Essays about: "Security Issues in Cloud Computing"

Showing result 1 - 5 of 55 essays containing the words Security Issues in Cloud Computing.

  1. 1. Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Shiwei Dong; [2023]
    Keywords : ;

    Abstract : As cloud services become increasingly popular, ensuring their privacy and security has become a significant concern for users. Cloud computing involves Data Service Outsourcing and Computation Outsourcing, which require additional security considerations compared to traditional computing. READ MORE

  2. 2. Security Management in Cloud Computing for healthcare Data

    University essay from Luleå tekniska universitet

    Author : Malik Asad; [2023]
    Keywords : ;

    Abstract : "In today's research field interconnected world, preventing security issues and confidentiality breaches has become paramount to safeguarding sensitive information, and organizations must take proactive measures to ensure data security. Cloud computing enhances security management by reducing the likelihood of cyber-attacks. READ MORE

  3. 3. Study of Security Issues in Kubernetes (K8s) Architectures; Tradeoffs and Opportunities

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Álvaro Revuelta Martinez; [2023]
    Keywords : ;

    Abstract : Cloud computing has emerged as a significant model, providing flexibility, scalability, and on-demand resources, transforming the way organizations manage and handle data. The shift to microservices architectures, a design approach in which applications are built as groups of loosely linked services, is a critical component of this transformation. READ MORE

  4. 4. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ziyad Elbanna; [2023]
    Keywords : Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Abstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE

  5. 5. Digital security monitoring of cloud services - SLA Analyser- Availability Monitoring tool for DB Cloud Services

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Sneha Gupta; Mosammath Nazifa Anjum Islam Anika; [2023]
    Keywords : SLAs; Availability; Cloud service monitoring;

    Abstract : Cloud computing is in current demand and widely used for businesses because of its scalability and flexibility. An agreement is signed between cloud providers and customers to guarantee the level of services are available as promised, it is called Service Level Agreement (SLA). READ MORE