Contact Us:09993897203
Email: dstarenainfo@gmail.com
1st Branch: 121,Malviya Nagar,
New Market,Bhopal-462003
2nd Branch:146/7/2 Premium Center
Zone-1,MP Nagar
Bhopal-462011
Arrow Registration
MATLAB,PHP,VHDL(VLSI),EMBEDDED SYSTEM,ANDROID WEBSITE DESIGN Industrial Training will be start Soon

Cloud Computing

Branch: Computer Science 

Topic: Clouding Computing (Java and .Net)

S.no. Project code Project theme Technology Download
1 ICDST-JV02 Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers Cloud Computing
2 ICDST-JV07 A Collaborative Key Management Protocol in Cipher text Policy Attribute-Based Encryption for Cloud Data Sharing Cloud Computing
3 ICDST-JV08 Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation Cloud Computing
4 ICDST-JV09 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud  Cloud Computing
5 ICDST-JV10 An Economical and SLO-Guaranteed Cloud Storage Service across Multiple Cloud Service Providers Cloud Computing
6 ICDST-JV11 Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data Cloud Computing
7 ICDST-JV14 TEES : An Efficient Search Scheme over Encrypted Data on Mobile Cloud Cloud Computing
8 ICDST-JV17 Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing Cloud Computing
9 ICDST-JV27 Securing Cloud Data under Key Exposure Cloud Computing
11 ICDST-JV35 Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model Sign In Or Purchase Cloud Computing
12 ICDST-JV44 On The Security Of A Variant Of Elgamal Encryption Scheme Cloud Computing
13 ICDST-JV48 A Lightweight Secure Data Sharing Scheme For Mobile Cloud Computing Cloud Computing
14 ICDST-JV49 Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme over Encrypted Cloud Data Cloud Computing
15 ICDST-JV53 Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories Cloud Computing
16 ICDST-JV56 A New Cloud Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users Cloud Computing
17 ICDST-JV64 Two-Aggregator Topology Optimization using Multiple Paths in Data Center Networks Cloud Computing
18 ICDST-JV66 Application-Aware Big Data Deduplication in Cloud Environment Cloud Computing
19 ICDST-JV67 Virtual Machine Migration Planning in Software-Defined Networks  Cloud Computing
20 ICDST-JV68 Fault Tolerant Stencil Computation on Cloud-based GPU Spot Instances Cloud Computing
21 ICDST-JV69 A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users Cloud Computing
22 ICDST-JV70 Dynamic Resource Provisioning for Energy Efficient Cloud Radio Access Networks Cloud Computing
23 ICDST-JV71 Secure Data Sharing and Searching at the Edge of Cloud Assisted Internet of Things Cloud Computing
15 ICDST-JV72 Nebula: Distributed Edge Cloud for Data Intensive Computing Cloud Computing
25 ICDST-JV73 A semi-automatic and trustworthy scheme for continuous cloud service certification Cloud Computing
26 ICDST-JV75 Empirical Analysis and Validation of Security Alerts Filtering Techniques Cloud Computing
27 ICDST-JV83 Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves- Authenticated Merkle Hash Tree Cloud Computing
28 ICDST-JV93 Using imbalance characteristic for fault-tolerant workflow scheduling in Cloud systems Cloud Computing
29 ICDST-JV99 Secure k-NN Query on Encrypted Cloud Data with Multiple Keys Cloud Computing
30 ICDST-JV106 Resource renting for periodical cloud workflow applications Cloud Computing
31 ICDST-JV107 Publicly Verifiable Boolean Query over Outsourced Encrypted Data Cloud Computing
32 ICDST-JV112 Scheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in Clouds Cloud Computing
33 ICDST-JV50 Synergy: A Hypervisor Managed Holistic Caching System Cloud Computing
34 ICDST-JV125 NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users Cloud Computing
35 ICDST-JV126 VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud Cloud Computing
36 ICDST-JV128 Minimum-Cost Cloud Storage Service across Multiple Cloud Providers Cloud Computing
37 ICDST-JV134 An Efficient Public Auditing Protocol with Novel Dynamic Structure for Cloud Data Cloud Computing
38 ICDST-JV135 Correlation Modeling and Resource Optimization for Cloud Service with Fault Recovery Cloud Computing
39 ICDST-JV141 Achieving Privacy-friendly Storage and Secure Statistics for Smart Meter Data on Outsourced Clouds Cloud Computing
40 ICDST-JV142 Quantitative Modeling and Analytical Calculation of Elasticity in Cloud Computing Cloud Computing
41 ICDST-JV147 A Robust Reputation Management Mechanism in the Federated Cloud Cloud Computing
42 ICDST-JV148 Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems Cloud Computing
43 ICDST-JV153 An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data Cloud Computing
44 ICDST-JV200 An Efficient Ranked Multi-Keyword Search for Multiple Data Owners over Encrypted Cloud Data Cloud Computing
45 ICDST-JV159 Efficient Traceable Authorization Search System for Secure Cloud Storage Cloud Computing
46 ICDST-JV160 Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment Cloud Computing
47 ICDST-JV162 SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage Cloud Computing
48 ICDST-JV165 Towards Privacy-preserving Content-based Image Retrieval in Cloud Computing Cloud Computing
49 ICDST-JV170 Efficient Client-Side Deduplication of Encrypted Data with Public Auditing in Cloud Storage Cloud Computing
