Essays about: "cloud Operating system"
Showing result 1 - 5 of 49 essays containing the words cloud Operating system.
-
1. FFS: A cryptographic cloud-based deniable filesystem through exploitation of online web services : Store your sensitive data in plain sight
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Many Online Web Services (OWSs) today, such as Flickr and Twitter, provide users with the possibility to post images that are stored on the platform for free. This thesis explores creating a cryptographically secure filesystem that stores its data on an online web service by encoding the encrypted data as images. READ MORE
-
2. Cloud provider comparison with a growing business perspective
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för arkitektur och samhällsbyggnad (ABE)Abstract : As technology becomes increasingly embedded in our daily lives, the demand for computational power is on the rise. Sometimes, the necessary calculations can be performed within the device itself, but often, they need to be processed remotely. This is where the role of cloud providers comes into play, steadily growing to meet the demand. READ MORE
-
3. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE
-
4. Supervised Algorithm for Predictive Maintenance
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Predictive maintenance plays a crucial role in preventing unexpected equipment failures and maintaining assets in good operating conditions in various systems. One such scenario where predictive maintenance has been widely used is in battery management systems for electronic vehicles based on lithium batteries, where the risk of failure can be reduced by predicting the remaining useful life of the lithium battery. READ MORE
-
5. Automating Deployments of Trusted Execution Environments
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Hardware-based TEEs (Trusted Execution Environments) are gaining adoption and becoming more prevalent in today’s computing landscape. In a cloud-native world, where everything runs on ephemeral compute, having the luxury of experts setting up computation environments before running a workload is no longer a possibility. READ MORE