Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/427544
Title: A Study of efficient and secure key distribution protocols for authentification in group communication environment
Researcher: Ambika, S
Guide(s): Rajakumar, S
Keywords: Engineering and Technology
Computer Science
Computer Science Information Systems
Communication networks
Cloud computing
Online meet
University: Anna University
Completed Date: 2021
Abstract: The distributed computing systems provide a vast variety of services to the world via communication networks and the Internet. The user of the distributed system feels that he/she alone is present in the system and using the entire system. This feel of the user offers a virtual vision of one system view. But in reality many processors are located in distant places and appropriately communicate each other to accomplish the workload of the system. Cloud computing, as a utility of distributed computing sponsors a variety of services and applications. Applications such as peer to peer communication, Skype, Facebook, WhatsApp, PAY-TV, Video conferencing, E-mail, Twitter and online network games are running in the distributed environment. Cloud computing has been gaining widespread significance in recent times especially with the advent of the state of the art communication technologies and data handling systems. Large volumes of data are being handled in real time and their availability is made feasible to consumers in an efficient manner through cloud computing networks. newlinePresent days, a group gathering is performed as an online meet conducted in the online meeting platforms such as Zoom, Google Meet, GoToMeeting, Webex Meet, Microsoft Teams etc. None of the cases, all the members are joining the gathering at the same time. Group communication becomes inevitable now a days and the group size is in increasing direction. This leads to issues pertaining to scalability characteristics of distributed systems. As the group size grows gradually, the size of key domain also expands proportionately. It is a difficult and challenging task to filter the unauthorized persons and hacking the data in the distributed network. newline
Pagination: xvii,139p.
URI: http://hdl.handle.net/10603/427544
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File25.46 kBAdobe PDFView/Open
02_prelim pages.pdf877.38 kBAdobe PDFView/Open
03_content.pdf16.09 kBAdobe PDFView/Open
04_abstract.pdf132.15 kBAdobe PDFView/Open
05_chapter 1.pdf944.54 kBAdobe PDFView/Open
06_chapter 2.pdf475.63 kBAdobe PDFView/Open
07_chapter 3.pdf1.25 MBAdobe PDFView/Open
08_chapter 4.pdf1.24 MBAdobe PDFView/Open
09_chapter 5.pdf569.18 kBAdobe PDFView/Open
10_annexures.pdf136.12 kBAdobe PDFView/Open
80_recommendation.pdf104.83 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: