SlideShare a Scribd company logo
1 of 4
MTech, BTech Projects | PhD Support| IEEE Projects | Paper Writing & Publishing
(Scopus Indexed, UGC CARE 'GROUP-A')
Our Development Technologies: Python, Java, PhP, .Net,
Android, IoT and Embedded
1 Cloud Technologies
List of Projects We are offering for your
Academic Project (2019-20) in Various Domains
& Technologies
From:
Cloud Technologies Team
You will get following services and stuff from our team...
1) Project Abstract & Explanation.
2) IEEE Base Paper& Explanation.
3) Complete functional code.
4) Complete Project Report with all UML diagrams.
5) Database backup.
6) Video file of project execution.
7) Project Needed Software’s and Installation in your machine.
8) Online (Different City) Support.
9) Our support until your External Viva.
10) You can brush up your project for your Visa Interview with our team.
 You are welcome with your own requirements.
 Project Abstract, Base paper and Project overview explanation you can get by before
registration.
Extra Supports:
Support for Project Enhancement / Future Work.
Support for Plagiarism Document.
We are offering Real Time Hosting and Cloud Hosting in AWS and etc.
Paper Writing & Publishing
 Scopus Indexed Journals
 UGC-CARE Group 'A' Journals
 International Journals
MTech, BTech Projects | PhD Support| IEEE Projects | Paper Writing & Publishing
(Scopus Indexed, UGC CARE 'GROUP-A')
Our Development Technologies: Python, Java, PhP, .Net,
Android, IoT and Embedded
2 Cloud Technologies
CLOUD COMPUTING PROJECTS
IEEE Papers, Java Development, Amazon Web
Services (AWS) hosting
Sno Title of the Project Domain &
Publishing Year
1 Revocable Attribute-Based Encryption Scheme With Efficient
Deduplication for Ehealth Systems
IEEE
July2019
2 A Practical Attribute-Based Document Collection Hierarchical
Encryption Scheme in Cloud Computing
IEEE
April 2019
3 Dynamic Multi-Keyword Ranked Search Based on Bloom Filter
Over Encrypted Cloud Data
IEEE
April 2019
4 Verifiable and Multi-Keyword Searchable Attribute-Based
Encryption Scheme for Cloud Storage
IEEE
April 2019
5 Enabling Identity-Based Integrity Auditing and Data Sharing With
Sensitive Information Hiding for Secure Cloud Storage
IEEE
February 2019
6 Extended File Hierarchy Access Control Scheme with Attribute
Based Encryption in Cloud Computing
IEEE
March 2019
7 Privacy Preserving Searchable Encryption with Fine-grained
Access Control
IEEE
January 2019
8 Authenticated Medical Documents Releasing with Privacy
Protection and Release Control
IEEE
April 2019
9 Provable Data Possession with Outsourced Data Transfer IEEE
January 2019
10 An Attribute-Based Controlled Collaborative Access Control
Scheme for Public Cloud Storage
IEEE
November 2019
1 Client Side Secure Image Deduplication Using DICE Protocol Multimedia
Information 28 June
2018
Video https://www.youtube.com/watch?v=xRGLNb2-0z8
2 Combining Data Owner-Side and Cloud-Side Access Control for
Encrypted Cloud Storage
Information Forensics
August 2018
Video https://www.youtube.com/watch?v=JlZrvH8YXq4
3 SeSPHR: A Methodology for Secure Sharing of Personal Health
Records in the Cloud
Internet of Things.
June 2018 -2018
4 HealthDep: An Efficient and Secure Deduplication Scheme for
Cloud-Assisted eHealth Systems
Industrial Informatics-
May 2018
Video https://www.youtube.com/watch?v=bzij1rjCWZI
MTech, BTech Projects | PhD Support| IEEE Projects | Paper Writing & Publishing
(Scopus Indexed, UGC CARE 'GROUP-A')
Our Development Technologies: Python, Java, PhP, .Net,
Android, IoT and Embedded
3 Cloud Technologies
5 Secure Attribute-Based Signature Scheme With Multiple
Authorities for Blockchain in Electronic Health Records Systems
Cloud Computing.
February 2018
Video https://www.youtube.com/watch?v=CadrLRtdpqI
6 Secure Identity-based Data Sharing and Profile Matching for
Mobile Healthcare Social Networks in Cloud Computing
Cloud Computing.
July 2018
Video https://www.youtube.com/watch?v=y2g-BWIOjZI
7 Semantic-Aware Searching Over Encrypted Data for Cloud
Computing
Information forensics
and security,
September-2018
8 An Efficient Ranked Multi-Keyword Search for Multiple Data
Owners Over Encrypted Cloud Data
Data Mining-April-
2018
9 Efficient and Expressive Keyword Search Over Encrypted Data in
Cloud
May-June 1 2018
10 Towards Privacy-Preserving Content-Based Image Retrieval in
Cloud Computing
Jan.-March 1 2018
1 RAAC: Robust and Auditable Access Control With Multiple
Attribute Authorities for Public Cloud Storage
Information Forensics
And Security-2017
2 Attribute-Based Storage Supporting Secure Deduplication of
Encrypted Data in Cloud
Big Data-2017
3 A Novel Efficient Remote Data Possession Checking Protocol in
Cloud Storage
Information Forensics
And Security-2017
4 Fast Phrase Search for Encrypted Cloud Storage Cloud Computing -
2017
5 Identity-based Remote Data Integrity Checking with Perfect Data
Privacy Preserving for Cloud Storage
Information Forensics
And Security-2017
6 Practical Privacy-Preserving Content-Based Retrieval in Cloud
Image Repositories
Cloud Computing -
2017
7 Provably Secure Key-Aggregate Cryptosystems with Broadcast
Aggregate Keys for Online Data Sharing on the Cloud
Computers-2017
8 Secure k-NN Query on Encrypted Cloud Data with Multiple Keys Big Data-2017
9 TAFC: Time and Attribute Factors Combined Access Control
for Time-Sensitive Data in Public Cloud
Services Computing-
2017
10 SeDaSC:Secure Data Sharing in Clouds Cloud Computing-2017
11 An Efficient and Fine-grained Big Data Access ControlScheme with
Privacy-preserving Policy
Big data
12 TEES: An Efficient Search Scheme over Encrypted Data on Mobile
Cloud
Cloud Computing-2017
13 Elimination of Redundant Data in Cloud with Secured Access
Control
Cloud Computing-2017
14 Hybrid Secure and Scalable Electronic Health Record Sharing in
Hybrid Cloud
Cloud Computing-2017
MTech, BTech Projects | PhD Support| IEEE Projects | Paper Writing & Publishing
(Scopus Indexed, UGC CARE 'GROUP-A')
Our Development Technologies: Python, Java, PhP, .Net,
Android, IoT and Embedded
4 Cloud Technologies
15 Facilitating Secure and Efficient Spatial Query
Processing on the Cloud
Cloud Computing-2017
16 Flexible Data Access Control Based on Trust and Reputation in
Cloud Computing
Cloud Computing-2017
17 Heterogeneous Data Storage Management with Deduplication in Cloud
Computing
BIG DATA-2017
18 A Secure Anti Collusion Data Sharing Scheme for Dynamic Groups
in the Cloud
Parallel And
Distributed Systems-
2016
1 Circuit ciphertext-policy Attribute-based Hybrid Encryption with
verifiable delegation in cloud computing
Cloud Computing -
2016
2 An Efficient File Hierarchy Attribute-Based Encryption Scheme in
Cloud Computing
Cloud Computing -
2016
3 Enabling Cloud Storage Auditing With Verifiable Outsourcing of
Key Updates
Cloud Computing-
2016
4 TMACS: A Robust and Verifiable Threshold Multi-Authority
Access Control System in Public Cloud Storage
Parallel And
Distributed Systems-
2016
5 Conjunctive Keyword Search With Designated Tester and Timing
Enabled Proxy Re-Encryption Function for E-Health Clouds
Cloud Computing-
2016
6 SecRBAC: Secure data in the Clouds Cloud Computing-
2016
7 Dual-Server Public-Key Encryption With Keyword Search for
Secure Cloud Storage
Cloud Computing-
2016

