SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
M.Phil Computer Science Cloud Computing Projects
Web : www.kasanpro.com Email : sales@kasanpro.com
List Link : http://kasanpro.com/projects-list/m-phil-computer-science-cloud-computing-projects
Title :A Secured Cost-effective Multi-Cloud Storage in Cloud Computing.
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/secured-cost-effective-multi-cloud-storage-cloud-computing-module
Abstract : The end of this decade is marked by a paradigm shift of the industrial information technology towards a
pay-per-use service business model known as cloud computing. Cloud data Storage redefines the security issues
targeted on customer's outsourced data (data that is not stored/retrieved from the costumers own servers). In this
work we observed that, from a customer's point of view, relying upon a solo SP for his outsourced data is not very
promising. In addition, providing better privacy as well as ensuring data availability can be achieved by dividing the
user's data block into data pieces and distributing them among the available SPs in such a way that no less than a
threshold number of SPs can take part in successful retrieval of the whole data block. In this paper, we propose a
secured cost-effective multi-cloud storage (SCMCS) model in cloud computing which holds an economical distribution
of data among the available SPs in the market, to provide customers with data availability as well as secure storage.
Our results show that, our proposed model provides a better decision for customers according to their available
budgets.
Title :A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/privacy-preserving-remote-data-integrity-checking-protocol
Abstract : Remote data integrity checking is a crucial technology in cloud computing. Recently many works focus on
providing data dynamics and/or public verifiability to this type of protocols. Existing protocols can support both
features with the help of a third party auditor. In a previous work, propose a remote data integrity checking protocol
that supports data dynamics. In this paper, we adapt to support public verifiability. The proposed protocol supports
public verifiability without help of a third party auditor. In addition, the proposed protocol does not leak any private
information to third party verifiers. Through a formal analysis, we show the correctness and security of the protocol.
After that, through theoretical analysis and experimental results, we demonstrate that the proposed protocol has a
good performance.
Title :Enabling Public Auditability and Data Dynamics For Storage Security in Cloud Computing
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/public-auditability-data-dynamics-for-storage-security-cloud-computing
Abstract : Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the
application software and databases to the centralized large data centers, where the management of the data and
services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have
not been well understood. This work studies the problem of ensuring the integrity of data storage in Cloud Computing.
In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the
integrity of the dynamic data stored in the cloud. The introduction of TPA eliminates the involvement of the client
through the auditing of whether his data stored in the cloud is indeed intact. The support for data dynamics via the
most general forms of data operation, such as block modification, insertion and deletion, is also a significant step
toward practicality, since services in Cloud Computing are not limited to archive or backup data only. While prior
works on ensuring remote data integrity often lacks the support of either public auditability or dynamic data
operations, this paper achieves both. We first identify the difficulties and potential security problems of direct
extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification
scheme for the seamless integration of these two salient features in our design. In particular, to achieve efficient data
dynamics, we improve the existing proof of storage models by manipulating block tag authentication. To support
efficient handling of multiple auditing tasks, we further explore the technique of signature to extend our main result
into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and
performance analysis show that the proposed schemes are highly efficient and provably secure.
Title :Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/dynamic-resource-allocation-efficient-parallel-data-processing-cloud
Abstract : In recent years ad-hoc parallel data processing has emerged to be one of the killer applications for
Infrastructure-as-a- Service (IaaS) clouds. Major Cloud computing companies have started to integrate frameworks
for parallel data processing in their product portfolio, making it easy for customers to access these services and to
deploy their programs. However, the processing frameworks which are currently used have been designed for static,
homogeneous cluster setups and disregard the particular nature of a cloud. Consequently, the allocated compute
resources may be inadequate for big parts of the submitted job and unnecessarily increase processing time and cost.
In this paper we discuss the opportunities and challenges for efficient parallel data processing in clouds and present
our research project Nephele. Nephele is the first data processing framework to explicitly exploit the dynamic
resource allocation offered by today's IaaS clouds for both, task scheduling and execution. Particular tasks of a
processing job can be assigned to different types of virtual machines which are automatically instantiated and
terminated during the job execution. Based on this new framework, we perform extended evaluations of
MapReduce-inspired processing jobs on an IaaS cloud system and compare the results to the popular data
processing framework Hadoop.
Title :Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/privacy-preserving-multi-keyword-ranked-search-encrypted-cloud-data
Abstract : The advent of cloud computing, data owners are motivated to outsource their complex data management
systems from local sites to commercial public cloud for great flexibility and economic savings. But for protecting data
privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based on
plaintext keyword search. Thus, enabling an encrypted cloud data search service is of paramount importance.
Considering the large number of data users and documents in cloud, it is crucial for the search service to allow
multi-keyword query and provide result similarity ranking to meet the effective data retrieval need. Related works on
searchable encryption focus on single keyword search or Boolean keyword search, and rarely differentiate the search
results. In this paper, for the first time, we define and solve the challenging problem of privacy-preserving
multi-keyword ranked search over encrypted cloud data (MRSE), and establish a set of strict privacy requirements for
such a secure cloud data utilization system to become a reality. Among various multi-keyword semantics, we choose
the efficient principle of "coordinate matching", i.e., as many matches as possible, to capture the similarity between
search query and data documents, and further use "inner product similarity" to quantitatively formalize such principle
for similarity measurement. We first propose a basic MRSE scheme using secure inner product computation, and
then significantly improve it to meet different privacy requirements in two levels of threat models. Thorough analysis
investigating privacy and efficiency guarantees of proposed schemes is given, and experiments on the real-world
dataset further show proposed schemes indeed introduce low overhead on computation and communication.
M.Phil Computer Science Cloud Computing Projects
Title :Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/dynamic-audit-services-integrity-verification-outsourced-storages-clouds
Abstract : In this paper, we propose a dynamic audit service for verify- ing the integrity of untrusted and outsourced
storage. Our audit service, constructed based on the techniques, fragment structure, random sampling and
index-hash table, can sup- port provable updates to outsourced data, and timely abnor- mal detection. In addition, we
propose an efficient approach based on probabilistic query and periodic verification for im- proving the performance of
audit services. Our experimental results not only validate the effectiveness of our approaches, but also show our audit
system has a lower computation overhead, as well as a shorter extra storage for audit mete- data.
Title :Data integrity proofs in cloud storage
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/data-integrity-proofs-cloud-storage
Abstract : Cloud computing has been envisioned as the de-facto solution to the rising storage costs of IT Enterprises.
With the high costs of data storage devices as well as the rapid rate at which data is being generated it proves costly
for enterprises or individual users to frequently update their hardware. Apart from reduction in storage costs data
outsourcing to the cloud also helps in reducing the maintenance. Cloud storage moves the user's data to large data
centers, which are remotely located, on which user does not have any control. However, this unique feature of the
cloud poses many new security challenges which need to be clearly understood and resolved. We provide a scheme
which gives a proof of data integrity in the cloud which the customer can employ to check the correctness of his data
in the cloud. This proof can be agreed upon by both the cloud and the customer and can be incorporated in the
Service level agreement (SLA).
Title :Optimal Service Pricing for a Cloud Cache
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/optimal-service-pricing-cloud-cache
Abstract : Cloud applications that offer data management services are emerging. Such clouds support caching of
data in order to provide quality query services. The users can query the cloud data, paying the price for the
infrastructure they use. Cloud management necessitates an economy that manages the service of multiple users in
an efficient, but also, resourceeconomic way that allows for cloud profit. Naturally, the maximization of cloud profit
given some guarantees for user satisfaction presumes an appropriate price-demand model that enables optimal
pricing of query services. The model should be plausible in that it reflects the correlation of cache structures involved
in the queries. Optimal pricing is achieved based on a dynamic pricing scheme that adapts to time changes. This
paper proposes a novel price-demand model designed for a cloud cache and a dynamic pricing scheme for queries
executed in the cloud cache. The pricing solution employs a novel method that estimates the correlations of the cache
services in an time-efficient manner. The experimental study shows the efficiency of the solution.
http://kasanpro.com/ieee/final-year-project-center-theni-reviews
Title :Secure and Practical Outsourcing of Linear Programming in Cloud Computing
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/secure-practical-outsourcing-linear-programming-cloud-computing
Abstract : Cloud Computing has great potential of providing robust computational power to the society at reduced
cost. It enables customers with limited computational resources to outsource their large computation workloads to the
cloud, and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software
that can be shared in a pay-per-use manner. Despite the tremendous benefits, security is the primary obstacle that
prevents the wide adoption of this promising computing model, especially for customers when their confidential data
are consumed and produced during the computation. Treating the cloud as an intrinsically insecure computing
platform from the viewpoint of the cloud customers, we must design mechanisms that not only protect sensitive
information by enabling computations with encrypted data, but also protect customers from malicious behaviors by
enabling the validation of the computation result. Such a mechanism of general secure computation outsourcing was
recently shown to be feasible in theory, but to design mechanisms that are practically efficient remains a very
challenging problem.
Focusing on engineering computing and optimization tasks, this paper investigates secure outsourcing of widely
applicable linear programming (LP) computations. In order to achieve practical efficiency, our mechanism design
explicitly decomposes the LP computation outsourcing into public LP solvers running on the cloud and private LP
parameters owned by the customer. The resulting flexibility allows us to explore appropriate secu- rity/efficiency
tradeoff via higher-level abstraction of LP compu- tations than the general circuit representation. In particular, by
formulating private data owned by the customer for LP problem as a set of matrices and vectors, we are able to
develop a set of efficient privacy-preserving problem transformation techniques, which allow customers to transform
original LP problem into some arbitrary one while protecting sensitive input/output infor- mation. To validate the
computation result, we further explore the fundamental duality theorem of LP computation and derive the necessary
and sufficient conditions that correct result must satisfy. Such result verification mechanism is extremely efficient and
incurs close-to-zero additional cost on both cloud server and customers. Extensive security analysis and experiment
results show the immediate practicability of our mechanism design.
Title :Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/privacy-preserving-public-auditing-cloud-computing
Abstract : Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their
data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of
configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage
and maintenance. However, the fact that users no longer have physical possession of the possibly large size of
outsourced data makes the data integrity protection in Cloud Computing a very challenging and potentially formidable
task, especially for users with constrained computing resources and capabilities. Thus, enabling public auditability for
cloud data storage security is of critical importance so that users can resort to an external audit party to check the
integrity of outsourced data when needed. To securely introduce an effective Third Party Auditor (TPA), the following
two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage
without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; 2) The Third
Party Auditing process should bring in no new vulnerabilities towards user data privacy. In this paper we are
extending the previous system by using automatic blocker for privacy preserving public auditing for data storage
security in cloud computing. we utilize the public key based homomorphic authenticator and uniquely integrate it with
random mask technique and automatic blocker. to achieve a privacy-preserving public auditing system for cloud data
storage security while keeping all above requirements in mind. Extensive security and performance analysis shows
the proposed schemes are provably secure and highly efficient.
M.Phil Computer Science Cloud Computing Projects
Title :Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
Language : NS2
Project Link : http://kasanpro.com/p/ns2/privacy-preserving-public-auditing-cloud-computing-code
Abstract : Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their
data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of
configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage
and maintenance. However, the fact that users no longer have physical possession of the possibly large size of
outsourced data makes the data integrity protection in Cloud Computing a very challenging and potentially formidable
task, especially for users with constrained computing resources and capabilities. Thus, enabling public auditability for
cloud data storage security is of critical importance so that users can resort to an external audit party to check the
integrity of outsourced data when needed. To securely introduce an effective Third Party Auditor (TPA), the following
two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage
without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; 2) The Third
Party Auditing process should bring in no new vulnerabilities towards user data privacy. In this paper we are
extending the previous system by using automatic blocker for privacy preserving public auditing for data storage
security in cloud computing. we utilize the public key based homomorphic authenticator and uniquely integrate it with
random mask technique and automatic blocker. to achieve a privacy-preserving public auditing system for cloud data
storage security while keeping all above requirements in mind. Extensive security and performance analysis shows
the proposed schemes are provably secure and highly efficient.
Title :Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/efficient-ranked-keyword-search-outsourced-cloud-data
Abstract : Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data
privacy, sensitive cloud data has to be encrypted before outsourced to the commercial public cloud, which makes
effective data utilization service a very challenging task. Although traditional searchable encryption techniques allow
users to securely search over encrypted data through keywords, they support only Boolean search and are not yet
sufficient to meet the effective data utilization need that is inherently demanded by large number of users and huge
amount of data files in cloud. In this paper, we define and solve the problem of secure ranked keyword search over
encrypted cloud data. Ranked search greatly enhances system usability by enabling search result relevance ranking
instead of sending undifferentiated results, and further ensures the file retrieval accuracy. Specifically, we explore the
statistical measure approach, i.e. relevance score, from information retrieval to build a secure searchable index, and
develop a one-to-many order-preserving mapping technique to properly protect those sensitive score information. The
resulting design is able to facilitate efficient server-side ranking without losing keyword privacy. Thorough analysis
shows that our proposed solution enjoys "as-strong-as-possible" security guarantee compared to previous searchable
encryption schemes, while correctly realizing the goal of ranked keyword search. Extensive experimental results
demonstrate the efficiency of the proposed solution.
Title :Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/data-integrity-public-auditing-data-storage-security-cloud-computing
Abstract : Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their
data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of
configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage
and maintenance. However, the fact that users no longer have physical possession of the possibly large size of
outsourced data makes the data integrity protection in Cloud Computing a very challenging and potentially formidable
task, especially for users with constrained computing resources and capabilities. Thus, enabling public auditability for
cloud data storage security is of critical importance so that users can resort to an external audit party to check the
integrity of outsourced data when needed. To securely introduce an effective third party auditor (TPA), the following
two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage
without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; 2) he third
party auditing process should bring in no new vulnerabilities towards user data privacy. In this paper, we utilize and
uniquely combine the public key based homomorphic authenticator with random masking to achieve the privacy-
preserving public cloud data auditing system, which meets all above requirements. To support efficient handling of
multiple auditing tasks, we further explore the technique of bilinear aggregate signature to extend our main result into
a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and
performance analysis shows the proposed schemes are provably secure and highly efficient.
Title :Cloud Computing Security: From Single to Multi-Clouds
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/cloud-computing-security-from-single-multi-clouds
Abstract : The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many
benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the
cloud computing environment, as users often store sensitive information with cloud storage providers but these
providers may be untrusted. Dealing with "single cloud" providers is predicted to become less popular with customers
due to risks of service availability failure and the possibility of malicious insiders in the single cloud. A movement
towards "multi-clouds", or in other words, "interclouds" or "cloud-of-clouds" has emerged recently.
This paper surveys recent research related to single and multi-cloud security and addresses possible solutions. It is
found that the research into the use of multi-cloud providers to maintain security has received less attention from the
research community than has the use of single clouds. This work aims to promote the use of multi-clouds due to its
ability to reduce security risks that affect the cloud computing user.
Title :A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
Language : NS2
Project Link : http://kasanpro.com/p/ns2/secured-cost-effective-multi-cloud-storage-cloud-computing
Abstract : The end of this decade is marked by a paradigm shift of the industrial information technology towards a
pay-per-use service business model known as cloud computing. Cloud data Storage redefines the security issues
targeted on customer's outsourced data (data that is not stored/retrieved from the costumers own servers). In this
work we observed that, from a customer's point of view, relying upon a solo SP for his outsourced data is not very
promising. In addition, providing better privacy as well as ensuring data availability can be achieved by dividing the
user's data block into data pieces and distributing them among the available SPs in such a way that no less than a
threshold number of SPs can take part in successful retrieval of the whole data block. In this paper, we propose a
secured cost-effective multi-cloud storage (SCMCS) model in cloud computing which holds an economical distribution
of data among the available SPs in the market, to provide customers with data availability as well as secure storage.
