+91 9008001602      080 - 40969981     info@technofist.com

Cloud Computing Projects

CLOUD COMPUTING:

Technofist provides latest IEEE 2017-18 software projects for final year students in cloud computing. Technofist is one of the best final year project institute for CSE ,IT engineering students for implementing cloud computing based project. Cloud computing refers to the way of storing the data remotely, irrespective of type of cloud is used. It may be Private cloud, Public cloud or Hybrid cloud.

Technically cloud computing is defined as virtualization and centralization of huge volumes of data. This category consists of cloud computing 2017-18 projects list and cloud computing project abstract, In technofist Latest IEEE 2017-18 cloud computing final year projects projects a available for cse students. Here we provide latest collection of cloud computingproject topics with their abstracts. These projects are developed using latest cloud technology concepts.

  1. COST MINIMIZATION ALGORITHMS FOR DATA CENTER MANAGEMENT
  2. ATTRIBUTE-BASED STORAGE SUPPORTING SECURE DEDUPLICATION OF ENCRYPTED DATA IN CLOUD
  3. EFFICIENT RESOURCE CONSTRAINED SCHEDULING USING PARALLEL TWO-PHASE BRANCH-AND-BOUND HEURISTICS
  4. IDENTITY-BASED DATA OUTSOURCING WITH COMPREHENSIVE AUDITING IN CLOUDS
  5. PLAN: JOINT POLICY- AND NETWORK-AWARE VM MANAGEMENT FOR CLOUD DATA CENTERS
  6. RAAC: ROBUST AND AUDITABLE ACCESS CONTROL WITH MULTIPLE ATTRIBUTE AUTHORITIES FOR PUBLIC CLOUD STORAGE
  7. LIVE DATA ANALYTICS WITH COLLABORATIVE EDGE AND CLOUD PROCESSING IN WIRELESS IOT NETWORKS
  8. A GENERAL FRAMEWORK FOR EDITED VIDEO AND RAW VIDEO SUMMARIZATION
  9. A SEMI-AUTOMATIC AND TRUSTWORTHY SCHEME FOR CONTINUOUS CLOUD SERVICE CERTIFICATION CONSTRAINTS
  10. A CLOUD-INTEGRATED,MULTILAYERED, AGENT-BASED CYBER-PHYSICAL SYSTEM ARCHITECTURE
  11. A COLLISION-MITIGATION CUCKOO HASHING SCHEME FOR LARGE-SCALE STORAGE SYSTEMS
  12. OPTIMIZING GREEN ENERGY, COST, AND AVAILABILITY IN DISTRIBUTED DATA CENTERS
  13. IDENTITY-BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE
  14. PRIVACY-PRESERVING DATA ENCRYPTION STRATEGY FOR BIG DATA IN MOBILE CLOUD COMPUTING
  15. TWO-FACTOR DATA ACCESS CONTROL WITH EFFICIENT REVOCATION FOR MULTI-AUTHORITY CLOUD STORAGE SYSTEMS
  16. VEHICULAR CLOUD DATA COLLECTION FOR INTELLIGENT TRANSPORTATION SYSTEMS
  17. PRACTICAL PRIVACY-PRESERVING MAPREDUCE BASED K-MEANS CLUSTERING OVER LARGE-SCALE DATASET
  18. FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES
  19. E-SCHOOL TECHNO BUS BASED ON CLOUD COMPUTING SERVICES
  20. ON TRAFFIC-AWARE PARTITION AND AGGREGATION IN MAPREDUCE FOR BIG DATA APPLICATIONS
  21. A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA
  22. AN EFFICIENT PRIVACY-PRESERVING RANKED KEYWORD SEARCH METHOD
  23. DIFFERENTIALLY PRIVATE ONLINE LEARNING FOR CLOUD-BASED VIDEO RECOMMENDATION WITH MULTIMEDIA BIG DATA IN SOCIAL NETWORKS
  24. SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY OF LINEAR PROGRAMMING
  25. DUAL-SERVER PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH FOR SECURE CLOUD STORAGE.
  26. DEYPOS: DEDUPLICATABLE DYNAMIC PROOF OF STORAGE FOR MULTI-USER ENVIRONMENTS
  27. DROPS: DIVISION AND REPLICATION OF DATA INCLOUD FOR OPTIMAL PERFORMANCE AND SECURITY
  28. PHOENIX: A MAPREDUCE IMPLEMENTATION WITH NEWENHANCEMENTS
  29. A SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD
  30. AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUTING
  31. AN EFFICIENT PRIVACY-PRESERVING RANKED KEYWORD SEARCH METHOD
  32. CDA GENERATION AND INTEGRATION FOR HEALTH INFORMATION EXCHANGE BASED ON CLOUD COMPUTING SYSTEM
  33. CIRCUIT CIPHERTEXT-POLICY ATTRIBUTE-BASED HYBRID ENCRYPTION WITH VERIFIABLE DELEGATION IN CLOUD COMPUTING
  34. CLOUDARMOR: SUPPORTING REPUTATION-BASED TRUST MANAGEMENT FOR CLOUD SERVICES
  35. CONDITIONAL IDENTITY-BASED BROADCAST PROXY RE-ENCRYPTION AND ITS APPLICATION TO CLOUD EMAIL
  36. CONJUNCTIVE KEYWORD SEARCH WITH DESIGNATED TESTER AND TIMING ENABLED PROXY RE-ENCRYPTION FUNCTION FOR E-HEALTH CLOUDS
  37. DIPLOCLOUD: EFFICIENT AND SCALABLE MANAGEMENT OF RDF DATA IN THE CLOUD
  38. DUAL-SERVER PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH FOR SECURE CLOUD STORAGE
  39. DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA
  40. ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
  41. FINE-GRAINED TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES
  42. IDENTITY-BASED ENCRYPTION WITH CLOUD REVOCATION AUTHORITY AND ITS APPLICATIONS
  43. PROTECTING YOUR RIGHT: VERIFIABLE ATTRIBUTE-BASED KEYWORD SEARCH WITH FINE-GRAINED OWNER-ENFORCED SEARCH AUTHORIZATION IN THE CLOUD
  44. REAL-TIME SEMANTIC SEARCH USING APPROXIMATE METHODOLOGY FOR LARGE-SCALE STORAGE SYSTEMS
  45. SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED ENCRYPTION
  46. SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY OF LINEAR PROGRAMMING
  47. TMACS: A ROBUST AND VERIFIABLE THRESHOLD MULTI-AUTHORITY ACCESS CONTROL SYSTEM IN PUBLIC CLOUD STORAGE
  48. A MODIFIED HIERARCHICAL ATTRIBUTE-BASED ENCRYPTION ACCESS CONTROL METHOD FOR MOBILE CLOUD COMPUTING
  49. A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
  50. CHARM A COST EFFICIENT MULTI CLOUD DATA HOSTING SCHEME WITH HIGH AVAILABILITY
  51. AUDITFREE CLOUD STORAGE VIA DENIABLE ATTRIBUTE BASED ENCRYPTION

 

download abstract

FOR CLOUD COMPUTING PROJECTS

Back to Top