Essays about: "cloud model security"
Showing result 1 - 5 of 66 essays containing the words cloud model security.
-
1. Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : As cloud services become increasingly popular, ensuring their privacy and security has become a significant concern for users. Cloud computing involves Data Service Outsourcing and Computation Outsourcing, which require additional security considerations compared to traditional computing. READ MORE
-
2. Confidential Federated Learning with Homomorphic Encryption
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. READ MORE
-
3. Study of Security Issues in Kubernetes (K8s) Architectures; Tradeoffs and Opportunities
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Cloud computing has emerged as a significant model, providing flexibility, scalability, and on-demand resources, transforming the way organizations manage and handle data. The shift to microservices architectures, a design approach in which applications are built as groups of loosely linked services, is a critical component of this transformation. READ MORE
-
4. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE
-
5. Vendor lock-in and its impact on cloud computing migration
University essay from Jönköping University/JTH, Avdelningen för datateknik och informatikAbstract : The concept of cloud computing describes a business model in which multiple service providers pool their resources to serve customers online. The ability to pool and assign resources as needed, to deliver services based on accurate usage metrics, to rapidly scale up or down, to deliver services on demand, and to give customers access from any location are just a few of the many benefits of cloud computing. READ MORE