myacademicproject logo

Cloud Computing

  • myacademicproject categorys

    A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage

    • B.TECH / M.TECH / M.SC / PH.D

    •  Gangadhar.T

    • 11 Months ago

    As an important application in cloud computing, cloud storage offers user scalable, flexible and high quality data storage and computation services. A growing number of data owners choose to outsource data files to the cloud. Because cloud storage servers are not fully trustworthy, data owners need dependable means to check the possession for their files outsourced to remote cloud servers. To address this crucial problem, some remote data possession checking (RDPC) protocols have been presented.

    Know More
  • myacademicproject categorys

    Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data

    • B.TECH / M.TECH / M.SC / PH.D

    •  Gangadhar.T

    • 13 Months ago

    Secure search techniques over encrypted cloud data allow an authorized user to query data files of interest by submitting encrypted query keywords to the cloud server in a privacy-preserving manner. However, in practice, the returned query results may be incorrect or incomplete in the dishonest cloud environment.

    Know More
  • myacademicproject categorys

    Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems

    • B.TECH / M.TECH / M.SC / PH.D

    •  Gangadhar.T

    • 13 Months ago

    —Likely system invariants model properties that hold in operating conditions of a computing system. Invariants may be mined offline from training datasets, or inferred during execution. Scientific work has shown that invariants’ mining techniques support several activities, including capacity planning and detection of failures, anomalies and violations of Service Level Agreements. However their practical application by operation engineers is still a challenge. We aim to fill this gap through an empirical analysis of three major techniques for mining invariants in cloud-based utility computing systems: clustering,

    Know More
  • myacademicproject categorys

    Fast Phrase Search for Encrypted Cloud Storage

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 14 Months ago

    Cloud computing has generated much interest in the research community in recent years for its many advantages, but has also raise security and privacy concerns.

    Know More
  • myacademicproject categorys

    Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • -24 Months ago

    Cloud storage system provides facilitative file storage and sharing services for distributed clients. To address integrity, controllable outsourcing and origin auditing concerns on outsourced files, we propose an identity-based data outsourcing (IBDO) scheme equipped with desirable features advantageous over existing proposals in securing outsourced data

    Know More
  • myacademicproject categorys

    Efficient and Expressive Keyword Search Over Encrypted Data in Cloud

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 15 Months ago

    Searchable encryption allows a cloud server to conduct keyword search over encrypted data on behalf of the data users without learning the underlying plaintexts. However, most existing searchable encryption schemes only support single or conjunctive keyword search, while a few other schemes that are able to perform expressive keyword search are computationally inefficient since they are built from bilinear pairings over the composite-order groups

    Know More
  • myacademicproject categorys

    Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing

    • B.Tech / M.Tech / M.Sc / Ph.D

    •  GANGADHAR.T

    • 12 Months ago

    Along with the development of cloud computing, an increasing number of enterprises start to adopt cloud service, which promotes the emergence of many cloud service providers.

    Know More
  • myacademicproject categorys

    Identity-Based Private Matching over Outsourced Encrypted Datasets

    • B.Tech / M.Tech / M.Sc / Ph.D

    •  GANGADHAR.T

    • 12 Months ago

    With wide use of cloud computing and storage services, sensitive information is increasingly centralized into the cloud to reduce the management costs, which raises concerns about data privacy. Encryption is a promising way to maintain the confidentiality of outsourced sensitive data, but it makes effective data utilization to be a very challenging task.

    Know More
  • myacademicproject categorys

    Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing

    • B.Tech / M.Tech / M.Sc / Ph.D

    •  GANGADHAR.T

    • 12 Months ago

    With the popularity of wearable devices, along with the development of clouds and cloudlet technology, there has been increasing need to provide better medical care. The processing chain of medical data mainly includes data collection, data storage and data sharing, etc

    Know More
  • myacademicproject categorys

    Privacy Protection based Access Control Scheme in Cloud-based Services

    • B.Tech / M.Tech / M.Sc / Ph.D

    •  GANGADHAR.T

    • 12 Months ago

    With the rapid development of the computer technology, cloud-based services have become a hot topic. Cloudbased services not only provide users with convenience, but also bring many security issues. Therefore, the study of access control scheme to protect users' privacy in cloud environment is of great significance. I

    Know More
  • myacademicproject categorys

    Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data

    • B.Tech / M.Tech / M.Sc / Ph.D

    •  GANGADHAR.T

    • 13 Months ago

    The amount of data generated by individuals and enterprises is rapidly increasing. With the emerging cloud computing paradigm, the data and corresponding complex management tasks can be outsourced to the cloud for the management flexibility and cost savings. Unfortunately, as the data could be sensitive, the direct data outsourcing would have the problem of privacy leakage. The encryption can be used, before the data outsourcing, with the concern that the operations can still be accomplished by the cloud. We consider the multikeyword similarity search over outsourced cloud data. In particular, with the consideration of the text data only, multiple keywords are specified by the user. The cloud returns the files containing more than a threshold number of input keywords or similar keywords, where the similarity here is defined according to the edit distance metric. We propose three solutions, where blind signature provides the user access privacy, and a novel use of Bloom f

    Know More
  • myacademicproject categorys

    Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud

    • B.Tech / M.Tech / M.Sc / Ph.D

    •  GANGADHAR.T

    • 12 Months ago

    Online data sharing for increased productivity and efficiency is one of the primary requirements today for any organization. The advent of cloud computing has pushed the limits of sharing across geographical boundaries, and has enabled a multitude of users to contribute and collaborate on shared data.