More Related Content

What's hot

Double Server Public Key Encryption with Keyword Search for Secure Cloud Storage
Double Server Public Key Encryption with Keyword Search for Secure Cloud StorageDouble Server Public Key Encryption with Keyword Search for Secure Cloud Storage
Double Server Public Key Encryption with Keyword Search for Secure Cloud Storage
ijtsrd
 

What's hot (20)

PhD Projects in Fog Computing Research Ideas
PhD Projects in Fog Computing Research IdeasPhD Projects in Fog Computing Research Ideas
PhD Projects in Fog Computing Research Ideas
 
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
 
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITYBLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITY
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
 
Double Server Public Key Encryption with Keyword Search for Secure Cloud Storage
Double Server Public Key Encryption with Keyword Search for Secure Cloud StorageDouble Server Public Key Encryption with Keyword Search for Secure Cloud Storage
Double Server Public Key Encryption with Keyword Search for Secure Cloud Storage
 
ALGORITHMIC APPROACH TO CLOUD DATA SECURITY
ALGORITHMIC APPROACH TO CLOUD DATA SECURITYALGORITHMIC APPROACH TO CLOUD DATA SECURITY
ALGORITHMIC APPROACH TO CLOUD DATA SECURITY
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Pantech- Dotnet projects 2016-2017
Pantech- Dotnet projects 2016-2017Pantech- Dotnet projects 2016-2017
Pantech- Dotnet projects 2016-2017
 
Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing MethodsCloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing Methods
 
Xanadu for Big Data + Deep Learning + Cloud + IoT Integration Strategy
Xanadu for Big Data + Deep Learning + Cloud + IoT Integration StrategyXanadu for Big Data + Deep Learning + Cloud + IoT Integration Strategy
Xanadu for Big Data + Deep Learning + Cloud + IoT Integration Strategy
 
2014 IEEE project
2014 IEEE project 2014 IEEE project
2014 IEEE project
 
AI as Driver of Transformation - Didier Ongena @CONNECT19
AI as Driver of Transformation - Didier Ongena @CONNECT19AI as Driver of Transformation - Didier Ongena @CONNECT19
AI as Driver of Transformation - Didier Ongena @CONNECT19
 
API security
API securityAPI security
API security
 
Bhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueBhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogue
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Novel cloud computingsecurity issues
Novel cloud computingsecurity issuesNovel cloud computingsecurity issues
Novel cloud computingsecurity issues
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
Xanadu Based Big Data Deep Learning for Medical Data Analysis
Xanadu Based Big Data Deep Learning for Medical Data AnalysisXanadu Based Big Data Deep Learning for Medical Data Analysis
Xanadu Based Big Data Deep Learning for Medical Data Analysis
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for Cloud
 

Similar to Cloud computing projects

Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
ijtsrd
 
Design of access control framework for big data as a service platform
Design of access control framework for big data as a service platformDesign of access control framework for big data as a service platform
Design of access control framework for big data as a service platform
International Journal of Reconfigurable and Embedded Systems
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 

Similar to Cloud computing projects (20)

Data mining projects
Data mining projectsData mining projects
Data mining projects
 
IEEE CSE Projects 2017 2018
IEEE CSE Projects 2017 2018IEEE CSE Projects 2017 2018
IEEE CSE Projects 2017 2018
 
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
Design of access control framework for big data as a service platform
Design of access control framework for big data as a service platformDesign of access control framework for big data as a service platform
Design of access control framework for big data as a service platform
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
 
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Research data management 1.5
Research data management 1.5Research data management 1.5
Research data management 1.5
 
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
Phoenix Data Conference - Big Data Analytics for IoT 11/4/17
 
Java ieee project titles 2017 2018 | Java ieee project 2017-2018
Java ieee project titles 2017 2018 | Java ieee project 2017-2018Java ieee project titles 2017 2018 | Java ieee project 2017-2018
Java ieee project titles 2017 2018 | Java ieee project 2017-2018
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
TUW-ASE Summer 2015: IoT Cloud Systems
TUW-ASE Summer 2015:  IoT Cloud SystemsTUW-ASE Summer 2015:  IoT Cloud Systems
TUW-ASE Summer 2015: IoT Cloud Systems
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 

More from CloudTechnologies

Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...
CloudTechnologies
 

More from CloudTechnologies (20)

Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...
 
iot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workersiot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workers
 
Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...
 
An iot based smart garden with weather station system
An iot based smart garden with weather station systemAn iot based smart garden with weather station system
An iot based smart garden with weather station system
 
A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...
 
Diabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approachesDiabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approaches
 
machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...
 
Image based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimationImage based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimation
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...
 
Io t projects
Io t projectsIo t projects
Io t projects
 
Python IEEE 2019 Projects List
Python IEEE 2019 Projects List Python IEEE 2019 Projects List
Python IEEE 2019 Projects List
 
Machine learning projects
Machine learning projectsMachine learning projects
Machine learning projects
 
Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)
 
Automation in Agriculture and IoT
Automation in Agriculture and IoTAutomation in Agriculture and IoT
Automation in Agriculture and IoT
 
Gas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOTGas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOT
 
The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...
 
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOTMULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
 
IoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction WorkersIoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction Workers
 
Attribute based storage supporting
Attribute based storage supporting Attribute based storage supporting
Attribute based storage supporting
 
a wireless io t system towards gait detection in stroke patients
a wireless io t system towards gait detection in stroke patientsa wireless io t system towards gait detection in stroke patients
a wireless io t system towards gait detection in stroke patients
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

Cloud computing projects

  • 1. MTech, BTech Projects | PhD Support| IEEE Projects | Paper Writing & Publishing (Scopus Indexed, UGC CARE 'GROUP-A') Our Development Technologies: Python, Java, PhP, .Net, Android, IoT and Embedded 1 Cloud Technologies List of Projects We are offering for your Academic Project (2019-20) in Various Domains & Technologies From: Cloud Technologies Team You will get following services and stuff from our team... 1) Project Abstract & Explanation. 2) IEEE Base Paper& Explanation. 3) Complete functional code. 4) Complete Project Report with all UML diagrams. 5) Database backup. 6) Video file of project execution. 7) Project Needed Software’s and Installation in your machine. 8) Online (Different City) Support. 9) Our support until your External Viva. 10) You can brush up your project for your Visa Interview with our team.  You are welcome with your own requirements.  Project Abstract, Base paper and Project overview explanation you can get by before registration. Extra Supports: Support for Project Enhancement / Future Work. Support for Plagiarism Document. We are offering Real Time Hosting and Cloud Hosting in AWS and etc. Paper Writing & Publishing  Scopus Indexed Journals  UGC-CARE Group 'A' Journals  International Journals
  • 2. MTech, BTech Projects | PhD Support| IEEE Projects | Paper Writing & Publishing (Scopus Indexed, UGC CARE 'GROUP-A') Our Development Technologies: Python, Java, PhP, .Net, Android, IoT and Embedded 2 Cloud Technologies CLOUD COMPUTING PROJECTS IEEE Papers, Java Development, Amazon Web Services (AWS) hosting Sno Title of the Project Domain & Publishing Year 1 Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems IEEE July2019 2 A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing IEEE April 2019 3 Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data IEEE April 2019 4 Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage IEEE April 2019 5 Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage IEEE February 2019 6 Extended File Hierarchy Access Control Scheme with Attribute Based Encryption in Cloud Computing IEEE March 2019 7 Privacy Preserving Searchable Encryption with Fine-grained Access Control IEEE January 2019 8 Authenticated Medical Documents Releasing with Privacy Protection and Release Control IEEE April 2019 9 Provable Data Possession with Outsourced Data Transfer IEEE January 2019 10 An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage IEEE November 2019 1 Client Side Secure Image Deduplication Using DICE Protocol Multimedia Information 28 June 2018 Video https://www.youtube.com/watch?v=xRGLNb2-0z8 2 Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage Information Forensics August 2018 Video https://www.youtube.com/watch?v=JlZrvH8YXq4 3 SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud Internet of Things. June 2018 -2018 4 HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems Industrial Informatics- May 2018 Video https://www.youtube.com/watch?v=bzij1rjCWZI
  • 3. MTech, BTech Projects | PhD Support| IEEE Projects | Paper Writing & Publishing (Scopus Indexed, UGC CARE 'GROUP-A') Our Development Technologies: Python, Java, PhP, .Net, Android, IoT and Embedded 3 Cloud Technologies 5 Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems Cloud Computing. February 2018 Video https://www.youtube.com/watch?v=CadrLRtdpqI 6 Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing Cloud Computing. July 2018 Video https://www.youtube.com/watch?v=y2g-BWIOjZI 7 Semantic-Aware Searching Over Encrypted Data for Cloud Computing Information forensics and security, September-2018 8 An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data Data Mining-April- 2018 9 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud May-June 1 2018 10 Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing Jan.-March 1 2018 1 RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage Information Forensics And Security-2017 2 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud Big Data-2017 3 A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage Information Forensics And Security-2017 4 Fast Phrase Search for Encrypted Cloud Storage Cloud Computing - 2017 5 Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage Information Forensics And Security-2017 6 Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories Cloud Computing - 2017 7 Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud Computers-2017 8 Secure k-NN Query on Encrypted Cloud Data with Multiple Keys Big Data-2017 9 TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud Services Computing- 2017 10 SeDaSC:Secure Data Sharing in Clouds Cloud Computing-2017 11 An Efficient and Fine-grained Big Data Access ControlScheme with Privacy-preserving Policy Big data 12 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud Cloud Computing-2017 13 Elimination of Redundant Data in Cloud with Secured Access Control Cloud Computing-2017 14 Hybrid Secure and Scalable Electronic Health Record Sharing in Hybrid Cloud Cloud Computing-2017
  • 4. MTech, BTech Projects | PhD Support| IEEE Projects | Paper Writing & Publishing (Scopus Indexed, UGC CARE 'GROUP-A') Our Development Technologies: Python, Java, PhP, .Net, Android, IoT and Embedded 4 Cloud Technologies 15 Facilitating Secure and Efficient Spatial Query Processing on the Cloud Cloud Computing-2017 16 Flexible Data Access Control Based on Trust and Reputation in Cloud Computing Cloud Computing-2017 17 Heterogeneous Data Storage Management with Deduplication in Cloud Computing BIG DATA-2017 18 A Secure Anti Collusion Data Sharing Scheme for Dynamic Groups in the Cloud Parallel And Distributed Systems- 2016 1 Circuit ciphertext-policy Attribute-based Hybrid Encryption with verifiable delegation in cloud computing Cloud Computing - 2016 2 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing Cloud Computing - 2016 3 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates Cloud Computing- 2016 4 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage Parallel And Distributed Systems- 2016 5 Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds Cloud Computing- 2016 6 SecRBAC: Secure data in the Clouds Cloud Computing- 2016 7 Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage Cloud Computing- 2016