Cloud Computing
Branch: Computer Science
Topic: Clouding Computing (Java and .Net)
S.no. | Project code | Project theme | Technology | Download |
1 | ICDST-JV02 | Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers | Cloud Computing | |
2 | ICDST-JV07 | A Collaborative Key Management Protocol in Cipher text Policy Attribute-Based Encryption for Cloud Data Sharing | Cloud Computing | |
3 | ICDST-JV08 | Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation | Cloud Computing | |
4 | ICDST-JV09 | Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud | Cloud Computing | |
5 | ICDST-JV10 | An Economical and SLO-Guaranteed Cloud Storage Service across Multiple Cloud Service Providers | Cloud Computing | |
6 | ICDST-JV11 | Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data | Cloud Computing | |
7 | ICDST-JV14 | TEES : An Efficient Search Scheme over Encrypted Data on Mobile Cloud | Cloud Computing | |
8 | ICDST-JV17 | Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing | Cloud Computing | |
9 | ICDST-JV27 | Securing Cloud Data under Key Exposure | Cloud Computing | |
11 | ICDST-JV35 | Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model Sign In Or Purchase | Cloud Computing | |
12 | ICDST-JV44 | On The Security Of A Variant Of Elgamal Encryption Scheme | Cloud Computing | |
13 | ICDST-JV48 | A Lightweight Secure Data Sharing Scheme For Mobile Cloud Computing | Cloud Computing | |
14 | ICDST-JV49 | Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme over Encrypted Cloud Data | Cloud Computing | |
15 | ICDST-JV53 | Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories | Cloud Computing | |
16 | ICDST-JV56 | A New Cloud Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users | Cloud Computing | |
17 | ICDST-JV64 | Two-Aggregator Topology Optimization using Multiple Paths in Data Center Networks | Cloud Computing | |
18 | ICDST-JV66 | Application-Aware Big Data Deduplication in Cloud Environment | Cloud Computing | |
19 | ICDST-JV67 | Virtual Machine Migration Planning in Software-Defined Networks | Cloud Computing | |
20 | ICDST-JV68 | Fault Tolerant Stencil Computation on Cloud-based GPU Spot Instances | Cloud Computing | |
21 | ICDST-JV69 | A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users | Cloud Computing | |
22 | ICDST-JV70 | Dynamic Resource Provisioning for Energy Efficient Cloud Radio Access Networks | Cloud Computing | |
23 | ICDST-JV71 | Secure Data Sharing and Searching at the Edge of Cloud Assisted Internet of Things | Cloud Computing | |
15 | ICDST-JV72 | Nebula: Distributed Edge Cloud for Data Intensive Computing | Cloud Computing | |
25 | ICDST-JV73 | A semi-automatic and trustworthy scheme for continuous cloud service certification | Cloud Computing | |
26 | ICDST-JV75 | Empirical Analysis and Validation of Security Alerts Filtering Techniques | Cloud Computing | |
27 | ICDST-JV83 | Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves- Authenticated Merkle Hash Tree | Cloud Computing | |
28 | ICDST-JV93 | Using imbalance characteristic for fault-tolerant workflow scheduling in Cloud systems | Cloud Computing | |
29 | ICDST-JV99 | Secure k-NN Query on Encrypted Cloud Data with Multiple Keys | Cloud Computing | |
30 | ICDST-JV106 | Resource renting for periodical cloud workflow applications | Cloud Computing | |
31 | ICDST-JV107 | Publicly Verifiable Boolean Query over Outsourced Encrypted Data | Cloud Computing | |
32 | ICDST-JV112 | Scheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in Clouds | Cloud Computing | |
33 | ICDST-JV50 | Synergy: A Hypervisor Managed Holistic Caching System | Cloud Computing | |
34 | ICDST-JV125 | NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users | Cloud Computing | |
35 | ICDST-JV126 | VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud | Cloud Computing | |
36 | ICDST-JV128 | Minimum-Cost Cloud Storage Service across Multiple Cloud Providers | Cloud Computing | |
37 | ICDST-JV134 | An Efficient Public Auditing Protocol with Novel Dynamic Structure for Cloud Data | Cloud Computing | |
38 | ICDST-JV135 | Correlation Modeling and Resource Optimization for Cloud Service with Fault Recovery | Cloud Computing | |
39 | ICDST-JV141 | Achieving Privacy-friendly Storage and Secure Statistics for Smart Meter Data on Outsourced Clouds | Cloud Computing | |
40 | ICDST-JV142 | Quantitative Modeling and Analytical Calculation of Elasticity in Cloud Computing | Cloud Computing | |
41 | ICDST-JV147 | A Robust Reputation Management Mechanism in the Federated Cloud | Cloud Computing | |
42 | ICDST-JV148 | Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems | Cloud Computing | |
43 | ICDST-JV153 | An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data | Cloud Computing | |
44 | ICDST-JV200 | An Efficient Ranked Multi-Keyword Search for Multiple Data Owners over Encrypted Cloud Data | Cloud Computing | |
45 | ICDST-JV159 | Efficient Traceable Authorization Search System for Secure Cloud Storage | Cloud Computing | |
46 | ICDST-JV160 | Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment | Cloud Computing | |
47 | ICDST-JV162 | SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage | Cloud Computing | |
48 | ICDST-JV165 | Towards Privacy-preserving Content-based Image Retrieval in Cloud Computing | Cloud Computing | |
49 | ICDST-JV170 | Efficient Client-Side Deduplication of Encrypted Data with Public Auditing in Cloud Storage | Cloud Computing | |
50 | ICDST-JV174 | Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing | Cloud Computing | |
