To see the other types of publications on this topic, follow the link: Privacy in Cloud computing.

Dissertations / Theses on the topic 'Privacy in Cloud computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Privacy in Cloud computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Li, Min. "Privacy Protection on Cloud Computing." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3844.

Full text
Abstract:
Cloud is becoming the most popular computing infrastructure because it can attract more and more traditional companies due to flexibility and cost-effectiveness. However, privacy concern is the major issue that prevents users from deploying on public clouds. My research focuses on protecting user's privacy in cloud computing. I will present a hardware-based and a migration-based approach to protect user's privacy. The root cause of the privacy problem is current cloud privilege design gives too much power to cloud providers. Once the control virtual machine (installed by cloud providers) is co
APA, Harvard, Vancouver, ISO, and other styles
2

Evertsson, Daniel. "Cloud computing from a privacy perspective." Thesis, Umeå universitet, Institutionen för datavetenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-81118.

Full text
Abstract:
The cloud could simplifies the everyday life of private individuals as well as big enterprises by renting out recourses. Resources such as storage capacity, computational power or cloud-based applications could be accessed without the need to invest in expensive infrastructure. Even though many enterprises could benefit from using cloud services they hesitate, partly because they fear data leakage when storing sensitive data in the cloud environment.The goal has been to prevent unauthorized users to access the users’ data by using client-side encryption. The solution must be able to support ex
APA, Harvard, Vancouver, ISO, and other styles
3

Lindén, Simon. "Cloud Computing – A review of Confidentiality and Privacy." Thesis, Linköpings universitet, Interaktiva och kognitiva system, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-129705.

Full text
Abstract:
With the introduction of cloud computing the computation got distributed, virtualized and scalable. This also meant that customers of cloud computing gave away some of their control of their system. That led to a heighten importance of how to handle security in the cloud, for both provider and customer. Since security is such a big subject the focus of this thesis is on confidentiality and privacy, both closely related to how to handle personal data. With the help of a systematic literature review in this thesis, current challenges and possible mitigations are presented in some different areas
APA, Harvard, Vancouver, ISO, and other styles
4

Gholami, Ali. "Security and Privacy of Sensitive Data in Cloud Computing." Doctoral thesis, KTH, Parallelldatorcentrum, PDC, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186141.

Full text
Abstract:
Cloud computing offers the prospect of on-demand, elastic computing, provided as a utility service, and it is revolutionizing many domains of computing. Compared with earlier methods of processing data, cloud computing environments provide significant benefits, such as the availability of automated tools to assemble, connect, configure and reconfigure virtualized resources on demand. These make it much easier to meet organizational goals as organizations can easily deploy cloud services. However, the shift in paradigm that accompanies the adoption of cloud computing is increasingly giving rise
APA, Harvard, Vancouver, ISO, and other styles
5

Pitaro, Raffaele. "Problematiche di trust e privacy negli ambienti di cloud computing." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8916/.

Full text
Abstract:
Questa tesi si prefigge l’obiettivo di analizzare alcuni aspetti critici della sicurezza in ambito cloud. In particolare, i problemi legati alla privacy, dai termini di utilizzo alla sicurezza dei dati personali più o meno sensibili. L’aumento esponenziale di dati memorizzati nei sistemi di cloud storage (es. Dropbox, Amazon S3) pone il problema della sensibilità dei dati su un piano tutt'altro che banale, dovuto anche a non ben chiare politiche di utilizzo dei dati, sia in termini di cessione degli stessi a società di terze parti, sia per quanto riguarda le responsabilità legali. Questa tesi
APA, Harvard, Vancouver, ISO, and other styles
6

Brown, Adrian Paul. "Implementing Privacy-Preserving Record Linkage in a Cloud Computing Environment." Thesis, Curtin University, 2021. http://hdl.handle.net/20.500.11937/86133.

Full text
Abstract:
Increased demand for record linkage of administrative data, coupled with privacy risks, presents considerable challenges for many organisations. The primary objective of this research was to develop an operational cloud model for privacy-preserving record linkage utilising scalable computing infrastructure. The thesis presents and evaluates a cloud model for record linkage that links records without sharing personally identifying information, incorporating new techniques for improving accuracy, privacy and performance.
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Bing. "Search over Encrypted Data in Cloud Computing." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/71466.

