SlideShare a Scribd company logo
1 of 4
MTech, BTech Projects | PhD Support| IEEE Projects | Paper Writing & Publishing
(Scopus Indexed, UGC CARE 'GROUP-A')
Our Development Technologies: Python, Java, PhP, .Net,
Android, IoT and Embedded
1 Cloud Technologies
List of Projects We are offering for your
Academic Project (2019-20) in Various Domains
& Technologies
From:
Cloud Technologies Team
You will get following services and stuff from our team...
1) Project Abstract & Explanation.
2) IEEE Base Paper& Explanation.
3) Complete functional code.
4) Complete Project Report with all UML diagrams.
5) Database backup.
6) Video file of project execution.
7) Project Needed Software’s and Installation in your machine.
8) Online (Different City) Support.
9) Our support until your External Viva.
10) You can brush up your project for your Visa Interview with our team.
 You are welcome with your own requirements.
 Project Abstract, Base paper and Project overview explanation you can get by before
registration.
Extra Supports:
Support for Project Enhancement / Future Work.
Support for Plagiarism Document.
We are offering Real Time Hosting and Cloud Hosting in AWS and etc.
Paper Writing & Publishing
 Scopus Indexed Journals
 UGC-CARE Group 'A' Journals
 International Journals
MTech, BTech Projects | PhD Support| IEEE Projects | Paper Writing & Publishing
(Scopus Indexed, UGC CARE 'GROUP-A')
Our Development Technologies: Python, Java, PhP, .Net,
Android, IoT and Embedded
2 Cloud Technologies
CLOUD COMPUTING PROJECTS
IEEE Papers, Java Development, Amazon Web
Services (AWS) hosting
Sno Title of the Project Domain &
Publishing Year
1 Revocable Attribute-Based Encryption Scheme With Efficient
Deduplication for Ehealth Systems
IEEE
July2019
2 A Practical Attribute-Based Document Collection Hierarchical
Encryption Scheme in Cloud Computing
IEEE
April 2019
3 Dynamic Multi-Keyword Ranked Search Based on Bloom Filter
Over Encrypted Cloud Data
IEEE
April 2019
4 Verifiable and Multi-Keyword Searchable Attribute-Based
Encryption Scheme for Cloud Storage
IEEE
April 2019
5 Enabling Identity-Based Integrity Auditing and Data Sharing With
Sensitive Information Hiding for Secure Cloud Storage
IEEE
February 2019
6 Extended File Hierarchy Access Control Scheme with Attribute
Based Encryption in Cloud Computing
IEEE
March 2019
7 Privacy Preserving Searchable Encryption with Fine-grained
Access Control
IEEE
January 2019
8 Authenticated Medical Documents Releasing with Privacy
Protection and Release Control
IEEE
April 2019
9 Provable Data Possession with Outsourced Data Transfer IEEE
January 2019
10 An Attribute-Based Controlled Collaborative Access Control
Scheme for Public Cloud Storage
IEEE
November 2019
1 Client Side Secure Image Deduplication Using DICE Protocol Multimedia
Information 28 June
2018
Video https://www.youtube.com/watch?v=xRGLNb2-0z8
2 Combining Data Owner-Side and Cloud-Side Access Control for
Encrypted Cloud Storage
Information Forensics
August 2018
Video https://www.youtube.com/watch?v=JlZrvH8YXq4
3 SeSPHR: A Methodology for Secure Sharing of Personal Health
Records in the Cloud
Internet of Things.
June 2018 -2018
4 HealthDep: An Efficient and Secure Deduplication Scheme for
Cloud-Assisted eHealth Systems
Industrial Informatics-
May 2018
Video https://www.youtube.com/watch?v=bzij1rjCWZI
MTech, BTech Projects | PhD Support| IEEE Projects | Paper Writing & Publishing
(Scopus Indexed, UGC CARE 'GROUP-A')
Our Development Technologies: Python, Java, PhP, .Net,
Android, IoT and Embedded
3 Cloud Technologies
5 Secure Attribute-Based Signature Scheme With Multiple
