Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Rochester Institute of Technology

Theses/Dissertations

Cloud computing

Articles 1 - 7 of 7

Full-Text Articles in Entire DC Network

Secure Outsourced Computation On Encrypted Data, Asma Aloufi Dec 2020

Secure Outsourced Computation On Encrypted Data, Asma Aloufi

Theses

Homomorphic encryption (HE) is a promising cryptographic technique that supports computations on encrypted data without requiring decryption first. This ability allows sensitive data, such as genomic, financial, or location data, to be outsourced for evaluation in a resourceful third-party such as the cloud without compromising data privacy. Basic homomorphic primitives support addition and multiplication on ciphertexts. These primitives can be utilized to represent essential computations, such as logic gates, which subsequently can support more complex functions. We propose the construction of efficient cryptographic protocols as building blocks (e.g., equality, comparison, and counting) that are commonly used in data analytics and …


Accelerating Homomorphic Encryption In The Cloud Environment Through High-Level Synthesis And Reconfigurable Resources, Michael J. Foster Nov 2017

Accelerating Homomorphic Encryption In The Cloud Environment Through High-Level Synthesis And Reconfigurable Resources, Michael J. Foster

Theses

The recent surge in cloud services is revolutionizing the way that data is stored and processed. Everyone with an internet connection, from large corporations to small companies and private individuals, now have access to cutting-edge processing power and vast amounts of data storage. This rise in cloud computing and storage, however, has brought with it a need for a new type of security. In order to have access to cloud services, users must allow the service provider to have full access to their private, unencrypted data. Users are required to trust the integrity of the service provider and the security …


Evaluating Determinants Of Cloud Computing Acceptance In Croatian Sme Organizations, Damir Vrsajkovic Aug 2016

Evaluating Determinants Of Cloud Computing Acceptance In Croatian Sme Organizations, Damir Vrsajkovic

Theses

The cloud computing technology has made a tremendous impact on various types of business organizations by enabling fast, easy and cost effective use of information systems, and thus making it available to everyone. Respectively, the cloud computing would be most beneficial for small and medium organizations (SMEs). However, the Croatian SMEs are still reluctant in accepting the cloud computing technology and unleashing its full potential. This research study focuses on exploring how different determinants outlined in extended model of unified theory of acceptance and use of technology (UTAUT2) influence behavioral intention of decision makers within Croatian SME organizations to accept …


Implementing A Dynamic Scaling Of Web Applications In A Virtualized Cloud Computing Environment, Mohammed Aljebreen Jan 2013

Implementing A Dynamic Scaling Of Web Applications In A Virtualized Cloud Computing Environment, Mohammed Aljebreen

Theses

Cloud computing is becoming more essential day by day. The allure of the cloud is the significant value and benefits that people gain from it, such as reduced costs, increased storage, flexibility, and more mobility. Flexibility is one of the major benefits that cloud computing can provide in terms of scaling up and down the infrastructure of a network. Once traffic has increased on one server within the network, a load balancer instance will route incoming requests to a healthy instance, which is less busy and less burdened. When the full complement of instances cannot handle any more requests, past …


Sla-Based Risk Analysis In Cloud Computing Environments, Mohammed Almathami Jan 2012

Sla-Based Risk Analysis In Cloud Computing Environments, Mohammed Almathami

Theses

The cloud computing has been evolved in recent years which led many customers to utilize the cloud computing technologies. The research work in this area has spread due to many issues that have coincided with the vast growth of the cloud computing technologies. On the other hand, the cloud security concern has become one of the important issues that cloud computing introduces. One of the main components of cloud services is the service level agreement (SLA) that works as a contractual document between the cloud providers and their customers and states some metrics and parameters that must be enforced by …


Time Delay And Its Effect In A Virtual Lab Created Using Cloud Computing, Juan Nunez Jan 2010

Time Delay And Its Effect In A Virtual Lab Created Using Cloud Computing, Juan Nunez

Theses

The emergence of Cloud Computing, as a model of virtualized physical resources and virtualized infrastructure, offers the opportunity of outsourcing the implementation of a Virtual Lab Manager. Virtual Lab Management has come to be considered the Holy Grail in the deployment and administration of Labs created in a Virtual Environment. With the advent of Cloud Computing new opportunities are developing that promise to cover much of the future in Virtual Labs. Designing network and information labs with real equipment and tools does not make sense from a cost benefit standpoint, as hardware gets obsolete in a short gap of time, …


Creating Local Networks In The Cloud, José R. Sánchez E. Jan 2010

Creating Local Networks In The Cloud, José R. Sánchez E.

Theses

The resources and services offered by cloud computing platforms have been opening new alternatives of expansion to several research areas. The cloud computing platform applications to the educative area have been creating interest in different educative organizations. This thesis proposes the use of the Amazon EC2 cloud computing platform to build networking laboratories for the computational and networking educative areas. Within this paper, several options are evaluated in order to fulfill this objective. The final proposed design introduces a practical scenario for networking laboratories. Future enhancements of the final design are proposed.