Contact Us:09993897203
Email: dstarenainfo@gmail.com
1st Branch: 121,Malviya Nagar,
New Market,Bhopal-462003
2nd Branch:146/7/2 Premium Center
Zone-1,MP Nagar
Bhopal-462011
Arrow Registration
MATLAB,PHP,VHDL(VLSI),EMBEDDED SYSTEM,ANDROID WEBSITE DESIGN Industrial Training will be start Soon

CLOUD COMPUTING

Branch: Computer Science

Topic:M.Tech cloud computing Projects

                        2018-2019 C.S M.TECH IEEE TITLES

S.NO TITLES

DOMAIN

download
CLOUD COMPUTING
DST TO C 01 Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers CLOUD COMPUTING
DST TO C 02 A Collaborative Key Management Protocol in Cipher text Policy Attribute-Based Encryption for Cloud Data Sharing CLOUD COMPUTING
DST TO C 03 Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation CLOUD COMPUTING
DST TO C 04 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud CLOUD COMPUTING
DST TO C 05 An Economical and SLO-Guaranteed Cloud Storage Service across Multiple Cloud Service Providers CLOUD COMPUTING
DST TO C 06 Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data CLOUD COMPUTING
DST TO C 07 TEES : An Efficient Search Scheme over Encrypted Data on Mobile Cloud CLOUD COMPUTING
DST TO C 08 Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing CLOUD COMPUTING
DST TO C 09 Securing Cloud Data under Key Exposure CLOUD COMPUTING
DST TO C 10 Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model Sign In Or Purchase CLOUD COMPUTING
DST TO C 11 On The Security Of A Variant Of Elgamal Encryption Scheme CLOUD COMPUTING
DST TO C 12 Fast Phrase Search For Encrypted Cloud Storage CLOUD COMPUTING
DST TO C 13 A Lightweight Secure Data Sharing Scheme For Mobile Cloud Computing CLOUD COMPUTING
DST TO C 14 Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme over Encrypted Cloud Data CLOUD COMPUTING
DST TO C 15 Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories CLOUD COMPUTING
DST TO C 16 A New Cloud Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users CLOUD COMPUTING
DST TO C 17 Two-Aggregator Topology Optimization using Multiple Paths in Data Center Networks CLOUD COMPUTING
DST TO C 18 Application-Aware Big Data Deduplication in Cloud Environment CLOUD COMPUTING
DST TO C 19 Virtual Machine Migration Planning in Software-Defined Networks CLOUD COMPUTING
DST TO C 20 Fault Tolerant Stencil Computation on Cloud-based GPU Spot Instances CLOUD COMPUTING
DST TO C 21 A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users CLOUD COMPUTING
DST TO C 22 Dynamic Resource Provisioning for Energy Efficient Cloud Radio Access Networks CLOUD COMPUTING
DST TO C 23 Secure Data Sharing and Searching at the Edge of Cloud Assisted Internet of Things CLOUD COMPUTING
DST TO C 24 Nebula: Distributed Edge Cloud for Data Intensive Computing CLOUD COMPUTING
DST TO C 25 A semi-automatic and trustworthy scheme for continuous cloud service certification CLOUD COMPUTING
DST TO C 26 Empirical Analysis and Validation of Security Alerts Filtering Techniques CLOUD COMPUTING
DST TO C 27 Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves- Authenticated Merkle Hash Tree CLOUD COMPUTING
DST TO C 28 Using imbalance characteristic for fault-tolerant workflow scheduling in Cloud systems CLOUD COMPUTING
DST TO C 29 Secure k-NN Query on Encrypted Cloud Data with Multiple Keys CLOUD COMPUTING
DST TO C 30 Resource renting for periodical cloud workflow applications CLOUD COMPUTING
DST TO C 31 Publicly Verifiable Boolean Query over Outsourced Encrypted Data CLOUD COMPUTING
DST TO C 32 Scheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in Clouds CLOUD COMPUTING
DST TO C 33 Synergy: A Hypervisor Managed Holistic Caching System CLOUD COMPUTING
DST TO C 34 NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users CLOUD COMPUTING
DST TO C 35 VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud CLOUD COMPUTING
DST TO C 36 Minimum-Cost Cloud Storage Service across Multiple Cloud Providers CLOUD COMPUTING
DST TO C 37 An Efficient Public Auditing Protocol with Novel Dynamic Structure for Cloud Data CLOUD COMPUTING
DST TO C 38 Correlation Modeling and Resource Optimization for Cloud Service with Fault Recovery CLOUD COMPUTING
DST TO C 39 Achieving Privacy-friendly Storage and Secure Statistics for Smart Meter Data on Outsourced Clouds CLOUD COMPUTING
DST TO C 40 Quantitative Modeling and Analytical Calculation of Elasticity in Cloud Computing CLOUD COMPUTING
DST TO C 41 A Robust Reputation Management Mechanism in the Federated Cloud CLOUD COMPUTING
DST TO C 42 Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems CLOUD COMPUTING
DST 1CP C 43 An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data CLOUD COMPUTING
DST 1CP C 44 An Efficient Ranked Multi-Keyword Search for Multiple Data Owners over Encrypted Cloud Data CLOUD COMPUTING
DST 1CP C 45 Efficient Traceable Authorization Search System for Secure Cloud Storage CLOUD COMPUTING
DST 1CP C 46 Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment CLOUD COMPUTING
DST 1CP C 47 SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage CLOUD COMPUTING
DST 1CP C 48 Towards Privacy-preserving Content-based Image Retrieval in Cloud Computing CLOUD COMPUTING
DST 1CP C 49 Efficient Client-Side Deduplication of Encrypted Data with Public Auditing in Cloud Storage CLOUD COMPUTING
DST 1CP C 50 Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing CLOUD COMPUTING
DST 1CP C 51 Privacy-preserving Search over Encrypted Personal Health Record in Multi-Source Cloud CLOUD COMPUTING
DST 1CP C 52 Combining Data Owner-side and Cloud-side Access Control for Encrypted Cloud Storage CLOUD COMPUTING
DST 1CP C 53 Publicly Verifiable Boolean Query Over Outsourced Encrypted Data CLOUD COMPUTING
DST 1CP C 54 Normal cloud model-based algorithm for multiattribute trusted cloud service selection

CLOUD COMPUTING

 
 
 
 




    Login Page

    Inquiry Form