Authorities for Blockchain in Electronic Health Records Systems
Cloud Computing.
February 2018
Video https://www.youtube.com/watch?v=CadrLRtdpqI
6 Secure Identity-based Data Sharing and Profile Matching for
Mobile Healthcare Social Networks in Cloud Computing
Cloud Computing.
July 2018
Video https://www.youtube.com/watch?v=y2g-BWIOjZI
7 Semantic-Aware Searching Over Encrypted Data for Cloud
Computing
Information forensics
and security,
September-2018
8 An Efficient Ranked Multi-Keyword Search for Multiple Data
Owners Over Encrypted Cloud Data
Data Mining-April-
2018
9 Efficient and Expressive Keyword Search Over Encrypted Data in
Cloud
May-June 1 2018
10 Towards Privacy-Preserving Content-Based Image Retrieval in
Cloud Computing
Jan.-March 1 2018
1 RAAC: Robust and Auditable Access Control With Multiple
Attribute Authorities for Public Cloud Storage
Information Forensics
And Security-2017
2 Attribute-Based Storage Supporting Secure Deduplication of
Encrypted Data in Cloud
Big Data-2017
3 A Novel Efficient Remote Data Possession Checking Protocol in
Cloud Storage
Information Forensics
And Security-2017
4 Fast Phrase Search for Encrypted Cloud Storage Cloud Computing -
2017
5 Identity-based Remote Data Integrity Checking with Perfect Data
Privacy Preserving for Cloud Storage
Information Forensics
And Security-2017
6 Practical Privacy-Preserving Content-Based Retrieval in Cloud
Image Repositories
Cloud Computing -
2017
7 Provably Secure Key-Aggregate Cryptosystems with Broadcast
Aggregate Keys for Online Data Sharing on the Cloud
Computers-2017
8 Secure k-NN Query on Encrypted Cloud Data with Multiple Keys Big Data-2017
9 TAFC: Time and Attribute Factors Combined Access Control
for Time-Sensitive Data in Public Cloud
Services Computing-
2017
10 SeDaSC:Secure Data Sharing in Clouds Cloud Computing-2017
11 An Efficient and Fine-grained Big Data Access ControlScheme with
Privacy-preserving Policy
Big data
12 TEES: An Efficient Search Scheme over Encrypted Data on Mobile
Cloud
Cloud Computing-2017
13 Elimination of Redundant Data in Cloud with Secured Access
Control
Cloud Computing-2017
14 Hybrid Secure and Scalable Electronic Health Record Sharing in
Hybrid Cloud
Cloud Computing-2017
MTech, BTech Projects | PhD Support| IEEE Projects | Paper Writing & Publishing
(Scopus Indexed, UGC CARE 'GROUP-A')
Our Development Technologies: Python, Java, PhP, .Net,
Android, IoT and Embedded
4 Cloud Technologies
15 Facilitating Secure and Efficient Spatial Query
Processing on the Cloud
Cloud Computing-2017
16 Flexible Data Access Control Based on Trust and Reputation in
Cloud Computing
Cloud Computing-2017
17 Heterogeneous Data Storage Management with Deduplication in Cloud
Computing
BIG DATA-2017
18 A Secure Anti Collusion Data Sharing Scheme for Dynamic Groups
in the Cloud
Parallel And
Distributed Systems-
2016
1 Circuit ciphertext-policy Attribute-based Hybrid Encryption with
verifiable delegation in cloud computing
Cloud Computing -
2016
2 An Efficient File Hierarchy Attribute-Based Encryption Scheme in
Cloud Computing
Cloud Computing -
2016
3 Enabling Cloud Storage Auditing With Verifiable Outsourcing of
Key Updates
Cloud Computing-
2016
4 TMACS: A Robust and Verifiable Threshold Multi-Authority
Access Control System in Public Cloud Storage
Parallel And
Distributed Systems-
2016
5 Conjunctive Keyword Search With Designated Tester and Timing
Enabled Proxy Re-Encryption Function for E-Health Clouds
Cloud Computing-
2016
6 SecRBAC: Secure data in the Clouds Cloud Computing-
2016
7 Dual-Server Public-Key Encryption With Keyword Search for
Secure Cloud Storage
Cloud Computing-
2016

