A STUDY ON PRECAUTION MEASURES FOR THEVULNERABILITIES IN CLOUD TECHNOLOGY

dc.contributor.authorS, MohanaPriya
dc.contributor.authorT, Saranya
dc.date.accessioned2020-09-12T09:28:34Z
dc.date.available2020-09-12T09:28:34Z
dc.date.issued2015-01
dc.description.abstractToday’s global village is getting equipped with more modern techniques. Various technologies have emerged and are being developed to fulfill the needs of the people. In this aspect, cloud computing technology has given its contribution over a large area especially in the field of networking and communication. Several companies have also developed their own search engines and other websites for communication where cloud computing plays a major role. However, some companies are facing some inconvenience in using this cloud technology which is mainly due to the threats and minute vulnerabilities. In this paper, we present an idea of reducing the problem of data breaches and denial of service which are contributing a major part in the usage of cloud as a worldwide technology. The proposed system will explain the usage of dual encryption technique and the technique of automated deletion of duplicated copies of the data present.en_US
dc.identifier.isbn978-1-941505-27-4
dc.identifier.urihttps://dspace.psgrkcw.com/handle/123456789/1439
dc.language.isoenen_US
dc.publisherPSGR Krishnammal College for Women, Coimbatoreen_US
dc.subjectcloud computingen_US
dc.subjectnetworking and communicationen_US
dc.titleA STUDY ON PRECAUTION MEASURES FOR THEVULNERABILITIES IN CLOUD TECHNOLOGYen_US
dc.title.alternativeCystrom 15 – Wireless Communicationen_US
dc.typeBooken_US

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
A STUDY ON PRECAUTION MEASURES FOR THEVULNERABILITIES IN CLOUD TECHNOLOGY.docx
Size:
10.36 KB
Format:
Microsoft Word XML
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: