Please use this identifier to cite or link to this item:
https://dr.ddn.upes.ac.in//xmlui/handle/123456789/2583
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bhardwaj, Akashdeep | - |
dc.date.accessioned | 2019-01-18T07:28:41Z | - |
dc.date.available | 2019-01-18T07:28:41Z | - |
dc.date.issued | 2017-04 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/2583 | - |
dc.description.abstract | Cloud Computing has become the global technology enabler for corporate businesses and home users relying on IT services today. Cloud Computing offers unlimited flexible computing resources, storage and network capacity to seamlessly meet the service demands offering rental models, hosting options, virtual infrastructure, maximum utilization and availability. Cloud computing also benefits technology organizations, service providers and the home users in reducing the capital expenditure and setup costs on a regular basis. Access to high speed links and Internet availability has further led to the increase in adoption of Cloud based services by global corporates working in offices or from remote locations as well as the home users. Since Cloud Computing utilizes the Internet as the primary communication medium, traffic from unsecure Internet locations flow into public data centers, on premise corporate systems and home computers. This exposes data and computing resources to external threats and cyber-attackers. To realize the full potential of Cloud Computing and be successful, security threats and challenges need to be addressed and managed. To counter these, Cloud service providers and organizations deploy firewalls and intrusion detection systems in data centers, while home users install antivirus and personal firewalls on desktops and laptops. | en_US |
dc.language.iso | en | en_US |
dc.publisher | UPES, Dehradun | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Cloud Computing | en_US |
dc.title | Designing secure archicture to mitigate DDoS attacks on hybrid clouds | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | Thesis |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | 19.61 kB | Adobe PDF | View/Open | |
02_certificate.pdf | 110.79 kB | Adobe PDF | View/Open | |
03_acknowledgement.pdf | 7.68 kB | Adobe PDF | View/Open | |
04_declaration.pdf | 5.4 kB | Adobe PDF | View/Open | |
05_contents.pdf | 131.22 kB | Adobe PDF | View/Open | |
06_List of figures.pdf | 93.5 kB | Adobe PDF | View/Open | |
07_list of tables.pdf | 51.48 kB | Adobe PDF | View/Open | |
08_list of abbreviations.pdf | 8.54 kB | Adobe PDF | View/Open | |
09_executive summary.pdf | 23.58 kB | Adobe PDF | View/Open | |
10_chapter1.pdf | 1.38 MB | Adobe PDF | View/Open | |
11_chapter2.pdf | 180.29 kB | Adobe PDF | View/Open | |
12_chapter3.pdf | 663.32 kB | Adobe PDF | View/Open | |
13_chapter4.pdf | 154.05 kB | Adobe PDF | View/Open | |
14_chapter5.pdf | 302.79 kB | Adobe PDF | View/Open | |
15_chapter6.pdf | 719.22 kB | Adobe PDF | View/Open | |
16_chapter7.pdf | 1.23 MB | Adobe PDF | View/Open | |
17_chapter8.pdf | 20.28 kB | Adobe PDF | View/Open | |
18_chapter9.pdf | 116.38 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.