takeoff projects

Btech/BE Java Cloud Computing Projects

Final year java cloud computing projects for btech students.Get the list of cloud computing projects in java for btech students.We will give guidelines about the projects,so students will get the real time knowledge and how to do the projects in a correct manner

SN PROJECT TITLES    Download Titles     ACTIONS    
1 A Distributed Auction based Framework for Scalable IaaS Provisioning in Geo Data Centers
2 A key policy attribute based temporary keyword search scheme for secure cloud storage
3 A New Lightweight Symmetric Searchable Encryption Scheme for String Identification
4 Shadow-Routing Based Dynamic Algorithms for Virtual Machine Placement in a Network Cloud
5 Catch You if You Misbehave Ranked Keyword Search Results Verification in Cloud Computing
6 Privacy Aware Data Deduplication for Side Channel in Cloud Storage
7 Efficient Traceable Authorization Search System
8 Optimizing Information Leakage in Multi cloud Storage Services
9 Modelling and Analysis of A Novel Deadline-Aware Scheduling Scheme For Cloud Computing Data Centers
10 Towards Efficient Resource Allocation for Heterogeneous Workloads in IaaS Clouds
11 Towards Privacy-preserving Content-based Image Retrieval in Cloud Computing
12 Towards Security-based Formation of Cloud
13 Improving Operational Efficiency of Applications via Cloud Computing
14 Translating algorithms to handle fully Homomorphic Encrypted data on the cloud
15 Dynamic VM scaling: provisioning and pricing through an online auction
16 Enhancing performance and energy Efficiency for Hybrid workloads in virtualized cloud Environment
17 Price based Resource allocation for Edge computing :A market equilibrium approach
SN PROJECT TITLES    Download Titles     ACTIONS    
1 Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers
2 A Collaborative Key Management Protocol in Cipher text Policy Attribute-Based Encryption for Cloud Data Sharing
3 Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation
4 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
5 An Economical and SLO-Guaranteed Cloud Storage Service across Multiple Cloud Service Providers
6 Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
7 TEES : An Efficient Search Scheme over Encrypted Data on Mobile Cloud
8 Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
9 Securing Cloud Data under Key Exposure
10 Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model Sign In Or Purchase
11 On The Security Of A Variant Of Elgamal Encryption Scheme
12 Fast Phrase Search For Encrypted Cloud Storage
13 A Lightweight Secure Data Sharing Scheme For Mobile Cloud Computing
14 Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme over Encrypted Cloud Data
15 Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
16 A New Cloud Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users
17 Two-Aggregator Topology Optimization using Multiple Paths in Data Center Networks
18 Application-Aware Big Data Deduplication in Cloud Environment
19 Virtual Machine Migration Planning in Software-Defined Networks
20 Fault Tolerant Stencil Computation on Cloud-based GPU Spot Instances
21 A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users
22 Dynamic Resource Provisioning for Energy Efficient Cloud Radio Access Networks
23 Secure Data Sharing and Searching at the Edge of Cloud Assisted Internet of Things
24 Nebula: Distributed Edge Cloud for Data Intensive Computing
25 A semi-automatic and trustworthy scheme for continuous cloud service certification
26 Empirical Analysis and Validation of Security Alerts Filtering Techniques
27 Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves- Authenticated Merkle Hash Tree
28 Using imbalance characteristic for fault-tolerant workflow scheduling in Cloud systems
29 Secure k-NN Query on Encrypted Cloud Data with Multiple Keys
30 Resource renting for periodical cloud workflow applications
31 Publicly Verifiable Boolean Query over Outsourced Encrypted Data
32 Scheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in Clouds
33 Synergy: A Hypervisor Managed Holistic Caching System
34 NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users
35 VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud
36 Minimum-Cost Cloud Storage Service across Multiple Cloud Providers
37 An Efficient Public Auditing Protocol with Novel Dynamic Structure for Cloud Data
38 Correlation Modeling and Resource Optimization for Cloud Service with Fault Recovery
39 Achieving Privacy-friendly Storage and Secure Statistics for Smart Meter Data on Outsourced Clouds
40 Quantitative Modeling and Analytical Calculation of Elasticity in Cloud Computing
41 A Robust Reputation Management Mechanism in the Federated Cloud
42 Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems
SN PROJECT TITLES       Download Titles      ACTION     
1 Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
