Essays about: "security in cloud"

Showing result 6 - 10 of 259 essays containing the words security in cloud.

  1. 6. Industry preferred implementation practices for security in cloud systems : An exploratory and qualitative analysis of implementation practices for cloud security

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Carl-Johan Elfström; [2023]
    Keywords : security; cloud; practices;

    Abstract : Since the introduction of cloud computing as a standard solution for data storage and software hosting, new security measures have been developed, and data laws and compliance regulations have become more stringent. In this thesis, the exploration of compliance and regulatory documents, interviews of industry professionals, and thematic analysis of interview data  uncover some industry-preferred implementation practices that will help to ensure compliance and cloud security for applications and data storage on the cloud. READ MORE

  2. 7. Impact of fixed-rate fingerprinting defense on cloud gaming experience

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Kent Thang; Adam Nyberg; [2023]
    Keywords : cloud gaming; QoE; QoS; proxy; fingerprinting defense; website fingerprinting attack;

    Abstract : Cloud gaming has emerged as a popular solution to meet the increasing hardware de-mands of modern video games, allowing players with dated or non-sufficient hardwareto access high-quality gaming experiences. However, the growing reliance on cloud ser-vices has led to heightened concerns regarding user privacy and the risk of fingerprintingattacks. READ MORE

  3. 8. Technology Acceptance for AI implementations : A case study in the Defense Industry about 3D Generative Models

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Michael Arenander; [2023]
    Keywords : Technology Acceptance; Artificial Intelligence; Machine Learning; 3D Generative Models; Innovation; Teknisk Acceptans; Artificiell Intelligens; Maskininlärning; 3D Generativa Modeller; Innovation;

    Abstract : Advancements in Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL) has emerged into 3D object creation processes through the rise of 3D Generative Adversarial Networks (3D GAN). These networks contain 3D generative models capable of analyzing and constructing 3D objects. READ MORE

  4. 9. Assessing Practices of Cloud Storage Security Among Users : A Study on Security Threats in Storage as a Service Environment

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Hugo Joo Jonsson; Vilgot Karlsson; [2023]
    Keywords : Cloud Computing; Storage-as-a-Service; Security threats; Security practices;

    Abstract : With the immense amount of data generated daily, relying solely on physical storage is insufficient. Therefore, Cloud services have become a big part of our day-to-day life, as they allow users to store data and relieve customers from the burden of maintenance. READ MORE

  5. 10. Securing Sensitive Data in the Cloud: A New Era of Security Through Zero Trust Principles

    University essay from KTH/Hälsoinformatik och logistik

    Author : Thomas Yacob; [2023]
    Keywords : Zero Trust; GitLab; Docker; Keycloak; GPG keys; sensitive data; firewalls;

    Abstract : The goal of this report is to examine how traditional security systems are structured and see their shortcomings, and from there propose how a new system can be built to secure sensitive data. The proposed approach is a new architecture called Zero Trust, which means implementing security at the design of the system and providing minimal access to users to perform their tasks. READ MORE