Subgraph matching with set similarity in a Rule based method for entity resolution Privacy policy inference of user uploaded Discovery of ranking fraud for mobile apps Secure auditing and deduplicating data in cloud Provable multicopy dynamic data possession Orchestrating bulk data transfers across New algorithms for secure outsourcing of Identity based encryption with outsourced Cost effective authentic and anonymous Control cloud data access privilege and A trusted iaa s environment A profit maximization scheme with guaranteed User defined privacy grid system Learning to rank image tags with limited