Our results show that, our proposed model provides a better decision for customers according to their available
budgets.
M.Phil Computer Science Cloud Computing Projects
Title :A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
Language : NS2
Project Link : http://kasanpro.com/p/ns2/remote-data-integrity-checking-protocol
Abstract : Remote data integrity checking is a crucial technology in cloud computing. Recently many works focus on
providing data dynamics and/or public verifiability to this type of protocols. Existing protocols can support both
features with the help of a third party auditor. In a previous work, propose a remote data integrity checking protocol
that supports data dynamics. In this paper, we adapt to support public verifiability. The proposed protocol supports
public verifiability without help of a third party auditor. In addition, the proposed protocol does not leak any private
information to third party verifiers. Through a formal analysis, we show the correctness and security of the protocol.
After that, through theoretical analysis and experimental results, we demonstrate that the proposed protocol has a
good performance.
http://kasanpro.com/ieee/final-year-project-center-theni-reviews
Title :Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
Language : ASP.NET with VB
Project Link :
http://kasanpro.com/p/asp-net-with-vb/secure-sharing-personal-health-records-attribute-based-encryption-implement
Abstract : Personal health record (PHR) is an emerging patient-centric model of health information exchange, which
is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy
concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To
assure the patients' control over access to their own PHRs, it is a promising method to encrypt the PHRs before
outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access and
efficient user revocation, have remained the most important challenges toward achieving fine-grained,
cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a
suite of mechanisms for data access control to PHRs stored in semi-trusted servers. To achieve fine-grained and
scalable data access control for PHRs, we leverage attribute based encryption (ABE) techniques to encrypt each
patient's PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner
scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key
management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by
exploiting multi-authority ABE. Our scheme also enables dynamic modification of access policies or file attributes,
supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios.
Extensive analytical and experimental results are presented which show the security, scalability and efficiency of our
proposed scheme.
Title :Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
Language : ASP.NET with C#
Project Link :
http://kasanpro.com/p/asp-net-with-c-sharp/secure-sharing-personal-health-records-attribute-based-encryption
Abstract : Personal health record (PHR) is an emerging patient-centric model of health information exchange, which
is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy
concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To
assure the patients' control over access to their own PHRs, it is a promising method to encrypt the PHRs before
outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access and
efficient user revocation, have remained the most important challenges toward achieving fine-grained,
cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a
suite of mechanisms for data access control to PHRs stored in semi-trusted servers. To achieve fine-grained and
scalable data access control for PHRs, we leverage attribute based encryption (ABE) techniques to encrypt each
patient's PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner
scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key
management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by
exploiting multi-authority ABE. Our scheme also enables dynamic modification of access policies or file attributes,
supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios.
Extensive analytical and experimental results are presented which show the security, scalability and efficiency of our
proposed scheme.
Title :Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
Language : C#
Project Link :
http://kasanpro.com/p/c-sharp/secure-sharing-personal-health-records-attribute-based-encryption-implement-code
Abstract : Personal health record (PHR) is an emerging patient-centric model of health information exchange, which
is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy
concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To
assure the patients' control over access to their own PHRs, it is a promising method to encrypt the PHRs before
outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access and
efficient user revocation, have remained the most important challenges toward achieving fine-grained,
cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a
suite of mechanisms for data access control to PHRs stored in semi-trusted servers. To achieve fine-grained and
scalable data access control for PHRs, we leverage attribute based encryption (ABE) techniques to encrypt each
patient's PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner
scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key
management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by
exploiting multi-authority ABE. Our scheme also enables dynamic modification of access policies or file attributes,
supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios.
Extensive analytical and experimental results are presented which show the security, scalability and efficiency of our
proposed scheme.
Title :Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
Language : PHP
Project Link : http://kasanpro.com/p/php/secure-sharing-personal-health-records-attribute-based-encryption-module
Abstract : Personal health record (PHR) is an emerging patient-centric model of health information exchange, which
is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy
concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To
assure the patients' control over access to their own PHRs, it is a promising method to encrypt the PHRs before
outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access and
efficient user revocation, have remained the most important challenges toward achieving fine-grained,
cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a
suite of mechanisms for data access control to PHRs stored in semi-trusted servers. To achieve fine-grained and
scalable data access control for PHRs, we leverage attribute based encryption (ABE) techniques to encrypt each
patient's PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner
scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key
management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by
exploiting multi-authority ABE. Our scheme also enables dynamic modification of access policies or file attributes,
supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios.
Extensive analytical and experimental results are presented which show the security, scalability and efficiency of our
proposed scheme.
M.Phil Computer Science Cloud Computing Projects
Title :Mining Contracts for Business Events and Temporal Constraints in Service Engagements
Language : C#
Project Link :
http://kasanpro.com/p/c-sharp/mining-contracts-business-events-temporal-constraints-service-engagements
Abstract : Contracts are legally binding descriptions of business service engagements. In particular, we consider
business events as elements of a service engagement. Business events such as purchase, delivery, bill payment,
bank interest accrual not only correspond to essential processes but are also inherently temporally constrained.
Identifying and understanding the events and their temporal relationships can help a business partner determine what
to deliver and what to expect from others as it participates in the service engagement specified by a contract.
However, contracts are expressed in unstructured text and their insights are buried therein.
Our contributions are threefold. We develop a novel approach employing a hybrid of surface patterns, parsing, and
classification to extract (1) business events and (2) their temporal constraints from contract text. We use topic
modeling to (3) automatically organize the event terms into clusters. An evaluation on a real-life contract dataset
demonstrates the viability and promise of our hybrid approach, yielding an F-measure of 0.89 in event extraction and
0.90 in temporal constraints extraction. The topic model yields event term clusters with an average match of 85%
between two independent human annotations and an expert-assigned set of class labels for the clusters.
Title :A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/load-balancing-model-based-cloud-partitioning-public-cloud
Abstract : Load balancing in the cloud computing environment has an important impact on the performance. Good
load balancing makes cloud computing more efficient and improves user satisfaction. This article introduces a better
load balance model for the public cloud based on the cloud partitioning concept with a switch mechanism to choose
different strategies for different situations. The algorithm applies the game theory to the load balancing strategy to
improve the efficiency in the public cloud environment.
Title :A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
Language : NS2
Project Link : http://kasanpro.com/p/ns2/load-balancing-model-based-cloud-partitioning-public-cloud-code
Abstract : Load balancing in the cloud computing environment has an important impact on the performance. Good
load balancing makes cloud computing more efficient and improves user satisfaction. This article introduces a better
load balance model for the public cloud based on the cloud partitioning concept with a switch mechanism to choose
different strategies for different situations. The algorithm applies the game theory to the load balancing strategy to
improve the efficiency in the public cloud environment.
Title :AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the
Clouds
Language : C#
Project Link :
http://kasanpro.com/p/c-sharp/ames-adaptive-mobile-video-streaming-efficient-social-video-sharing-clouds
Abstract : While demands on video traffic over mobile networks have been souring, the wireless link capacity cannot
keep up with the traffic demand. The gap between the traffic demand and the link capacity, along with time-varying
link conditions, results in poor service quality of video streaming over mobile networks such as long buffering time and
intermittent disruptions. Leveraging the cloud computing technology, we propose a new mobile video streaming
framework, dubbed AMES-Cloud, which has two main parts: AMoV (adaptive mobile video streaming) and ESoV
(efficient social video sharing). AMoV and ESoV construct a private agent to provide video streaming services
efficiently for each mobile user. For a given user, AMoV lets her private agent adaptively adjust her streaming flow
with a scalable video coding technique based on the feedback of link quality. Likewise, ESoV monitors the social
network interactions among mobile users, and their private agents try to prefetch video content in advance. We
implement a prototype of the AMES-Cloud framework to demonstrate its performance. It is shown that the private
agents in the clouds can effectively provide the adaptive streaming, and perform video sharing (i.e., prefetching)
based on the social network analysis.
http://kasanpro.com/ieee/final-year-project-center-theni-reviews
Title :AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the
Clouds
Language : NS2
Project Link : http://kasanpro.com/p/ns2/ames-adaptive-mobile-video-streaming-social-video-sharing-clouds
Abstract : While demands on video traffic over mobile networks have been souring, the wireless link capacity cannot
keep up with the traffic demand. The gap between the traffic demand and the link capacity, along with time-varying
link conditions, results in poor service quality of video streaming over mobile networks such as long buffering time and
intermittent disruptions. Leveraging the cloud computing technology, we propose a new mobile video streaming
framework, dubbed AMES-Cloud, which has two main parts: AMoV (adaptive mobile video streaming) and ESoV
(efficient social video sharing). AMoV and ESoV construct a private agent to provide video streaming services
efficiently for each mobile user. For a given user, AMoV lets her private agent adaptively adjust her streaming flow
with a scalable video coding technique based on the feedback of link quality. Likewise, ESoV monitors the social
network interactions among mobile users, and their private agents try to prefetch video content in advance. We
implement a prototype of the AMES-Cloud framework to demonstrate its performance. It is shown that the private
agents in the clouds can effectively provide the adaptive streaming, and perform video sharing (i.e., prefetching)
based on the social network analysis.
M.Phil Computer Science Cloud Computing Projects
Title :NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/nccloud-network-coding-based-storage-system-cloud-clouds
Abstract : To provide fault tolerance for cloud storage, recent studies propose to stripe data across multiple cloud
vendors. However, if a cloud suffers from a permanent failure and loses all its data, we need to repair the lost data
with the help of the other surviving clouds to preserve data redundancy. We present a proxy-based storage system for
fault-tolerant multiple-cloud storage called NCCloud, which achieves cost-effective repair for a permanent single-cloud
failure. NCCloud is built on top of a network-coding-based storage scheme called the functional minimum-storage
regenerating (FMSR) codes, which maintain the same fault tolerance and data redundancy as in traditional erasure
codes (e.g., RAID-6), but use less repair traffic and hence incur less monetary cost due to data transfer. One key
design feature of our FMSR codes is that we relax the encoding requirement of storage nodes during repair, while
preserving the benefits of network coding in repair. We implement a proof-of-concept prototype of NCCloud and
deploy it atop both local and commercial clouds. We validate that FMSR codes provide significant monetary cost
savings in repair over RAID-6 codes, while having comparable response time performance in normal cloud storage
operations such as upload/download.
Title :NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds
Language : NS2
Project Link : http://kasanpro.com/p/ns2/nccloud-network-coding-based-storage-system-cloud-clouds-code
Abstract : To provide fault tolerance for cloud storage, recent studies propose to stripe data across multiple cloud
vendors. However, if a cloud suffers from a permanent failure and loses all its data, we need to repair the lost data
with the help of the other surviving clouds to preserve data redundancy. We present a proxy-based storage system for
fault-tolerant multiple-cloud storage called NCCloud, which achieves cost-effective repair for a permanent single-cloud
failure. NCCloud is built on top of a network-coding-based storage scheme called the functional minimum-storage
regenerating (FMSR) codes, which maintain the same fault tolerance and data redundancy as in traditional erasure
codes (e.g., RAID-6), but use less repair traffic and hence incur less monetary cost due to data transfer. One key
design feature of our FMSR codes is that we relax the encoding requirement of storage nodes during repair, while
preserving the benefits of network coding in repair. We implement a proof-of-concept prototype of NCCloud and
deploy it atop both local and commercial clouds. We validate that FMSR codes provide significant monetary cost
savings in repair over RAID-6 codes, while having comparable response time performance in normal cloud storage
operations such as upload/download.
Title :Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
Language : C#
Project Link :
http://kasanpro.com/p/c-sharp/privacy-preserving-multi-keyword-ranked-search-encrypted-cloud-data-code
Abstract : With the advent of cloud computing, data owners are motivated to outsource their complex data
management systems from local sites to the commercial public cloud for great flexibility and economic savings. But
for protecting data privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data
utilization based on plaintext keyword search. Thus, enabling an encrypted cloud data search service is of paramount
importance. Considering the large number of data users and documents in the cloud, it is necessary to allow multiple
keywords in the search request and return documents in the order of their relevance to these keywords. Related
works on searchable encryption focus on single keyword search or Boolean keyword search, and rarely sort the
search results. In this paper, for the first time, we define and solve the challenging problem of privacypreserving
multi-keyword ranked search over encrypted cloud data (MRSE).We establish a set of strict privacy requirements for
such a secure cloud data utilization system. Among various multikeyword semantics, we choose the efficient similarity
measure of "coordinate matching", i.e., as many matches as possible, to capture the relevance of data documents to
the search query. We further use "inner product similarity" to quantitatively evaluate such similarity measure. We first
propose a basic idea for the MRSE based on secure inner product computation, and then give two significantly
improved MRSE schemes to achieve various stringent privacy requirements in two different threat models. Thorough
analysis investigating privacy and efficiency guarantees of proposed schemes is given. Experiments on the real-world
dataset further show proposed schemes indeed introduce low overhead on computation and communication.
Title :Compatibility-aware Cloud Service Composition Under Fuzzy Preferences
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/compatibility-aware-cloud-service-composition-under-fuzzy-preferences
Abstract : When a single Cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all
the user requirements, a composition of Cloud services is required. Cloud service composition, which includes several
tasks such as discovery, compatibility checking, selection, and deployment, is a complex process and users find it
difficult to select the best one among the hundreds, if not thousands, of possible compositions available. Service
composition in Cloud raises even new challenges caused by diversity of users with different expertise requiring their
applications to be deployed across difference geographical locations with distinct legal constraints. The main difficulty
lies in selecting a combination of virtual appliances (software images) and infrastructure services that are compatible
and satisfy a user with vague preferences. Therefore, we present a framework and algorithms which simplify Cloud
service composition for unskilled users. We develop an ontologybased approach to analyze Cloud service
compatibility by applying reasoning on the expert knowledge. In addition, to minimize effort of users in expressing
their preferences, we apply combination of evolutionary algorithms and fuzzy logic for composition optimization. This
lets users express their needs in linguistics terms which brings a great comfort to them compared to systems that
force users to assign exact weights for all preferences.
Title :Compatibility-aware Cloud Service Composition Under Fuzzy Preferences
Language : NS2
Project Link : http://kasanpro.com/p/ns2/compatibility-aware-cloud-service-composition-under-fuzzy-preference
Abstract : When a single Cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all
the user requirements, a composition of Cloud services is required. Cloud service composition, which includes several
tasks such as discovery, compatibility checking, selection, and deployment, is a complex process and users find it
difficult to select the best one among the hundreds, if not thousands, of possible compositions available. Service
composition in Cloud raises even new challenges caused by diversity of users with different expertise requiring their
applications to be deployed across difference geographical locations with distinct legal constraints. The main difficulty
lies in selecting a combination of virtual appliances (software images) and infrastructure services that are compatible
and satisfy a user with vague preferences. Therefore, we present a framework and algorithms which simplify Cloud
service composition for unskilled users. We develop an ontologybased approach to analyze Cloud service
compatibility by applying reasoning on the expert knowledge. In addition, to minimize effort of users in expressing
their preferences, we apply combination of evolutionary algorithms and fuzzy logic for composition optimization. This
lets users express their needs in linguistics terms which brings a great comfort to them compared to systems that
force users to assign exact weights for all preferences.
M.Phil Computer Science Cloud Computing Projects
Title :A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
Language : Java
Project Link : http://kasanpro.com/p/java/load-balancing-model-cloud-partitioning-public-cloud
Abstract : Load balancing in the cloud computing environment has an important impact on the performance. Good
load balancing makes cloud computing more efficient and improves user satisfaction. This article introduces a better
load balance model for the public cloud based on the cloud partitioning concept with a switch mechanism to choose
different strategies for different situations. The algorithm applies the game theory to the load balancing strategy to
improve the efficiency in the public cloud environment.
Title :EduCloud: PaaS versus IaaS Cloud Usage for an Advanced Computer Science Course
Language : Java
Project Link : http://kasanpro.com/p/java/educloud-paas-iaas-cloud-usage-advanced-computer-science-course
Abstract : The cloud has become a widely used term in academia and the industry. Education has not remained
unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially
for software as a service cloud. However, an evaluation of the educational potential of infrastructure and platform
clouds has not been explored yet. An evaluation of which type of cloud would be the most beneficial for students to
learn, depending on the technical knowledge required for its usage, is missing. Here, the first systematic evaluation of