Full text
Abstract:
Cloud computing which provides computation and storage resources in a pay-per-usage manner has emerged as the most popular computation model nowadays. Under the new paradigm, users are able to request computation resources dynamically in real-time to accommodate their workload requirements. The flexible resource allocation feature endows cloud computing services with the capability to offer affordable and efficient computation services. However, moving data and applications into the cloud exposes a privacy leakage risk of the user data. As the growing awareness of data privacy, more and more u
APA, Harvard, Vancouver, ISO, and other styles
8

Skolmen, Dayne Edward. "Protection of personal information in the South African cloud computing environment: a framework for cloud computing adoption." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/12747.

Full text
Abstract:
Cloud Computing has advanced to the point where it may be considered an attractive proposition for an increasing number of South African organisations, yet the adoption of Cloud Computing in South Africa remains relatively low. Many organisations have been hesitant to adopt Cloud solutions owing to a variety of inhibiting factors and concerns that have created mistrust in Cloud Computing. One of the top concerns identified is security within the Cloud Computing environment. The approaching commencement of new data protection legislation in South Africa, known as the Protection of Personal Info
APA, Harvard, Vancouver, ISO, and other styles
9

Huang, Xueli. "Achieving Data Privacy and Security in Cloud." Diss., Temple University Libraries, 2016. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/372805.

Full text
Abstract:
Computer and Information Science<br>Ph.D.<br>The growing concerns in term of the privacy of data stored in public cloud have restrained the widespread adoption of cloud computing. The traditional method to protect the data privacy is to encrypt data before they are sent to public cloud, but heavy computation is always introduced by this approach, especially for the image and video data, which has much more amount of data than text data. Another way is to take advantage of hybrid cloud by separating the sensitive data from non-sensitive data and storing them in trusted private cloud and un-trus
APA, Harvard, Vancouver, ISO, and other styles
10

TAPANELLI, Pietro. "Cloud computing contracts." Doctoral thesis, Università degli Studi di Camerino, 2014. http://hdl.handle.net/11581/401831.

Full text
Abstract:
Cloud computing services are ubiquitous: for small and large companies the phenomenon of cloud computing is nowadays a standard business practice. This work would compile an analysis about the contractual issues related to the different services provided by all IT services provider. There are faced not only legal topics strictly connected to the personal data protection because, as the thesis will show, there are several legal acts provided by European Union, Italy (and from all EU's member states) and data protection authorities (both nation and international) that discipline the entire data
APA, Harvard, Vancouver, ISO, and other styles
11

Al-Refai, Ali, and Srinivasreddy Pandiri. "Cloud Computing : Trends and Performance Issues." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3672.

Full text
Abstract:
Context: Cloud Computing is a very fascinating concept these days, it is attracting so many organiza-tions to move their utilities and applications into a dedicated data centers, and so it can be accessed from the Internet. This allows the users to focus solely on their businesses while Cloud Computing providers handle the technology. Choosing a best provider is a challenge for organizations that are willing to step into the Cloud Computing world. A single cloud center generally could not deliver large scale of resources for the cloud tenants; therefore, multiple cloud centers need to collabor
APA, Harvard, Vancouver, ISO, and other styles
12

Lounis, Ahmed. "Security in cloud computing." Thesis, Compiègne, 2014. http://www.theses.fr/2014COMP1945/document.

Full text
Abstract:
Le Cloud Computing, ou informatique en nuages, est un environnement de stockage et d’exécution flexible et dynamique qui offre à ses utilisateurs des ressources informatiques à la demande via internet. Le Cloud Computing se développe de manière exponentielle car il offre de nombreux avantages rendus possibles grâce aux évolutions majeures des Data Centers et de la virtualisation. Cependant, la sécurité est un frein majeur à l’adoption du Cloud car les données et les traitements seront externalisés hors de site de confiance de client. Cette thèse contribue à résoudre les défis et les issues de
APA, Harvard, Vancouver, ISO, and other styles
13

Imine, Youcef. "Cloud computing security." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2520.

Full text
Abstract:
Ces dernières années, nous assistons à une immense révolution numérique de l’internet où de nombreuses applications, innovantes telles que l’internet des objets, les voitures autonomes, etc., ont émergé. Par conséquent, l’adoption des technologies d’externalisations des données, telles que le cloud ou le fog computing, afin de gérer cette expansion technologique semble inévitable. Cependant, l’utilisation du cloud ou du fog computing en tant que plateforme d’externalisation pour le stockage ou le partage des données crée plusieurs défis scientifiques. En effet, externaliser ses données signifi
APA, Harvard, Vancouver, ISO, and other styles
14

Brahim, Kamel. "Cloud Computing:Accountability." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3164/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Siddiqui, Muhammad Anas. "Cloud Computing : Evaluation, as a platform for Scania Architecture." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-18896.

