Java Cloud Computing Projects
S.NO | PROJECT TITLE | YEAR | |||
---|---|---|---|---|---|
J17CC01 | Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers | 2017 | |||
J17CC02 | A Collaborative Key Management Protocol in Cipher text Policy Attribute-Based Encryption for Cloud Data Sharing | 2017 | |||
J17CC03 | Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation | 2017 | |||
J17CC04 | Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud | 2017 | |||
J17CC05 | An Economical and SLO-Guaranteed Cloud Storage Service across Multiple Cloud Service Providers | 2017 | |||
J17CC06 | Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data | 2017 | |||
J17CC07 | TEES : An Efficient Search Scheme over Encrypted Data on Mobile Cloud | 2017 | |||
J17CC08 | Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing | 2017 | |||
J17CC09 | Securing Cloud Data under Key Exposure | 2017 | |||
J17CC10 | Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model Sign In Or Purchase | 2017 | |||
J17CC11 | On The Security Of A Variant Of Elgamal Encryption Scheme | 2017 | |||
J17CC12 | Fast Phrase Search For Encrypted Cloud Storage | 2017 | |||
J17CC13 | A Lightweight Secure Data Sharing Scheme For Mobile Cloud Computing | 2017 | |||
J17CC14 | Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme over Encrypted Cloud Data | 2017 | |||
J17CC15 | Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories | 2017 | |||
J17CC16 | A New Cloud Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users | 2017 | |||
J17CC17 | Two-Aggregator Topology Optimization using Multiple Paths in Data Center Networks | 2017 | |||
J17CC18 | Application-Aware Big Data Deduplication in Cloud Environment | 2017 | |||
J17CC19 | Virtual Machine Migration Planning in Software-Defined Networks | 2017 | |||
J17CC20 | Fault Tolerant Stencil Computation on Cloud-based GPU Spot Instances | 2017 | |||
J17CC21 | A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users | 2017 | |||
J17CC22 | Dynamic Resource Provisioning for Energy Efficient Cloud Radio Access Networks | 2017 | |||
J17CC23 | Secure Data Sharing and Searching at the Edge of Cloud Assisted Internet of Things | 2017 | |||
J17CC24 | Nebula: Distributed Edge Cloud for Data Intensive Computing | 2017 | |||
J17CC25 | A semi-automatic and trustworthy scheme for continuous cloud service certification | 2017 | |||
J17CC26 | Empirical Analysis and Validation of Security Alerts Filtering Techniques | 2017 | |||
J17CC27 | Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves- Authenticated Merkle Hash Tree | 2017 | |||
J17CC28 | Using imbalance characteristic for fault-tolerant workflow scheduling in Cloud systems | 2017 | |||
J17CC29 | Secure k-NN Query on Encrypted Cloud Data with Multiple Keys | 2017 | |||
J17CC30 | Resource renting for periodical cloud workflow applications | 2017 | |||
J17CC31 | Publicly Verifiable Boolean Query over Outsourced Encrypted Data | 2017 | |||
J17CC32 | Scheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in Clouds | 2017 | |||
J17CC33 | Synergy: A Hypervisor Managed Holistic Caching System | 2017 | |||
J17CC34 | NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users | 2017 | |||
J17CC35 | VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud | 2017 | |||
J17CC36 | Minimum-Cost Cloud Storage Service across Multiple Cloud Providers | 2017 | |||
J17CC37 | An Efficient Public Auditing Protocol with Novel Dynamic Structure for Cloud Data | 2017 | |||
J17CC38 | Correlation Modeling and Resource Optimization for Cloud Service with Fault Recovery | 2017 | |||
J17CC39 | Achieving Privacy-friendly Storage and Secure Statistics for Smart Meter Data on Outsourced Clouds | 2017 | |||
J17CC40 | Quantitative Modeling and Analytical Calculation of Elasticity in Cloud Computing | 2017 |
S.NO | PROJECT TITLE | YEAR | |||
---|---|---|---|---|---|
J16CC01 | Attribute-Based Data Sharing Scheme Revisited in Cloud Computing | 2016 | |||
J16CC02 | Analysis of Classical Encryption Techniques in Cloud Computing | 2016 | |||
J16CC03 | A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds | 2016 | |||
J16CC04 | Encrypted Data Management with De-duplication in Cloud Computing | 2016 | |||
J16CC05 | A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing | 2016 | |||
J16CC06 | Video Stream Analysis in Clouds An Object Detection and Classification Framework for High Performance Video Analytics | 2016 | |||
J16CC07 | Probabilistic Optimization of Resource Distribution and Encryption for Data Storage in the Cloud | 2016 | |||
J16CC08 | Energy-efficient Adaptive Resource Management for Real-time Vehicular Cloud Services | 2016 | |||
J16CC09 | Effective Modeling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload | 2016 | |||
J16CC10 | Trust is Good, Control is Better Creating Secure Clouds by Continuous Auditing | 2016 | |||
J16CC11 | Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation | 2016 | |||
J16CC12 | Providing User Security Guarantees in Public Infrastructure Clouds | 2016 | |||
J16CC13 | Follow-Me Cloud: When Cloud Services Follow Mobile Users | 2016 | |||
J16CC14 | Stochastic Load Balancing for Virtual Resource Management in Datacenters | 2016 | |||
J16CC15 | A Combinatorial Auction Mechanism for Multiple Resource Procurement in Cloud Computing | 2016 | |||
J16CC16 | Crowdsourcing based Description of Urban Emergency Events using Social Media Big Data | 2016 | |||
J16CC17 | A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data | 2016 | |||
J16CC18 | A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud | 2016 | |||
J16CC19 | An Efficient File Hierarchy Attribute-Based Encryption | 2016 | |||
J16CC20 | Dynamic and Public Auditing with Fair Arbitration for Cloud Data | 2016 | |||
J16CC21 | Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates | 2016 | |||
J16CC22 | Identity-Based Encryption with Cloud Revocation Authority and Its Applications | 2016 | |||
J16CC23 | Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud | 2016 | |||
J16CC24 | Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption | 2016 | |||
J16CC25 | A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing | 2016 | |||
J16CC26 | DeyPoS: De-duplicatable Dynamic Proof of Storage for Multi-User Environments | 2016 | |||
J16CC27 | Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing | 2016 | |||
J16CC28 | SecRBAC: Secure data in the Clouds | 2016 | |||
J16CC29 | RepCloud: Attesting to Cloud Service Dependency | 2016 | |||
J16CC30 | Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys | 2016 | |||
J16CC31 | A Multi queue Interlacing Peak Scheduling Method Based on Tasks Classification in Cloud Computing | 2016 | |||
J16CC32 | Self-Tuning Service Provisioning for Decentralized Cloud Applications | 2016 | |||
J16CC33 | Cloud workflow scheduling with deadlines and time slot availability | 2016 | |||
J16CC34 | Automatically Enforcing Security SLAs in the Cloud | 2016 | |||
J16CC35 | A Tutorial on Secure Outsourcing of Large-scale Computations for Big Data | 2016 | |||
J16CC36 | Trust Agent-Based Behavior Induction in Social Networks | 2016 | |||
J16CC37 | Fair Resource Allocation for Data-Intensive Computing in the Cloud | 2016 | |||
J16CC38 | Knowledge-Based Resource Allocation for Collaborative Simulation Development in a Multi-tenant Cloud Computing Environment | 2016 | |||
J16CC39 | KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage | 2016 | |||
J16CC40 | A Trust Label System for Communicating Trust in Cloud Services | 2016 | |||
J16CC41 | Towards Trustworthy Multi-Cloud Services Communities: A Trustbased Hedonic Coalitional Game | 2016 | |||
J16CC42 | Joint Energy Minimization and Resource Allocation in C-RAN with Mobile Cloud | 2016 | |||
J16CC43 | Middleware-oriented Deployment Automation for Cloud Applications | 2016 | |||
J16CC44 | Energy-efficient Adaptive Resource Management for Real-time Vehicular Cloud Services | 2016 | |||
J16CC45 | Cloud Service Reliability Enhancement via Virtual Machine Placement Optimization | 2016 | |||
J16CC46 | Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems | 2016 | |||
J16CC47 | Effective Modelling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload | 2016 | |||
J16CC48 | An Energy-Efficient VM Prediction and Migration Framework for Overcommitted Clouds | 2016 | |||
J16CC49 | Optimal Joint Scheduling and Cloud Offloading for Mobile Applications | 2016 | |||
J16CC50 | A Taxonomy of Job Scheduling on Distributed Computing Systems | 2016 | |||
J16CC51 | Dynamic and Public Auditing with Fair Arbitration for Cloud Data | 2016 | |||
J16CC52 | EPAS: A Sampling Based Similarity Identification Algorithm for the Cloud | 2016 | |||
J16CC53 | Cost Minimization Algorithms for Data Center Management | 2016 | |||
J16CC54 | Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds | 2016 | |||
J16CC55 | Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage | 2016 | |||
J16CC56 | Improved Data Transfer Scheduling and Optimization as a Service in Cloud | 2016 | |||
J16CC57 | Protecting Your Right Verifiable Attribute-BasedKeyword Search with Fine-GrainedOwner-Enforced Search Authorizationin the Cloud | 2016 | |||
J16CC58 | Encryption as a Service for Data Healthcare Cloud Security | 2016 | |||
J16CC59 | CDA Generation and Integration for Health info Exchange based on Cloud | 2016 | |||
J16CC60 | ID2S Password-Authenticated Key Exchange | 2016 | |||
J16CC61 | Virtual Machine-Based Task Scheduling Algorithm in a Cloud | 2016 |
S.NO | PROJECT TITLE | YEAR | |||
---|---|---|---|---|---|
J15CC01 | A Cloud Security Assessment System Based on Classifying and Grading | 2015 | |||
J15CC02 | Identity-Based Encryption with Outsourced Revocation in Cloud Computing | 2015 | |||
J15CC03 | Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage | 2015 | |||
J15CC04 | End-to-End Delay Minimization for Scientific Workflows in Clouds under Budget Constraint | 2015 | |||
J15CC05 | A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid | 2015 | |||
J15CC06 | Adaptive Workflow Scheduling on Cloud Computing | 2015 | |||
J15CC07 | Advances in Applications Portability and Services Interoperability among Multiple Clouds | 2015 | |||
J15CC08 | Aggressive Resource Provisioning for Ensuring QoS in Virtualized Environments | 2015 | |||
J15CC09 | FastRAQ A Fast Approach to Range-Aggregate Queries in Big Data Environments | 2015 | |||
J15CC10 | An Efficient Green Control Algorithm in Cloud Computing for Cost Optimization | 2015 | |||
J15CC11 | Olympus The Cloud of Sensors | 2015 | |||
J15CC12 | CHive Bandwidth Optimized Continuous Querying in Distributed Clouds | 2015 | |||
J15CC13 | OPoR Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices | 2015 | |||
J15CC14 | Cloud Brokering Current Practices and Upcoming Challenges | 2015 | |||
J15CC15 | Cloud Federations in the Sky Formation Game and Mechanism | 2015 | |||
J15CC16 | Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds | 2015 | |||
J15CC17 | Cost-Effective Authentic and Anonymous Data Sharing with Forward Security | 2015 | |||
J15CC18 | Three-server swapping for access confidentiality | 2015 | |||
J15CC19 | T-Broker A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services | 2015 | |||
J15CC20 | Stealthy Denial of Service Strategy in Cloud Computing | 2015 | |||
J15CC21 | SelCSP A Framework to Facilitate Selection of Cloud Service Providers | 2015 | |||
J15CC22 | Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters | 2015 | |||
J15CC23 | Data as a Currency and Cloud-Based Data Lockers | 2015 | |||
J15CC24 | Reactive Resource Provisioning Heuristics for Dynamic Data flows on Cloud Infrastructure | 2015 | |||
J15CC25 | Deploying Large-Scale Datasets on-Demand in the Cloud Treats and Tricks on Data Distribution | 2015 | |||
J15CC26 | Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing | 2015 | |||
J15CC27 | Placing Virtual Machines to Optimize Cloud Gaming Experience | 2015 | |||
J15CC28 | Implementing Design Diversity Using Portfolio Thinking to Dynamically and Adaptively Manage the Allocation of Web Services in the Cloud | 2015 | |||
J15CC29 | Personal Cloud Storage Benchmarks and Comparison | 2015 | |||
J15CC30 | Trustworthy Processing of Healthcare Big Data in Hybrid Clouds | 2015 | |||
J15CC31 | An Intelligent Economic Approach for Dynamic Resource Allocation in Cloud Services | 2015 | |||
J15CC32 | A Hybrid Cloud Approach for Secure Authorized Deduplication | 2015 | |||
J15CC33 | A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing | 2015 | |||
J15CC34 | A Scalable and Reliable Matching Service for Content-BasedPublish/Subscribe Systems | 2015 | |||
J15CC35 | A Secure and Dynamic Multi-keyword Ranked Search Schemeover Encrypted Cloud Data | 2015 | |||
J15CC36 | A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud | 2015 | |||
J15CC37 | An Authenticated Trust and Reputation Calculation andManagement System for Cloud and Sensor Networks Integration | 2015 | |||
J15CC38 | Audit-Free Cloud Storage via Deniable Attribute-based Encryption | 2015 | |||
J15CC39 | Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing | 2015 | |||
J15CC40 | CloudArmor: Supporting Reputation-based Trust Management for Cloud Services | 2015 | |||
J15CC41 | Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption | 2015 | |||
J15CC42 | Enabling Cloud Storage Auditing With Key-Exposure Resistance | 2015 | |||
J15CC43 | Enabling Fine-grained Multi-keyword Search SupportingClassified Sub-dictionaries over Encrypted Cloud Data | 2015 | |||
J15CC44 | Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage | 2015 | |||
J15CC45 | Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing | 2015 | |||
J15CC46 | Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage | 2015 | |||
J15CC47 | Provable Multicopy Dynamic Data Possession in Cloud Computing Systems | 2015 | |||
J15CC48 | Public Integrity Auditing for Shared Dynamic Cloud Data withGroup User Revocation | 2015 | |||
J15CC49 | Secure Auditing and Deduplicating Data in Cloud | 2015 | |||
J15CC50 | Stealthy Denial of Service Strategy in Cloud Computing | 2015 | |||
J15CC51 | Security and privacy in cloud computing | 2015 | |||
J15CC52 | A Density-aware dataencryption scheme for outsourced databases in cloud computing | 2015 | |||
J15CC53 | An Execution Environment Oriented Approach for scheduling dependent task of,. | 2015 | |||
J15CC54 | Deploying Large-Scale Datasets on-Demand in the Cloud Treats | 2015 | |||
J15CC55 | MobiContext A Context-aware Cloud-Based Venue Recommendation Framework | 2015 |