different types of cloud technologies in an advanced course on network overlays with 84 students and four professors
is presented. This evaluation tries to answer the question whether cloud technologies (and which specific type of
cloud) can be useful in educational scenarios for computer science students by focusing students in the actual tasks
at hand. This study demonstrates that platform clouds are valued by both students and professors to achieve the
course objectives and that clouds offer a significant improvement over the previous situation in labs where much effort
was devoted to setting up the software necessary for course activities. These results most strongly apply to courses in
which students interact with resources that are non-self-contained (e.g., network nodes, databases, mechanical
equipment, or the cloud itself), but could also apply to other science disciplines that involve programming or
performing virtual experiments.
http://kasanpro.com/ieee/final-year-project-center-theni-reviews
Title :Automating Cloud Services Life Cycle through Semantic Technologies
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/automating-cloud-services-life-cycle-semantic-technologies
Abstract : Managing virtualized services efficiently over the cloud is an open challenge. Traditional models of
software development are not appropriate for the cloud computing domain, where software (and other) services are
acquired on demand. In this paper, we describe a new integrated methodology for the life cycle of IT services
delivered on the cloud and demonstrate how it can be used to represent and reason about services and service
requirements and so automate service acquisition and consumption from the cloud. We have divided the IT service
life cycle into five phases of requirements, discovery, negotiation, composition, and consumption. We detail each
phase and describe the ontologies that we have developed to represent the concepts and relationships for each
phase. To show how this life cycle can automate the usage of cloud services, we describe a cloud storage prototype
that we have developed. This methodology complements previous work on ontologies for service descriptions in that
it is focused on supporting negotiation for the particulars of a service and going beyond simple matchmaking.
Title :Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data
Supporting Synonym Query
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/cloud-search-services-multi-keyword-ranked-search-encrypted-cloud
Abstract : In recent years, consumer-centric cloud computing paradigm has emerged as the development of smart
electronic devices combined with the emerging cloud computing technologies. A variety of cloud services are
delivered to the consumers with the premise that an effective and efficient cloud search service is achieved. For
consumers, they want to find the most relevant products or data, which is highly desirable in the "pay-as-you use"
cloud computing paradigm. As sensitive data (such as photo albums, emails, personal health records, financial
records, etc.) are encrypted before outsourcing to cloud, traditional keyword search techniques are useless.
Meanwhile, existing search approaches over encrypted cloud data support only exact or fuzzy keyword search, but
not semantics-based multi-keyword ranked search. Therefore, how to enable an effective searchable system with
support of ranked search remains a very challenging problem. This paper proposes an effective approach to solve the
problem of multi-keyword ranked search over encrypted cloud data supporting synonym queries. The main
contribution of this paper is summarized in two aspects: multi-keyword ranked search to achieve more accurate
search results and synonym-based search to support synonym queries. Extensive experiments on real-world dataset
were performed to validate the approach, showing that the proposed solution is very effective and efficient for
multikeyword ranked searching in a cloud environment.
Title :Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data
Supporting Synonym Query
Language : NS2
Project Link : http://kasanpro.com/p/ns2/multi-keyword-ranked-search-cloud-search-services-encrypted-cloud
Abstract : In recent years, consumer-centric cloud computing paradigm has emerged as the development of smart
electronic devices combined with the emerging cloud computing technologies. A variety of cloud services are
delivered to the consumers with the premise that an effective and efficient cloud search service is achieved. For
consumers, they want to find the most relevant products or data, which is highly desirable in the "pay-as-you use"
cloud computing paradigm. As sensitive data (such as photo albums, emails, personal health records, financial
records, etc.) are encrypted before outsourcing to cloud, traditional keyword search techniques are useless.
Meanwhile, existing search approaches over encrypted cloud data support only exact or fuzzy keyword search, but
not semantics-based multi-keyword ranked search. Therefore, how to enable an effective searchable system with
support of ranked search remains a very challenging problem. This paper proposes an effective approach to solve the
problem of multi-keyword ranked search over encrypted cloud data supporting synonym queries. The main
contribution of this paper is summarized in two aspects: multi-keyword ranked search to achieve more accurate
search results and synonym-based search to support synonym queries. Extensive experiments on real-world dataset
were performed to validate the approach, showing that the proposed solution is very effective and efficient for
multikeyword ranked searching in a cloud environment.
M.Phil Computer Science Cloud Computing Projects
Title :A Mechanism Design Approach to Resource Procurement in Cloud Computing
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/resource-procurement-cloud-computing-module
Abstract : We present a cloud resource procurement approach which not only automates the selection of an
appropriate cloud vendor but also implements dynamic pricing. Three possible mechanisms are suggested for cloud
resource procurement: cloud-dominant strategy incentive compatible (C-DSIC), cloud-Bayesian incentive compatible
(C-BIC), and cloud optimal (C-OPT). C-DSIC is dominant strategy incentive compatible, based on the VCG
mechanism, and is a low-bid Vickrey auction. C-BIC is Bayesian incentive compatible, which achieves budget
balance. C-BIC does not satisfy individual rationality. In C-DSIC and C-BIC, the cloud vendor who charges the lowest
cost per unit QoS is declared the winner. In C-OPT, the cloud vendor with the least virtual cost is declared the winner.
C-OPT overcomes the limitations of both C-DSIC and C-BIC. C-OPT is not only Bayesian incentive compatible, but
also individually rational. Our experiments indicate that the resource procurement cost decreases with increase in
number of cloud vendors irrespective of the mechanisms. We also propose a procurement module for a cloud broker
which can implement C-DSIC, C-BIC, or C-OPT to perform resource procurement in a cloud computing context. A
cloud broker with such a procurement module enables users to automate the choice of a cloud vendor among many
with diverse offerings, and is also an essential first step toward implementing dynamic pricing in the cloud.
Title :A Mechanism Design Approach to Resource Procurement in Cloud Computing
Language : NS2
Project Link : http://kasanpro.com/p/ns2/resource-procurement-cloud-computing
Abstract : We present a cloud resource procurement approach which not only automates the selection of an
appropriate cloud vendor but also implements dynamic pricing. Three possible mechanisms are suggested for cloud
resource procurement: cloud-dominant strategy incentive compatible (C-DSIC), cloud-Bayesian incentive compatible
(C-BIC), and cloud optimal (C-OPT). C-DSIC is dominant strategy incentive compatible, based on the VCG
mechanism, and is a low-bid Vickrey auction. C-BIC is Bayesian incentive compatible, which achieves budget
balance. C-BIC does not satisfy individual rationality. In C-DSIC and C-BIC, the cloud vendor who charges the lowest
cost per unit QoS is declared the winner. In C-OPT, the cloud vendor with the least virtual cost is declared the winner.
C-OPT overcomes the limitations of both C-DSIC and C-BIC. C-OPT is not only Bayesian incentive compatible, but
also individually rational. Our experiments indicate that the resource procurement cost decreases with increase in
number of cloud vendors irrespective of the mechanisms. We also propose a procurement module for a cloud broker
which can implement C-DSIC, C-BIC, or C-OPT to perform resource procurement in a cloud computing context. A
cloud broker with such a procurement module enables users to automate the choice of a cloud vendor among many
with diverse offerings, and is also an essential first step toward implementing dynamic pricing in the cloud.
Title :A Novel Model for Competition and Cooperation Among Cloud Providers
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/competition-cooperation-among-cloud-providers
Abstract : Having received significant attention in the industry, the cloud market is nowadays fiercely competitive with
many cloud providers. On one hand, cloud providers compete against each other for both existing and new cloud
users. To keep existing users and attract newcomers, it is crucial for each provider to offer an optimal price policy
which maximizes the final revenue and improves the competitive advantage. The competition among providers leads
to the evolution of the market and dynamic resource prices over time. On the other hand, cloud providers may
cooperate with each other to improve their final revenue. Based on a Service Level Agreement, a provider can
outsource its users' resource requests to its partner to reduce the operation cost and thereby improve the final
revenue. This leads to the problem of determining the cooperating parties in a cooperative environment. This paper
tackles these two issues of the current cloud market. First, we solve the problem of competition among providers and
propose a dynamic price policy. We employ a discrete choice model to describe the user's choice behavior based on
his obtained benefit value. The choice model is used to derive the probability of a user choosing to be served by a
certain provider. The competition among providers is formulated as a non-cooperative stochastic game where the
players are providers who act by proposing the price policy simultaneously. The game is modelled as a Markov
Decision Process whose solution is a Markov Perfect Equilibrium. Then, we address the cooperation among providers
by presenting a novel algorithm for determining a cooperation strategy that tells providers whether to satisfy users'
resource requests locally or outsource them to a certain provider. The algorithm yields the optimal cooperation
structure from which no provider unilaterally deviates to gain more revenue. Numerical simulations are carried out to
evaluate the performance of the proposed models.
Title :A Novel Model for Competition and Cooperation Among Cloud Providers
Language : NS2
Project Link : http://kasanpro.com/p/ns2/competition-cooperation-model-among-cloud-providers
Abstract : Having received significant attention in the industry, the cloud market is nowadays fiercely competitive with
many cloud providers. On one hand, cloud providers compete against each other for both existing and new cloud
users. To keep existing users and attract newcomers, it is crucial for each provider to offer an optimal price policy
which maximizes the final revenue and improves the competitive advantage. The competition among providers leads
to the evolution of the market and dynamic resource prices over time. On the other hand, cloud providers may
cooperate with each other to improve their final revenue. Based on a Service Level Agreement, a provider can
outsource its users' resource requests to its partner to reduce the operation cost and thereby improve the final
revenue. This leads to the problem of determining the cooperating parties in a cooperative environment. This paper
tackles these two issues of the current cloud market. First, we solve the problem of competition among providers and
propose a dynamic price policy. We employ a discrete choice model to describe the user's choice behavior based on
his obtained benefit value. The choice model is used to derive the probability of a user choosing to be served by a
certain provider. The competition among providers is formulated as a non-cooperative stochastic game where the
players are providers who act by proposing the price policy simultaneously. The game is modelled as a Markov
Decision Process whose solution is a Markov Perfect Equilibrium. Then, we address the cooperation among providers
by presenting a novel algorithm for determining a cooperation strategy that tells providers whether to satisfy users'
resource requests locally or outsource them to a certain provider. The algorithm yields the optimal cooperation
structure from which no provider unilaterally deviates to gain more revenue. Numerical simulations are carried out to
evaluate the performance of the proposed models.
Title :Consistency as a Service: Auditing Cloud Consistency
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/consistency-service-auditing-cloud-consistency
Abstract : Cloud storage services have become commercially popular due to their overwhelming advantages. To
provide ubiquitous always-on access, a cloud service provider (CSP) maintains multiple replicas for each piece of
data on geographically distributed servers. A key problem of using the replication technique in clouds is that it is very
expensive to achieve strong consistency on a worldwide scale. In this paper, we first present a novel consistency as a
service (CaaS) model, which consists of a large data cloud and multiple small audit clouds. In the CaaS model, a data
cloud is maintained by a CSP, and a group of users that constitute an audit cloud can verify whether the data cloud
provides the promised level of consistency or not. We propose a two-level auditing architecture, which only requires a
loosely synchronized clock in the audit cloud. Then, we design algorithms to quantify the severity of violations with
two metrics: the commonality of violations, and the staleness of the value of a read. Finally, we devise a heuristic
auditing strategy (HAS) to reveal as many violations as possible. Extensive experiments were performed using a
combination of simulations and real cloud deployments to validate HAS.
M.Phil Computer Science Cloud Computing Projects
Title :Consistency as a Service: Auditing Cloud Consistency
Language : NS2
Project Link : http://kasanpro.com/p/ns2/consistency-as-a-service-auditing-cloud-consistency
Abstract : Cloud storage services have become commercially popular due to their overwhelming advantages. To
provide ubiquitous always-on access, a cloud service provider (CSP) maintains multiple replicas for each piece of
data on geographically distributed servers. A key problem of using the replication technique in clouds is that it is very
expensive to achieve strong consistency on a worldwide scale. In this paper, we first present a novel consistency as a
service (CaaS) model, which consists of a large data cloud and multiple small audit clouds. In the CaaS model, a data
cloud is maintained by a CSP, and a group of users that constitute an audit cloud can verify whether the data cloud
provides the promised level of consistency or not. We propose a two-level auditing architecture, which only requires a
loosely synchronized clock in the audit cloud. Then, we design algorithms to quantify the severity of violations with
two metrics: the commonality of violations, and the staleness of the value of a read. Finally, we devise a heuristic
auditing strategy (HAS) to reveal as many violations as possible. Extensive experiments were performed using a
combination of simulations and real cloud deployments to validate HAS.
Title :Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/panda-public-auditing-shared-data-efficient-user-revocation-cloud
Abstract : With data storage and sharing services in the cloud, users can easily modify and share data as a group.
To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the
blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications
performed by different users. For security reasons, once a user is revoked from the group, the blocks which were
previously signed by this revoked user must be re-signed by an existing user. The straightforward method, which
allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is
inefficient due to the large size of shared data in the cloud. In this paper, we propose a novel public auditing
mechanism for the integrity of shared data with efficient user revocation in mind. By utilizing the idea of proxy
re-signatures, we allow the cloud to re-sign blocks on behalf of existing users during user revocation, so that existing
users do not need to download and re-sign blocks by themselves. In addition, a public verifier is always able to audit
the integrity of shared data without retrieving the entire data from the cloud, even if some part of shared data has
been re-signed by the cloud. Moreover, our mechanism is able to support batch auditing by verifying multiple auditing
tasks simultaneously. Experimental results show that our mechanism can significantly improve the efficiency of user
revocation.
Title :Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
Language : NS2
Project Link : http://kasanpro.com/p/ns2/panda-public-auditing-shared-data-efficient-user-revocation-cloud-code
Abstract : With data storage and sharing services in the cloud, users can easily modify and share data as a group.
To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the
blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications
performed by different users. For security reasons, once a user is revoked from the group, the blocks which were
previously signed by this revoked user must be re-signed by an existing user. The straightforward method, which
allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is
inefficient due to the large size of shared data in the cloud. In this paper, we propose a novel public auditing
mechanism for the integrity of shared data with efficient user revocation in mind. By utilizing the idea of proxy
re-signatures, we allow the cloud to re-sign blocks on behalf of existing users during user revocation, so that existing
users do not need to download and re-sign blocks by themselves. In addition, a public verifier is always able to audit
the integrity of shared data without retrieving the entire data from the cloud, even if some part of shared data has
been re-signed by the cloud. Moreover, our mechanism is able to support batch auditing by verifying multiple auditing
tasks simultaneously. Experimental results show that our mechanism can significantly improve the efficiency of user
revocation.
Title :Performance and cost evaluation of an adaptive encryption architecture for cloud databases
Language : C#
Project Link :
http://kasanpro.com/p/c-sharp/performance-cost-evaluation-adaptive-encryption-architecture-cloud-databases
Abstract : The cloud database as a service is a novel paradigm that can support several Internet-based applications,
but its adoption requires the solution of information confidentiality problems. We propose a novel architecture for
adaptive encryption of public cloud databases that offers an interesting alternative to the trade-off between the
required data confidentiality level and the flexibility of the cloud database structures at design time. We demonstrate
the feasibility and performance of the proposed solution through a software prototype. Moreover, we propose an
original cost model that is oriented to the evaluation of cloud database services in plain and encrypted instances and
that takes into account the variability of cloud prices and tenant workload during a medium-term period.
Title :Performance and cost evaluation of an adaptive encryption architecture for cloud databases
Language : NS2
Project Link :
http://kasanpro.com/p/ns2/performance-cost-evaluation-adaptive-encryption-architecture-cloud-databases-code
Abstract : The cloud database as a service is a novel paradigm that can support several Internet-based applications,
but its adoption requires the solution of information confidentiality problems. We propose a novel architecture for
adaptive encryption of public cloud databases that offers an interesting alternative to the trade-off between the
required data confidentiality level and the flexibility of the cloud database structures at design time. We demonstrate
the feasibility and performance of the proposed solution through a software prototype. Moreover, we propose an
original cost model that is oriented to the evaluation of cloud database services in plain and encrypted instances and
that takes into account the variability of cloud prices and tenant workload during a medium-term period.
M.Phil Computer Science Cloud Computing Projects
Title :Comprehensive Explanation of SLA Violations at Runtime
Language : Java
Project Link : http://kasanpro.com/p/java/comprehensive-explanation-sla-violations-runtime
Abstract : Service Level Agreements (SLAs) establish the Quality of Service (QoS) agreed between service-based
systems consumers and providers. Since the violation of such SLAs may involve penalties, quality assurance
techniques have been developed to supervise the SLAs fulfillment at runtime. However, existing proposals present
some drawbacks: 1) the SLAs they support are not expressive enough to model real-world scenarios, 2) they couple
the monitoring configuration to a given SLA specification, 3) the explanations of the violations are difficult to
understand and even potentially inaccurate, 4) some proposals either do not provide an architecture, or present low
cohesion within their elements. In this paper, we propose a comprehensive solution, from a conceptual reference
model to its design and implementation, that overcomes these drawbacks. The resulting platform, SALMonADA,
receives the SLA agreed between the parties as input and reports timely and comprehensive explanations of SLA
violations. SALMonADA performs an automated monitoring configuration and it analyses highly expressive SLAs by
means of a constraint satisfaction problems based technique. We have evaluated the impact of SALMonADA over the
resulting service consumption time performance. The results are satisfactory enough to consider SALMonADA for
SLA supervision because of its low intrusiveness.

