Essays about: "cloud model security"

Showing result 1 - 5 of 66 essays containing the words cloud model security.

  1. 1. Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Shiwei Dong; [2023]
    Keywords : ;

    Abstract : As cloud services become increasingly popular, ensuring their privacy and security has become a significant concern for users. Cloud computing involves Data Service Outsourcing and Computation Outsourcing, which require additional security considerations compared to traditional computing. READ MORE

  2. 2. Confidential Federated Learning with Homomorphic Encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zekun Wang; [2023]
    Keywords : Cloud Technology; Confidential Computing; Federated Learning; Homomorphic Encryption; Trusted Execution Environment; Molnteknik; Konfidentiell databehandling; Federerad inlärning; Homomorfisk kryptering; Betrodd körningsmiljö;

    Abstract : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. READ MORE

  3. 3. Study of Security Issues in Kubernetes (K8s) Architectures; Tradeoffs and Opportunities

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Álvaro Revuelta Martinez; [2023]
    Keywords : ;

    Abstract : Cloud computing has emerged as a significant model, providing flexibility, scalability, and on-demand resources, transforming the way organizations manage and handle data. The shift to microservices architectures, a design approach in which applications are built as groups of loosely linked services, is a critical component of this transformation. READ MORE

  4. 4. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ziyad Elbanna; [2023]
    Keywords : Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Abstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE

  5. 5. Vendor lock-in and its impact on cloud computing migration

    University essay from Jönköping University/JTH, Avdelningen för datateknik och informatik

    Author : Tesfaldet Weldemicheal; [2023]
    Keywords : cloud computing; contract terms; network effects; proprietary technologies; vendor lock-in;

    Abstract : The concept of cloud computing describes a business model in which multiple service providers pool their resources to serve customers online. The ability to pool and assign resources as needed, to deliver services based on accurate usage metrics, to rapidly scale up or down, to deliver services on demand, and to give customers access from any location are just a few of the many benefits of cloud computing. READ MORE