Cloud Computing Project Topic List

  1. A Cost-Effective Deadline-Constrained Dynamic Scheduling Algorithm for Scientific Workflows in a Cloud Computing

  2. A Combined Forecast-Based Virtual Machine Migration in Cloud Data Centers

  3. An Energy-Efficient VM Prediction and Migration Framework for Overcommitted Clouds

  4. Business Value-Aware Task Scheduling for Hybrid IaaS Cloud

  5. Scalable and Direct Vector Bin-Packing Heuristic Based on Residual Resource Ratios for Virtual Machine Placement in Cloud Data Centers

  6. A Hybrid Multi-Objective Particle Swarm Optimization For Scientific Workflow Scheduling

  7. STAR SLA-aware Autonomic Management of Cloud Resources

  8. Crow Search Based Virtual Machine Placement Strategy in Cloud Data Centers with Live Migration

  9. An Iterative Budget Algorithm for Dynamic Virtual Machine Consolidation under cloud Computing Environment

  10. Cost Optimization for Dynamic Replication and Migration of Data in Cloud Data Centers

  11. An Energy Efficient and SLA Compliant Approach for Resource Allocation and Consolidation in Cloud Computing Environments

  12. On Efficient Resource Use for Scientific Workflows in Clouds

  13. An Intelligent Regressive Ensemble Approach for Predicting Resource Usage in Cloud Computing

  14. A Distributed Auction-based Framework for Scalable IaaS Provisioning in Geo-Data Centers

  15. A Game Approach to Multi-servers Load Balancing with Load-Dependent Server Availability Consideration

  16. Power and resource-aware virtual machine placement for IaaS cloud

  17. Hierarchical Stochastic Models for Performance Availability and Power Consumption Analysis of IaaS Clouds

  18. A Truthful (1- )-Optimal Mechanism for On-demand Cloud Resource Provisioning

  19. Distributed Resource Allocation for Data Center Networks- A Hierarchical Game Approach

  20. Energy-Efficient Virtual Machine Selection Based on Resource Ranking and Utilization Factor Approach in Cloud Computing for IoT

  21. Multi-Objective Scheduling for Scientific Workflow in Multicloud Environment

  22. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem

  23. Energy-aware VM Consolidation in Cloud Data Centers Using Utilization Prediction Model

  24. Energy Efficient VM Placement in Cloud Data Center

  25. Genetic-Based Algorithms Applied to a Workflow Scheduling Algorithm with Security and Deadline Constraints in Clouds

  26. A Hierarchical Control Framework of Load Balancing and Resource Allocation of Cloud Computing Services

  27. Revenue Maximization for Dynamic Expansion of Geo-distributed Cloud Data Centers

  28. Energy Efficient Scheduling of Servers with Multi-Sleep Modes for Cloud Data Center

  29. DeyPoS Deduplicatable Dynamic Proof of Storage for Multi-User Environments

  30. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

  31. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple

  32. Providing User Security Guarantees in Public Infrastructure Clouds

  33. EPAS A Sampling Based Similarity Identification Algorithm for the Cloud

  34. Dynamic and Public Auditing with Fair Arbitration for Cloud Data

  35. An Efficient Privacy-Preserving Ranked Keyword Search Method

  36. Dynamic and Fault-Tolerant Clustering for Scientific Workflows

  37. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

  38. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates

  39. Dynamic Hash Table Based Public Auditing for Secure Cloud Storage

  40. Identity-Based Encryption with Cloud Revocation Authority and Its Applications

  41. Fine Grained Two Factor Access Control for Web Based Cloud Computing Services

  42. Protecting Your Right: Attribute-Based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud

  43. Secure Optimization Computation Outsourcing in Cloud Computing A Case Study of Linear Programming

  44. Diplo Cloud Efficient and Scalable Management of RDF Data in the Cloud

  45. CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System

  46. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email

  47. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud

  48. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

  49. CD Store Toward Reliable Secure and Cost-Efficient Cloud Storage via Convergent Dispersal

  50. Circuit Cipher Text-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing

  51. Cloud Armor Supporting Reputation-based Trust Management for Cloud Services

  52. Privacy Preserving Ranked Multi Keyword Search for Multiple Data Owners in Cloud Computing

  53. Reducing Fragmentation for In-Line De duplication Backup Storage via Exploiting Backup History and Cache Knowledge

  54. TMACS A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

  55. An Efficient File Hierarchy Attribute Based Encryption Scheme in Cloud Computing

  56. Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E – Health Clouds

  57. Dual Server Public Key Encryption With Keyword Search for Secure Cloud Storage

  58. Geometric Range Search on Encrypted Spatial Data

  59. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving

  60. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories

  61. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds

  62. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage

  63. RAAC Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage

  64. Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data

  65. A Robust Reputation Management Mechanism in the Federated Cloud

  66. Securing Cloud Data Under Key Exposure

  67. Customer Satisfaction Aware Optimal Multi Server Configuration for Profit Maximization in Cloud Computing

  68. Privacy Protection Based Access Control Scheme in Cloud-based Services

  69. TAFC Time and Attribute Factors Combined Access Control on Time- Sensitive Data in Public Cloud

  70. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification

  71. VP Search Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data

  72. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

  73. A Semi-Automatic and Trustworthy Scheme for Continuous Cloud Service Certification

  74. Enabling Fine Grained Multi Keyword Search Supporting Classified Sub-Dictionaries Over Encrypted Cloud Data

  75. Reducing Fragmentation for In-Line Deduplication Backup Storage via Exploiting Backup History and Cache Knowledge

  76. SecRBAC Secure data in the Clouds

  77. KSF-OABE Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage

  78. Read2Me A Cloud-Based Reading Aid for the Visually Impaired

  79. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing

  80. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud

  81. A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains

  82. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing

  83. Two-Factor Data Security Protection Mechanism for Cloud Storage System

  84. Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud

  85. Optimizing Cost for Online Social Networks on Geo-Distributed Clouds

  86. Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing

  87. PHE An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing

  88. TTSA An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds

  89. Optimizing Autonomic Resources for the Management of Large Service-Based Business Processes

  90. Towards Shared Ownership in the Cloud

  91. Scheduling Inter-Datacenter Video Flows for Cost Efficiency

  92. Migration Modeling and Learning Algorithms for Containers in Fog Computing

  93. Multi-user Multi-task Computation Offloading in Green Mobile Edge Cloud Computing

  94. Achieving Fairness aware Two Level Scheduling for Heterogeneous Distributed Systems

  95. CLASS Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics

  96. Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols

  97. Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing

  98. Dynamic VM Scaling Provisioning and Pricing Through an Online Auction

  99. An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers

  100. Semantic-based Compound Keyword Search Over Encrypted Cloud Data

  101. Secure and Sustainable Load Balancing of Edge Datacenters in Fog Computing

  102. A Power-of-Two Choices Based Algorithm for Fog Computing

  103. virtFlow Guest Independent Execution Flow Analysis Across Virtualized Environments

  104. Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras

  105. Enhancing Performance and Energy Efficiency for Hybrid Workloads in Virtualized Cloud Environment

  106. Minimal Cost Server Configuration for Meeting Time-Varying Resource Demands in Cloud Centers

  107. Aggregation-Based Colocation Datacenter Energy Management in Wholesale Markets

  108. Provably Secure and Lightweight Identity-Based Authenticated Data Sharing Protocol for Cyber-Physical Cloud Environment

  109. SEPDP Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage

  110. An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers

  111. HealthDep An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems

  112. VMGuard A VMI-based Security Architecture for Intrusion Detection in Cloud Environment

  113. Price-based Resource Allocation for Edge Computing: A Market Equilibrium Approach

  114. Efficient Resource Allocation for On-Demand Mobile-Edge Cloud Computing

  115. An Efficient and Secured Framework for Mobile Cloud Computing

  116. Efficient Traceable Authorization Search System for Secure Cloud Storage

  117. A Robust Formulation for Efficient Application Offloading to Clouds

  118. A Planning Approach for Reassigning Virtual Machines in IaaS Clouds

  119. Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing

  120. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage

  121. Combining Data Owner-side and Cloud-side Access Control for Encrypted Cloud Storage

  122. A New Lightweight Symmetric Searchable Encryption Scheme for String Identification

  123. Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical CloudData

  124. An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing

  125. An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data

  126. Audit-Free Cloud Storage via Deniable Attribute-based Encryption

  127. Catch You if You Misbehave Ranked Keyword Search Results Verification in Cloud Computing

  128. Chaotic Searchable Encryption for Mobile Cloud Storage

  129. Unified Fine-grained Access Control for Personal Health Records in Cloud Computing

  130. A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing

  131. CryptCloud+ Secure and Expressive Data Access Control for Cloud Storage

  132. DROPS Division and Replication of Data in Cloud for Optimal Performance and Security

  133. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud

  134. Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage

  135. Identity-Based Private Matching Over Outsourced Encrypted Datasets

  136. Inference Attack Resistant E-Healthcare Cloud System with Fine Grained Access Control

  137. Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage

  138. Privacy Preservation for Outsourced Medical Data With Flexible Access Control

  139. Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing

  140. Provably Secure Fine-Grained Data Access Control over Multiple Cloud Servers in Mobile Cloud Computing Based HealthCare Applications

  141. Transactional Behavior Verification in Business Process as a Service Configuration

  142. Publicly Verifiable Boolean Query Over Outsourced Encrypted Data

  143. Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage

  144. Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud

  145. Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in Cloud

  146. Towards Privacy-preserving Content-based Image Retrieval in Cloud Computing

  147. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems

  148. SeSPHR A Methodology for Secure Sharing of Personal Health Records in the Cloud

 

 

 

 

 

Leave a Reply

Call to order