vinodressume
DESCRIPTION
nice cvTRANSCRIPT
Vinod KumarH.no:51-964-a-4-1, L.I.C colony,Near pump house,Kurnool-518003, Email : [email protected] Pradesh. Mobile : +91-9885858944Vinod KumarH.no:51-964-a-4-1, L.I.C colony,Near pump house,Kurnool-518003, Email : [email protected] Pradesh. Mobile : +91-9885858944
OBJECTIVE:OBJECTIVE:
To Acquire advanced knowledge in my concern. Seeking a challenging career where my academic excellence will add value towards organization and personal growth.ACADEMIC PROFILE:ACADEMIC PROFILE:
SKILL SETS:SKILL SETS:
COURSEINSTITUTIONBOARDPERCENTAGEYEAR OF PASSING
Bachelor of Technology(COMPUTER SCIENCE AND ENGINEERING):ST.JOHNS COLLEGE OF ENGINEERING, KURNOOLJAWAHARLAL NEHRU UNIVERSITY(ANANTAPUR)63%2013
Intermediate(10+2):NARAYANA JUNIOR COLLEGE,KURNOOL STATE BOARD86% 2009
S.S.CKESHAVAREDDY TALENT SCHOOL.A.P STATE BOARD90% 2007
Operating SystemsLinux,Windows
Internship & Languages (C,C++),SQL,PL/SQL,Linux
PackagesMS-Office.
OOPsAREAS OF INTEREST AREAS OF INTEREST
Cloud Computing
ACHIEVEMENTSACHIEVEMENTS
Got certificate of WEB DESIGN in ANTS ANIMATION ACADEMY Participated in CRICKET TOURNAMENTS in Erode District level.Got certificate of WEB DESIGN in ANTS ANIMATION ACADEMY
Participated in CRICKET TOURNAMENTS in Erode District level.
CO-CURRICULAR ACTIVITIESCO-CURRICULAR ACTIVITIES
ATTEND a WORKSHOP on ETHICAL HACKING in our college.Attended a workshop on Cloud Computing in our college. ATTENDED a workshop android development in our Engineering.Attended a workshop on Ethical Hacking in our collegeATTEND a WORKSHOP on ETHICAL HACKING in our college.
Attended a workshop on Cloud Computing in our college.
ATTENDED a workshop android development in our Engineering.Attended a workshop on Ethical Hacking in our college
PROJECT SUMMARY:PROJECT SUMMARY:
Title :Reliable re-encryption in un reliable clouds Domain(.net)Description: A key approach to secure cloud computing is for the data owner to store encrypted data in the cloud, and issue decryption keys to authorized users. Then, when a user is revoked, the data owner will issue re-encryption commands to the cloud to re-encrypt the data, to prevent the revoked user from decrypting the data, they can continue to access the data.Title :Reliable re-encryption in un reliable clouds Domain(.net)Description: A key approach to secure cloud computing is for the data owner to store encrypted data in the cloud, and issue decryption keys to authorized users. Then, when a user is revoked, the data owner will issue re-encryption commands to the cloud to re-encrypt the data, to prevent the revoked user from decrypting the data, they can continue to access the data.
FATHERS NAME : PURUSHOTHOMDATE OF BIRTH : 17th MARCH 1991GENDER : MALENATIONALITY : INDIAN MOTHER TONGUE : TELUGULANGUAGES (SPEAK) : ENGLISH, TELUGUL, HINDI LANGUAGES (READ &WRITE) : ENGLISH, TELUGU, HINDIPERSONAL DETAILS:FATHERS NAME : PURUSHOTHOM
DATE OF BIRTH : 17th MARCH 1991
GENDER : MALE
NATIONALITY : INDIAN MOTHER TONGUE : TELUGU
LANGUAGES (SPEAK) : ENGLISH, TELUGUL, HINDI
LANGUAGES (READ &WRITE) : ENGLISH, TELUGU, HINDIPERSONAL DETAILS:
I hereby declare that all the details in the application are true, complete and correct to the best of my knowledge and belief.
Authentically, [VINOD KUMAR]