Full text
Abstract:
Cloud computing has been given a great deal of attention during recent years. Almost all the technology market leaders and leading hosting service providers (like IBM, Microsoft and Verizon) have entered into the Cloud market as Cloud Providers. Cloud computing promises to provide highly available, secure, low cost, agile and highly scalable solution to the consumers. Scania is a global company and one of the world’s leading heavy vehicle manufacturers with 35,000+ employees. All the large organizations such as Scania, aim to constantly update themselves with the latest technology in order to
APA, Harvard, Vancouver, ISO, and other styles
16

Pauley, Wayne A. Jr. "An Empirical Study of Privacy Risk Assessment Methodologies in Cloud Computing Environments." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/271.

Full text
Abstract:
Companies offering services on the Internet have led corporations to shift from the high cost of owning and maintaining stand-alone, privately-owned-and-operated infrastructure to a shared infrastructure model. These shared infrastructures are being offered by infrastructure service providers which have subscription, or pay-on-demand, charge models presenting compute and storage resources as a generalized utility. Utility based infrastructures that are run by service providers have been defined as "cloud computing" by the National Institute of Standards and Technology. In the cloud computing m
APA, Harvard, Vancouver, ISO, and other styles
17

Zhang, Yulong. "TOWARDS AN INCENTIVE COMPATIBLE FRAMEWORK OF SECURE CLOUD COMPUTING." VCU Scholars Compass, 2012. http://scholarscompass.vcu.edu/etd/2739.

Full text
Abstract:
Cloud computing has changed how services are provided and supported through the computing infrastructure. It has the advantages such as flexibility , scalability , compatibility and availability . However, the current architecture design also brings in some troublesome problems, like the balance of cooperation benefits and privacy concerns between the cloud provider and the cloud users, and the balance of cooperation benefits and free-rider concerns between different cloud users. Theses two problems together form the incentive problem in cloud environment. The first conflict lies between the r
APA, Harvard, Vancouver, ISO, and other styles
18

Coss, David. "Cloud Privacy Audit Framework: A Value-Based Design." VCU Scholars Compass, 2013. http://scholarscompass.vcu.edu/etd/3106.

Full text
Abstract:
The rapid expansion of cloud technology provides enormous capacity, which allows for the collection, dissemination and re-identification of personal information. It is the cloud’s resource capabilities such as these that fuel the concern for privacy. The impetus of these concerns are not too far removed from those expressed by Mason in 1986, when he identified privacy as one of the biggest ethical issues facing the information age. There seems to be continuous ebb and flow relationship with respect to privacy concerns and the development of new information communication technologies such as cl
APA, Harvard, Vancouver, ISO, and other styles
19

Pagano, F. "A DISTRIBUTED APPROACH TO PRIVACY ON THE CLOUD." Doctoral thesis, Università degli Studi di Milano, 2012. http://hdl.handle.net/2434/172441.

Full text
Abstract:
The increasing adoption of Cloud-based data processing and storage poses a number of privacy issues. Users wish to preserve full control over their sensitive data and cannot accept it to be fully accessible to an external storage provider. Previous research in this area was mostly addressed at techniques to protect data stored on untrusted database servers; however, I argue that the Cloud architecture presents a number of specific problems and issues. This dissertation contains a detailed analysis of open issues. To handle them, I present a novel approach where confidential data is stored in a
APA, Harvard, Vancouver, ISO, and other styles
20

Limone, Marilena. "Cloud computing; Risvolti normativi." Doctoral thesis, Universita degli studi di Salerno, 2015. http://hdl.handle.net/10556/1958.

Full text
Abstract:
2013 - 2014<br>The expression "cloud computing", in Italian “nuvola informatica”, indicates a complex range of technologies that allow, typically in the form service offered by a provider to the customer, to store, archive and / or process data, in most cases of a personal nature, thanks to the use of hardware and software resources distributed and virtualized on line. Cloud computing services are used in different ways and by different users: consumers, in general, use them for e-mail, for storing and sharing content and information of various kinds, for payment services but also for
APA, Harvard, Vancouver, ISO, and other styles
21

Cao, Ning. "Secure and Reliable Data Outsourcing in Cloud Computing." Digital WPI, 2012. https://digitalcommons.wpi.edu/etd-dissertations/333.

