Essays about: "trusted service provider"

Showing result 1 - 5 of 10 essays containing the words trusted service provider.

  1. 1. Confidential Federated Learning with Homomorphic Encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zekun Wang; [2023]
    Keywords : Cloud Technology; Confidential Computing; Federated Learning; Homomorphic Encryption; Trusted Execution Environment; Molnteknik; Konfidentiell databehandling; Federerad inlärning; Homomorfisk kryptering; Betrodd körningsmiljö;

    Abstract : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. READ MORE

  2. 2. CarGo : A Decentralized Protocol for Booking and Payment in Car-Sharing Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Aristotelis-Antonios Kotsias; [2023]
    Keywords : blockchain; car-sharing system; layer two solutions; smart contract; car booking and payment;

    Abstract : Sharing commodities such as vehicles and houses in exchange for a fee has become very popular in the recent years. Companies such as Uber and Airbnb are two examples where their users can rent their underutilized assets for a period of time. READ MORE

  3. 3. Studying the Opportunities of Blockchain Implementations in Electronic Transactions compared to the eIDAS Regulations

    University essay from KTH/Industriell ekonomi och organisation (Inst.)

    Author : Hanna Hansson; [2022]
    Keywords : Blockchain; blockchain technology; eIDAS; eIDAS regulation; eID; electronic identification; PKI; public key infrastructure; trusted service provider; distributed ledgers; SSI; self-sovereign identity; Blockchain; blockchain teknologi; eIDAS; eIDAS regulationen; eID; elektronisk identifikation; PKI; distribuerad databaseteknik; SSI;

    Abstract : The electronic identification regulation, eIDAS, and its trusted service providers are currently based on technologies that have been used for decades. The eIDAS and many others in the security industry have shown interest in newer technologies such as distributed ledgers and blockchain. READ MORE

  4. 4. Securing cloud-hosted IoT Workflows with Intel SGX

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Adnan Jamil Ahsan; [2022]
    Keywords : IoT; Node-RED; Azure; SGX; Gramine; Trusted Execution Environment; Security; STRIDE;

    Abstract : The rapid increase in the number of IoT devices and their widespread applications demands secure and scalable solutions for managing and executing IoT workflows. This thesis investigates the security of IoT workflows created in Node-RED, an open-source visual programming tool, and deployed on untrusted hosts managed by a major cloud service provider, Azure. READ MORE

  5. 5. A Novel Approach to Describe EdgeCloud SLA using TOSCA

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Sivakishan Atal Bihari BEESA; [2021]
    Keywords : TOSCA; SLA; Decentralized marketplace; SLA definition languages; Edge cloud; Blockchain; Hyper ledger fabric blockchain; Nubo; SLA management.;

    Abstract : Nubo is a broker-less and decentralized edge cloud marketplace that provides APIexposure for integration between entities of the marketplace, i.e., service providers and customers of edge cloud. The core functionalities of this marketplace are implemented by using Hyperledger Fabric blockchain. READ MORE