Mais conteúdo relacionado

Mais procurados

M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsVijay Karan
 
Java and .net IEEE 2012
Java and .net IEEE 2012Java and .net IEEE 2012
Java and .net IEEE 2012Vipin Jacob
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsVijay Karan
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsVijay Karan
 
Parallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot netParallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot netredpel dot com
 
M.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing ProjectsM.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing ProjectsVijay Karan
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstracttsysglobalsolutions
 
M.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing ProjectsM.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing ProjectsVijay Karan
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsVijay Karan
 
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)S3 Infotech IEEE Projects
 
M.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System ProjectsM.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System ProjectsVijay Karan
 
M.Phil Computer Science Parallel and Distributed System Projects
M.Phil Computer Science Parallel and Distributed System ProjectsM.Phil Computer Science Parallel and Distributed System Projects
M.Phil Computer Science Parallel and Distributed System ProjectsVijay Karan
 
M phil-computer-science-parallel-and-distributed-system-projects
M phil-computer-science-parallel-and-distributed-system-projectsM phil-computer-science-parallel-and-distributed-system-projects
M phil-computer-science-parallel-and-distributed-system-projectsVijay Karan
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
 
Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...iosrjce
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
 
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYBEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYRaushan Kumar Singh
 
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...iosrjce
 
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...ijassn
 

Mais procurados (19)

M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security Projects
 
Java and .net IEEE 2012
Java and .net IEEE 2012Java and .net IEEE 2012
Java and .net IEEE 2012
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication Projects
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication Projects
 
Parallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot netParallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot net
 
M.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing ProjectsM.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing Projects
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstract
 
M.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing ProjectsM.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing Projects
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
 
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
 
M.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System ProjectsM.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System Projects
 
M.Phil Computer Science Parallel and Distributed System Projects
M.Phil Computer Science Parallel and Distributed System ProjectsM.Phil Computer Science Parallel and Distributed System Projects
M.Phil Computer Science Parallel and Distributed System Projects
 
M phil-computer-science-parallel-and-distributed-system-projects
M phil-computer-science-parallel-and-distributed-system-projectsM phil-computer-science-parallel-and-distributed-system-projects
M phil-computer-science-parallel-and-distributed-system-projects
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
 
Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...Security based Clock Synchronization technique in Wireless Sensor Network for...
Security based Clock Synchronization technique in Wireless Sensor Network for...
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
 
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYBEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
 
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
 
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
 

Destaque

Cadmun economics proyect
Cadmun economics proyectCadmun economics proyect
Cadmun economics proyectMarce Bravo
 
Manual notebook 11. cfie salamanca 2016
Manual notebook 11. cfie salamanca 2016Manual notebook 11. cfie salamanca 2016
Manual notebook 11. cfie salamanca 2016Pablote67
 
The Social Media Sustainability Index 2013 by SUSTAINLY
The Social Media Sustainability Index 2013 by SUSTAINLYThe Social Media Sustainability Index 2013 by SUSTAINLY
The Social Media Sustainability Index 2013 by SUSTAINLYHéctor Lousa @HectorLousa
 
ความรู้เกี่ยวกับบล็อก
ความรู้เกี่ยวกับบล็อกความรู้เกี่ยวกับบล็อก
ความรู้เกี่ยวกับบล็อกKhemjira_P
 
Riesgos en seguridad y salud ocupacional
Riesgos en seguridad y salud ocupacionalRiesgos en seguridad y salud ocupacional
Riesgos en seguridad y salud ocupacionaljohan marulanda
 
Invexpert e L' Assistente Patrimoniale
Invexpert e L' Assistente Patrimoniale Invexpert e L' Assistente Patrimoniale
Invexpert e L' Assistente Patrimoniale Mauro Vanzini
 
Rodion tkachev portfolio
Rodion tkachev portfolioRodion tkachev portfolio
Rodion tkachev portfolioRodion Tkachev
 
แฟ้มสะสมผลงาน : มิสเขมจิรา ปลงไสว
แฟ้มสะสมผลงาน : มิสเขมจิรา ปลงไสวแฟ้มสะสมผลงาน : มิสเขมจิรา ปลงไสว
แฟ้มสะสมผลงาน : มิสเขมจิรา ปลงไสวKhemjira_P
 
ตัวอย่างรายงานโครงงาน ม.6
ตัวอย่างรายงานโครงงาน ม.6ตัวอย่างรายงานโครงงาน ม.6
ตัวอย่างรายงานโครงงาน ม.6Khemjira_P
 
απεικονιση ενεργειακων στρατηγικων
απεικονιση ενεργειακων στρατηγικωναπεικονιση ενεργειακων στρατηγικων
απεικονιση ενεργειακων στρατηγικωνroi_tzimika
 
2015 JBUG KOREA MEETUP - spring4 width infinispan
2015 JBUG KOREA MEETUP - spring4 width infinispan2015 JBUG KOREA MEETUP - spring4 width infinispan
2015 JBUG KOREA MEETUP - spring4 width infinispanYongHyuk Lee
 

Destaque (20)

Sumer
SumerSumer
Sumer
 
Cadmun economics proyect
Cadmun economics proyectCadmun economics proyect
Cadmun economics proyect
 
