Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/5871
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTegta, Kshitij-
dc.contributor.authorSingh, Yashwant [Guided by]-
dc.date.accessioned2022-08-18T10:18:04Z-
dc.date.available2022-08-18T10:18:04Z-
dc.date.issued2015-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui//xmlui/handle/123456789/5871-
dc.description.abstractAdvances in networking technology and an increase in the need for computing resources have prompted many organizations to outsource their storage and computing needs. This new economic and computing model is commonly referred to as cloud. While the benefits of using a public cloud infrastructure are clear, it introduces significant security and privacy risks. In fact, it seems that the biggest hurdle to the adoption of cloud storage (and cloud computing in general) is concern over the confidentiality and integrity of data. To address the concerns outlined above and increase the adoption of cloud storage, we argue for designing a virtual private storage service based on new cryptographic techniques. In this project work, the plain text of 128 bits is given as input to encryption block in whichencryption of data is made and the cipher text of 128 bits is throughout as output. The key length of 128bits, 192bits or 256bits is used in process of encryption.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectCloud computingen_US
dc.subjectAES algorithmen_US
dc.subjectInfrastructure as a serviceen_US
dc.subjectPlatform as a serviceen_US
dc.titleCloud Computing Securityen_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Cloud Computing Security.pdf1.36 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.