2 Analysis of Classical Encryption Techniques in Cloud Computing
3 A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds
4 Encrypted Data Management with De-duplication in Cloud Computing
5 A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing
6 Video Stream Analysis in Clouds An Object Detection and Classification Framework for High Performance Video Analytics
7 Probabilistic Optimization of Resource Distribution and Encryption for Data Storage in the Cloud
8 Energy-efficient Adaptive Resource Management for Real-time Vehicular Cloud Services
9 Effective Modeling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload
10 Trust is Good, Control is Better Creating Secure Clouds by Continuous Auditing
11 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
12 Providing User Security Guarantees in Public Infrastructure Clouds
13 Follow-Me Cloud: When Cloud Services Follow Mobile Users
14 Stochastic Load Balancing for Virtual Resource Management in Datacenters
15 A Combinatorial Auction Mechanism for Multiple Resource Procurement in Cloud Computing
16 Crowdsourcing based Description of Urban Emergency Events using Social Media Big Data
17 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
18 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
19 An Efficient File Hierarchy Attribute-Based Encryption
20 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
21 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
22 Identity-Based Encryption with Cloud Revocation Authority and Its Applications
23 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
24 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
25 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
26 DeyPoS: De-duplicatable Dynamic Proof of Storage for Multi-User Environments
27 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
28 SecRBAC: Secure data in the Clouds
29 RepCloud: Attesting to Cloud Service Dependency
30 Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
31 A Multi queue Interlacing Peak Scheduling Method Based on Tasks Classification in Cloud Computing
32 Self-Tuning Service Provisioning for Decentralized Cloud Applications
33 Cloud workflow scheduling with deadlines and time slot availability
34 Automatically Enforcing Security SLAs in the Cloud
35 A Tutorial on Secure Outsourcing of Large-scale Computations for Big Data
36 Trust Agent-Based Behavior Induction in Social Networks
37 Fair Resource Allocation for Data-Intensive Computing in the Cloud
38 Knowledge-Based Resource Allocation for Collaborative Simulation Development in a Multi-tenant Cloud Computing Environment
39 KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
40 A Trust Label System for Communicating Trust in Cloud Services
41 Towards Trustworthy Multi-Cloud Services Communities: A Trustbased Hedonic Coalitional Game
42 Joint Energy Minimization and Resource Allocation in C-RAN with Mobile Cloud
43 Middleware-oriented Deployment Automation for Cloud Applications
44 Energy-efficient Adaptive Resource Management for Real-time Vehicular Cloud Services
45 Cloud Service Reliability Enhancement via Virtual Machine Placement Optimization
46 Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
47 Effective Modelling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload
48 An Energy-Efficient VM Prediction and Migration Framework for Overcommitted Clouds
49 Optimal Joint Scheduling and Cloud Offloading for Mobile Applications
50 A Taxonomy of Job Scheduling on Distributed Computing Systems
51 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
52 EPAS: A Sampling Based Similarity Identification Algorithm for the Cloud
53 Cost Minimization Algorithms for Data Center Management
54 Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
55 Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
56 Improved Data Transfer Scheduling and Optimization as a Service in Cloud
57 Protecting Your Right Verifiable Attribute-BasedKeyword Search with Fine-GrainedOwner-Enforced Search Authorizationin the Cloud
58 Encryption as a Service for Data Healthcare Cloud Security
59 CDA Generation and Integration for Health info Exchange based on Cloud
60 ID2S Password-Authenticated Key Exchange
61 Virtual Machine-Based Task Scheduling Algorithm in a Cloud
Download Titles
1 A Cloud Security Assessment System Based on Classifying and Grading
2 Identity-Based Encryption with Outsourced Revocation in Cloud Computing
3 Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage
4 End-to-End Delay Minimization for Scientific Workflows in Clouds under Budget Constraint
5 A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid
6 Adaptive Workflow Scheduling on Cloud Computing
7 Advances in Applications Portability and Services Interoperability among Multiple Clouds
8 Aggressive Resource Provisioning for Ensuring QoS in Virtualized Environments
