Essays about: "thesis on cloud security"

Showing result 11 - 15 of 127 essays containing the words thesis on cloud security.

  1. 11. Advanced Secret Handling in Kubernetes Application with HashiCorp Vault

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Maryum Hamid; [2023]
    Keywords : HashiCorp Vault; Key Management System; Kubernetes; HashiCorp Vault; Key Management System; Kubernetes;

    Abstract : In the era of microservices and cloud-based systems, safeguarding sensitive credentials has become a critical concern for modern businesses. This thesis delves into the application of HashiCorp Vault, a prominent tool for secure secret management, within the domain of telecommunication networks, renowned for managing tens of thousands of nodes. READ MORE

  2. 12. E-Health data risks & protection for public cloud : An elderly healthcare usecase for Swedish municipality

    University essay from

    Author : Deepak Dhyani; [2023]
    Keywords : Data Protection; Data Privacy Risks; Public Cloud Data Protection;

    Abstract : Organizations are increasingly adopting the cloud to meet their business goals more cost-effectively. Cloud benefits like scalability, broad access, high availability, and cost-effectiveness provide a great incentive for organizations to move their applications to the cloud. READ MORE

  3. 13. Evaluating the Ownership of Personal data in the Cloud by Optimizing the IT Architecture : Applying a reference architecture to make the ownership of personal data more clear within an organization

    University essay from Uppsala universitet/Datalogi

    Author : Tilda Myrsell; Sofie Hulteberg; [2023]
    Keywords : Cloud computing; reference architecture; personal data; international standard ISO IEC 17789; data security; data ownership;

    Abstract : ​​Cloud computing is an area that many companies use in order to stay in line with technological development. To keep these systems productive and easily managed, a reference architecture can be used as a framework and also as a manual on how to structure an organization to suit its specific needs and goals. READ MORE

  4. 14. Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability

    University essay from KTH/Hälsoinformatik och logistik

    Author : Ahmad Al Khateeb; Abdulrazzaq Summaq; [2023]
    Keywords : Access Control; Authorization; Keycloak; GPG Keys; Encryption; GitLab; Version Control; Neo4j; Data Security;

    Abstract : The amount of data and the development of new technologies used by all society-critical organizations are increasing dramatically. In parallel, data breaches, cyber-attacks, and their devastating consequences are also on the rise, as well as the number of individuals and organizations that are potential targets for such attacks. READ MORE

  5. 15. Vendor lock-in and its impact on cloud computing migration

    University essay from Jönköping University/JTH, Avdelningen för datateknik och informatik

    Author : Tesfaldet Weldemicheal; [2023]
    Keywords : cloud computing; contract terms; network effects; proprietary technologies; vendor lock-in;

    Abstract : The concept of cloud computing describes a business model in which multiple service providers pool their resources to serve customers online. The ability to pool and assign resources as needed, to deliver services based on accurate usage metrics, to rapidly scale up or down, to deliver services on demand, and to give customers access from any location are just a few of the many benefits of cloud computing. READ MORE