    Know More
  • myacademicproject categorys

    RAAC Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage

    • B.Tech / M.Tech / M.Sc / Ph.D

    •  GANGADHAR.T

    • 12 Months ago

    Data access control is a challenging issue in public cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but-curious cloud servers.

    Know More
  • myacademicproject categorys

    TAFC Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud

    • B.Tech / M.Tech / M.Sc / Ph.D

    •  GANGADHAR.T

    • 12 Months ago

    The new paradigm of outsourcing data to the cloud is a double-edged sword. On the one hand, it frees data owners from the technical management, and is easier for data owners to share their data with intended users. On the other hand, it poses new challenges on privacy and security protection. To protect data confidentiality against the honest-but-curious cloud service provider, numerous works have been proposed to support finegrained data access control.

    Know More
  • myacademicproject categorys

    TEES An Efficient Search Scheme over Encrypted Data on Mobile Cloud

    • B.Tech / M.Tech / M.Sc / Ph.D

    •  GANGADHAR.T

    • 11 Months ago

    Cloud storage provides a convenient, massive, and scalable storage at low cost, but data privacy is a major concern that prevents users from storing files on the cloud trustingly.

    Know More
  • myacademicproject categorys

    A Critical Overview of Latest Challenges and Solutions of Mobile Cloud Computing

    • B.TECH / M.TECH / M.SC / PH.D

    •   GANGADHAR.T

    • 12 Months ago

    The unabated plethora of research activities to augment multifarious mobile devices by leveraging cloud resources have created new research field called Mobile Cloud Computing (MCC).

    Know More
  • myacademicproject categorys

    Transactional Behavior Verification in Business Process as a Service Configuration

    • B.TECH / M.TECH / M.SC / PH.D

    •   GANGADHAR.T

    • 12 Months ago

    Business Process as a Service (BPaaS) is an emerging type of cloud service that offers configurable and executable business processes to clients over the Internet. As BPaaS is still in early years of research, many open issues remain. Managing the configuration of BPaaS builds on areas such as software product lines and configurable business processes.

    Know More
  • myacademicproject categorys

    A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing

    • B.TECH / M.TECH / M.SC / PH.D

    •   GANGADHAR.T

    • 12 Months ago

    Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic technique for fine-grained access control of outsourced data in the cloud. However, some drawbacks of key management hinder the popularity of its application. One drawback in urgent need of solution is the key escrow problem.

    Know More
  • myacademicproject categorys

    Securing Cloud Data under Key Exposure A News Reveal a powerful attacker

    • B.TECH / M.TECH / M.SC / PH.D

    •   GANGADHAR.T

    • 14 Months ago

    Recent news reveal a powerful attacker which breaks data confidentiality by acquiring cryptographic keys, by means of coercion or backdoors in cryptographic software. Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the attacker’s access to the ciphertext.

    Know More
  • myacademicproject categorys

    A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

    • B.TECH / M.TECH / M.SC / PH.D

    •   GANGADHAR.T

    • 12 Months ago

    With the popularity of cloud computing, mobile devices can store/retrieve personal data from anywhere at any time. Consequently, the data security problem in mobile cloud becomes more and more severe and prevents further development of mobile cloud.

    Know More
  • myacademicproject categorys

    Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things

    • B.TECH / M.TECH / M.SC / PH.D

    •   GANGADHAR.T

    • 12 Months ago

    The Internet of things (Iot)1 is considered as a future internet that extends the connection of the internet to all kinds of real-world physical smart devices. A report by Cisco (www.cisco .com/c/dam/en_us/about/ac79/docs/ innov/IoT_IBSG_0411FINAL.pdf) estimates that by 2020 around 50 billion of such smart devices will be connected to the Internet. By connecting these billions of smart devices to the Internet.

    Know More
  • myacademicproject categorys

    Temporal Factor-aware Video Affective Analysis and Recommendation for Cyber-based Social Media

    • B.TECH / M.TECH / M.SC / PH.D

    •   GANGADHAR.T

    • 12 Months ago

    As an important cyber-enabled application, online video recommendation is seeing significant interest from both industry and academia. To effectively recommend video content becomes a popular research topic. However, it has been found that existing recommendation methods based on video affective analysis ignore the temporal factor.