Full text
Abstract:
"The many advantages of cloud computing are increasingly attracting individuals and organizations to outsource their data from local to remote cloud servers. In addition to cloud infrastructure and platform providers, such as Amazon, Google, and Microsoft, more and more cloud application providers are emerging which are dedicated to offering more accessible and user friendly data storage services to cloud customers. It is a clear trend that cloud data outsourcing is becoming a pervasive service. Along with the widespread enthusiasm on cloud computing, however, concerns on data security with cl
APA, Harvard, Vancouver, ISO, and other styles
22

Ali, Ayaz. "Analysis of key security and privacy concerns and viable solutions in Cloud computing." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-90806.

Full text
Abstract:
Cloud Security and Privacy is the most concerned area in the development of newly advance technological domains like cloud computing, the cloud of things, the Internet of Things. However, with the growing popularity and diverse nature of these technologies, security and privacy are becoming intricate matters and affect the adoption of cloud computing. Many small and large enterprises are in conflict while migrating towards cloud technology and this is because of no proper cloud adoption policy guideline, generic solutions for system migration issues, systematic models to analyze security and p
APA, Harvard, Vancouver, ISO, and other styles
23

Villarino, Marzo Jorge. "La privacidad en el entorno del cloud computing." Doctoral thesis, Universitat Abat Oliba, 2017. http://hdl.handle.net/10803/456904.

Full text
Abstract:
L’evolució tecnològica ha tingut un enorme impacte en els drets fonamentals, donant lloc al naixement de la quarta generació de drets. Un d’aquests drets ha sigut, sens dubte, el dret a la protecció de dades. La privacitat constitueix una de les grans preocupacions de la societat. Per aquesta raó, qualsevol desenvolupament tecnològic planteja nous reptes a la regulació de la protecció de dades. La computació en núvol és una nova realitat tecnològica caracteritzada per la ubiqüitat, l’elasticitat, el dinamisme, la virtualització, l’escalabilitat i el pagament sota demanda. En aquest treball s
APA, Harvard, Vancouver, ISO, and other styles
24

Palanisamy, Balaji. "Cost-effective and privacy-conscious cloud service provisioning: architectures and algorithms." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/52157.

Full text
Abstract:
Cloud Computing represents a recent paradigm shift that enables users to share and remotely access high-powered computing resources (both infrastructure and software/services) contained in off-site data centers thereby allowing a more efficient use of hardware and software infrastructures. This growing trend in cloud computing, combined with the demands for Big Data and Big Data analytics, is driving the rapid evolution of datacenter technologies towards more cost-effective, consumer-driven, more privacy conscious and technology agnostic solutions. This dissertation is dedicated to taking a s
APA, Harvard, Vancouver, ISO, and other styles
25

Thilakanathan, Danan. "Secure Data Sharing and Collaboration in the Cloud." Thesis, The University of Sydney, 2015. http://hdl.handle.net/2123/15164.

Full text
Abstract:
Cloud technology can be leveraged to enable data-sharing capabilities, which can benefit the user through greater productivity and efficiency. However, the Cloud is susceptible to many privacy and security vulnerabilities, which hinders the progress and widescale adoption of data sharing for the purposes of collaboration. Thus, there is a strong demand for data owners to not only ensure that their data is kept private and secure in the Cloud, but to also have a degree of control over their own data contents once they are shared with data consumers. Specifically, the main issues for data shari
APA, Harvard, Vancouver, ISO, and other styles
26

Cerf, Sophie. "control theory for computing systems : application to big-data cloud services & location privacy protection." Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAT024.

Full text
Abstract:
Cette thèse présente une application de la théorie du contrôle pour les systèmes informatiques. Un algorithme de contrôle peut gérer des systèmes plus grands et plus complexes, même lorsqu'ils sont particulièrement sensibles aux variations de leur environnement. Cependant, l'application du contrôle aux systèmes informatiques soulève plusieurs défis, par exemple dû au fait qu'aucune physique ne les régisse. D'une part, le cadre mathématique fourni par la théorie du contrôle peut être utilisé pour améliorer l'automatisation, la robustesse et la fiabilité des systèmes informatiques. D'autre part,
APA, Harvard, Vancouver, ISO, and other styles
27

Giraud, Matthieu. "Secure Distributed MapReduce Protocols : How to have privacy-preserving cloud applications?" Thesis, Université Clermont Auvergne‎ (2017-2020), 2019. http://www.theses.fr/2019CLFAC033/document.

