Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7873
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Verma, Nikhil | - |
dc.contributor.author | Singh, Yashwant [Guided by] | - |
dc.date.accessioned | 2022-10-17T06:30:52Z | - |
dc.date.available | 2022-10-17T06:30:52Z | - |
dc.date.issued | 2014 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7873 | - |
dc.description.abstract | Cloud computing is one of the most significant milestones in recent times in the history of computers. In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. The basic concept of cloud computing is to provide a platform for sharing of resources which includes software and infrastructure with the help of virtualization. In order to provide quality of service, this environment makes every effort to be dynamic and reliable. As in most other streams of computers, security is a major obstacle for cloud computing. There are various opinions on the security of cloud computing which deal with the positives and negatives of it. This paper is an attempt to investigate the crucial security threats with respect to cloud computing. It further focuses on the available security measures which can be used for the effective implementation of cloud computing. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
dc.subject | Cloud computing | en_US |
dc.subject | Key Exchange | en_US |
dc.title | Cloud Computing Security using Diffie-Hellman Key Exchange | en_US |
dc.type | Project Report | en_US |
Appears in Collections: | B.Tech. Project Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Cloud Computing Security using Diffie-Hellman Key Exchange.pdf | 761.79 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.