Summary
Overview
Education
Skills
Certification
Communication Languages
Project
Extracurricular Activities
Timeline
Generic
Likhitha Bandlamudi

Likhitha Bandlamudi

Summary

Seeking an IT traineeship position to apply and further develop My technical skills acquired through academic studies in Bachelor of Technology in Information Technology, while gaining practical experience and insights into diverse IT domains. Eager to contribute innovative ideas, learn from industry experts, and leverage hands-on training to kickstart a rewarding career in Information Technology

Overview

1
1
Certification

Education

Bachelor of Technology in Information Technology - Computer Science And Programming

Jawaharlal Nehru Technological University Kakinada
05.2023

Skills

  • Programming Languages: Python, OOPS Concepts,Basics of C,SQL
  • Technical Problem-Solving: Proactive issue identification and resolution
  • Communication & Collaboration: Teamwork, Effective Communication, Adaptability

Certification


  • TCS ion Career Edge - Young Professional certification
  • Codetantra Certification (Python Programming)
  • National Programme on Technology Enhanced Learning Certification in completing Data Analyticals Course
  • Hacker rank certification in Basic Python Programming
  • Hacker rank certification in Basic SQL
  • Skill Up Certification on Completion of Introduction to the Basics of Azure Services
  • International English Language Testing System(IELTS) - Band score of 7

Communication Languages

  • English (Full Working Proficiency)


Project

Data Integrity Protection of secret Data - sharing through Algorithms


  • In this project provide a concrete and efficient instantiation of scheme, prove its security and provide an implementation to show its practicality.
  • This project will introduce the trusted authority to authenticate user those who have the access to the data on cloud.
  • SHA algorithm is used by the trusted authority to generate the key and that key will get share to user as well as the owner.
  • ·The trusted authority module receives encrypted file using AES Algorithm from the data owner and computes hash value using MD-5 algorithm. It stores key in its database which will be used during the dynamic operations and to determine the cheating party in the system (CSP or Owner).
  • Trusted authority send file to CSP module to store on cloud. The resulting key sets are shown to have a number of desirable properties that ensure the confidentiality of communication sessions against collusion attacks by other network nodes.

Extracurricular Activities

  • Member in NSS (National Service Scheme) - an Indian government sector public service program conducted by the Ministry of Youth Affairs and Sports of the Government of India to develop social and civic responsibility and serve socially to nation
  • Arts (Drawing, Dance)

Timeline

Bachelor of Technology in Information Technology - Computer Science And Programming

Jawaharlal Nehru Technological University Kakinada
Likhitha Bandlamudi