Full text
Abstract:
À l’heure des réseaux sociaux et des objets connectés, de nombreuses et diverses données sont produites à chaque instant. L’analyse de ces données a donné lieu à une nouvelle science nommée "Big Data". Pour traiter du mieux possible ce flux incessant de données, de nouvelles méthodes de calcul ont vu le jour. Les travaux de cette thèse portent sur la cryptographie appliquée au traitement de grands volumes de données, avec comme finalité la protection des données des utilisateurs. En particulier, nous nous intéressons à la sécurisation d’algorithmes utilisant le paradigme de calcul distribué Ma
APA, Harvard, Vancouver, ISO, and other styles
28

Aloqaily, Moayad. "User Experience-Based Provisioning Services in Vehicular Clouds." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35545.

Full text
Abstract:
Today, the increasing number of applications based on the Internet of Things, as well as advances in wireless communication, information and communication technology, and mobile cloud computing have allowed users to access a wide range of resources while mobile. Vehicular clouds are considered key elements for today’s intelligent transportation systems. They are outfitted with equipment to enable applications and services for vehicle drivers, surrounding vehicles, pedestrians and third parties. As vehicular cloud computing has become more popular, due to its ability to improve driver and vehi
APA, Harvard, Vancouver, ISO, and other styles
29

Olurin, Olumuyiwa. "Policy Merger System for P3P in a Cloud Aggregation Platform." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/23624.

Full text
Abstract:
The need for aggregating privacy policies is present in a variety of application areas today. In traditional client/server models, websites host services along with their policies in different private domains. However, in a cloud-computing platform where aggregators can merge multiple services, users often face complex decisions in terms of choosing the right services from service providers. In this computing paradigm, the ability to aggregate policies as well as services will be useful and more effective for users that are privacy conscious regarding their sensitive or personal information.
APA, Harvard, Vancouver, ISO, and other styles
30

Li, Ming. "User-Centric Security and Privacy Mechanisms in Untrusted Networking and Computing Environments." Digital WPI, 2011. https://digitalcommons.wpi.edu/etd-dissertations/323.

Full text
Abstract:
"Our modern society is increasingly relying on the collection, processing, and sharing of digital information. There are two fundamental trends: (1) Enabled by the rapid developments in sensor, wireless, and networking technologies, communication and networking are becoming more and more pervasive and ad hoc. (2) Driven by the explosive growth of hardware and software capabilities, computation power is becoming a public utility and information is often stored in centralized servers which facilitate ubiquitous access and sharing. Many emerging platforms and systems hinge on both dimensions, suc
APA, Harvard, Vancouver, ISO, and other styles
31

Sobati, Moghadam Somayeh. "Contributions to Data Privacy in Cloud Data Warehouses." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSE2020.

Full text
Abstract:
Actuellement, les scénarios d’externalisation de données deviennent de plus en plus courants avec l’avènement de l’infonuagique. L’infonuagique attire les entreprises et les organisations en raison d’une grande variété d’avantages fonctionnels et économiques.De plus, l’infonuagique offre une haute disponibilité, le passage d’échelle et une reprise après panne efficace. L’un des services plus notables est la base de données en tant que service (Database-as-a-Service), où les particuliers et les organisations externalisent les données, le stockage et la gestion `a un fournisseur de services. Ces
APA, Harvard, Vancouver, ISO, and other styles
32

Malík, Tomáš. "Adopce Cloud computing ve firemním sektoru." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-124676.

Full text
Abstract:
This work is focused on the newly emerging field of Cloud computing and view of adoption of this technology in various industrial sectors. The first section explains the concept of cloud computing, its characteristics and individual models. The following part is a brief analysis of the size and development of the current market for cloud services. Next section focuses on the creation of industry categories acording to area of their business, together with their description. The actual categories are examined in part four, along with their expenditures on IT and state of Cloud's adoption, in ad
APA, Harvard, Vancouver, ISO, and other styles
33

Theron, Piet. "Criteria for the evaluation of private cloud computing." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/85858.

