Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7873
Full metadata record
DC FieldValueLanguage
dc.contributor.authorVerma, Nikhil-
dc.contributor.authorSingh, Yashwant [Guided by]-
dc.date.accessioned2022-10-17T06:30:52Z-
dc.date.available2022-10-17T06:30:52Z-
dc.date.issued2014-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/7873-
dc.description.abstractCloud computing is one of the most significant milestones in recent times in the history of computers. In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. The basic concept of cloud computing is to provide a platform for sharing of resources which includes software and infrastructure with the help of virtualization. In order to provide quality of service, this environment makes every effort to be dynamic and reliable. As in most other streams of computers, security is a major obstacle for cloud computing. There are various opinions on the security of cloud computing which deal with the positives and negatives of it. This paper is an attempt to investigate the crucial security threats with respect to cloud computing. It further focuses on the available security measures which can be used for the effective implementation of cloud computing.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectCloud computingen_US
dc.subjectKey Exchangeen_US
dc.titleCloud Computing Security using Diffie-Hellman Key Exchangeen_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Cloud Computing Security using Diffie-Hellman Key Exchange.pdf761.79 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.