Manual notebook 11. cfie salamanca 2016
Manual notebook 11. cfie salamanca 2016Manual notebook 11. cfie salamanca 2016
Manual notebook 11. cfie salamanca 2016
 
Goods And Services Tax
Goods And Services TaxGoods And Services Tax
Goods And Services Tax
 
The Social Media Sustainability Index 2013 by SUSTAINLY
The Social Media Sustainability Index 2013 by SUSTAINLYThe Social Media Sustainability Index 2013 by SUSTAINLY
The Social Media Sustainability Index 2013 by SUSTAINLY
 
Digipak analyse
Digipak analyseDigipak analyse
Digipak analyse
 
After Augustus
After AugustusAfter Augustus
After Augustus
 
Dearye automatic hydraulic brick production line
Dearye automatic hydraulic brick production lineDearye automatic hydraulic brick production line
Dearye automatic hydraulic brick production line
 
Cato
CatoCato
Cato
 
ความรู้เกี่ยวกับบล็อก
ความรู้เกี่ยวกับบล็อกความรู้เกี่ยวกับบล็อก
ความรู้เกี่ยวกับบล็อก
 
Riesgos en seguridad y salud ocupacional
Riesgos en seguridad y salud ocupacionalRiesgos en seguridad y salud ocupacional
Riesgos en seguridad y salud ocupacional
 
Invexpert e L' Assistente Patrimoniale
Invexpert e L' Assistente Patrimoniale Invexpert e L' Assistente Patrimoniale
Invexpert e L' Assistente Patrimoniale
 
Rodion tkachev portfolio
Rodion tkachev portfolioRodion tkachev portfolio
Rodion tkachev portfolio
 
Ahimsa
AhimsaAhimsa
Ahimsa
 
แฟ้มสะสมผลงาน : มิสเขมจิรา ปลงไสว
แฟ้มสะสมผลงาน : มิสเขมจิรา ปลงไสวแฟ้มสะสมผลงาน : มิสเขมจิรา ปลงไสว
แฟ้มสะสมผลงาน : มิสเขมจิรา ปลงไสว
 
ตัวอย่างรายงานโครงงาน ม.6
ตัวอย่างรายงานโครงงาน ม.6ตัวอย่างรายงานโครงงาน ม.6
ตัวอย่างรายงานโครงงาน ม.6
 
Dramitseth
DramitsethDramitseth
Dramitseth
 
απεικονιση ενεργειακων στρατηγικων
απεικονιση ενεργειακων στρατηγικωναπεικονιση ενεργειακων στρατηγικων
απεικονιση ενεργειακων στρατηγικων
 
военный тест
военный тествоенный тест
военный тест
 
2015 JBUG KOREA MEETUP - spring4 width infinispan
2015 JBUG KOREA MEETUP - spring4 width infinispan2015 JBUG KOREA MEETUP - spring4 width infinispan
2015 JBUG KOREA MEETUP - spring4 width infinispan
 

Semelhante a M.Phil Computer Science Cloud Computing Projects

IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataIRJET Journal
 
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...IJERA Editor
 
Cloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsCloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsVijay Karan
 
Cloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsCloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsVijay Karan
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET Journal
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET Journal
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com msudan92
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
 
IEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and AbstractIEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and Abstracttsysglobalsolutions
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...IRJET Journal
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagedbpublications
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...IRJET Journal
 

Semelhante a M.Phil Computer Science Cloud Computing Projects (20)

IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
Cloud java titles adrit solutions
Cloud java titles adrit solutionsCloud java titles adrit solutions
Cloud java titles adrit solutions
 
V04405122126
V04405122126V04405122126
V04405122126
 
A Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted DataA Novel Method of Directly Auditing Integrity On Encrypted Data
A Novel Method of Directly Auditing Integrity On Encrypted Data
 
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
 
Cloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projectsCloud computing-ieee-2014-projects
Cloud computing-ieee-2014-projects
 
Cloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 ProjectsCloud Computing IEEE 2014 Projects
Cloud Computing IEEE 2014 Projects
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
 
.Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com .Net projects 2011 by core ieeeprojects.com
.Net projects 2011 by core ieeeprojects.com
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
IEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and AbstractIEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and Abstract
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
 

Mais de Vijay Karan

IEEE 2014 Java Projects
IEEE 2014 Java ProjectsIEEE 2014 Java Projects
IEEE 2014 Java ProjectsVijay Karan
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java ProjectsVijay Karan
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsVijay Karan
 
IEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsIEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsVijay Karan
 
IEEE 2015 Matlab Projects
IEEE 2015 Matlab ProjectsIEEE 2015 Matlab Projects
IEEE 2015 Matlab ProjectsVijay Karan
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# ProjectsVijay Karan
 
IEEE 2015 C# Projects
IEEE 2015 C# ProjectsIEEE 2015 C# Projects
IEEE 2015 C# ProjectsVijay Karan
 
IEEE 2014 ASP.NET with C# Projects
IEEE 2014 ASP.NET with C# ProjectsIEEE 2014 ASP.NET with C# Projects
IEEE 2014 ASP.NET with C# ProjectsVijay Karan
 
IEEE 2014 ASP.NET with VB Projects
IEEE 2014 ASP.NET with VB ProjectsIEEE 2014 ASP.NET with VB Projects
IEEE 2014 ASP.NET with VB ProjectsVijay Karan
 
M.E Computer Science Medical Imaging Projects
M.E Computer Science Medical Imaging ProjectsM.E Computer Science Medical Imaging Projects
M.E Computer Science Medical Imaging ProjectsVijay Karan
 
M.Phil Computer Science Server Computing Projects
M.Phil Computer Science Server Computing ProjectsM.Phil Computer Science Server Computing Projects
M.Phil Computer Science Server Computing ProjectsVijay Karan
 
M.E Computer Science Server Computing Projects
M.E Computer Science Server Computing ProjectsM.E Computer Science Server Computing Projects
M.E Computer Science Server Computing ProjectsVijay Karan
 
M.Phil Computer Science Remote Sensing Projects
M.Phil Computer Science Remote Sensing ProjectsM.Phil Computer Science Remote Sensing Projects
M.Phil Computer Science Remote Sensing ProjectsVijay Karan
 
M.E Computer Science Remote Sensing Projects
M.E Computer Science Remote Sensing ProjectsM.E Computer Science Remote Sensing Projects
M.E Computer Science Remote Sensing ProjectsVijay Karan
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsVijay Karan
 
M.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsM.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsVijay Karan
 
M.E Computer Science Biometric System Projects
M.E Computer Science Biometric System ProjectsM.E Computer Science Biometric System Projects
M.E Computer Science Biometric System ProjectsVijay Karan
 
M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsVijay Karan
 
M.Phil Computer Science Image Processing Projects
M.Phil Computer Science Image Processing ProjectsM.Phil Computer Science Image Processing Projects
M.Phil Computer Science Image Processing ProjectsVijay Karan
 
M.E Computer Science Image Processing Projects
M.E Computer Science Image Processing ProjectsM.E Computer Science Image Processing Projects
M.E Computer Science Image Processing ProjectsVijay Karan
 

Mais de Vijay Karan (20)

IEEE 2014 Java Projects
IEEE 2014 Java ProjectsIEEE 2014 Java Projects
IEEE 2014 Java Projects
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java Projects
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
 
IEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsIEEE 2014 Matlab Projects
IEEE 2014 Matlab Projects
 
IEEE 2015 Matlab Projects
IEEE 2015 Matlab ProjectsIEEE 2015 Matlab Projects
IEEE 2015 Matlab Projects
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# Projects
 
IEEE 2015 C# Projects
IEEE 2015 C# ProjectsIEEE 2015 C# Projects
IEEE 2015 C# Projects
 
IEEE 2014 ASP.NET with C# Projects
IEEE 2014 ASP.NET with C# ProjectsIEEE 2014 ASP.NET with C# Projects
IEEE 2014 ASP.NET with C# Projects
 
IEEE 2014 ASP.NET with VB Projects
IEEE 2014 ASP.NET with VB ProjectsIEEE 2014 ASP.NET with VB Projects
IEEE 2014 ASP.NET with VB Projects
 
M.E Computer Science Medical Imaging Projects
M.E Computer Science Medical Imaging ProjectsM.E Computer Science Medical Imaging Projects
M.E Computer Science Medical Imaging Projects
 
M.Phil Computer Science Server Computing Projects
M.Phil Computer Science Server Computing ProjectsM.Phil Computer Science Server Computing Projects
M.Phil Computer Science Server Computing Projects
 
M.E Computer Science Server Computing Projects
M.E Computer Science Server Computing ProjectsM.E Computer Science Server Computing Projects
M.E Computer Science Server Computing Projects
 
M.Phil Computer Science Remote Sensing Projects
M.Phil Computer Science Remote Sensing ProjectsM.Phil Computer Science Remote Sensing Projects
M.Phil Computer Science Remote Sensing Projects
 
M.E Computer Science Remote Sensing Projects
M.E Computer Science Remote Sensing ProjectsM.E Computer Science Remote Sensing Projects
M.E Computer Science Remote Sensing Projects
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking Projects
 
M.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsM.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System Projects
 
M.E Computer Science Biometric System Projects
M.E Computer Science Biometric System ProjectsM.E Computer Science Biometric System Projects
M.E Computer Science Biometric System Projects
 
M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing Projects
 
M.Phil Computer Science Image Processing Projects
M.Phil Computer Science Image Processing ProjectsM.Phil Computer Science Image Processing Projects
M.Phil Computer Science Image Processing Projects
 
M.E Computer Science Image Processing Projects
M.E Computer Science Image Processing ProjectsM.E Computer Science Image Processing Projects
M.E Computer Science Image Processing Projects
 

Último

Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptxAneriPatwari
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 

Último (20)

Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 

M.Phil Computer Science Cloud Computing Projects

  • 1. M.Phil Computer Science Cloud Computing Projects Web : www.kasanpro.com Email : sales@kasanpro.com List Link : http://kasanpro.com/projects-list/m-phil-computer-science-cloud-computing-projects Title :A Secured Cost-effective Multi-Cloud Storage in Cloud Computing. Language : C# Project Link : http://kasanpro.com/p/c-sharp/secured-cost-effective-multi-cloud-storage-cloud-computing-module Abstract : The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-per-use service business model known as cloud computing. Cloud data Storage redefines the security issues targeted on customer's outsourced data (data that is not stored/retrieved from the costumers own servers). In this work we observed that, from a customer's point of view, relying upon a solo SP for his outsourced data is not very promising. In addition, providing better privacy as well as ensuring data availability can be achieved by dividing the user's data block into data pieces and distributing them among the available SPs in such a way that no less than a threshold number of SPs can take part in successful retrieval of the whole data block. In this paper, we propose a secured cost-effective multi-cloud storage (SCMCS) model in cloud computing which holds an economical distribution of data among the available SPs in the market, to provide customers with data availability as well as secure storage. Our results show that, our proposed model provides a better decision for customers according to their available budgets. Title :A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability Language : C# Project Link : http://kasanpro.com/p/c-sharp/privacy-preserving-remote-data-integrity-checking-protocol Abstract : Remote data integrity checking is a crucial technology in cloud computing. Recently many works focus on providing data dynamics and/or public verifiability to this type of protocols. Existing protocols can support both features with the help of a third party auditor. In a previous work, propose a remote data integrity checking protocol that supports data dynamics. In this paper, we adapt to support public verifiability. The proposed protocol supports public verifiability without help of a third party auditor. In addition, the proposed protocol does not leak any private information to third party verifiers. Through a formal analysis, we show the correctness and security of the protocol. After that, through theoretical analysis and experimental results, we demonstrate that the proposed protocol has a good performance. Title :Enabling Public Auditability and Data Dynamics For Storage Security in Cloud Computing Language : C# Project Link : http://kasanpro.com/p/c-sharp/public-auditability-data-dynamics-for-storage-security-cloud-computing Abstract : Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not been well understood. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction of TPA eliminates the involvement of the client through the auditing of whether his data stored in the cloud is indeed intact. The support for data dynamics via the most general forms of data operation, such as block modification, insertion and deletion, is also a significant step toward practicality, since services in Cloud Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often lacks the support of either public auditability or dynamic data operations, this paper achieves both. We first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification scheme for the seamless integration of these two salient features in our design. In particular, to achieve efficient data dynamics, we improve the existing proof of storage models by manipulating block tag authentication. To support efficient handling of multiple auditing tasks, we further explore the technique of signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and
  • 2. performance analysis show that the proposed schemes are highly efficient and provably secure. Title :Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud Language : C# Project Link : http://kasanpro.com/p/c-sharp/dynamic-resource-allocation-efficient-parallel-data-processing-cloud Abstract : In recent years ad-hoc parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a- Service (IaaS) clouds. Major Cloud computing companies have started to integrate frameworks for parallel data processing in their product portfolio, making it easy for customers to access these services and to deploy their programs. However, the processing frameworks which are currently used have been designed for static, homogeneous cluster setups and disregard the particular nature of a cloud. Consequently, the allocated compute resources may be inadequate for big parts of the submitted job and unnecessarily increase processing time and cost. In this paper we discuss the opportunities and challenges for efficient parallel data processing in clouds and present our research project Nephele. Nephele is the first data processing framework to explicitly exploit the dynamic resource allocation offered by today's IaaS clouds for both, task scheduling and execution. Particular tasks of a processing job can be assigned to different types of virtual machines which are automatically instantiated and terminated during the job execution. Based on this new framework, we perform extended evaluations of MapReduce-inspired processing jobs on an IaaS cloud system and compare the results to the popular data processing framework Hadoop. Title :Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Language : C# Project Link : http://kasanpro.com/p/c-sharp/privacy-preserving-multi-keyword-ranked-search-encrypted-cloud-data Abstract : The advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext keyword search. Thus, enabling an encrypted cloud data search service is of paramount importance. Considering the large number of data users and documents in cloud, it is crucial for the search service to allow multi-keyword query and provide result similarity ranking to meet the effective data retrieval need. Related works on searchable encryption focus on single keyword search or Boolean keyword search, and rarely differentiate the search results. In this paper, for the first time, we define and solve the challenging problem of privacy-preserving multi-keyword ranked search over encrypted cloud data (MRSE), and establish a set of strict privacy requirements for such a secure cloud data utilization system to become a reality. Among various multi-keyword semantics, we choose the efficient principle of "coordinate matching", i.e., as many matches as possible, to capture the similarity between search query and data documents, and further use "inner product similarity" to quantitatively formalize such principle for similarity measurement. We first propose a basic MRSE scheme using secure inner product computation, and then significantly improve it to meet different privacy requirements in two levels of threat models. Thorough analysis investigating privacy and efficiency guarantees of proposed schemes is given, and experiments on the real-world dataset further show proposed schemes indeed introduce low overhead on computation and communication. M.Phil Computer Science Cloud Computing Projects Title :Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds Language : C# Project Link : http://kasanpro.com/p/c-sharp/dynamic-audit-services-integrity-verification-outsourced-storages-clouds Abstract : In this paper, we propose a dynamic audit service for verify- ing the integrity of untrusted and outsourced storage. Our audit service, constructed based on the techniques, fragment structure, random sampling and index-hash table, can sup- port provable updates to outsourced data, and timely abnor- mal detection. In addition, we propose an efficient approach based on probabilistic query and periodic verification for im- proving the performance of audit services. Our experimental results not only validate the effectiveness of our approaches, but also show our audit system has a lower computation overhead, as well as a shorter extra storage for audit mete- data. Title :Data integrity proofs in cloud storage Language : C# Project Link : http://kasanpro.com/p/c-sharp/data-integrity-proofs-cloud-storage Abstract : Cloud computing has been envisioned as the de-facto solution to the rising storage costs of IT Enterprises.
  • 3. With the high costs of data storage devices as well as the rapid rate at which data is being generated it proves costly for enterprises or individual users to frequently update their hardware. Apart from reduction in storage costs data outsourcing to the cloud also helps in reducing the maintenance. Cloud storage moves the user's data to large data centers, which are remotely located, on which user does not have any control. However, this unique feature of the cloud poses many new security challenges which need to be clearly understood and resolved. We provide a scheme which gives a proof of data integrity in the cloud which the customer can employ to check the correctness of his data in the cloud. This proof can be agreed upon by both the cloud and the customer and can be incorporated in the Service level agreement (SLA). Title :Optimal Service Pricing for a Cloud Cache Language : C# Project Link : http://kasanpro.com/p/c-sharp/optimal-service-pricing-cloud-cache Abstract : Cloud applications that offer data management services are emerging. Such clouds support caching of data in order to provide quality query services. The users can query the cloud data, paying the price for the infrastructure they use. Cloud management necessitates an economy that manages the service of multiple users in an efficient, but also, resourceeconomic way that allows for cloud profit. Naturally, the maximization of cloud profit given some guarantees for user satisfaction presumes an appropriate price-demand model that enables optimal pricing of query services. The model should be plausible in that it reflects the correlation of cache structures involved in the queries. Optimal pricing is achieved based on a dynamic pricing scheme that adapts to time changes. This paper proposes a novel price-demand model designed for a cloud cache and a dynamic pricing scheme for queries executed in the cloud cache. The pricing solution employs a novel method that estimates the correlations of the cache services in an time-efficient manner. The experimental study shows the efficiency of the solution. http://kasanpro.com/ieee/final-year-project-center-theni-reviews Title :Secure and Practical Outsourcing of Linear Programming in Cloud Computing Language : C# Project Link : http://kasanpro.com/p/c-sharp/secure-practical-outsourcing-linear-programming-cloud-computing Abstract : Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large computation workloads to the cloud, and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in a pay-per-use manner. Despite the tremendous benefits, security is the primary obstacle that prevents the wide adoption of this promising computing model, especially for customers when their confidential data are consumed and produced during the computation. Treating the cloud as an intrinsically insecure computing platform from the viewpoint of the cloud customers, we must design mechanisms that not only protect sensitive information by enabling computations with encrypted data, but also protect customers from malicious behaviors by enabling the validation of the computation result. Such a mechanism of general secure computation outsourcing was recently shown to be feasible in theory, but to design mechanisms that are practically efficient remains a very challenging problem. Focusing on engineering computing and optimization tasks, this paper investigates secure outsourcing of widely applicable linear programming (LP) computations. In order to achieve practical efficiency, our mechanism design explicitly decomposes the LP computation outsourcing into public LP solvers running on the cloud and private LP parameters owned by the customer. The resulting flexibility allows us to explore appropriate secu- rity/efficiency tradeoff via higher-level abstraction of LP compu- tations than the general circuit representation. In particular, by formulating private data owned by the customer for LP problem as a set of matrices and vectors, we are able to develop a set of efficient privacy-preserving problem transformation techniques, which allow customers to transform original LP problem into some arbitrary one while protecting sensitive input/output infor- mation. To validate the computation result, we further explore the fundamental duality theorem of LP computation and derive the necessary and sufficient conditions that correct result must satisfy. Such result verification mechanism is extremely efficient and incurs close-to-zero additional cost on both cloud server and customers. Extensive security analysis and experiment results show the immediate practicability of our mechanism design. Title :Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing Language : C# Project Link : http://kasanpro.com/p/c-sharp/privacy-preserving-public-auditing-cloud-computing Abstract : Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their
  • 4. data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in Cloud Computing a very challenging and potentially formidable task, especially for users with constrained computing resources and capabilities. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. To securely introduce an effective Third Party Auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; 2) The Third Party Auditing process should bring in no new vulnerabilities towards user data privacy. In this paper we are extending the previous system by using automatic blocker for privacy preserving public auditing for data storage security in cloud computing. we utilize the public key based homomorphic authenticator and uniquely integrate it with random mask technique and automatic blocker. to achieve a privacy-preserving public auditing system for cloud data storage security while keeping all above requirements in mind. Extensive security and performance analysis shows the proposed schemes are provably secure and highly efficient. M.Phil Computer Science Cloud Computing Projects Title :Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing Language : NS2 Project Link : http://kasanpro.com/p/ns2/privacy-preserving-public-auditing-cloud-computing-code Abstract : Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in Cloud Computing a very challenging and potentially formidable task, especially for users with constrained computing resources and capabilities. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. To securely introduce an effective Third Party Auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; 2) The Third Party Auditing process should bring in no new vulnerabilities towards user data privacy. In this paper we are extending the previous system by using automatic blocker for privacy preserving public auditing for data storage security in cloud computing. we utilize the public key based homomorphic authenticator and uniquely integrate it with random mask technique and automatic blocker. to achieve a privacy-preserving public auditing system for cloud data storage security while keeping all above requirements in mind. Extensive security and performance analysis shows the proposed schemes are provably secure and highly efficient. Title :Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data Language : C# Project Link : http://kasanpro.com/p/c-sharp/efficient-ranked-keyword-search-outsourced-cloud-data Abstract : Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data privacy, sensitive cloud data has to be encrypted before outsourced to the commercial public cloud, which makes effective data utilization service a very challenging task. Although traditional searchable encryption techniques allow users to securely search over encrypted data through keywords, they support only Boolean search and are not yet sufficient to meet the effective data utilization need that is inherently demanded by large number of users and huge amount of data files in cloud. In this paper, we define and solve the problem of secure ranked keyword search over encrypted cloud data. Ranked search greatly enhances system usability by enabling search result relevance ranking instead of sending undifferentiated results, and further ensures the file retrieval accuracy. Specifically, we explore the statistical measure approach, i.e. relevance score, from information retrieval to build a secure searchable index, and develop a one-to-many order-preserving mapping technique to properly protect those sensitive score information. The resulting design is able to facilitate efficient server-side ranking without losing keyword privacy. Thorough analysis shows that our proposed solution enjoys "as-strong-as-possible" security guarantee compared to previous searchable encryption schemes, while correctly realizing the goal of ranked keyword search. Extensive experimental results demonstrate the efficiency of the proposed solution. Title :Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing Language : C# Project Link : http://kasanpro.com/p/c-sharp/data-integrity-public-auditing-data-storage-security-cloud-computing
  • 5. Abstract : Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in Cloud Computing a very challenging and potentially formidable task, especially for users with constrained computing resources and capabilities. Thus, enabling public auditability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. To securely introduce an effective third party auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; 2) he third party auditing process should bring in no new vulnerabilities towards user data privacy. In this paper, we utilize and uniquely combine the public key based homomorphic authenticator with random masking to achieve the privacy- preserving public cloud data auditing system, which meets all above requirements. To support efficient handling of multiple auditing tasks, we further explore the technique of bilinear aggregate signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis shows the proposed schemes are provably secure and highly efficient. Title :Cloud Computing Security: From Single to Multi-Clouds Language : C# Project Link : http://kasanpro.com/p/c-sharp/cloud-computing-security-from-single-multi-clouds Abstract : The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. Dealing with "single cloud" providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the single cloud. A movement towards "multi-clouds", or in other words, "interclouds" or "cloud-of-clouds" has emerged recently. This paper surveys recent research related to single and multi-cloud security and addresses possible solutions. It is found that the research into the use of multi-cloud providers to maintain security has received less attention from the research community than has the use of single clouds. This work aims to promote the use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user. Title :A Secured Cost-effective Multi-Cloud Storage in Cloud Computing Language : NS2 Project Link : http://kasanpro.com/p/ns2/secured-cost-effective-multi-cloud-storage-cloud-computing Abstract : The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-per-use service business model known as cloud computing. Cloud data Storage redefines the security issues targeted on customer's outsourced data (data that is not stored/retrieved from the costumers own servers). In this work we observed that, from a customer's point of view, relying upon a solo SP for his outsourced data is not very promising. In addition, providing better privacy as well as ensuring data availability can be achieved by dividing the user's data block into data pieces and distributing them among the available SPs in such a way that no less than a threshold number of SPs can take part in successful retrieval of the whole data block. In this paper, we propose a secured cost-effective multi-cloud storage (SCMCS) model in cloud computing which holds an economical distribution of data among the available SPs in the market, to provide customers with data availability as well as secure storage. Our results show that, our proposed model provides a better decision for customers according to their available budgets. M.Phil Computer Science Cloud Computing Projects Title :A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability Language : NS2 Project Link : http://kasanpro.com/p/ns2/remote-data-integrity-checking-protocol Abstract : Remote data integrity checking is a crucial technology in cloud computing. Recently many works focus on providing data dynamics and/or public verifiability to this type of protocols. Existing protocols can support both features with the help of a third party auditor. In a previous work, propose a remote data integrity checking protocol that supports data dynamics. In this paper, we adapt to support public verifiability. The proposed protocol supports public verifiability without help of a third party auditor. In addition, the proposed protocol does not leak any private information to third party verifiers. Through a formal analysis, we show the correctness and security of the protocol.
