Dissertations / Theses on the topic 'Cloud Data Security Scheme'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Cloud Data Security Scheme.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Bartlett, Alex Michael. "SoK: A Practical Cost Comparison Among Provable Data Possession Schemes." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1819.
Full textChenette, Nathan Lee. "Symmetric schemes for efficient range and error-tolerant search on encrypted data." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/48976.
Full textHuang, Xueli. "Achieving Data Privacy and Security in Cloud." Diss., Temple University Libraries, 2016. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/372805.
Full textOduyiga, Adeshola Oyesanya. "Security in Cloud Storage : A Suitable Security Algorithm for Data Protection." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34428.
Full textMaddineni, Venkata Sravan Kumar, and Shivashanker Ragi. "Security Techniques for protecting data in Cloud Computing." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3430.
Full textKaaniche, Nesrine. "Cloud data storage security based on cryptographic mechanisms." Thesis, Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0033/document.
Full textKaaniche, Nesrine. "Cloud data storage security based on cryptographic mechanisms." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2014. http://www.theses.fr/2014TELE0033.
Full textDlamini, Moses Thandokuhle. "Combating Data Leakage in the Cloud." Thesis, University of Pretoria, 2020. http://hdl.handle.net/2263/73245.
Full textHe, Yijun, and 何毅俊. "Protecting security in cloud and distributed environments." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B49617631.
Full textGholami, Ali. "Security and Privacy of Sensitive Data in Cloud Computing." Doctoral thesis, KTH, Parallelldatorcentrum, PDC, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186141.
Full textYahya, Farashazillah. "A security framework to protect data in cloud storage." Thesis, University of Southampton, 2017. https://eprints.soton.ac.uk/415861/.
Full textImine, Youcef. "Cloud computing security." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2520.
Full textAl, Beshri Aiiad Ahmad M. "Outsourcing data storage without outsourcing trust in cloud computing." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/61738/1/Aiiad_Ahmad_M._Al_Beshri_Thesis.pdf.
Full textLounis, Ahmed. "Security in cloud computing." Thesis, Compiègne, 2014. http://www.theses.fr/2014COMP1945/document.
Full textBuop, George Onyango. "Data storage security for cloud computing using elliptic curve cryptography." Master's thesis, University of Cape Town, 2020. http://hdl.handle.net/11427/32489.
Full textMxoli, Ncedisa Avuya Mercia. "Guidelines for secure cloud-based personal health records." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/14134.
Full textEma, Ismat. "Sensitive Data Migration to the Cloud." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64736.
Full textSule, Mary-Jane. "Trusted cloud computing modelling with distributed end-user attestable multilayer security." Thesis, Brunel University, 2016. http://bura.brunel.ac.uk/handle/2438/12893.
Full textThomas, Michael Kyle. "Implementation of the Security-Dependability Adaptive Voting Scheme." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/32542.
Full textNoman, Ali. "Addressing the Data Location Assurance Problem of Cloud Storage Environments." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/37375.
Full textVan, der Schyff Karl Izak. "Cloud information security : a higher education perspective." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011607.
Full textXiong, Huijun. "Secure Data Service Outsourcing with Untrusted Cloud." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/23191.
Full textThilakanathan, Danan. "Secure Data Sharing and Collaboration in the Cloud." Thesis, The University of Sydney, 2015. http://hdl.handle.net/2123/15164.
Full textBilbray, Kyle. "DSFS: a data storage facilitating service for maximizing security, availability, performance, and customizability." Thesis, Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52984.
Full textInam, ul Haq Muhammad. "The major security challenges to cloud computing." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-17235.
Full textWeber, Torsten, Johannes Quaas, and Petri Räisänen. "Evaluation of the statistical cloud scheme in the ECHAM5 model using satellite data." Universitätsbibliothek Leipzig, 2015. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-189558.
Full textWeber, Torsten, Johannes Quaas, and Petri Räisänen. "Evaluation of the statistical cloud scheme in the ECHAM5 model using satellite data." Royal Meteorological Society, 2011. https://ul.qucosa.de/id/qucosa%3A12921.
Full textAkintoye, Samson Busuyi. "Quality of service in cloud computing: Data model; resource allocation; and data availability and security." University of the Western Cape, 2019. http://hdl.handle.net/11394/7066.
Full textGustafsson, Julia, and Mariam Said. "Security Aspects of Cloud Computing – Perspectives within Organizations." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-10458.
Full textXu, Cheng. "Authenticated query processing in the cloud." HKBU Institutional Repository, 2019. https://repository.hkbu.edu.hk/etd_oa/620.
Full textBernabeu, Emanuel. "Methodology for a Security-Dependability Adaptive Protection Scheme based on Data Mining." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/30131.
Full textZhang, Cong, and 張聰. "Design of Anonymity scheme for communication systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31228100.
Full textBacke, Anton, and Hugo Lindén. "Cloud Computing Security: A Systematic Literature Review." Thesis, Uppsala universitet, Institutionen för informatik och media, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-256426.
Full textWang, Ke, and 黃岢. "Designing authenication scheme for wireless sensor networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B42841732.
Full textCao, Ning. "Secure and Reliable Data Outsourcing in Cloud Computing." Digital WPI, 2012. https://digitalcommons.wpi.edu/etd-dissertations/333.
Full textZhu, Chunsheng. "Improving sensor-cloud : energy efficiency, security, sensory data transmission, and quality of service." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/58352.
Full textFigueira, André. "Secure framework for cloud data sharing based on blockchain." Master's thesis, Universidade de Évora, 2018. http://hdl.handle.net/10174/24258.
Full textPrakash, Aravind. "Confidential Data Dispersion using Thresholding." Scholarly Repository, 2009. http://scholarlyrepository.miami.edu/oa_theses/232.
Full textWonjiga, Amir Teshome. "User-centric security monitoring in cloud environments." Thesis, Rennes 1, 2019. http://www.theses.fr/2019REN1S080.
Full textSENIGAGLIESI, LINDA. "Information-theoretic security techniques for data communications and storage." Doctoral thesis, Università Politecnica delle Marche, 2019. http://hdl.handle.net/11566/263165.
Full textDuarte, Coscia Bruno Marcel. "Evaluation of Network-Layer Security Technologies for Cloud Platforms." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-290293.
Full textForde, Edward Steven. "Security Strategies for Hosting Sensitive Information in the Commercial Cloud." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3604.
Full textQuint, Ryan David. "Practical Implementation of a Security-Dependability Adaptive Voting Scheme Using Decision Trees." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/35667.
Full textKumar, Virendra. "Provable security support for kerberos (and beyond)." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44722.
Full textLi, F. "Context-aware attribute-based techniques for data security and access control in mobile cloud environment." Thesis, City University London, 2015. http://openaccess.city.ac.uk/11891/.
Full textVasilopoulos, Dimitrios. "Reconciling cloud storage functionalities with security : proofs of storage with data reliability and secure deduplication." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS399.
Full textTang, Yuzhe. "Secure and high-performance big-data systems in the cloud." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/53995.
Full textSkolmen, Dayne Edward. "Protection of personal information in the South African cloud computing environment: a framework for cloud computing adoption." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/12747.
Full textTan, Yue. "Stochastic Modeling, Optimization and Data-Driven Adaptive Control with Applications in Cloud Computing and Cyber Security." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1431098853.
Full textAdeka, Muhammad I. "Cryptography and Computer Communications Security. Extending the Human Security Perimeter through a Web of Trust." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/11380.
Full text