More Related Content

What's hot

PhD Projects in Fog Computing Research Ideas
PhD Projects in Fog Computing Research IdeasPhD Projects in Fog Computing Research Ideas
PhD Projects in Fog Computing Research IdeasPhD Services
 
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET Journal
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingredpel dot com
 
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITYBLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITYijccsa
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET Journal
 
Double Server Public Key Encryption with Keyword Search for Secure Cloud Storage
Double Server Public Key Encryption with Keyword Search for Secure Cloud StorageDouble Server Public Key Encryption with Keyword Search for Secure Cloud Storage
Double Server Public Key Encryption with Keyword Search for Secure Cloud Storageijtsrd
 
ALGORITHMIC APPROACH TO CLOUD DATA SECURITY
ALGORITHMIC APPROACH TO CLOUD DATA SECURITYALGORITHMIC APPROACH TO CLOUD DATA SECURITY
ALGORITHMIC APPROACH TO CLOUD DATA SECURITYRishank123
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsFinalyearprojects Toall
 
Pantech- Dotnet projects 2016-2017
Pantech- Dotnet projects 2016-2017Pantech- Dotnet projects 2016-2017
Pantech- Dotnet projects 2016-2017Java Team
 
Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing MethodsCloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing MethodsIJCSIS Research Publications
 
Xanadu for Big Data + Deep Learning + Cloud + IoT Integration Strategy
Xanadu for Big Data + Deep Learning + Cloud + IoT Integration StrategyXanadu for Big Data + Deep Learning + Cloud + IoT Integration Strategy
Xanadu for Big Data + Deep Learning + Cloud + IoT Integration StrategyAlex G. Lee, Ph.D. Esq. CLP
 
AI as Driver of Transformation - Didier Ongena @CONNECT19
AI as Driver of Transformation - Didier Ongena @CONNECT19AI as Driver of Transformation - Didier Ongena @CONNECT19
AI as Driver of Transformation - Didier Ongena @CONNECT19Codit
 
Bhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueBhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueVijayananda Mohire
 
Novel cloud computingsecurity issues
Novel cloud computingsecurity issuesNovel cloud computingsecurity issues
Novel cloud computingsecurity issuesJoo Manthar
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
 
Xanadu Based Big Data Deep Learning for Medical Data Analysis
Xanadu Based Big Data Deep Learning for Medical Data AnalysisXanadu Based Big Data Deep Learning for Medical Data Analysis
Xanadu Based Big Data Deep Learning for Medical Data AnalysisAlex G. Lee, Ph.D. Esq. CLP
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for CloudMphasis
 

What's hot (20)

PhD Projects in Fog Computing Research Ideas
PhD Projects in Fog Computing Research IdeasPhD Projects in Fog Computing Research Ideas
PhD Projects in Fog Computing Research Ideas
 
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
 
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITYBLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
 
Double Server Public Key Encryption with Keyword Search for Secure Cloud Storage
Double Server Public Key Encryption with Keyword Search for Secure Cloud StorageDouble Server Public Key Encryption with Keyword Search for Secure Cloud Storage
Double Server Public Key Encryption with Keyword Search for Secure Cloud Storage
 
ALGORITHMIC APPROACH TO CLOUD DATA SECURITY
ALGORITHMIC APPROACH TO CLOUD DATA SECURITYALGORITHMIC APPROACH TO CLOUD DATA SECURITY
ALGORITHMIC APPROACH TO CLOUD DATA SECURITY
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Pantech- Dotnet projects 2016-2017
Pantech- Dotnet projects 2016-2017Pantech- Dotnet projects 2016-2017
Pantech- Dotnet projects 2016-2017
 
Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing MethodsCloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing Methods
 
Xanadu for Big Data + Deep Learning + Cloud + IoT Integration Strategy
Xanadu for Big Data + Deep Learning + Cloud + IoT Integration StrategyXanadu for Big Data + Deep Learning + Cloud + IoT Integration Strategy
Xanadu for Big Data + Deep Learning + Cloud + IoT Integration Strategy
 
2014 IEEE project
2014 IEEE project 2014 IEEE project
2014 IEEE project
 
AI as Driver of Transformation - Didier Ongena @CONNECT19
AI as Driver of Transformation - Didier Ongena @CONNECT19AI as Driver of Transformation - Didier Ongena @CONNECT19
AI as Driver of Transformation - Didier Ongena @CONNECT19
 
API security
API securityAPI security
API security
 
Bhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueBhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogue
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Novel cloud computingsecurity issues
Novel cloud computingsecurity issuesNovel cloud computingsecurity issues
Novel cloud computingsecurity issues
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
Xanadu Based Big Data Deep Learning for Medical Data Analysis
Xanadu Based Big Data Deep Learning for Medical Data AnalysisXanadu Based Big Data Deep Learning for Medical Data Analysis
Xanadu Based Big Data Deep Learning for Medical Data Analysis
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for Cloud
 

Similar to Cloud computing projects

Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...ijtsrd
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET Journal
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagedbpublications
 
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...Editor IJCATR
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
Research data management 1.5
Research data management 1.5Research data management 1.5
Research data management 1.5John Martin
 
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...IJCI JOURNAL
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17Mark Goldstein
 
Java ieee project titles 2017 2018 | Java ieee project 2017-2018
Java ieee project titles 2017 2018 | Java ieee project 2017-2018Java ieee project titles 2017 2018 | Java ieee project 2017-2018
Java ieee project titles 2017 2018 | Java ieee project 2017-2018LeMeniz Infotech
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
TUW-ASE Summer 2015: IoT Cloud Systems
TUW-ASE Summer 2015:  IoT Cloud SystemsTUW-ASE Summer 2015:  IoT Cloud Systems
TUW-ASE Summer 2015: IoT Cloud SystemsHong-Linh Truong
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyIRJET Journal
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
 

Similar to Cloud computing projects (20)

Data mining projects
Data mining projectsData mining projects
Data mining projects
 
IEEE CSE Projects 2017 2018
IEEE CSE Projects 2017 2018IEEE CSE Projects 2017 2018
IEEE CSE Projects 2017 2018
 
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
Design of access control framework for big data as a service platform
Design of access control framework for big data as a service platformDesign of access control framework for big data as a service platform
Design of access control framework for big data as a service platform
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
 
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Research data management 1.5
Research data management 1.5Research data management 1.5
Research data management 1.5
 
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
 
Java ieee project titles 2017 2018 | Java ieee project 2017-2018
Java ieee project titles 2017 2018 | Java ieee project 2017-2018Java ieee project titles 2017 2018 | Java ieee project 2017-2018
Java ieee project titles 2017 2018 | Java ieee project 2017-2018
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
TUW-ASE Summer 2015: IoT Cloud Systems
TUW-ASE Summer 2015:  IoT Cloud SystemsTUW-ASE Summer 2015:  IoT Cloud Systems
TUW-ASE Summer 2015: IoT Cloud Systems
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 

More from CloudTechnologies

Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...CloudTechnologies
 
iot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workersiot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workersCloudTechnologies
 
Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...CloudTechnologies
 
An iot based smart garden with weather station system
An iot based smart garden with weather station systemAn iot based smart garden with weather station system
An iot based smart garden with weather station systemCloudTechnologies
 
A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...CloudTechnologies
 
Diabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approachesDiabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approachesCloudTechnologies
 
machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...CloudTechnologies
 
Image based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimationImage based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimationCloudTechnologies
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...CloudTechnologies
 