Full text
Abstract:
Thesis (MSc)--Stellenbosch University, 2013.<br>ENGLISH ABSTRACT: Cloud computing is seen as one of top 10 disruptive changes in IT for the next decade by leading research analysts. Consequently, enterprises are starting to investigate the effect it will have on the strategic direction of their businesses and technology stacks. Because of the disruptive nature of the paradigm shift introduced by it, as well as the strategic impact thereof, it is necessary that a structured approach with regard to risk, value and operational cost is followed with the decision on its relevance, as well as
APA, Harvard, Vancouver, ISO, and other styles
34

Basson, Benhardus. "The right to privacy : how the proposed POPI Bill will impact data security in a cloud computing environment." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/86184.

Full text
Abstract:
Thesis (MComm)--Stellenbosch University, 2014.<br>ENGLISH ABSTRACT: The growing popularity and continuing development of cloud computing services is ever evolving and is slowly being integrated into our daily lives through our interactions with electronic devices. Cloud Computing has been heralded as the solution for enterprises to reduce information technology infrastructure cost by buying cloud services as a utility. While this premise is generally correct, in certain industries for example banking, the sensitive nature of the information submitted to the cloud for storage or processing plac
APA, Harvard, Vancouver, ISO, and other styles
35

Vepuri, Harish, and Mohsin Rahman. "IMPLICATIONS OF CLOUD COMPUTING IN IT ORGANIZATIONS." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH. Forskningsmiljö Informationsteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-16989.

Full text
Abstract:
Information technology (IT) in the recent decades has showcased immense evolution. This evolution has impacted not only the technological sector of the society but also the socio-political and economic sectors. One such archetype that has gained popular momentum in the recent years is cloud computing. Still in its developmental stages, cloud computing is the latest offspring of computing services and has invariably challenged the traditional aspects of computing services across the IT Organizations in the world. Thus, adopted by a number of developed as well as developing countries, cloud comp
APA, Harvard, Vancouver, ISO, and other styles
36

Polk, Nekerral. "Adoption of Cloud Computing Services in an Illinois-Based Insurance Company." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7058.

Full text
Abstract:
The decision to adopt cloud computing services should involve business units of an insurance company as well as information technology (IT) because cloud computing services are viewed as both a technology offering and business alternative. The purpose of this qualitative exploratory case study was to explore the strategies used by IT architects of an Illinois-based insurance company when adopting cloud computing services. The theory supporting this study was the technology acceptance model. The study's population consisted of IT architects from an Illinois-based insurance company that have use
APA, Harvard, Vancouver, ISO, and other styles
37

Eze, Benjamin. "A Cloud-based Surveillance and Performance Management Architecture for Community Healthcare." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39272.

Full text
Abstract:
Governments and healthcare providers are under increasing pressure to streamline their processes to reduce operational costs while improving service delivery and quality of care. Systematic performance management of healthcare processes is important to ensure that quality of care goals are being met at all levels of the healthcare ecosystem. The challenge is that measuring these goals requires the aggregation and analysis of large amounts of data from various stakeholders in the healthcare industry. With the lack of interoperability between stakeholders in current healthcare compute and storag
APA, Harvard, Vancouver, ISO, and other styles
38

Marques, Bruno Manuel Dias Caetano. "Privacidade de informação e a reforma das directivas europeias de privacidade de dados." Master's thesis, Instituto Superior de Economia e Gestão, 2012. http://hdl.handle.net/10400.5/10973.

Full text
Abstract:
Mestrado em Gestão de Sistemas de Informação<br>A privacidade de informação parece ser, atualmente, uma preocupação crescente para os utilizadores de sistemas de informação (SI), dado o desconhecimento da forma como os seus dados privados são utilizados, por quem, com que intuito e qual a sua fiabilidade. Segundo um estudo recente do Eurobarómetro, os cidadãos europeus encontram-se apreensivos quanto à utilização dos seus dados privados pelas organizações, com especial incidência nas redes sociais e motores de pesquisa, na Internet. A maioria dos utilizadores tem consciência de que o seu conhe
APA, Harvard, Vancouver, ISO, and other styles
39

Rodrigues, João Miguel Cardia Melro. "TSKY: a dependable middleware solution for data privacy using public storage clouds." Master's thesis, Faculdade de Ciências e Tecnologia, 2013. http://hdl.handle.net/10362/11071.

