Essays about: "Cloud security"
Showing result 16 - 20 of 265 essays containing the words Cloud security.
-
16. FFS: A cryptographic cloud-based deniable filesystem through exploitation of online web services : Store your sensitive data in plain sight
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Many Online Web Services (OWSs) today, such as Flickr and Twitter, provide users with the possibility to post images that are stored on the platform for free. This thesis explores creating a cryptographically secure filesystem that stores its data on an online web service by encoding the encrypted data as images. READ MORE
-
17. Security Management in Cloud Computing for healthcare Data
University essay from Luleå tekniska universitetAbstract : "In today's research field interconnected world, preventing security issues and confidentiality breaches has become paramount to safeguarding sensitive information, and organizations must take proactive measures to ensure data security. Cloud computing enhances security management by reducing the likelihood of cyber-attacks. READ MORE
-
18. Confidential Federated Learning with Homomorphic Encryption
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. READ MORE
-
19. An evaluation of Honeypots with Compliant Kubernetes
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : This thesis evaluates different honeypot technologies and how they can be integrated into Compliant Kubernetes (CK8s), a secure open-source distribution of Kubernetes designed to address various compliance and regulatory requirements. The thesis identifies and compares the features, metrics, and suitability of several candidate honeypots for CK8s based on a literature survey and experimental testing. READ MORE
-
20. Analysis of the security of a VXLAN network
University essay from KTH/Hälsoinformatik och logistikAbstract : Traditionally, VLANs have been the most suitable solution for connecting computers. This, in line with the increased use of cloud services in recent years, has given rise to problems with scalability and security within VLAN networks, which need to be investigated. READ MORE