Advanced search

Showing result 1 - 5 of 92 essays matching the above criteria.

  1. 1. Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Shiwei Dong; [2023]
    Keywords : ;

    Abstract : As cloud services become increasingly popular, ensuring their privacy and security has become a significant concern for users. Cloud computing involves Data Service Outsourcing and Computation Outsourcing, which require additional security considerations compared to traditional computing. READ MORE

  2. 2. Dynamic container orchestration for a device-cloud continuum

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Camilo Alfonso Rodriguez Garzon; [2023]
    Keywords : Edge computing; kubernetes operator; dynamic scheduling; Edge computing; Kubernetes-operatör; dynamisk schemaläggning;

    Abstract : Edge computing has emerged as a paradigm to support the growing demand for real-time processing of data generated at the edge of the network. As the devices at the edge are constrained, one of the challenges in the area is how to schedule workloads. READ MORE

  3. 3. Confidential Federated Learning with Homomorphic Encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zekun Wang; [2023]
    Keywords : Cloud Technology; Confidential Computing; Federated Learning; Homomorphic Encryption; Trusted Execution Environment; Molnteknik; Konfidentiell databehandling; Federerad inlärning; Homomorfisk kryptering; Betrodd körningsmiljö;

    Abstract : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. READ MORE

  4. 4. Monitoring software usage and usage behaviour based on SaaS data: case Gemini Water portfolio

    University essay from Uppsala universitet/Datorteknik

    Author : August Bredberg; [2023]
    Keywords : SaaS; cloud; cloud computing; monitoring; data; usage data; usage behavior;

    Abstract : Software as a Service (SaaS) platforms paired with cloud-based storage is a common schema used among software providers across the globe. Such solutions usually accumulate vast amounts of usage and usage behaviour data. READ MORE

  5. 5. Industry 4.0 : Implementation & Maturity Level Assessment in European Industry

    University essay from Högskolan i Halmstad/Akademin för företagande, innovation och hållbarhet

    Author : Arun Palathra Alex; Femy Jospeh; [2023]
    Keywords : Industry 4.0; Maturity level;

    Abstract : Industry 4.0 is the trend towards automation and data exchange in manufacturing technologies and processes, which include cyber-physical systems (CPS), the Internet of Things (IoT), the Industrial Internet of Things (IIOT), cloud computing, cognitive computing, and artificial intelligence.  Industry 4. READ MORE