Cloud Computing Project List:

  1. A New Lightweight Symmetric Searchable Encryption Scheme for String Identification.
  2. Efficient Traceable Authorization Search System for Secure Cloud Storage.
  3. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage.
  4. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories.
  5. Publicly Verifiable Boolean Query Over Outsourced Encrypted Data.
  6. Securing Cloud Data under Key Exposure
  7. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing.
  8. Privacy-Preserving Outsourced Support Vector Machine Design for Secure Drug Discovery.
  9. SecRBAC: Secure data in the Clouds.
  10. Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage.
  11. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving.
  12. Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data.
  13. Optimizing Information Leakage in Multicloud Storage Services.
  14. An Efficient Privacy-Preserving Ranked Keyword Search Method.
  15. Minimum Unsatisfiability.
  1. Cluster based load balancing in Cloud Computing.
  2. Building confidential and efficient query services in the cloud with RASP data perturbation.
  3. Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service.
  4. Strategy-Proof Pricing for Cloud Service Composition.
  5. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing.
  6. Towards Differential Query Services in Cost-Efficient Clouds.
  7. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems.
  8. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds.
  9. Cloud workflow scheduling with deadlines and time slot availability.
  10. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments.
  11. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates.
  12. Cloud Federations in the Sky: Formation Game and Mechanism.
  13. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services.
  14. Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts.
  15. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption.
  1. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security.
  2. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid clouds.
  3. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability.
  4. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing.
  5. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data.
  6. Identity-based Encryption with Outsourced Revocation in Cloud Computing.
  7. Innovative Schemes for ResourceAllocation in the Cloud for Media Streaming Applications.
  8. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices.
  9. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing.
  10. Stealthy Denial of Service Strategy in Cloud Computing.
  11. A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems.
  12. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance.
  13. A Heuristic Clustering-based Task Deployment Approach for Load Balancing Using Bayes Theorem in Cloud Environment.
  14. Secure Authorized Deduplication backup storage with reducing fragmentation via exploiting backup history and cache knowledge.