S.NO |
TITLES |
DOMAIN
|
download |
|
CLOUD COMPUTING |
|
DST TO C 01 |
Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers |
CLOUD COMPUTING |
|
DST TO C 02 |
A Collaborative Key Management Protocol in Cipher text Policy Attribute-Based Encryption for Cloud Data Sharing |
CLOUD COMPUTING |
|
DST TO C 03 |
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation |
CLOUD COMPUTING |
|
DST TO C 04 |
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud |
CLOUD COMPUTING |
|
DST TO C 05 |
An Economical and SLO-Guaranteed Cloud Storage Service across Multiple Cloud Service Providers |
CLOUD COMPUTING |
|
DST TO C 06 |
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data |
CLOUD COMPUTING |
|
DST TO C 07 |
TEES : An Efficient Search Scheme over Encrypted Data on Mobile Cloud |
CLOUD COMPUTING |
|
DST TO C 08 |
Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing |
CLOUD COMPUTING |
|
DST TO C 09 |
Securing Cloud Data under Key Exposure |
CLOUD COMPUTING |
|
DST TO C 10 |
Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model Sign In Or Purchase |
CLOUD COMPUTING |
|
DST TO C 11 |
On The Security Of A Variant Of Elgamal Encryption Scheme |
CLOUD COMPUTING |
|
DST TO C 12 |
Fast Phrase Search For Encrypted Cloud Storage |
CLOUD COMPUTING |
|
DST TO C 13 |
A Lightweight Secure Data Sharing Scheme For Mobile Cloud Computing |
CLOUD COMPUTING |
|
DST TO C 14 |
Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme over Encrypted Cloud Data |
CLOUD COMPUTING |
|
DST TO C 15 |
Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories |
CLOUD COMPUTING |
|
DST TO C 16 |
A New Cloud Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users |
CLOUD COMPUTING |
|
DST TO C 17 |
Two-Aggregator Topology Optimization using Multiple Paths in Data Center Networks |
CLOUD COMPUTING |
|
DST TO C 18 |
Application-Aware Big Data Deduplication in Cloud Environment |
CLOUD COMPUTING |
|
DST TO C 19 |
Virtual Machine Migration Planning in Software-Defined Networks |
CLOUD COMPUTING |
|
DST TO C 20 |
Fault Tolerant Stencil Computation on Cloud-based GPU Spot Instances |
CLOUD COMPUTING |
|
DST TO C 21 |
A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users |
CLOUD COMPUTING |
|
DST TO C 22 |
Dynamic Resource Provisioning for Energy Efficient Cloud Radio Access Networks |
CLOUD COMPUTING |
|
DST TO C 23 |
Secure Data Sharing and Searching at the Edge of Cloud Assisted Internet of Things |
CLOUD COMPUTING |
|
DST TO C 24 |
Nebula: Distributed Edge Cloud for Data Intensive Computing |
CLOUD COMPUTING |
|
DST TO C 25 |
A semi-automatic and trustworthy scheme for continuous cloud service certification |
CLOUD COMPUTING |
|
DST TO C 26 |
Empirical Analysis and Validation of Security Alerts Filtering Techniques |
CLOUD COMPUTING |
|
DST TO C 27 |
Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves- Authenticated Merkle Hash Tree |
CLOUD COMPUTING |
|
DST TO C 28 |
Using imbalance characteristic for fault-tolerant workflow scheduling in Cloud systems |
CLOUD COMPUTING |
|
DST TO C 29 |
Secure k-NN Query on Encrypted Cloud Data with Multiple Keys |
CLOUD COMPUTING |
|
DST TO C 30 |
Resource renting for periodical cloud workflow applications |
CLOUD COMPUTING |
|
DST TO C 31 |
Publicly Verifiable Boolean Query over Outsourced Encrypted Data |
CLOUD COMPUTING |
|
DST TO C 32 |
Scheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in Clouds |
CLOUD COMPUTING |
|
DST TO C 33 |
Synergy: A Hypervisor Managed Holistic Caching System |
CLOUD COMPUTING |
|
DST TO C 34 |
NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users |
CLOUD COMPUTING |
|
DST TO C 35 |
VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud |
CLOUD COMPUTING |
|
DST TO C 36 |
Minimum-Cost Cloud Storage Service across Multiple Cloud Providers |
CLOUD COMPUTING |
|
DST TO C 37 |
An Efficient Public Auditing Protocol with Novel Dynamic Structure for Cloud Data |
CLOUD COMPUTING |
|
DST TO C 38 |
Correlation Modeling and Resource Optimization for Cloud Service with Fault Recovery |
CLOUD COMPUTING |
|
DST TO C 39 |
Achieving Privacy-friendly Storage and Secure Statistics for Smart Meter Data on Outsourced Clouds |
CLOUD COMPUTING |
|
DST TO C 40 |
Quantitative Modeling and Analytical Calculation of Elasticity in Cloud Computing |
CLOUD COMPUTING |
|
DST TO C 41 |
A Robust Reputation Management Mechanism in the Federated Cloud |
CLOUD COMPUTING |
|
DST TO C 42 |
Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems |
CLOUD COMPUTING |
|
DST 1CP C 43 |
An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data |
CLOUD COMPUTING |
|
DST 1CP C 44 |
An Efficient Ranked Multi-Keyword Search for Multiple Data Owners over Encrypted Cloud Data |
CLOUD COMPUTING |
|
DST 1CP C 45 |
Efficient Traceable Authorization Search System for Secure Cloud Storage |
CLOUD COMPUTING |
|
DST 1CP C 46 |
Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment |
CLOUD COMPUTING |
|
DST 1CP C 47 |
SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage |
CLOUD COMPUTING |
|
DST 1CP C 48 |
Towards Privacy-preserving Content-based Image Retrieval in Cloud Computing |
CLOUD COMPUTING |
|
DST 1CP C 49 |
Efficient Client-Side Deduplication of Encrypted Data with Public Auditing in Cloud Storage |
CLOUD COMPUTING |
|
DST 1CP C 50 |
Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing |
CLOUD COMPUTING |
|
DST 1CP C 51 |
Privacy-preserving Search over Encrypted Personal Health Record in Multi-Source Cloud |
CLOUD COMPUTING |
|
DST 1CP C 52 |
Combining Data Owner-side and Cloud-side Access Control for Encrypted Cloud Storage |
CLOUD COMPUTING |
|
DST 1CP C 53 |
Publicly Verifiable Boolean Query Over Outsourced Encrypted Data |
CLOUD COMPUTING |
|
DST 1CP C 54 |
Normal cloud model-based algorithm for multiattribute trusted cloud service selection |
CLOUD COMPUTING
|