50 ICDST-JV174 Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing Cloud Computing
51 ICDST-JV190 Privacy-preserving Search over Encrypted Personal Health Record in Multi-Source Cloud Cloud Computing
52 ICDST-JV195 Combining Data Owner-side and Cloud-side Access Control for Encrypted Cloud Storage Cloud Computing
53 ICDST-JV198 Publicly Verifiable Boolean Query Over Outsourced Encrypted Data Cloud Computing
54 ICDST-JV201 Normal cloud model-based algorithm for multiattribute trusted cloud service selection Cloud Computing
55 ICDST-JV203 Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage Cloud Computing
56 ICDST-JV204 A Time-Efficient Approach for Detecting Errors in Big Sensor Data on Cloud Cloud Computing
57 ICDST-JV207 Using Crowdsourcing to Provide QoS for Mobile Cloud Computing Cloud Computing
58 ICDST-JV208 Collective Energy-Efficiency Approach to Data Center Networks Planning Cloud Computing
59 ICDST-JV212 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services Cloud Computing
60 ICDST-JV213 Optimal Cloud Computing Resource Allocation for Demand Side Management Cloud Computing
61 ICDST-JV214 A Modified Hierarchical Attribute-based Encryption Access Control Method for Mobile Cloud Computing Cloud Computing
62 ICDST-JV215 Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing Cloud Computing
63 ICDST-JV219 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing Cloud Computing
64 ICDST-JV220 Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates Cloud Computing
65 ICDST-JV111 Multiagent-Based Resource Allocation for Energy Minimization in Cloud Computing Systems Cloud Computing
66 ICDST-JV227 A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services Cloud Computing
67 ICDST-JV200 Autonomous Agent-Based Load Balancing Algorithm in Cloud Computing Cloud Computing
68 ICDST-JV158 BDCaM: Big Data for Context-aware Monitoring – A Personalized Knowledge Discovery Framework for Assisted Healthcare Cloud Computing
69 ICDST-JV254 Cloud Federations in the Sky: Formation Game and Mechanism Cloud Computing
70 ICDST-JV255 Cloud- Trust – a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds Cloud Computing
71 ICDST-JV257 Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users Cloud Computing
72 ICDST-JV259 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption Cloud Computing
73 ICDST-JV274 Efficient Optimal Algorithm for Task Scheduling in Cloud Computing Environment Cloud Computing
74 ICDST-JV276 Enabling Cloud Storage Auditing With Key-Exposure Resistance Cloud Computing
75 ICDST-JV277 Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud Cloud Computing
76 ICDST-JV278 Ensuring Data Storage Security in Cloud Computing Cloud Computing
77 ICDST-JV279 Evolutionary Multi-Objective Workflow Scheduling in Cloud Cloud Computing
78 ICDST-JV250 Exact and Heuristic Resource Mapping Algorithms for Distributed and Hybrid Clouds Cloud Computing
79 ICDST-JV282 Extending MapReduce across Clouds with BStream Cloud Computing
50 ICDST-JV305 Multi-Criteria User Modeling in Recommender Systems Cloud Computing
81 ICDST-JV318 Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud Cloud Computing
82 ICDST-JV333 Task Scheduling in the Cloud Computing Based on the Cuckoo Search Algorithm Cloud Computing
83 ICDST-JV341 Using Facebook for Image Steganography Cloud Computing
84 ICDST-JV353 A Holistic Approach to Distributed Dimensionality Reduction of Big Data Cloud Computing
85 ICDST-DN42 Privacy-preserving public auditing for regenerating-code-based cloud storage Cloud Computing
86 ICDST-DN55 SEDASC: shared data authority Scheme Cloud Computing
87 ICDST-DN65 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing Cloud Computing
88 ICDST-DN67 Attribute-based Access Control with Constant-size Ciphertext  in Cloud Computing Cloud Computing
89 ICDST-DN68 Bidding Strategies for Spot Instances in Cloud Computing Markets Cloud Computing
90 ICDST-DN72 CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability Cloud Computing
91 ICDST-DN73 Cloud Armor: Supporting Reputation-based Trust Management for Cloud Services Cloud Computing
92 ICDST-DN76 DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party Cloud Computing
93 ICDST-DN77 Data as a Currency and Cloud-Based Data Lockers Cloud Computing
94 ICDST-DN81 Efficient   audit  service outsourcing   for   data  integrity  in   clouds Cloud Computing
95 ICDST-DN118 ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds Cloud Computing
96 ICDST-DN122 Implementation and Evaluation of Digital E-Lecture Annotation in Learning Groups to Foster Active Learning Cloud Computing
97 ICDST-DN123 Least Cost Influence Maximization Across Multiple Social Networks Cloud Computing
98 ICDST-DN126 Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage Cloud Computing
99 ICDST-DN126 Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage Cloud Computing
100 ICDST-DN134 DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security Cloud Computing
101 ICDST-DN135 Aggressive Resource Provisioning for Ensuring QOS in virtualized Environment Cloud Computing
70 ICDST-DN136 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data Cloud Computing
103 ICDST-DN137 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage Cloud Computing

 

     


    Comments are closed.