JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

Similar documents
JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

Void main Technologies

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Void main Technologies

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

NET M.TECH IEEE TITLES

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

IEEE Project Titles

A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing

* Inter-Cloud Research: Vision

WAVE: A Decentralized Authorization Framework with Transitive Delegation

DOTNET Projects. DotNet Projects IEEE I. DOTNET based CLOUD COMPUTING. DOTNET based ARTIFICIAL INTELLIGENCE

JAVA - PROJECT TOPICS IEEE 2015 BASED DOMAIN S.NO TOPIC CODE

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING

JAVA M.TECH IEEE TITLES

Certificate reputation. Dorottya Papp

Efficient Auditable Access Control Systems for Public Shared Cloud Storage

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification

NETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication

Zheng Yan ( 闫峥 ) Achieving Trustworthy Cyber Systems: Challenges and Strategies Trust Management Enhanced Security with Privacy

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration

Fine-Grained Data Updates on Cloud with Authorized Public Auditing

Planning and Administering SharePoint 2016

Swarm at the Edge of the Cloud. John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Cyber-Physical Chain (CPChain) Light Paper

MCSE Productivity. A Success Guide to Prepare- Core Solutions of Microsoft SharePoint Server edusum.com

CISC859: Topics in Advanced Networks & Distributed Computing: Network & Distributed System Security. A Brief Overview of Security & Privacy Issues

TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

ETHERNITY DECENTRALIZED CLOUD COMPUTING

WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

Cloud-Security: Show-Stopper or Enabling Technology?

Overview SENTINET 3.1

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE

Blanket Encryption. 385 Moffett Park Dr. Sunnyvale, CA Technical Report

Modern key distribution with ClaimChains

Cloud Computing. kbf: Towards Approximate and Bloom Filter based Key-Value Storage for Cloud Computing Systems

Security and Privacy in Cloud Computing

the SWIFT Customer Security

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo

MODAInnovations. Complete Academic Project Solutions IEEE PROJECTS

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

Enhanced Privacy ID (EPID), 156

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING

SRA A Strategic Research Agenda for Future Network Technologies

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

Grid Computing Systems: A Survey and Taxonomy

Privacy Challenges in Big Data and Industry 4.0

Grid Architectural Models

Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter

Securing Multiple Mobile Platforms

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI

Security and Privacy in the Internet of Things : Antonio F. Skarmeta

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud

A Review on Remote Data Auditing in Cloud Computing

Erkuden Rios MARCH 2017, EXCEL LONDON

Smart City, Internet of Things, Security and Privacy

ISSN Vol.04,Issue.05, May-2016, Pages:

Cloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An

Global Data Plane. The Cloud is not enough: Saving IoT from the Cloud & Toward a Global Data Infrastructure PRESENTED BY MEGHNA BAIJAL

COURSE OUTLINE. COURSE OBJECTIVES After completing this course, students will be able to: 1 - INSTALLING & CONFIGURING DCS

Cloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel

Protecting Your Cloud

IBM Tivoli Directory Server

Secure Product Design Lifecycle for Connected Vehicles

Dynamic and Flexible Group Key Generation Based on User Behaviour Monitoring

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Who s Protecting Your Keys? August 2018

Internet of Things: Driving the Transformation

Security & Privacy. Larry Rudolph. Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph

Empowering the Service Economy with SLA-aware Infrastructures in the project

Efficient integrity checking technique for securing client data in cloud computing

5G Revolution & Service security in Korea

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits

Cloud, SDN and BIGIQ. Philippe Bogaerts Senior Field Systems Engineer

Kaspersky Security Network

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

DATA DEDUPLCATION AND MIGRATION USING LOAD REBALANCING APPROACH IN HDFS Pritee Patil 1, Nitin Pise 2,Sarika Bobde 3 1

HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES

ISSN Vol.08,Issue.16, October-2016, Pages:

Fujitsu World Tour 2018

Scalable, Reliable Marshalling and Organization of Distributed Large Scale Data Onto Enterprise Storage Environments *

CipherCloud CASB+ Connector for ServiceNow

CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks

Security Readiness Assessment

Azure SQL Database. Indika Dalugama. Data platform solution architect Microsoft datalake.lk

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA

ROUTING PROJECT LIST

Managing SSL/TLS Traffic Flows

Securing Distributed Computation via Trusted Quorums. Yan Michalevsky, Valeria Nikolaenko, Dan Boneh

Transcription:

JAVA IEEE TRANSACTION ON CLOUD COMPUTING 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing 2. ITJCC02 A semi-automatic and trustworthy scheme for continuous cloud service certification 3. ITJCC03 Attribute-Based Storage Supporting Secure DE duplication of Encrypted Data in Cloud 4. ITJCC04 Empirical Analysis and Validation of Security Alerts Filtering Techniques 5. ITJCC05 Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves- Authenticated Merkle Hash Tree 6. ITJCC06 Using imbalance characteristic for faulttolerant workflow scheduling in Cloud systems 7. ITJCC07 Secure k-nn Query on Encrypted Cloud Data with Multiple Keys 8. ITJCC08 Resource renting for periodical cloud workflow applications 9. ITJCC09 A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds 10. ITJCC10 Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories 11. ITJCC11 Publicly Verifiable Boolean Query over Outsourced Encrypted Data

12. ITJCC12 Scheduling for Workflows with Security- Sensitive Intermediate Data by Selective Tasks Duplication in Clouds 13. ITJCC13 Securing Cloud Data under Key Exposure 14. ITJCC14 Synergy: A Hypervisor Managed Holistic Caching System 15. ITJCC15 NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users 16. ITJCC16 VOD-ADAC: Anonymous Distributed Fine- Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud 17. ITJCC17 Virtual Machine Migration Planning in Software-Defined Networks 18. ITJCC18 Minimum-Cost Cloud Storage Service across Multiple Cloud Providers 19. ITJCC19 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 20. ITJCC20 An Efficient Public Auditing Protocol with Novel Dynamic Structure for Cloud Data 21. ITJCC21 Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation 22. ITJCC22 RepCloud: Attesting to Cloud Service Dependency 24. ITJCC23 Dynamic and Public Auditing with Fair Arbitration for Cloud Data 25. ITJCC24 Identity-Based Proxy-Oriented Data Uploading

and Remote Data Integrity Checking in Public Cloud 26. ITJCC25 SCLPV: Secure Certificate less Public Verification for Cloud-Based Cyber-Physical- Social Systems against Malicious Auditors 27. ITJCC26 Self-Tuning Service Provisioning for Decentralized Cloud Applications 28. ITJCC27 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments 29. ITJCC28 Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage 30. ITJCC29 Protecting Your Right: Verifiable Attributebased Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud 31. ITJCC30 A Protocol for Preventing Insider Attacks inuntrusted Infrastructure-as-a-Service Clouds 32. ITJCC31 Cloud workflow scheduling with deadlines and time slot availability 33. ITJCC32 Automatically Enforcing Security SLAs in the Cloud 34. ITJCC33 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing 35. ITJCC34 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption 36. ITJCC35 Privacy Preserving Ranked Multikey word Search For Multiple Data Owners In Cloud Computing 37. ITJCC36 Cloud Armor: Supporting Reputation-based

Trust Management for Cloud Services 38. ITJCC37 DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud 39. ITJCC38 DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security 40. ITJCC39 Stealthy Denial of Service Strategy in Cloud Computing 41. ITJCC40 Identity-Based Distributed Provable Data Possessionin Multicloud Storage 42. ITJCC41 An Intelligent Economic Approach for Dynamic Resource Allocation in Cloud Services 43. ITJCC42 Audit-Free Cloud Storage via Deniable Attribute-based Encryption 44. ITJCC43 Secure Auditing and DE duplicating Data in Cloud 45. ITJCC44 Privacy-Preserving Public Auditing for Regenerating Code-Based Cloud Storage 46. ITJCC45 An efficient algorithm for the bursting of service-based applications in hybrid Clouds 47. ITJCC46 Agent-based Interactions and Economic Encounters in an Intelligent Inter Cloud 48. ITJCC47 SeDaSC: Secure Data Sharing in Clouds 49. ITJCC48 T-broker: A Trust-aware Service Brokering Scheme for Multiple Cloud Collaborative Services

50. ITJCC49 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 51. ITJCC50 Identity-Based Encryption with Outsourced Revocation in Cloud Computing DOTNET CLOUD COMPUTING 1. ITDCC01 A New Cloud Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users 2. ITDCC02 Cloudy Knapsack Algorithm for Offloading Tasks from Large Scale Distributed Applications 3. ITDCC03 Secure k-nn Query on Encrypted Cloud Data with Multiple Keys 4. ITDCC04 Optimal Cloud Computing Resource Allocation for Demand Side Management in Smart Grid 5. ITDCC05 Two-Aggregator Topology Optimization using Multiple Paths in Data Center Networks 6. ITDCC06 Stackelberg Game for Energy-aware Resource Allocation to Sustain Data Centers Using RES 7. ITDCC07 Dynamic Cloud Task Scheduling Based on a Two-Stage Strategy 8. ITDCC08 Fast Phrase Search for Encrypted Cloud Storage

324. ITDCC34 KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage 325. ITDCC35 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing 326. ITDCC36 Identity-Based Encryption with Cloud Revocation Authority and Its Applications 327. ITDCC37 Online Resource Scheduling Under Concave Pricing for Cloud Computing 328. ITDCC38 Skyline Discovery and Composition of Multi- Cloud Smashup Services