Essays about: "cloud techniques blekinge"

Showing result 1 - 5 of 13 essays containing the words cloud techniques blekinge.

  1. 1. Enhancement of Networking Capabilities in P2P OpenStack

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Vidyadhar reddy Peddireddy; [2019]
    Keywords : Multi cloud networking; OpenStack; Tricircle; VPNaaS;

    Abstract : In recent times, there’s been a trend towards setting up smaller clouds at the edge of the network and interconnecting them across multiple sites. In these scenarios, the software used for managing the resources should be flexible enough to scale. READ MORE

  2. 2. Energy-aware adaptation in Cloud datacenters

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Srivasthav Mahadevamangalam; [2018]
    Keywords : Cloud Computing; Virtualization; CloudSim; Energy-efficient; and VM Consolidation.;

    Abstract : Context: Cloud computing is providing services and resources to customers based on pay-per-use. As the services increasing, Cloud computing using a vast number of data centers like thousands of data centers which consumes high energy. The power consumption for cooling the data centers is very high. READ MORE

  3. 3. Identification and Masking Method of Clouds in Satellite Images

    University essay from Blekinge Tekniska Högskola/Institutionen för tillämpad signalbehandling

    Author : Harsha Yashaskar Emani; [2018]
    Keywords : ;

    Abstract : Identification of the cloud in an image is essential in order to remove the noise in the image and improve the quality of the image. Further the masking of cloud in a satellite image is important in order to obtain a clear image taken from a remote sensing satellite. READ MORE

  4. 4. Homomorphic Encryption: Working and Analytical Assessment : DGHV, HElib, Paillier, FHEW and HE in cloud security

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Srinivas Divya Papisetty; [2017]
    Keywords : Homomorphic encryption; Homomorphic Encryption Schemes; Cloud security; Cryptography;

    Abstract : Context: Secrecy has kept researchers spanning over centuries engaged in the creation of data protection techniques. With the growing rate of data breach and intervention of adversaries in confidential data storage and communication, efficient data protection has found to be a challenge. READ MORE

  5. 5. Assessment of Snort Intrusion Prevention System in Virtual Environment Against DoS and DDoS Attacks : An empirical evaluation between source mode and destination mode

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Avinash Kiran Ivvala; [2017]
    Keywords : Intrusion Prevention Systems; cloud computing; snort; source mode; destination mode.;

    Abstract : Context. Cloud computing (CC) is developed as a Human-centered computing model to facilitate its users to access resources anywhere on the globe. The resources can be shared among any cloud user which mainly questions the security in cloud computing. READ MORE