Full text
Abstract:
Dissertação para obtenção do Grau de Mestre em Engenharia Informática<br>This dissertation aims to take advantage of the virtues offered by data storage cloud based systems on the Internet, proposing a solution that avoids security issues by combining different providers’ solutions in a vision of a cloud-of-clouds storage and computing. The solution, TSKY System (or Trusted Sky), is implemented as a middleware system, featuring a set of components designed to establish and to enhance conditions for security, privacy, reliability and availability of data, with these conditions being secured and
APA, Harvard, Vancouver, ISO, and other styles
40

Al, Smadi Duha. "Information Sharing and Storage Behavior via Cloud Computing: Security and Privacy in Research and Practice and Users' Trust." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1505164/.

Full text
Abstract:
This research contributes to the cloud computing (CC) literature and information science research by addressing the reality of information sharing and storage behavior (ISSB) of the users' personal information via CC. Gathering information about usage also allows this research to address the paradox between the research and practice. Additionally, this research explores the concept of trust and its role in the behavioral change relative to CC. The findings help reconcile the paradox between the two realms. Essay1 develops and tests cloud computing usage model (CCUM) that assesses ISSB. This
APA, Harvard, Vancouver, ISO, and other styles
41

Sun, Wenhai. "Towards Secure Outsourced Data Services in the Public Cloud." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/84396.

Full text
Abstract:
Past few years have witnessed a dramatic shift for IT infrastructures from a self-sustained model to a centralized and multi-tenant elastic computing paradigm -- Cloud Computing, which significantly reshapes the landscape of existing data utilization services. In truth, public cloud service providers (CSPs), e.g. Google, Amazon, offer us unprecedented benefits, such as ubiquitous and flexible access, considerable capital expenditure savings and on-demand resource allocation. Cloud has become the virtual ``brain" as well to support and propel many important applications and system designs, for
APA, Harvard, Vancouver, ISO, and other styles
42

Pereira, Pedro Miguel Roxo. "Implementação e avaliação de uma Private Cloud em OpenSource." Master's thesis, Instituto Superior de Economia e Gestão, 2014. http://hdl.handle.net/10400.5/7575.

Full text
Abstract:
Mestrado em Gestão de Sistemas de Informação<br>Com as crescentes necessidades e exigências em fornecer melhores ferramentas e sistemas de informação a todos os intervenientes do setor da educação, é considerado fundamental a promoção e reformulação dos serviços tecnológicos atuais, de forma a acrescentar mais autonomia, celeridade e eficiência. Considerando o ambiente atual como economicamente restritivo, o cloud computing poderá constituir uma interessante solução para colmatar os objetivos enunciados. O presente projeto consistiu no desenvolvimento de uma nuvem privada num organismo centr
APA, Harvard, Vancouver, ISO, and other styles
43

Maskara, Arvind. "A Process Framework for Managing Quality of Service in Private Cloud." ScholarWorks, 2014. https://scholarworks.waldenu.edu/dissertations/3220.

Full text
Abstract:
As information systems leaders tap into the global market of cloud computing-based services, they struggle to maintain consistent application performance due to lack of a process framework for managing quality of service (QoS) in the cloud. Guided by the disruptive innovation theory, the purpose of this case study was to identify a process framework for meeting the QoS requirements of private cloud service users. Private cloud implementation was explored by selecting an organization in California through purposeful sampling. Information was gathered by interviewing 23 information technology (I
APA, Harvard, Vancouver, ISO, and other styles
44

Colombo, Cristiano. "Cloud computing e direito das sucessões : direito de privacidade como critério de acesso aos dados pelos herdeiros." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2015. http://hdl.handle.net/10183/121911.

Full text
Abstract:
La présente étude se penche sur une réflexion à propos de la succession causa mortis de données sauvegardées à la Cloud Computing, en cherchant à délimiter les options juridiques pour, en cas de mort, permettre ou, encore, interdire, l’accès des héritiers aux données du décédé. Dans ce sens, dans le premier chapitre, nous avons étudié la Cloud Computing comme un moyen contemporain de stockage de données en reprenant les autres moyens qui se sont présentés tout au long de l’histoire, tout comme le rapport établi entre la Société de l’Information et le Droit, en analysant la position non-interve
APA, Harvard, Vancouver, ISO, and other styles
45

Carter, Henry Lee. "Efficient techniques for secure multiparty computation on mobile devices." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54318.