Python IEEE 2019 Projects List
Python IEEE 2019 Projects List Python IEEE 2019 Projects List
Python IEEE 2019 Projects List CloudTechnologies
 
Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)CloudTechnologies
 
Automation in Agriculture and IoT
Automation in Agriculture and IoTAutomation in Agriculture and IoT
Automation in Agriculture and IoTCloudTechnologies
 
Gas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOTGas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOTCloudTechnologies
 
The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...CloudTechnologies
 
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOTMULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOTCloudTechnologies
 
IoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction WorkersIoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction WorkersCloudTechnologies
 
Attribute based storage supporting
Attribute based storage supporting Attribute based storage supporting
Attribute based storage supporting CloudTechnologies
 
a wireless io t system towards gait detection in stroke patients
a wireless io t system towards gait detection in stroke patientsa wireless io t system towards gait detection in stroke patients
a wireless io t system towards gait detection in stroke patientsCloudTechnologies
 

More from CloudTechnologies (20)

Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...
 
iot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workersiot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workers
 
Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...
 
An iot based smart garden with weather station system
An iot based smart garden with weather station systemAn iot based smart garden with weather station system
An iot based smart garden with weather station system
 
A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...
 
Diabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approachesDiabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approaches
 
machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...
 
Image based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimationImage based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimation
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...
 
Io t projects
Io t projectsIo t projects
Io t projects
 
Python IEEE 2019 Projects List
Python IEEE 2019 Projects List Python IEEE 2019 Projects List
Python IEEE 2019 Projects List
 
Machine learning projects
Machine learning projectsMachine learning projects
Machine learning projects
 
Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)
 
Automation in Agriculture and IoT
Automation in Agriculture and IoTAutomation in Agriculture and IoT
Automation in Agriculture and IoT
 
Gas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOTGas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOT
 
The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...
 
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOTMULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
 
IoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction WorkersIoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction Workers
 
Attribute based storage supporting
Attribute based storage supporting Attribute based storage supporting
Attribute based storage supporting
 
a wireless io t system towards gait detection in stroke patients
a wireless io t system towards gait detection in stroke patientsa wireless io t system towards gait detection in stroke patients
a wireless io t system towards gait detection in stroke patients
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 