    Know More
  • myacademicproject categorys

    An Economical and SLO-Guaranteed Cloud Storage Service across Multiple Cloud Service Providers

    • B.TECH / M.TECH / M.SC / PH.D

    •   GANGADHAR.T

    • 12 Months ago

    It is important for cloud service brokers to provide a multi-cloud storage service to minimize their payment cost to cloud service providers (CSPs) while providing service level objective (SLO) guarantee to their customers. Many multi-cloud storage services have been proposed or payment cost minimization or SLO guarantee. However, no previous works fully leverage the current cloud pricing policies (such as resource reservation pricing) to reduce the payment cost.

    Know More
  • myacademicproject categorys

    Strong Key-Exposure Resilient Auditing for Secure Cloud Storage

    • B.TECH / M.TECH / M.SC / PH.D

    •   GANGADHAR.T

    • 12 Months ago

    Key exposure is one serious security problem for cloud storage auditing. In order to deal with this problem, cloud storage auditing scheme with key-exposure resilience has been proposed. However, in such a scheme, the malicious cloud might still forge valid authenticators later than the key-exposure time period if it obtains the current secret key of data owner

    Know More
  • myacademicproject categorys

    Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    MANET (Mobile Ad-Hoc Network) has a dynamic topology. Due to the mobility of nodes in the network of cooperative communication is a technique for archived greater efficiency of transmission. In this paper the Network Lifetime has been improved using Cross layer Distributed Energy Adaptive Location based Cooperative MAC protocols. This DEL-CMAC protocol has been increases the network lifetime and energy efficiency. The performance is achieved by utility based best relay selection strategy selects the best relay used on location

    Know More
  • myacademicproject categorys

    Attribute-Based Storage Supporting Secure Deduplication of EncryptedData in Cloud

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    Attribute-based encryption (ABE) has been widely used in cloud computing where a data provider outsources his/her encrypted data to a cloud service provider, and can share the data with users possessing specific credentials (or attributes). However, the standard ABE system does not support secure deduplication, which is crucial for eliminating duplicate copies of identical data in order to save storage space and network bandwidth. In this paper, we present an attribute-based storage system with secure deduplication in a hybrid cloud setting, where a private cloud is responsible for duplicate detection and a public cloud manages the storage.

    Know More
  • myacademicproject categorys

    RIAL Resource Intensity Aware Load Balancing in Clouds

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    To provide robust infrastructure as a service (IaaS), clouds currently perform load balancing by migrating virtual machines (VMs) from heavily loaded physical machines (PMs) to lightly loaded PMs. The unique features of clouds pose formidable challenges to achieving effective and efficient load balancing. First, VMs in clouds use different resources (e.g., CPU, bandwidth, memory) to serve a variety of services (e.g., high performance computing, web services, file

    Know More
  • myacademicproject categorys

    Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data

    • B.TECH / M.TECH / M.SC / PH.D

    •   GANGADHAR.T

    • 12 Months ago

    Cloud computing provides individuals and enterprises massive computing power and scalable storage capacities to support a variety of big data applications in domains like health care and scientific research, therefore more and more data owners are involved to outsource their data on cloud servers for great convenience in data management and mining. However, data sets like health records in electronic documents usually contain sensitive information, which brings about privacy concerns if the documents are released or shared to partially untrusted third-parties in cloud. A practical and widely used technique for data privacy preservation is to encrypt data before outsourcing to the cloud servers, which however reduces the data utility and makes many

    Know More
  • myacademicproject categorys

    Attribute-Based Data Sharing Scheme Revisited in Cloud Computing

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    Cipher text-policy attribute-based encryption (CP-ABE) is a very promising encryption technique for secure data sharing in the context of cloud computing. Data owner is allowed to fully control the access policy associated with his data which to be shared. However, CP-ABE is limited to a potential security risk that is known as key escrow problem, whereby the secret keys of users have to be issued by a trusted key authority. Besides, most of the existing CP-ABE schemes cannot support attribute with arbitrary state. In this paper, we revisit attribute-based data sharing scheme in order to solve the key escrow issue but also improve the expressiveness of attribute, so that the resulting scheme

    Know More
  • myacademicproject categorys

    Two-Factor Data Security Protection Mechanism for Cloud Storage System

    • B.TECH / M.TECH / M.SC / PH.D

    •   GANGADHAR.T

    • 12 Months ago

    In this paper, we propose a two-factor data security protection mechanism with factor revocability for cloud storage system. Our system allows a sender to send an encrypted message to a receiver through a cloud storage server. The sender only needs to know the identity of the receiver but no other information (such as its public key or its certificate). The receiver needs to possess two things in order to decrypt the ciphertext. The first thing is his/her secret key stored in

    Know More
  • myacademicproject categorys

    An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

    • B.TECH / M.TECH / M.SC / PH.D

    •  GANGADHAR.T

    • 12 Months ago

    Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption technology to solve the challenging problem of secure data sharing in cloud computing. The shared data files generally have the characteristic of multilevel hierarchy, particularly in the area of healthcare and the military. However, the hierarchy structure of shared files has not been explored in CP-ABE. In this paper, an efficient file hierarchy attribute-based encryption scheme is proposed in cloud computing. The layered access structures are integrated into a single access

    Know More