Essays about: "Cloud computing Vulnerabilities"

Showing result 1 - 5 of 19 essays containing the words Cloud computing Vulnerabilities.

  1. 1. Confidential Federated Learning with Homomorphic Encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zekun Wang; [2023]
    Keywords : Cloud Technology; Confidential Computing; Federated Learning; Homomorphic Encryption; Trusted Execution Environment; Molnteknik; Konfidentiell databehandling; Federerad inlärning; Homomorfisk kryptering; Betrodd körningsmiljö;

    Abstract : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. READ MORE

  2. 2. Study of Security Issues in Kubernetes (K8s) Architectures; Tradeoffs and Opportunities

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Álvaro Revuelta Martinez; [2023]
    Keywords : ;

    Abstract : Cloud computing has emerged as a significant model, providing flexibility, scalability, and on-demand resources, transforming the way organizations manage and handle data. The shift to microservices architectures, a design approach in which applications are built as groups of loosely linked services, is a critical component of this transformation. READ MORE

  3. 3. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexios Stournaras; [2023]
    Keywords : Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE

  4. 4. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Johnson Akpotor Scott; [2022]
    Keywords : Risk Assessment; Security countermeasure; Risk Management; Risk Mitigation; Adaptive Security Controls; Threats; Risk; Vulnerabilities; User Behavior Trust Degree; User Behavior Risk Rating; Policy Decision Point; Policy Enforcement Point; User Behavior Trust Model; Adaptive Security Architecture; SaaS; Public Cloud.;

    Abstract : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. READ MORE

  5. 5. Gamifying Attack Path Reporting : Preliminary design of an educational cyber security game

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Anna Misnik; Shafeek Zakko; [2022]
    Keywords : Gamification; Cyber Security Education; Game Design; Meta Attack Language; Attack Simulations; Hacking; Spelifiering; Cybersäkerhetsutbildning; Spel Design; Meta Attack Språk; Attacksimuleringar; Dataintrång;

    Abstract : With rapid digitalization and technical growth, the IT systems that we are using are becoming extremely complicated and intertwined. This created as a result, more challenging security problems that get complicated alongside the systems, and the need for advanced solutions to prevent the exploitation of systems vulnerabilities. READ MORE