  • 6. After that, through theoretical analysis and experimental results, we demonstrate that the proposed protocol has a good performance. http://kasanpro.com/ieee/final-year-project-center-theni-reviews Title :Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption Language : ASP.NET with VB Project Link : http://kasanpro.com/p/asp-net-with-vb/secure-sharing-personal-health-records-attribute-based-encryption-implement Abstract : Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients' control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semi-trusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute based encryption (ABE) techniques to encrypt each patient's PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multi-authority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability and efficiency of our proposed scheme. Title :Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption Language : ASP.NET with C# Project Link : http://kasanpro.com/p/asp-net-with-c-sharp/secure-sharing-personal-health-records-attribute-based-encryption Abstract : Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients' control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semi-trusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute based encryption (ABE) techniques to encrypt each patient's PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multi-authority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability and efficiency of our proposed scheme. Title :Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption Language : C# Project Link : http://kasanpro.com/p/c-sharp/secure-sharing-personal-health-records-attribute-based-encryption-implement-code Abstract : Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients' control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access and efficient user revocation, have remained the most important challenges toward achieving fine-grained,
  • 7. cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semi-trusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute based encryption (ABE) techniques to encrypt each patient's PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multi-authority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability and efficiency of our proposed scheme. Title :Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption Language : PHP Project Link : http://kasanpro.com/p/php/secure-sharing-personal-health-records-attribute-based-encryption-module Abstract : Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients' control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semi-trusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute based encryption (ABE) techniques to encrypt each patient's PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multi-authority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability and efficiency of our proposed scheme. M.Phil Computer Science Cloud Computing Projects Title :Mining Contracts for Business Events and Temporal Constraints in Service Engagements Language : C# Project Link : http://kasanpro.com/p/c-sharp/mining-contracts-business-events-temporal-constraints-service-engagements Abstract : Contracts are legally binding descriptions of business service engagements. In particular, we consider business events as elements of a service engagement. Business events such as purchase, delivery, bill payment, bank interest accrual not only correspond to essential processes but are also inherently temporally constrained. Identifying and understanding the events and their temporal relationships can help a business partner determine what to deliver and what to expect from others as it participates in the service engagement specified by a contract. However, contracts are expressed in unstructured text and their insights are buried therein. Our contributions are threefold. We develop a novel approach employing a hybrid of surface patterns, parsing, and classification to extract (1) business events and (2) their temporal constraints from contract text. We use topic modeling to (3) automatically organize the event terms into clusters. An evaluation on a real-life contract dataset demonstrates the viability and promise of our hybrid approach, yielding an F-measure of 0.89 in event extraction and 0.90 in temporal constraints extraction. The topic model yields event term clusters with an average match of 85% between two independent human annotations and an expert-assigned set of class labels for the clusters. Title :A Load Balancing Model Based on Cloud Partitioning for the Public Cloud Language : C# Project Link : http://kasanpro.com/p/c-sharp/load-balancing-model-based-cloud-partitioning-public-cloud Abstract : Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. This article introduces a better load balance model for the public cloud based on the cloud partitioning concept with a switch mechanism to choose different strategies for different situations. The algorithm applies the game theory to the load balancing strategy to
  • 8. improve the efficiency in the public cloud environment. Title :A Load Balancing Model Based on Cloud Partitioning for the Public Cloud Language : NS2 Project Link : http://kasanpro.com/p/ns2/load-balancing-model-based-cloud-partitioning-public-cloud-code Abstract : Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. This article introduces a better load balance model for the public cloud based on the cloud partitioning concept with a switch mechanism to choose different strategies for different situations. The algorithm applies the game theory to the load balancing strategy to improve the efficiency in the public cloud environment. Title :AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds Language : C# Project Link : http://kasanpro.com/p/c-sharp/ames-adaptive-mobile-video-streaming-efficient-social-video-sharing-clouds Abstract : While demands on video traffic over mobile networks have been souring, the wireless link capacity cannot keep up with the traffic demand. The gap between the traffic demand and the link capacity, along with time-varying link conditions, results in poor service quality of video streaming over mobile networks such as long buffering time and intermittent disruptions. Leveraging the cloud computing technology, we propose a new mobile video streaming framework, dubbed AMES-Cloud, which has two main parts: AMoV (adaptive mobile video streaming) and ESoV (efficient social video sharing). AMoV and ESoV construct a private agent to provide video streaming services efficiently for each mobile user. For a given user, AMoV lets her private agent adaptively adjust her streaming flow with a scalable video coding technique based on the feedback of link quality. Likewise, ESoV monitors the social network interactions among mobile users, and their private agents try to prefetch video content in advance. We implement a prototype of the AMES-Cloud framework to demonstrate its performance. It is shown that the private agents in the clouds can effectively provide the adaptive streaming, and perform video sharing (i.e., prefetching) based on the social network analysis. http://kasanpro.com/ieee/final-year-project-center-theni-reviews Title :AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds Language : NS2 Project Link : http://kasanpro.com/p/ns2/ames-adaptive-mobile-video-streaming-social-video-sharing-clouds Abstract : While demands on video traffic over mobile networks have been souring, the wireless link capacity cannot keep up with the traffic demand. The gap between the traffic demand and the link capacity, along with time-varying link conditions, results in poor service quality of video streaming over mobile networks such as long buffering time and intermittent disruptions. Leveraging the cloud computing technology, we propose a new mobile video streaming framework, dubbed AMES-Cloud, which has two main parts: AMoV (adaptive mobile video streaming) and ESoV (efficient social video sharing). AMoV and ESoV construct a private agent to provide video streaming services efficiently for each mobile user. For a given user, AMoV lets her private agent adaptively adjust her streaming flow with a scalable video coding technique based on the feedback of link quality. Likewise, ESoV monitors the social network interactions among mobile users, and their private agents try to prefetch video content in advance. We implement a prototype of the AMES-Cloud framework to demonstrate its performance. It is shown that the private agents in the clouds can effectively provide the adaptive streaming, and perform video sharing (i.e., prefetching) based on the social network analysis. M.Phil Computer Science Cloud Computing Projects Title :NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds Language : C# Project Link : http://kasanpro.com/p/c-sharp/nccloud-network-coding-based-storage-system-cloud-clouds
  • 9. Abstract : To provide fault tolerance for cloud storage, recent studies propose to stripe data across multiple cloud vendors. However, if a cloud suffers from a permanent failure and loses all its data, we need to repair the lost data with the help of the other surviving clouds to preserve data redundancy. We present a proxy-based storage system for fault-tolerant multiple-cloud storage called NCCloud, which achieves cost-effective repair for a permanent single-cloud failure. NCCloud is built on top of a network-coding-based storage scheme called the functional minimum-storage regenerating (FMSR) codes, which maintain the same fault tolerance and data redundancy as in traditional erasure codes (e.g., RAID-6), but use less repair traffic and hence incur less monetary cost due to data transfer. One key design feature of our FMSR codes is that we relax the encoding requirement of storage nodes during repair, while preserving the benefits of network coding in repair. We implement a proof-of-concept prototype of NCCloud and deploy it atop both local and commercial clouds. We validate that FMSR codes provide significant monetary cost savings in repair over RAID-6 codes, while having comparable response time performance in normal cloud storage operations such as upload/download. Title :NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds Language : NS2 Project Link : http://kasanpro.com/p/ns2/nccloud-network-coding-based-storage-system-cloud-clouds-code Abstract : To provide fault tolerance for cloud storage, recent studies propose to stripe data across multiple cloud vendors. However, if a cloud suffers from a permanent failure and loses all its data, we need to repair the lost data with the help of the other surviving clouds to preserve data redundancy. We present a proxy-based storage system for fault-tolerant multiple-cloud storage called NCCloud, which achieves cost-effective repair for a permanent single-cloud failure. NCCloud is built on top of a network-coding-based storage scheme called the functional minimum-storage regenerating (FMSR) codes, which maintain the same fault tolerance and data redundancy as in traditional erasure codes (e.g., RAID-6), but use less repair traffic and hence incur less monetary cost due to data transfer. One key design feature of our FMSR codes is that we relax the encoding requirement of storage nodes during repair, while preserving the benefits of network coding in repair. We implement a proof-of-concept prototype of NCCloud and deploy it atop both local and commercial clouds. We validate that FMSR codes provide significant monetary cost savings in repair over RAID-6 codes, while having comparable response time performance in normal cloud storage operations such as upload/download. Title :Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Language : C# Project Link : http://kasanpro.com/p/c-sharp/privacy-preserving-multi-keyword-ranked-search-encrypted-cloud-data-code Abstract : With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext keyword search. Thus, enabling an encrypted cloud data search service is of paramount importance. Considering the large number of data users and documents in the cloud, it is necessary to allow multiple keywords in the search request and return documents in the order of their relevance to these keywords. Related works on searchable encryption focus on single keyword search or Boolean keyword search, and rarely sort the search results. In this paper, for the first time, we define and solve the challenging problem of privacypreserving multi-keyword ranked search over encrypted cloud data (MRSE).We establish a set of strict privacy requirements for such a secure cloud data utilization system. Among various multikeyword semantics, we choose the efficient similarity measure of "coordinate matching", i.e., as many matches as possible, to capture the relevance of data documents to the search query. We further use "inner product similarity" to quantitatively evaluate such similarity measure. We first propose a basic idea for the MRSE based on secure inner product computation, and then give two significantly improved MRSE schemes to achieve various stringent privacy requirements in two different threat models. Thorough analysis investigating privacy and efficiency guarantees of proposed schemes is given. Experiments on the real-world dataset further show proposed schemes indeed introduce low overhead on computation and communication. Title :Compatibility-aware Cloud Service Composition Under Fuzzy Preferences Language : C# Project Link : http://kasanpro.com/p/c-sharp/compatibility-aware-cloud-service-composition-under-fuzzy-preferences Abstract : When a single Cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of Cloud services is required. Cloud service composition, which includes several tasks such as discovery, compatibility checking, selection, and deployment, is a complex process and users find it difficult to select the best one among the hundreds, if not thousands, of possible compositions available. Service composition in Cloud raises even new challenges caused by diversity of users with different expertise requiring their applications to be deployed across difference geographical locations with distinct legal constraints. The main difficulty
  • 10. lies in selecting a combination of virtual appliances (software images) and infrastructure services that are compatible and satisfy a user with vague preferences. Therefore, we present a framework and algorithms which simplify Cloud service composition for unskilled users. We develop an ontologybased approach to analyze Cloud service compatibility by applying reasoning on the expert knowledge. In addition, to minimize effort of users in expressing their preferences, we apply combination of evolutionary algorithms and fuzzy logic for composition optimization. This lets users express their needs in linguistics terms which brings a great comfort to them compared to systems that force users to assign exact weights for all preferences. Title :Compatibility-aware Cloud Service Composition Under Fuzzy Preferences Language : NS2 Project Link : http://kasanpro.com/p/ns2/compatibility-aware-cloud-service-composition-under-fuzzy-preference Abstract : When a single Cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of Cloud services is required. Cloud service composition, which includes several tasks such as discovery, compatibility checking, selection, and deployment, is a complex process and users find it difficult to select the best one among the hundreds, if not thousands, of possible compositions available. Service composition in Cloud raises even new challenges caused by diversity of users with different expertise requiring their applications to be deployed across difference geographical locations with distinct legal constraints. The main difficulty lies in selecting a combination of virtual appliances (software images) and infrastructure services that are compatible and satisfy a user with vague preferences. Therefore, we present a framework and algorithms which simplify Cloud service composition for unskilled users. We develop an ontologybased approach to analyze Cloud service compatibility by applying reasoning on the expert knowledge. In addition, to minimize effort of users in expressing their preferences, we apply combination of evolutionary algorithms and fuzzy logic for composition optimization. This lets users express their needs in linguistics terms which brings a great comfort to them compared to systems that force users to assign exact weights for all preferences. M.Phil Computer Science Cloud Computing Projects Title :A Load Balancing Model Based on Cloud Partitioning for the Public Cloud Language : Java Project Link : http://kasanpro.com/p/java/load-balancing-model-cloud-partitioning-public-cloud Abstract : Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. This article introduces a better load balance model for the public cloud based on the cloud partitioning concept with a switch mechanism to choose different strategies for different situations. The algorithm applies the game theory to the load balancing strategy to improve the efficiency in the public cloud environment. Title :EduCloud: PaaS versus IaaS Cloud Usage for an Advanced Computer Science Course Language : Java Project Link : http://kasanpro.com/p/java/educloud-paas-iaas-cloud-usage-advanced-computer-science-course Abstract : The cloud has become a widely used term in academia and the industry. Education has not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for software as a service cloud. However, an evaluation of the educational potential of infrastructure and platform clouds has not been explored yet. An evaluation of which type of cloud would be the most beneficial for students to learn, depending on the technical knowledge required for its usage, is missing. Here, the first systematic evaluation of different types of cloud technologies in an advanced course on network overlays with 84 students and four professors is presented. This evaluation tries to answer the question whether cloud technologies (and which specific type of cloud) can be useful in educational scenarios for computer science students by focusing students in the actual tasks at hand. This study demonstrates that platform clouds are valued by both students and professors to achieve the course objectives and that clouds offer a significant improvement over the previous situation in labs where much effort was devoted to setting up the software necessary for course activities. These results most strongly apply to courses in which students interact with resources that are non-self-contained (e.g., network nodes, databases, mechanical equipment, or the cloud itself), but could also apply to other science disciplines that involve programming or performing virtual experiments. http://kasanpro.com/ieee/final-year-project-center-theni-reviews
