Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/427544
Title: | A Study of efficient and secure key distribution protocols for authentification in group communication environment |
Researcher: | Ambika, S |
Guide(s): | Rajakumar, S |
Keywords: | Engineering and Technology Computer Science Computer Science Information Systems Communication networks Cloud computing Online meet |
University: | Anna University |
Completed Date: | 2021 |
Abstract: | The distributed computing systems provide a vast variety of services to the world via communication networks and the Internet. The user of the distributed system feels that he/she alone is present in the system and using the entire system. This feel of the user offers a virtual vision of one system view. But in reality many processors are located in distant places and appropriately communicate each other to accomplish the workload of the system. Cloud computing, as a utility of distributed computing sponsors a variety of services and applications. Applications such as peer to peer communication, Skype, Facebook, WhatsApp, PAY-TV, Video conferencing, E-mail, Twitter and online network games are running in the distributed environment. Cloud computing has been gaining widespread significance in recent times especially with the advent of the state of the art communication technologies and data handling systems. Large volumes of data are being handled in real time and their availability is made feasible to consumers in an efficient manner through cloud computing networks. newlinePresent days, a group gathering is performed as an online meet conducted in the online meeting platforms such as Zoom, Google Meet, GoToMeeting, Webex Meet, Microsoft Teams etc. None of the cases, all the members are joining the gathering at the same time. Group communication becomes inevitable now a days and the group size is in increasing direction. This leads to issues pertaining to scalability characteristics of distributed systems. As the group size grows gradually, the size of key domain also expands proportionately. It is a difficult and challenging task to filter the unauthorized persons and hacking the data in the distributed network. newline |
Pagination: | xvii,139p. |
URI: | http://hdl.handle.net/10603/427544 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 25.46 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 877.38 kB | Adobe PDF | View/Open | |
03_content.pdf | 16.09 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 132.15 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 944.54 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 475.63 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 1.25 MB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 1.24 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 569.18 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 136.12 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 104.83 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: