration analysis

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Ingrid Hyltander; [2019]
    Keywords : Software Vulnerabilities; Security Misconfiguration; Configuration Analysis; Web Server; Apache; Nginx; Technology and Engineering;

    Abstract : The web server is an essential component of many systems today. It has the possibility to give access to files with sensitive information and it is the backbone that enable a vast amount of applications. READ MORE

  5. 5. IoT-NETZ: Spoofing Attack Mitigation in IoT Network

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hamzeh Mohammadnia; [2019]
    Keywords : ;

    Abstract : The phenomenal growth of the Internet of Things (IoT) and popularity of the mobile stations have rapidly increased the demand of WLAN network (known as IEEE 802.11 and WiFi). WLAN is a low-cost alternative of the cellular network and being an unlicensed spectrum to build the master plan of embedding the Internet in everything-&-anywhere. READ MORE