National Repository of Grey Literature 4 records found  Search took 0.01 seconds. 
Securing Shared Data Storage
Škoda, Martin ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This work presents the cloud computing model. It describes deployment models and distribution models of the cloud computing. The distribution models like software as a service and infrastructure as a service are described. Then the current solutions from companies Amazon.com, Microsoft and VMware and the description of security of the particular solutions are presented. The next section deals with data security in the cloud computing. In this section, the fundamental methods of data security (confidentiality, integrity and availability) and the examples of cryptographic methods used in the cloud computing are described. Further, the methods used for secure infrastructure and network (defense in depth), the protection of privacy and the security of data storage are described. Nowadays, the open problems are ensuring the protection of privacy of user data and data storage security auditing, which prevent users to gain trust in cloud computing. To solve these problems, Privacy as a Service (PasS), homomorphic encryption, privacy preserving data storage public auditing and Trusted Computing are described. In the final part of this work, the threads in the cloud computing environment and theirs countermeasures are analyzed. Finally, the design of model for securing shared data storage is proposed. Model is based on the previous findings. Model uses a tamper-proof hardware with cryptographic protections to ensure the privacy of computed data and the integrity of data stored on storage in the cloud computing.
The Protection of Privacy on the Internet: a Law and Economics Perspective
Blatt, Patrik ; Dušek, Libor (advisor) ; Montag, Josef (referee)
The Protection of Privacy on the Internet: a Law and Economics Perspective Abstract The topic of this thesis is protection of privacy on the Internet, further narrowed down to the matter of granting consent to store and process cookies and looking at it specifically from the perspective of law and economics. The aim of this paper is to answer the question of whether the current legislation of granting permission to process cookies is sufficient and user-friendly. To answer this question, the thesis was based on interpretation of the results of a survey about using cookies, conducted on selected Czech websites, namely those of central authorities of the Czech Republic, Czech news portals and Czech online shopping stores. Furthermore, the thesis proposes specific changes within current legislation of processing cookies. Because of the transposition of Directive on privacy and electronic communications into the legal order of the Czech Republic, the policy of granting consent to the storing and processing of personal data has changed from the original opt-out policy to the current opt-in policy. The current opt-in policy requires a preceding user's consent. In this thesis, I conclude that applying this opt-in policy has lowered the user-friendly settings and that it did not lead to any improvement of...
Monitoring of employees
Drozdíková, Andrea ; Štefko, Martin (advisor) ; Kotous, Jan (referee)
Monitoring of employees Abstract The theme of this diploma thesis is, as the title suggests, the monitoring of employees. With the continuous development and progress of technologies and their increasing availability, the privacy of citizens is becoming increasingly more endangered. Even more concerning is the privacy of employees in the workplace, where an employer has inexhaustible possibilities to monitor activity at work - and sometimes outside of the workplace as well. On the other hand, the intention of the employer to protect its assets and the financial means invested in the operation of its business is appreciable and in some ways necessary to align with the employer's obligations to their shareholders. Therefore, the chosen subject brings to the surface the conflict of two equal rights, as the right to protection of privacy collides with the right of protection of property. For this reason, the whole thesis takes into account both the labour law regulations and the regulations on the protection of personal data - since personal data of employees can be threatened by monitoring. With regard to the fact, that Regulation (EU) 2016/679 comes into effect soon, it is briefly mentioned in the relevant parts, especially when assessing whether it will impact the legal interpretation in the future or not....
Securing Shared Data Storage
Škoda, Martin ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This work presents the cloud computing model. It describes deployment models and distribution models of the cloud computing. The distribution models like software as a service and infrastructure as a service are described. Then the current solutions from companies Amazon.com, Microsoft and VMware and the description of security of the particular solutions are presented. The next section deals with data security in the cloud computing. In this section, the fundamental methods of data security (confidentiality, integrity and availability) and the examples of cryptographic methods used in the cloud computing are described. Further, the methods used for secure infrastructure and network (defense in depth), the protection of privacy and the security of data storage are described. Nowadays, the open problems are ensuring the protection of privacy of user data and data storage security auditing, which prevent users to gain trust in cloud computing. To solve these problems, Privacy as a Service (PasS), homomorphic encryption, privacy preserving data storage public auditing and Trusted Computing are described. In the final part of this work, the threads in the cloud computing environment and theirs countermeasures are analyzed. Finally, the design of model for securing shared data storage is proposed. Model is based on the previous findings. Model uses a tamper-proof hardware with cryptographic protections to ensure the privacy of computed data and the integrity of data stored on storage in the cloud computing.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.