Essays about: "thesis on cloud security"

Showing result 1 - 5 of 88 essays containing the words thesis on cloud security.

  1. 1. Are modern smart cameras vulnerable to yesterday’s vulnerabilities? : A security evaluation of a smart home camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jesper Larsson; [2021]
    Keywords : Security; Penetration testing; Threat modelling; Internet of things; Smart cameras; Säkerhet; penetrationstestning; hotmodellering; Sakernas internet; Smarta kameror;

    Abstract : IoT cameras can allow users to monitor their space remotely, but consumers are worried about the security implications. Their worries are neither unfounded as vulnerabilities repeatedly have been found in internet connected cameras. READ MORE

  2. 2. Machine Learning with Reconfigurable Privacy on Resource-Limited Edge Computing Devices

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zannatun Nayem Tania; [2021]
    Keywords : Data Privacy; Resource Management; Machine Learning; Fitbit; Internet of Things IoT ; Optimization; Dataintegritet; Resurshantering; Machine Learning; Fitbit; Internet of Things IoT ; Optimering;

    Abstract : Distributed computing allows effective data storage, processing and retrieval but it poses security and privacy issues. Sensors are the cornerstone of the IoT-based pipelines, since they constantly capture data until it can be analyzed at the central cloud resources. However, these sensor nodes are often constrained by limited resources. READ MORE

  3. 3. Building OCI Images With a Container Orchestrator : A comparison of OCI build-tools

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Jonas Sjödin; [2021]
    Keywords : ;

    Abstract : Cloud computing is a quickly growing field in modern computing science where new technologies arise every day. One of the latest trends in cloud computing is container based technology, which  allows applications to run in a reproducible and stateless fashion without requiring manually installed dependencies. READ MORE

  4. 4. The Viability of Using Trusted Execution Environments to Protect Data in Node-RED : A study on using AMD-SEV and Intel SGX to protect sensitive data when Node-RED is deployed on the cloud.

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Carl Leijonberg; [2021]
    Keywords : Trusted execution environments; AMD-SEV; Intel SGX; Internet of Things; Node-RED;

    Abstract : The Internet of Things (IoT) consists of a network of physical devices that are connected over the internet for the purpose of exchanging data with other devices and systems. IoT platforms, such as Node-RED, have been introduced in recent times to facilitate communication between different IoT devices. READ MORE

  5. 5. Implementation of a Deep Learning Inference Accelerator on the FPGA.

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Shenbagaraman Ramakrishnan; [2020]
    Keywords : Artificial Intelligence; Machine Learning; Deep Learning; Neural Networks; Deep Learning Accelerators; NVDLA; FPGA; Technology and Engineering;

    Abstract : Today, Artificial Intelligence is one of the most important technologies, ubiquitous in our daily lives. Deep Neural Networks (DNN's) have come up as state of art for various machine intelligence applications such as object detection, image classification, face recognition and performs myriad of activities with exceptional prediction accuracy. READ MORE