51 | ICDST-JV190 | Privacy-preserving Search over Encrypted Personal Health Record in Multi-Source Cloud | Cloud Computing | |
52 | ICDST-JV195 | Combining Data Owner-side and Cloud-side Access Control for Encrypted Cloud Storage | Cloud Computing | |
53 | ICDST-JV198 | Publicly Verifiable Boolean Query Over Outsourced Encrypted Data | Cloud Computing | |
54 | ICDST-JV201 | Normal cloud model-based algorithm for multiattribute trusted cloud service selection | Cloud Computing | |
55 | ICDST-JV203 | Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage | Cloud Computing | |
56 | ICDST-JV204 | A Time-Efficient Approach for Detecting Errors in Big Sensor Data on Cloud | Cloud Computing | |
57 | ICDST-JV207 | Using Crowdsourcing to Provide QoS for Mobile Cloud Computing | Cloud Computing | |
58 | ICDST-JV208 | Collective Energy-Efficiency Approach to Data Center Networks Planning | Cloud Computing | |
59 | ICDST-JV212 | Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services | Cloud Computing | |
60 | ICDST-JV213 | Optimal Cloud Computing Resource Allocation for Demand Side Management | Cloud Computing | |
61 | ICDST-JV214 | A Modified Hierarchical Attribute-based Encryption Access Control Method for Mobile Cloud Computing | Cloud Computing | |
62 | ICDST-JV215 | Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing | Cloud Computing | |
63 | ICDST-JV219 | An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing | Cloud Computing | |
64 | ICDST-JV220 | Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates | Cloud Computing | |
65 | ICDST-JV111 | Multiagent-Based Resource Allocation for Energy Minimization in Cloud Computing Systems | Cloud Computing | |
66 | ICDST-JV227 | A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services | Cloud Computing | |
67 | ICDST-JV200 | Autonomous Agent-Based Load Balancing Algorithm in Cloud Computing | Cloud Computing | |
68 | ICDST-JV158 | BDCaM: Big Data for Context-aware Monitoring – A Personalized Knowledge Discovery Framework for Assisted Healthcare | Cloud Computing | |
69 | ICDST-JV254 | Cloud Federations in the Sky: Formation Game and Mechanism | Cloud Computing | |
70 | ICDST-JV255 | Cloud- Trust – a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds | Cloud Computing | |
71 | ICDST-JV257 | Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users | Cloud Computing | |
72 | ICDST-JV259 | Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption | Cloud Computing | |
73 | ICDST-JV274 | Efficient Optimal Algorithm for Task Scheduling in Cloud Computing Environment | Cloud Computing | |
74 | ICDST-JV276 | Enabling Cloud Storage Auditing With Key-Exposure Resistance | Cloud Computing | |
75 | ICDST-JV277 | Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud | Cloud Computing | |
76 | ICDST-JV278 | Ensuring Data Storage Security in Cloud Computing | Cloud Computing | |
77 | ICDST-JV279 | Evolutionary Multi-Objective Workflow Scheduling in Cloud | Cloud Computing | |
78 | ICDST-JV250 | Exact and Heuristic Resource Mapping Algorithms for Distributed and Hybrid Clouds | Cloud Computing | |
79 | ICDST-JV282 | Extending MapReduce across Clouds with BStream | Cloud Computing | |
50 | ICDST-JV305 | Multi-Criteria User Modeling in Recommender Systems | Cloud Computing | |
81 | ICDST-JV318 | Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud | Cloud Computing | |
82 | ICDST-JV333 | Task Scheduling in the Cloud Computing Based on the Cuckoo Search Algorithm | Cloud Computing | |
83 | ICDST-JV341 | Using Facebook for Image Steganography | Cloud Computing | |
84 | ICDST-JV353 | A Holistic Approach to Distributed Dimensionality Reduction of Big Data | Cloud Computing | |
85 | ICDST-DN42 | Privacy-preserving public auditing for regenerating-code-based cloud storage | Cloud Computing | |
86 | ICDST-DN55 | SEDASC: shared data authority Scheme | Cloud Computing | |
87 | ICDST-DN65 | A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing | Cloud Computing | |
88 | ICDST-DN67 | Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing | Cloud Computing | |
89 | ICDST-DN68 | Bidding Strategies for Spot Instances in Cloud Computing Markets | Cloud Computing | |
90 | ICDST-DN72 | CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability | Cloud Computing | |
91 | ICDST-DN73 | Cloud Armor: Supporting Reputation-based Trust Management for Cloud Services | Cloud Computing | |
92 | ICDST-DN76 | DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party | Cloud Computing | |
93 | ICDST-DN77 | Data as a Currency and Cloud-Based Data Lockers | Cloud Computing | |
94 | ICDST-DN81 | Efficient audit service outsourcing for data integrity in clouds | Cloud Computing | |
95 | ICDST-DN118 | ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds | Cloud Computing | |
96 | ICDST-DN122 | Implementation and Evaluation of Digital E-Lecture Annotation in Learning Groups to Foster Active Learning | Cloud Computing | |
97 | ICDST-DN123 | Least Cost Influence Maximization Across Multiple Social Networks | Cloud Computing | |
98 | ICDST-DN126 | Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage | Cloud Computing | |
99 | ICDST-DN126 | Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage | Cloud Computing | |
100 | ICDST-DN134 | DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security | Cloud Computing | |
101 | ICDST-DN135 | Aggressive Resource Provisioning for Ensuring QOS in virtualized Environment | Cloud Computing | |
70 | ICDST-DN136 | A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data | Cloud Computing | |
103 | ICDST-DN137 | Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage | Cloud Computing |