Essays about: "Cloud security"

Showing result 36 - 40 of 265 essays containing the words Cloud security.

  1. 36. Kubernetes Automatic Geographical Failover Techniques

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Philip Eriksson; [2023]
    Keywords : Kubernetes; Geographical Failover; Multi-cluster; Non-Byzantine;

    Abstract : With the rise of microservice architectures, there is a need for an orchestration tool to manage containers. Kubernetes has emerged as one of the most popular alternatives, adopting widespread usage. But managing multiple Kubernetes clusters on its own have proven to be a challenging task. READ MORE

  2. 37. Automating Deployments of Trusted Execution Environments

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gidófalvy Gordon Zsolt; [2023]
    Keywords : hardware TEE; Intel SGX; AMD SEV; SEV-SNP; automation; configuration management; Ansible; scripting; OS dependency management; automation tooling; system tooling; system administration; hardware TEE; Intel SGX; AMD SEV; SEV-SNP; automatisering; konfigurationshantering; Ansible; skript; hantering av OS-beroenden; verktyg för automatisering; systemverktyg; systemverktyg; systemadministration; hardware TEE; Intel SGX; AMD SEV; SEV-SNP; automatisering; konfigurationshantering; Ansible; skript; hantering av OS-beroenden; verktyg för automatisering; systemverktyg; systemverktyg; systemadministration;

    Abstract : Hardware-based TEEs (Trusted Execution Environments) are gaining adoption and becoming more prevalent in today’s computing landscape. In a cloud-native world, where everything runs on ephemeral compute, having the luxury of experts setting up computation environments before running a workload is no longer a possibility. READ MORE

  3. 38. Compliance Regulatory and Security Challenges in Cloud & IP Telephony -A comparison study between India and Sweden

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Thomas Manayathil Chackochan; Ronit Gonsalvez; [2023]
    Keywords : cloud computing; regulatory frameworks; IP telephony; forensic investigation; compliance regulations;

    Abstract : Cloud computing has evolved from cutting-edge technology to a best practice for businesses across industries. However, compliance with regulatory mandates and addressing security challenges in the cloud environment remain significant concerns. READ MORE

  4. 39. Exploring IoT Security Threats and Forensic Challenges: A LiteratureReview and Survey Study

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Abdulrahman Al Allaf; Waseem Totonji; [2023]
    Keywords : Internet of Things; IoT security; IoT threats; IoT attacks; Digital forensics; IoT forensic; IoT forensic challenges; Cloud forensics; Network forensics;

    Abstract : Internet of Things (IoT) devices have increased rapidly in recent years, revolutionizing many industries, including healthcare, manufacturing, and transportation, and bringing benefits to both individuals and industries. However, this increase in IoT device usage has exposed IoT ecosystems to numerous security threats and digital forensic challenges. READ MORE

  5. 40. Increasing Efficiency and Scalability in AWS IAM by Leveraging an Entity-centric Attribute- & Role-based Access Control (EARBAC) Model

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Rasmus Karlsson; Pontus Jönrup; [2023]
    Keywords : Cloud; Authorisation; Security; AWS; Amazon; RBAC; ABAC; EARBAC; Access Control; Access Control Model; Access Control Models; Principle of Least Privilege;

    Abstract : Cloud computing is becoming increasingly popular among all types of companies due to its inherent benefits. However, because of its infrastructure, it might be difficult to manage access rights between users and resources. READ MORE