  • 11. Title :Automating Cloud Services Life Cycle through Semantic Technologies Language : C# Project Link : http://kasanpro.com/p/c-sharp/automating-cloud-services-life-cycle-semantic-technologies Abstract : Managing virtualized services efficiently over the cloud is an open challenge. Traditional models of software development are not appropriate for the cloud computing domain, where software (and other) services are acquired on demand. In this paper, we describe a new integrated methodology for the life cycle of IT services delivered on the cloud and demonstrate how it can be used to represent and reason about services and service requirements and so automate service acquisition and consumption from the cloud. We have divided the IT service life cycle into five phases of requirements, discovery, negotiation, composition, and consumption. We detail each phase and describe the ontologies that we have developed to represent the concepts and relationships for each phase. To show how this life cycle can automate the usage of cloud services, we describe a cloud storage prototype that we have developed. This methodology complements previous work on ontologies for service descriptions in that it is focused on supporting negotiation for the particulars of a service and going beyond simple matchmaking. Title :Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query Language : C# Project Link : http://kasanpro.com/p/c-sharp/cloud-search-services-multi-keyword-ranked-search-encrypted-cloud Abstract : In recent years, consumer-centric cloud computing paradigm has emerged as the development of smart electronic devices combined with the emerging cloud computing technologies. A variety of cloud services are delivered to the consumers with the premise that an effective and efficient cloud search service is achieved. For consumers, they want to find the most relevant products or data, which is highly desirable in the "pay-as-you use" cloud computing paradigm. As sensitive data (such as photo albums, emails, personal health records, financial records, etc.) are encrypted before outsourcing to cloud, traditional keyword search techniques are useless. Meanwhile, existing search approaches over encrypted cloud data support only exact or fuzzy keyword search, but not semantics-based multi-keyword ranked search. Therefore, how to enable an effective searchable system with support of ranked search remains a very challenging problem. This paper proposes an effective approach to solve the problem of multi-keyword ranked search over encrypted cloud data supporting synonym queries. The main contribution of this paper is summarized in two aspects: multi-keyword ranked search to achieve more accurate search results and synonym-based search to support synonym queries. Extensive experiments on real-world dataset were performed to validate the approach, showing that the proposed solution is very effective and efficient for multikeyword ranked searching in a cloud environment. Title :Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query Language : NS2 Project Link : http://kasanpro.com/p/ns2/multi-keyword-ranked-search-cloud-search-services-encrypted-cloud Abstract : In recent years, consumer-centric cloud computing paradigm has emerged as the development of smart electronic devices combined with the emerging cloud computing technologies. A variety of cloud services are delivered to the consumers with the premise that an effective and efficient cloud search service is achieved. For consumers, they want to find the most relevant products or data, which is highly desirable in the "pay-as-you use" cloud computing paradigm. As sensitive data (such as photo albums, emails, personal health records, financial records, etc.) are encrypted before outsourcing to cloud, traditional keyword search techniques are useless. Meanwhile, existing search approaches over encrypted cloud data support only exact or fuzzy keyword search, but not semantics-based multi-keyword ranked search. Therefore, how to enable an effective searchable system with support of ranked search remains a very challenging problem. This paper proposes an effective approach to solve the problem of multi-keyword ranked search over encrypted cloud data supporting synonym queries. The main contribution of this paper is summarized in two aspects: multi-keyword ranked search to achieve more accurate search results and synonym-based search to support synonym queries. Extensive experiments on real-world dataset were performed to validate the approach, showing that the proposed solution is very effective and efficient for multikeyword ranked searching in a cloud environment. M.Phil Computer Science Cloud Computing Projects Title :A Mechanism Design Approach to Resource Procurement in Cloud Computing Language : C# Project Link : http://kasanpro.com/p/c-sharp/resource-procurement-cloud-computing-module
  • 12. Abstract : We present a cloud resource procurement approach which not only automates the selection of an appropriate cloud vendor but also implements dynamic pricing. Three possible mechanisms are suggested for cloud resource procurement: cloud-dominant strategy incentive compatible (C-DSIC), cloud-Bayesian incentive compatible (C-BIC), and cloud optimal (C-OPT). C-DSIC is dominant strategy incentive compatible, based on the VCG mechanism, and is a low-bid Vickrey auction. C-BIC is Bayesian incentive compatible, which achieves budget balance. C-BIC does not satisfy individual rationality. In C-DSIC and C-BIC, the cloud vendor who charges the lowest cost per unit QoS is declared the winner. In C-OPT, the cloud vendor with the least virtual cost is declared the winner. C-OPT overcomes the limitations of both C-DSIC and C-BIC. C-OPT is not only Bayesian incentive compatible, but also individually rational. Our experiments indicate that the resource procurement cost decreases with increase in number of cloud vendors irrespective of the mechanisms. We also propose a procurement module for a cloud broker which can implement C-DSIC, C-BIC, or C-OPT to perform resource procurement in a cloud computing context. A cloud broker with such a procurement module enables users to automate the choice of a cloud vendor among many with diverse offerings, and is also an essential first step toward implementing dynamic pricing in the cloud. Title :A Mechanism Design Approach to Resource Procurement in Cloud Computing Language : NS2 Project Link : http://kasanpro.com/p/ns2/resource-procurement-cloud-computing Abstract : We present a cloud resource procurement approach which not only automates the selection of an appropriate cloud vendor but also implements dynamic pricing. Three possible mechanisms are suggested for cloud resource procurement: cloud-dominant strategy incentive compatible (C-DSIC), cloud-Bayesian incentive compatible (C-BIC), and cloud optimal (C-OPT). C-DSIC is dominant strategy incentive compatible, based on the VCG mechanism, and is a low-bid Vickrey auction. C-BIC is Bayesian incentive compatible, which achieves budget balance. C-BIC does not satisfy individual rationality. In C-DSIC and C-BIC, the cloud vendor who charges the lowest cost per unit QoS is declared the winner. In C-OPT, the cloud vendor with the least virtual cost is declared the winner. C-OPT overcomes the limitations of both C-DSIC and C-BIC. C-OPT is not only Bayesian incentive compatible, but also individually rational. Our experiments indicate that the resource procurement cost decreases with increase in number of cloud vendors irrespective of the mechanisms. We also propose a procurement module for a cloud broker which can implement C-DSIC, C-BIC, or C-OPT to perform resource procurement in a cloud computing context. A cloud broker with such a procurement module enables users to automate the choice of a cloud vendor among many with diverse offerings, and is also an essential first step toward implementing dynamic pricing in the cloud. Title :A Novel Model for Competition and Cooperation Among Cloud Providers Language : C# Project Link : http://kasanpro.com/p/c-sharp/competition-cooperation-among-cloud-providers Abstract : Having received significant attention in the industry, the cloud market is nowadays fiercely competitive with many cloud providers. On one hand, cloud providers compete against each other for both existing and new cloud users. To keep existing users and attract newcomers, it is crucial for each provider to offer an optimal price policy which maximizes the final revenue and improves the competitive advantage. The competition among providers leads to the evolution of the market and dynamic resource prices over time. On the other hand, cloud providers may cooperate with each other to improve their final revenue. Based on a Service Level Agreement, a provider can outsource its users' resource requests to its partner to reduce the operation cost and thereby improve the final revenue. This leads to the problem of determining the cooperating parties in a cooperative environment. This paper tackles these two issues of the current cloud market. First, we solve the problem of competition among providers and propose a dynamic price policy. We employ a discrete choice model to describe the user's choice behavior based on his obtained benefit value. The choice model is used to derive the probability of a user choosing to be served by a certain provider. The competition among providers is formulated as a non-cooperative stochastic game where the players are providers who act by proposing the price policy simultaneously. The game is modelled as a Markov Decision Process whose solution is a Markov Perfect Equilibrium. Then, we address the cooperation among providers by presenting a novel algorithm for determining a cooperation strategy that tells providers whether to satisfy users' resource requests locally or outsource them to a certain provider. The algorithm yields the optimal cooperation structure from which no provider unilaterally deviates to gain more revenue. Numerical simulations are carried out to evaluate the performance of the proposed models. Title :A Novel Model for Competition and Cooperation Among Cloud Providers Language : NS2 Project Link : http://kasanpro.com/p/ns2/competition-cooperation-model-among-cloud-providers Abstract : Having received significant attention in the industry, the cloud market is nowadays fiercely competitive with many cloud providers. On one hand, cloud providers compete against each other for both existing and new cloud
  • 13. users. To keep existing users and attract newcomers, it is crucial for each provider to offer an optimal price policy which maximizes the final revenue and improves the competitive advantage. The competition among providers leads to the evolution of the market and dynamic resource prices over time. On the other hand, cloud providers may cooperate with each other to improve their final revenue. Based on a Service Level Agreement, a provider can outsource its users' resource requests to its partner to reduce the operation cost and thereby improve the final revenue. This leads to the problem of determining the cooperating parties in a cooperative environment. This paper tackles these two issues of the current cloud market. First, we solve the problem of competition among providers and propose a dynamic price policy. We employ a discrete choice model to describe the user's choice behavior based on his obtained benefit value. The choice model is used to derive the probability of a user choosing to be served by a certain provider. The competition among providers is formulated as a non-cooperative stochastic game where the players are providers who act by proposing the price policy simultaneously. The game is modelled as a Markov Decision Process whose solution is a Markov Perfect Equilibrium. Then, we address the cooperation among providers by presenting a novel algorithm for determining a cooperation strategy that tells providers whether to satisfy users' resource requests locally or outsource them to a certain provider. The algorithm yields the optimal cooperation structure from which no provider unilaterally deviates to gain more revenue. Numerical simulations are carried out to evaluate the performance of the proposed models. Title :Consistency as a Service: Auditing Cloud Consistency Language : C# Project Link : http://kasanpro.com/p/c-sharp/consistency-service-auditing-cloud-consistency Abstract : Cloud storage services have become commercially popular due to their overwhelming advantages. To provide ubiquitous always-on access, a cloud service provider (CSP) maintains multiple replicas for each piece of data on geographically distributed servers. A key problem of using the replication technique in clouds is that it is very expensive to achieve strong consistency on a worldwide scale. In this paper, we first present a novel consistency as a service (CaaS) model, which consists of a large data cloud and multiple small audit clouds. In the CaaS model, a data cloud is maintained by a CSP, and a group of users that constitute an audit cloud can verify whether the data cloud provides the promised level of consistency or not. We propose a two-level auditing architecture, which only requires a loosely synchronized clock in the audit cloud. Then, we design algorithms to quantify the severity of violations with two metrics: the commonality of violations, and the staleness of the value of a read. Finally, we devise a heuristic auditing strategy (HAS) to reveal as many violations as possible. Extensive experiments were performed using a combination of simulations and real cloud deployments to validate HAS. M.Phil Computer Science Cloud Computing Projects Title :Consistency as a Service: Auditing Cloud Consistency Language : NS2 Project Link : http://kasanpro.com/p/ns2/consistency-as-a-service-auditing-cloud-consistency Abstract : Cloud storage services have become commercially popular due to their overwhelming advantages. To provide ubiquitous always-on access, a cloud service provider (CSP) maintains multiple replicas for each piece of data on geographically distributed servers. A key problem of using the replication technique in clouds is that it is very expensive to achieve strong consistency on a worldwide scale. In this paper, we first present a novel consistency as a service (CaaS) model, which consists of a large data cloud and multiple small audit clouds. In the CaaS model, a data cloud is maintained by a CSP, and a group of users that constitute an audit cloud can verify whether the data cloud provides the promised level of consistency or not. We propose a two-level auditing architecture, which only requires a loosely synchronized clock in the audit cloud. Then, we design algorithms to quantify the severity of violations with two metrics: the commonality of violations, and the staleness of the value of a read. Finally, we devise a heuristic auditing strategy (HAS) to reveal as many violations as possible. Extensive experiments were performed using a combination of simulations and real cloud deployments to validate HAS. Title :Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud Language : C# Project Link : http://kasanpro.com/p/c-sharp/panda-public-auditing-shared-data-efficient-user-revocation-cloud Abstract : With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. For security reasons, once a user is revoked from the group, the blocks which were previously signed by this revoked user must be re-signed by an existing user. The straightforward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is
  • 14. inefficient due to the large size of shared data in the cloud. In this paper, we propose a novel public auditing mechanism for the integrity of shared data with efficient user revocation in mind. By utilizing the idea of proxy re-signatures, we allow the cloud to re-sign blocks on behalf of existing users during user revocation, so that existing users do not need to download and re-sign blocks by themselves. In addition, a public verifier is always able to audit the integrity of shared data without retrieving the entire data from the cloud, even if some part of shared data has been re-signed by the cloud. Moreover, our mechanism is able to support batch auditing by verifying multiple auditing tasks simultaneously. Experimental results show that our mechanism can significantly improve the efficiency of user revocation. Title :Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud Language : NS2 Project Link : http://kasanpro.com/p/ns2/panda-public-auditing-shared-data-efficient-user-revocation-cloud-code Abstract : With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. For security reasons, once a user is revoked from the group, the blocks which were previously signed by this revoked user must be re-signed by an existing user. The straightforward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is inefficient due to the large size of shared data in the cloud. In this paper, we propose a novel public auditing mechanism for the integrity of shared data with efficient user revocation in mind. By utilizing the idea of proxy re-signatures, we allow the cloud to re-sign blocks on behalf of existing users during user revocation, so that existing users do not need to download and re-sign blocks by themselves. In addition, a public verifier is always able to audit the integrity of shared data without retrieving the entire data from the cloud, even if some part of shared data has been re-signed by the cloud. Moreover, our mechanism is able to support batch auditing by verifying multiple auditing tasks simultaneously. Experimental results show that our mechanism can significantly improve the efficiency of user revocation. Title :Performance and cost evaluation of an adaptive encryption architecture for cloud databases Language : C# Project Link : http://kasanpro.com/p/c-sharp/performance-cost-evaluation-adaptive-encryption-architecture-cloud-databases Abstract : The cloud database as a service is a novel paradigm that can support several Internet-based applications, but its adoption requires the solution of information confidentiality problems. We propose a novel architecture for adaptive encryption of public cloud databases that offers an interesting alternative to the trade-off between the required data confidentiality level and the flexibility of the cloud database structures at design time. We demonstrate the feasibility and performance of the proposed solution through a software prototype. Moreover, we propose an original cost model that is oriented to the evaluation of cloud database services in plain and encrypted instances and that takes into account the variability of cloud prices and tenant workload during a medium-term period. Title :Performance and cost evaluation of an adaptive encryption architecture for cloud databases Language : NS2 Project Link : http://kasanpro.com/p/ns2/performance-cost-evaluation-adaptive-encryption-architecture-cloud-databases-code Abstract : The cloud database as a service is a novel paradigm that can support several Internet-based applications, but its adoption requires the solution of information confidentiality problems. We propose a novel architecture for adaptive encryption of public cloud databases that offers an interesting alternative to the trade-off between the required data confidentiality level and the flexibility of the cloud database structures at design time. We demonstrate the feasibility and performance of the proposed solution through a software prototype. Moreover, we propose an original cost model that is oriented to the evaluation of cloud database services in plain and encrypted instances and that takes into account the variability of cloud prices and tenant workload during a medium-term period. M.Phil Computer Science Cloud Computing Projects Title :Comprehensive Explanation of SLA Violations at Runtime Language : Java Project Link : http://kasanpro.com/p/java/comprehensive-explanation-sla-violations-runtime
  • 15. Abstract : Service Level Agreements (SLAs) establish the Quality of Service (QoS) agreed between service-based systems consumers and providers. Since the violation of such SLAs may involve penalties, quality assurance techniques have been developed to supervise the SLAs fulfillment at runtime. However, existing proposals present some drawbacks: 1) the SLAs they support are not expressive enough to model real-world scenarios, 2) they couple the monitoring configuration to a given SLA specification, 3) the explanations of the violations are difficult to understand and even potentially inaccurate, 4) some proposals either do not provide an architecture, or present low cohesion within their elements. In this paper, we propose a comprehensive solution, from a conceptual reference model to its design and implementation, that overcomes these drawbacks. The resulting platform, SALMonADA, receives the SLA agreed between the parties as input and reports timely and comprehensive explanations of SLA violations. SALMonADA performs an automated monitoring configuration and it analyses highly expressive SLAs by means of a constraint satisfaction problems based technique. We have evaluated the impact of SALMonADA over the resulting service consumption time performance. The results are satisfactory enough to consider SALMonADA for SLA supervision because of its low intrusiveness.