Cloud computing projects

  • 1. MTech, BTech Projects | PhD Support| IEEE Projects | Paper Writing & Publishing (Scopus Indexed, UGC CARE 'GROUP-A') Our Development Technologies: Python, Java, PhP, .Net, Android, IoT and Embedded 1 Cloud Technologies List of Projects We are offering for your Academic Project (2019-20) in Various Domains & Technologies From: Cloud Technologies Team You will get following services and stuff from our team... 1) Project Abstract & Explanation. 2) IEEE Base Paper& Explanation. 3) Complete functional code. 4) Complete Project Report with all UML diagrams. 5) Database backup. 6) Video file of project execution. 7) Project Needed Software’s and Installation in your machine. 8) Online (Different City) Support. 9) Our support until your External Viva. 10) You can brush up your project for your Visa Interview with our team.  You are welcome with your own requirements.  Project Abstract, Base paper and Project overview explanation you can get by before registration. Extra Supports: Support for Project Enhancement / Future Work. Support for Plagiarism Document. We are offering Real Time Hosting and Cloud Hosting in AWS and etc. Paper Writing & Publishing  Scopus Indexed Journals  UGC-CARE Group 'A' Journals  International Journals
  • 2. MTech, BTech Projects | PhD Support| IEEE Projects | Paper Writing & Publishing (Scopus Indexed, UGC CARE 'GROUP-A') Our Development Technologies: Python, Java, PhP, .Net, Android, IoT and Embedded 2 Cloud Technologies CLOUD COMPUTING PROJECTS IEEE Papers, Java Development, Amazon Web Services (AWS) hosting Sno Title of the Project Domain & Publishing Year 1 Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems IEEE July2019 2 A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing IEEE April 2019 3 Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data IEEE April 2019 4 Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage IEEE April 2019 5 Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage IEEE February 2019 6 Extended File Hierarchy Access Control Scheme with Attribute Based Encryption in Cloud Computing IEEE March 2019 7 Privacy Preserving Searchable Encryption with Fine-grained Access Control IEEE January 2019 8 Authenticated Medical Documents Releasing with Privacy Protection and Release Control IEEE April 2019 9 Provable Data Possession with Outsourced Data Transfer IEEE January 2019 10 An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage IEEE November 2019 1 Client Side Secure Image Deduplication Using DICE Protocol Multimedia Information 28 June 2018 Video https://www.youtube.com/watch?v=xRGLNb2-0z8 2 Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage Information Forensics August 2018 Video https://www.youtube.com/watch?v=JlZrvH8YXq4 3 SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud Internet of Things. June 2018 -2018 4 HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems Industrial Informatics- May 2018 Video https://www.youtube.com/watch?v=bzij1rjCWZI
  • 3. MTech, BTech Projects | PhD Support| IEEE Projects | Paper Writing & Publishing (Scopus Indexed, UGC CARE 'GROUP-A') Our Development Technologies: Python, Java, PhP, .Net, Android, IoT and Embedded 3 Cloud Technologies 5 Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems Cloud Computing. February 2018 Video https://www.youtube.com/watch?v=CadrLRtdpqI 6 Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing Cloud Computing. July 2018 Video https://www.youtube.com/watch?v=y2g-BWIOjZI 7 Semantic-Aware Searching Over Encrypted Data for Cloud Computing Information forensics and security, September-2018 8 An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data Data Mining-April- 2018 9 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud May-June 1 2018 10 Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing Jan.-March 1 2018 1 RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage Information Forensics And Security-2017 2 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud Big Data-2017 3 A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage Information Forensics And Security-2017 4 Fast Phrase Search for Encrypted Cloud Storage Cloud Computing - 2017 5 Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage Information Forensics And Security-2017 6 Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories Cloud Computing - 2017 7 Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud Computers-2017 8 Secure k-NN Query on Encrypted Cloud Data with Multiple Keys Big Data-2017 9 TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud Services Computing- 2017 10 SeDaSC:Secure Data Sharing in Clouds Cloud Computing-2017 11 An Efficient and Fine-grained Big Data Access ControlScheme with Privacy-preserving Policy Big data 12 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud Cloud Computing-2017 13 Elimination of Redundant Data in Cloud with Secured Access Control Cloud Computing-2017 14 Hybrid Secure and Scalable Electronic Health Record Sharing in Hybrid Cloud Cloud Computing-2017
  • 4. MTech, BTech Projects | PhD Support| IEEE Projects | Paper Writing & Publishing (Scopus Indexed, UGC CARE 'GROUP-A') Our Development Technologies: Python, Java, PhP, .Net, Android, IoT and Embedded 4 Cloud Technologies 15 Facilitating Secure and Efficient Spatial Query Processing on the Cloud Cloud Computing-2017 16 Flexible Data Access Control Based on Trust and Reputation in Cloud Computing Cloud Computing-2017 17 Heterogeneous Data Storage Management with Deduplication in Cloud Computing BIG DATA-2017 18 A Secure Anti Collusion Data Sharing Scheme for Dynamic Groups in the Cloud Parallel And Distributed Systems- 2016 1 Circuit ciphertext-policy Attribute-based Hybrid Encryption with verifiable delegation in cloud computing Cloud Computing - 2016 2 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing Cloud Computing - 2016 3 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates Cloud Computing- 2016 4 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage Parallel And Distributed Systems- 2016 5 Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds Cloud Computing- 2016 6 SecRBAC: Secure data in the Clouds Cloud Computing- 2016 7 Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage Cloud Computing- 2016