Cloud Computing Titles

IEEE 2017-2018 CSE project titles download

DOT NET

Code Titles IEEE/Year Abstract
REDN-1 Cloud Security Ecosystem for Data Security and Privacy 2017 Download
REDN-2 Enterprise Architecture Modeling Based on Cloud Computing Security Ontology as a Reference Model 2017 Download
REDN-3 A Cloud Access Security Broker Based Approach for Encrypted Data Search and Sharing 2017 Download
REDN-4 Efficient Privacy Preserving Integrity Checking Model for Cloud Data Storage Security 2017 Download
REDN-5 Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing 2017 Download
REDN-6 Multi-Factor Authentication with OpenId in Virtualized Environments 2017 Download
REDN-7 Full Verifiability for Outsourced Decryption in Attribute Based Encryption 2017 Download
REDN-8 Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud 2017 Download
REDN-9 Trusting Cloud Service Providers: Trust Phases and a Taxonomy of Trust Factors 2017 Download
REDN-10 Accelerated Search over Encrypted Cloud Data 2017 Download
REDN-11 Secure k-NN Query on Encrypted Cloud Data with Multiple Keys 2017 Download
REDN-12 Privacy Protection based Access Control Scheme in Cloud-based Services 2017 Download
REDN-13 Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems 2017 Download
REDN-14 A New E-Voting Scheme Based on Revised Simplified Verifiable Re-encryption Mixnet 2017 Download
REDN-15 Secure and Efficient Cloud Data Deduplication with Randomized Tag 2017 Download
REDN-16 Securing Cloud Data under Key Exposure 2017 Download
REDN-17 Cloud Data Auditing Techniques with a Focus on Privacy and Security 2017 Download
REDN-18 Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers 2017 Download
REDN-19 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption 2017 Download
REDN-20 Energy-Aware Scheduling with Uncertain Execution Time for Real-Time Systems 2017 Download

JAVA

REJAVA-1 A Multilevel Access Control Scheme for Data Security in Transparent Computing 2017 Download
REJAVA-2 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the cloud 2017 Download
REJAVA-3 An Efficient Public Auditing Protocol with Novel Dynamic Structure for Cloud Data 2017 Download
REJAVA-4 Cloud Data Auditing Techniques with a Focus on Privacy and Security 2017 Download
REJAVA-5 Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud Storage 2017 Download
REJAVA-6 Heterogeneous Data Storage Management with Deduplication in Cloud Computing 2017 Download
REJAVA-7 Full Verifiability for Outsourced Decryption in Attribute Based Encryption 2017 Download
REJAVA-8 Minimum-Cost Cloud Storage Service across Multiple Cloud Providers 2017 Download
REJAVA-9 Privacy protection based access control scheme in cloud-based services 2017 Download
REJAVA-10 Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data 2017 Download
REJAVA-11 Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model 2017 Download
REJAVA-12 Publicly Verifiable Boolean Query over Outsourced Encrypted Data 2017 Download
REJAVA-13 Secure multi-keyword search supporting dynamic update and ranked retrieval 2017 Download
REJAVA-14 Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving 2017 Download
REJAVA-15 Graphical Password 2017 Download