Full text
Abstract:
Smartphones are rapidly becoming a widespread computation platform, with many users relying on their mobile devices as their primary computing device. This popularity has brought about a plethora of mobile applications and services which are designed to efficiently make these limited devices a viable source of entertainment and productivity. This is commonly accomplished by moving the critical application computation to a Cloud or application server managed by the application developer. Unfortunately, the significant number of breaches experienced by mobile application infrastructure and the a
APA, Harvard, Vancouver, ISO, and other styles
46

Vaskovich, Daria. "Cloud Computing and Sensitive Data : A Case of Beneficial Co-Existence or Mutual Exclusiveness?" Thesis, KTH, Hållbarhet och industriell dynamik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169597.

Full text
Abstract:
I dag anses molntjänster vara ett omtalat ämne som har ändrat hur IT-tjänster levereras och som skapat nya affärsmodeller. Några av molntjänsternas mest frekvent nämnda fördelar är flexibilitet och skalbarhet. Molntjänster är i dagsläget extensivt använda av privatpersoner genom tjänster så som Google Drive och Dropbox. Å andra sidan kan en viss försiktighet gentemot molntjänster uppmärksammas hos de organisationer som innehar känslig data. Denna försiktighet kan anses leda till en långsammare tillämpningshastighet för dessa organisationer. Detta examensarbete har som syfte att undersöka samba
APA, Harvard, Vancouver, ISO, and other styles
47

Ameur, Yulliwas. "Exploring the Scope of Machine Learning using Homomorphic Encryption in IoT/Cloud." Electronic Thesis or Diss., Paris, HESAM, 2023. http://www.theses.fr/2023HESAC036.

Full text
Abstract:
L'apprentissage automatique en tant que service (MLaaS) a accéléré l'adoption des techniques d'apprentissage automatique dans divers domaines. Toutefois, cette tendance a également soulevé de sérieuses inquiétudes quant à la sécurité et à la confidentialité des données sensibles utilisées dans les modèles d'apprentissage automatique. Pour relever ce défi, notre approche consiste à utiliser le chiffrement homomorphique.Cette thèse explore l'application du chiffrement homomorphe dans divers contextes d'apprentissage automatique. La première partie du travail se concentre sur l'utilisation du chi
APA, Harvard, Vancouver, ISO, and other styles
48

Rocha, Francisco Emanuel Liberal. "Privacy in cloud computing." Master's thesis, 2010. http://hdl.handle.net/10451/9238.

Full text
Abstract:
Tese de mestrado em Segurança Informática, apresentada à Universidade de Lisboa, através da Faculdade de Ciências, 2010<br>O paradigma cloud computing está progressivamente a integrar-se nas tecnologias de informação e é também visto por muitos como a próxima grande viragem na indústria da computação. A sua integração significa grandes alterações no modo como olhamos para a segurança dos dados de empresas que decidem confiar informação confidencial aos fornecedores de serviços cloud. Esta alteração implica um nível muito elevado de confiança no fornecedor do serviço. Ao mudar para a cloud, uma
APA, Harvard, Vancouver, ISO, and other styles
49

Giweli, Nabil. "Enhancing cloud computing security and privacy." Thesis, 2013. http://handle.uws.edu.au:8081/1959.7/530171.

Full text
Abstract:
This thesis aims to enhance cloud computing security by proposing a solution based on the DCS approach. The research towards achieving this aim starts with a systematic review of the literature to establish a framework to utilize DCS concepts for improving data security and privacy in cloud environments. The DCS concept is based on providing security at the data level. Hence, the data are self-describing, self-defending and self-protecting during their lifecycle in the cloud environments. The data owner is solely responsible to set and manage the data privacy and security measures. These requi
APA, Harvard, Vancouver, ISO, and other styles
50

SHIH, MING HSIEN, and 施明賢. "Privacy Protection of Cloud Computing Service." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/00352738377551801474.

Full text
Abstract:
碩士<br>國立清華大學<br>科技法律研究所<br>99<br>With the rapid development of information technology, on one hand, the daily life becomes more convenient; but on the other hand, it also brings about more complicated issues on the privacy and security than ever. Cloud computing service is not a brand new technology, but a new business service model. With the diversification of the cloud computing service applications, its impact on protection of personal privacy is more influential than any other technologies. The essay, through the interaction between privacy, security, information technology, will not onl
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!