Essays about: "thesis on cloud security"

Showing result 16 - 20 of 127 essays containing the words thesis on cloud security.

  1. 16. Cloud Computing Impacts on Business Models : A study based on Osterwalder’s Business Model Canvas

    University essay from Blekinge Tekniska Högskola

    Author : Shobha Biligerepalya Chandrashekhar; Rafika Ida Mutia; [2023]
    Keywords : ;

    Abstract : Cloud computing is a model that provide on-demand access to a range of computing services and resources such as servers, networks, storage, and application through the internet. Companies utilizing cloud computing can use different services based on their needs without initial capital expenditure. READ MORE

  2. 17. Kubernetes Automatic Geographical Failover Techniques

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Philip Eriksson; [2023]
    Keywords : Kubernetes; Geographical Failover; Multi-cluster; Non-Byzantine;

    Abstract : With the rise of microservice architectures, there is a need for an orchestration tool to manage containers. Kubernetes has emerged as one of the most popular alternatives, adopting widespread usage. But managing multiple Kubernetes clusters on its own have proven to be a challenging task. READ MORE

  3. 18. Automating Deployments of Trusted Execution Environments

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gidófalvy Gordon Zsolt; [2023]
    Keywords : hardware TEE; Intel SGX; AMD SEV; SEV-SNP; automation; configuration management; Ansible; scripting; OS dependency management; automation tooling; system tooling; system administration; hardware TEE; Intel SGX; AMD SEV; SEV-SNP; automatisering; konfigurationshantering; Ansible; skript; hantering av OS-beroenden; verktyg för automatisering; systemverktyg; systemverktyg; systemadministration; hardware TEE; Intel SGX; AMD SEV; SEV-SNP; automatisering; konfigurationshantering; Ansible; skript; hantering av OS-beroenden; verktyg för automatisering; systemverktyg; systemverktyg; systemadministration;

    Abstract : Hardware-based TEEs (Trusted Execution Environments) are gaining adoption and becoming more prevalent in today’s computing landscape. In a cloud-native world, where everything runs on ephemeral compute, having the luxury of experts setting up computation environments before running a workload is no longer a possibility. READ MORE

  4. 19. Compliance Regulatory and Security Challenges in Cloud & IP Telephony -A comparison study between India and Sweden

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Thomas Manayathil Chackochan; Ronit Gonsalvez; [2023]
    Keywords : cloud computing; regulatory frameworks; IP telephony; forensic investigation; compliance regulations;

    Abstract : Cloud computing has evolved from cutting-edge technology to a best practice for businesses across industries. However, compliance with regulatory mandates and addressing security challenges in the cloud environment remain significant concerns. READ MORE

  5. 20. Cryptography Executed in Web Browsers – Achieving Convenient End-to-End Security for Lock Access Control

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Chanvuth Chea; [2023]
    Keywords : ;

    Abstract : Many client-server applications are not protected with end-to-end security, allowing the web server to control all data. In this thesis, the feasibility of executing modern cryptography on the web browser has been evaluated and proposed an end-to-end security design for cloud-based lock access control. READ MORE