Void main Technologies

Similar documents
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification

Void main Technologies

IEEE Project Titles

JAVA - PROJECT TOPICS IEEE 2015 BASED DOMAIN S.NO TOPIC CODE

A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

NET M.TECH IEEE TITLES

MODAInnovations. Complete Academic Project Solutions IEEE PROJECTS

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

For: - B. E B. Tech M. E M. Tech MCA BCA Diploma MS M. Sc PROJECTS TITLES FOR ACADEMIC YEAR

NETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING

Efficient Auditable Access Control Systems for Public Shared Cloud Storage

JAVA M.TECH IEEE TITLES

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

PROJECT LIST

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

DATA MINING. 3. ITDDM03 A Probabilistic Model of Social Working Memory for Information Retrieval in Social Interactions

Attribute Based Encryption with Privacy Protection in Clouds

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING

For: - B. E B. Tech M. E M. Tech MCA BCA Diploma MS M. Sc PROJECTS TITLES FOR ACADEMIC YEAR

CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security. A Brief Overview of Security & Privacy Issues

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

IEEE 2017 SOFTWARE PROJECT TITLES

ROUTING PROJECT LIST

Personal & Trusted Cloud

IEEE SOFTWARE PROJECT TITLES FINAL YEAR ACADEMIC PROJECT LIST TECHNOFIST

Fujitsu World Tour 2018

Sl.No Project Title Year

Privacy Challenges in Big Data and Industry 4.0

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products

International Journal of Advance Research in Engineering, Science & Technology

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING

JAVA PROJECTS LIST. S.No Title/Name of the Project Year. Mobile Computing

Aceware Technologies Pvt Ltd. (An ISO 9001:2008 Certified Company)

WEB APPLICATION. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Elysium Technologies Private Limited::IEEE Final year Project

S. Indirakumari, A. Thilagavathy

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage

DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES

WAVE: A Decentralized Authorization Framework with Transitive Delegation

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY

CipherCloud CASB+ Connector for ServiceNow

ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2,

Abstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp

CSE 565 Computer Security Fall 2018

Cloud Computing. kbf: Towards Approximate and Bloom Filter based Key-Value Storage for Cloud Computing Systems

Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud

Innovation policy for Industry 4.0

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

CNT Computer and Network Security: Privacy/Anonymity

Cisco Collaborative Knowledge

ISSN Vol.08,Issue.16, October-2016, Pages:

A Procedural Based Encryption Technique for Accessing Data on Cloud

Modern key distribution with ClaimChains

D B M G Data Base and Data Mining Group of Politecnico di Torino

AN IMPROVED PRIVACY POLICY INFERENCE OVER THE SOCIALLY SHARED IMAGES IN SOCIAL WEBSITES

HOW SNOWFLAKE SETS THE STANDARD WHITEPAPER

Business Technology Briefing: Fear of Flying, And How You Can Overcome It

Informatica Enterprise Information Catalog

Oracle Database 11g: Security Release 2

SMART DEVICES: DO THEY RESPECT YOUR PRIVACY?

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration

Grid Computing Systems: A Survey and Taxonomy

Cyber-Physical Chain (CPChain) Light Paper

National Institute of Information and Communications Technology. Cybersecurity Laboratory Security Fundamentals Laboratory Planning Office

Managing Microsoft 365 Identity and Access

Secure Access & SWIFT Customer Security Controls Framework

Cybersecurity ecosystem and TDL Antonio F. Skarmeta

Zheng Yan ( 闫峥 ) Achieving Trustworthy Cyber Systems: Challenges and Strategies Trust Management Enhanced Security with Privacy

Securing Multiple Mobile Platforms

TIES for Microsoft CityNext Next-Generation Situational Awareness

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering

IEEE PROJECTS ON EMBEDDED SYSTEMS

Oracle Database 11g: Security Release 2

Computer-based Tracking Protocols: Improving Communication between Databases

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits

Service Mesh and Microservices Networking

CONSOLIDATING RISK MANAGEMENT AND REGULATORY COMPLIANCE APPLICATIONS USING A UNIFIED DATA PLATFORM

Information Retrieval System Based on Context-aware in Internet of Things. Ma Junhong 1, a *

Mobile and Ubiquitous Computing

ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM

BitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Wireless Network Security Spring 2015

For: - B. E B. Tech M. E M. Tech MCA BCA Diploma MS M. Sc

Personal Cybersecurity

DYNAMIC AGGREGATE KEY GENERATOR FOR CLOUD COMPUTING

epldt Web Builder Security March 2017

Transcription:

Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing 4. A Multilevel Access Control Scheme for Data Security in Transparent Computing 5. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage 6. A robust reputation management mechanism in the federated cloud 7. Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data 8. Attribute-Based Storage Supporting Secure De-duplication of Encrypted Data in Cloud 9. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing 10. Collaborative Filtering-Based Recommendation of Online Social Voting 11. Cooperative Query Answer Authentication Scheme Over Anonymous Sensing Data SECURE 12. Dynamic Facet Ordering for Faceted Product Search Engines

13. Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage 14. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud 15. Efficient Keyword-aware Representative Travel Route Recommendation 16. Enabling Semantic Search based on Conceptual Graphs over Encrypted Outsourced Data 17. Fast Phrase Search for Encrypted Cloud Storage 18. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems 19. Generating Query Facets using Knowledge Bases 20. Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud 21. iask: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence 22. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds 23. Identity-Based Encryption with Cloud Revocation Authority and Its Applications 24. Identity-Based Private Matching over Outsourced Encrypted Datasets 25. Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage

26. Keyword Search with Access Control over Encrypted Cloud Data 27. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection 28. My Privacy My Decision: Control of Photo Sharing on Online Social Networks 29. Network Capability in Localizing Node Failures via End-to-End Path Measurements 30. On the Security of Data Access Control for Multi-authority Cloud Storage Systems 31. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories 32. Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing 33. Privacy Protection based Access Control Scheme in Cloud-based Services 34. Privacy-Preserving Multikeyword Top-k Similarity Search Over Outsourced Cloud Data 35. Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data 36. ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions 37. Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud SECURE NETWORKIN G NETWORKIN G

38. QoS Recommendation in Cloud Services 39. Quantifying Interdependent Privacy Risks with Location Data 40. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage 41. RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem 42. Secure Data Sharing in Cloud Computing Using Revocable- Storage Identity-Based Encryption 43. Securing Cloud Data under Key Exposure 44. SeDaSC: Secure Data Sharing in Clouds 45. SocialQ&A: An Online Social Network Based Question and Answer System 46. SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors 47. SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud 48. Strong Key-Exposure Resilient Auditing for Secure Cloud Storage 49. SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks 50. TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud SECURE MOBILE

51. TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud 52. Towards Real-Time, Country-Level Location Classification of Worldwide Tweets 53. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving 54. User Differentiated Verifiable File Search on the Cloud 55. User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective 56. VPSearch: Achieving Verifiability for Privacy-Preserving Multi- Keyword Search over Encrypted Cloud Data 57. A Mixed Generative-Discriminative Based Hashing Method 58. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing 59. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 60. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 61. Active Trust :Secure and Trustable Routing in Wireless Sensor Networks 62. An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing Networking

63. An Efficient Privacy-Preserving Ranked Keyword Search Method 64. Automatically Mining Facets for Queries from Their Search Results 65. Circuit Cipher text-policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing 66. Cloud Armor: Supporting Reputation-Based Trust Management for Cloud Services 67. Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email 68. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Micro blogging Information 69. Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts 70. Crowd sourcing for Top-K Query Processing over Uncertain Data 71. Cyber bullying Detection based on Semantic-Enhanced Marginalized De noising Auto-Encoder 72. Data Lineage in Malicious Environments 73. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments Information Security

74. DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud 75. Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage 76. Dynamic and Public Auditing with Fair Arbitration for Cloud Data 77. Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates 78. Enabling Fine-Grained Multi-Keyword Search Supporting Classified SubDictionaries over Encrypted Cloud Data 79. EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data 80. Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services 81. Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing 82. Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions 83. ID2S Password-Authenticated Key Exchange Protocols 84. Identity-Based Encryption with Cloud Revocation Authority and Its Applications Information Security Information security Networking

85. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud 86. ipath: Path Inference in Wireless Sensor Networks 87. KSF-OABE Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage 88. Location Aware Keyword Query Suggestion Based on Document Proximity 89. Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine Grained Owner-Enforced Search Authorization in the Cloud 90. Secure Data Sharing in Cloud Computing Using Revocable- Storage Identity-Based Encryptio 91. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage Networking 92. Audit-Free Cloud Storage via Deniable Attribute-based Encryption 93. Identity-Based Encryption with Outsourced Revocation in Cloud Computing 94. Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage 95. Privacy Preserving Ranked Multi-Keyword Search for Multiple

Data Owners in Cloud Computing 96. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation 97. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 98. Secure Distributed Deduplication Systems with Improved Reliability 99. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability Information Secuirty 100. Secure Auditing and Deduplicating Data in Cloud 101. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites 102. Scalable Constrained Spectral Clustering 103. Cloud Key Bank: Privacy and Owner Authorization Enforced Key Management Framework 104. An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration 105. Enabling Fine-grained Multi-keyword Search Supporting Classified Subdictionaries over Encrypted Cloud Data

106. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 107. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption 108. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 109. Provable Multi copy Dynamic Data Possession in Cloud Computing Systems 110. Enabling Cloud Storage Auditing With Key-Exposure Resistance 111. On the Security of Data Access Control for Multi authority Cloud Storage Systems 112. Cloud Armor: Supporting Reputation-based Trust Management for Cloud Services 113. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services 114. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage 115. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds 116. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing

117. A Hybrid Cloud Approach for Secure Authorized Deduplication 118. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data 119. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data 120. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds 121. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 122. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage 123. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems 124. Fast Nearest Neighbor Search with Keywords 125. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 126. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks 127. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud Information Security Networking Networking

128. Privacy-Preserving and Content-Protecting Location Based Queries 129. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases Information Security