Fresher Abap Resume
Fresher Abap Resume
Fresher Abap Resume
INTERMEDIATE
MPC
POINTS 711
MIMS JUNIOR COLLEGE, MANCHERIAL,
INDIA (2016-2019)
LINKEDIN PROFILE :
EMAIL: be.with.mohammadgmail.com
WORKS EXPERIENCE
ADDITIONAL SKILLS
INTERN
DELMON SAP LTD
JEDDAH, KSA
ABAP OBJECT ORIENTED PROGRAMMING (OOPS)
NOV.2022 - FEB.2023
ABAP ODATA SERVICE
Worked with Real time Objects in
the following ABAP modules: SQL
1. ALV REPORTS
BASIC DATA STRUCTURES
2. BDC
Database Management Systems
3. CROSS APPLICATION
Operating System (Microsoft Windows 7/8/10)
4. ODATA SERVICE
Programming in Core Java/C++
5. OOPS
MAJOR PROJECT
PROFESSIONAL
SKILLS MULTIPLE SERVER PUBLIC KEY ENCRYPTION WITH KEYWORD
SEARCH FOR SECURE CLOUD STORAGE.
Exceptional communication and
programming skills Searchable encryption is of increasing interest for
protecting the data privacy in secure searchable cloud
Successful working in a team storage.
environment as well as
independently So, we investigate the security of a well-known
cryptographic primitive, namely, public key encryption
The ability to work under with keyword search (PEKS) which is very useful in
pressure and multi-task many applications of cloud storage.
The ability to follow instructions Unfortunately, it has been shown that the traditional
and deliver quality results PEKS framework suffers from an inherent insecurity
called inside keyword guessing attack (KGA) launched
by the malicious server.
HANDS-ON-EXPERIENCE
To address this security vulnerability, we propose a new
PEKS framework named dual-server public key
Virtual internship in Amazon Web encryption with keyword search (DS-PEKS).
Service (AWS) Cloud Foundation
As another main contribution, we define a new variant
Virtual internship in Amazon Web of the smooth projective hash functions (SPHFs)
Service (AWS) Machine Learning referred to as linear and homomorphic SPHF (LH-SPHF).
SAP ABAP TRAINING We then show a generic construction of secure DS-
PEKS from LH-SPHF.
VERSION IT INSTITUTE, HYDERABAD, INDIA
In a PEKS system, using the receiver’s public key, the
sender attaches some encrypted keywords (referred to
as PEKS ciphertexts) with the encrypted data.
CERTIFICATES
The receiver then sends the trapdoor of a to-be-
searched keyword to the server for data searching.
● SAP ABAP on S/4 HANA Given the trapdoor and the PEKS ciphertext, the server
● Programming in core Java
can test whether the keyword underlying the PEKS
cipher text is equal to the one selected by the receiver.
● AICTE AWS Cloud Internship
If so, the server sends the matching encrypted data to
the receiver.
PERSONAL DETAILS Operating system: - Windows XP/7.