9 FastRAQ A Fast Approach to Range-Aggregate Queries in Big Data Environments
10 An Efficient Green Control Algorithm in Cloud Computing for Cost Optimization
11 Olympus The Cloud of Sensors
12 CHive Bandwidth Optimized Continuous Querying in Distributed Clouds
13 OPoR Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
14 Cloud Brokering Current Practices and Upcoming Challenges
15 Cloud Federations in the Sky Formation Game and Mechanism
16 Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds
17 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
18 Three-server swapping for access confidentiality
19 T-Broker A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
20 Stealthy Denial of Service Strategy in Cloud Computing
21 SelCSP A Framework to Facilitate Selection of Cloud Service Providers
22 Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
23 Data as a Currency and Cloud-Based Data Lockers
24 Reactive Resource Provisioning Heuristics for Dynamic Data flows on Cloud Infrastructure
25 Deploying Large-Scale Datasets on-Demand in the Cloud Treats and Tricks on Data Distribution
26 Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
27 Placing Virtual Machines to Optimize Cloud Gaming Experience
28 Implementing Design Diversity Using Portfolio Thinking to Dynamically and Adaptively Manage the Allocation of Web Services in the Cloud
29 Personal Cloud Storage Benchmarks and Comparison
30 Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
31 An Intelligent Economic Approach for Dynamic Resource Allocation in Cloud Services
32 A Hybrid Cloud Approach for Secure Authorized Deduplication
33 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
34 A Scalable and Reliable Matching Service for Content-BasedPublish/Subscribe Systems
35 A Secure and Dynamic Multi-keyword Ranked Search Schemeover Encrypted Cloud Data
36 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
37 An Authenticated Trust and Reputation Calculation andManagement System for Cloud and Sensor Networks Integration
38 Audit-Free Cloud Storage via Deniable Attribute-based Encryption
39 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
40 CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
41 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
42 Enabling Cloud Storage Auditing With Key-Exposure Resistance
43 Enabling Fine-grained Multi-keyword Search SupportingClassified Sub-dictionaries over Encrypted Cloud Data
44 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
45 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
46 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
47 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
48 Public Integrity Auditing for Shared Dynamic Cloud Data withGroup User Revocation
49 Secure Auditing and Deduplicating Data in Cloud
50 Stealthy Denial of Service Strategy in Cloud Computing
51 Security and privacy in cloud computing
52 A Density-aware dataencryption scheme for outsourced databases in cloud computing
53 An Execution Environment Oriented Approach for scheduling dependent task of,.
54 Deploying Large-Scale Datasets on-Demand in the Cloud Treats
55 MobiContext A Context-aware Cloud-Based Venue Recommendation Framework
1 Oruta Privacy Preserving Public Auditing for Shared Data in the Cloud
2 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
3 Key Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
4 On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multi
5 Privacy Preserving Back-Propagation Neural Network Learning Made Practical
6 A Hybrid Cloud Approach for Secure Authorized Deduplication
7 Automatic Scaling of Internet Applications for Cloud Computing Services
8 CCIoT CMfg Cloud Computing and Internet of Things-Based Cloud Manufacturing Service System
9 Cloud Service Negotiation in Internet of Things Environment A Mixed Approach
10 CLOUDQUAL A Quality Model for Cloud Services
11 Developing Vehicular Data Cloud Services in the IoT Environment
12 Enabling Smart Cloud Services Through Remote Sensing An Internet of Everything
13 Toward Trans coding as a Service in a Multimedia Cloud Energy-Efficient Job-Dispatching
14 Integrity for Join Queries in the Cloud
15 Dynamic Heterogeneity Aware Resource Provisioning in the cloud
16 Scalable Analytics for IAAS Cloud Availability
17 Transformation-Based Monetary Cost Optimizations for Workflows in the Cloud
18 Data Similarity Aware Computation Infrastructure for the Cloud
20 Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
21 Dynamic Cloud Pricing for Revenue Maximization
22 Hybrid Attribute and Re-Encryption-Based Key Management for Secure and Scalable
23 Privacy Preserving Multi keyword Ranked Search over Encrypted Cloud Data
24 Probabilistic Consolidation of Virtual Machines in Self Organizing Cloud Data Centers
25 Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage
26 An Efficient and Trustworthy Resource Sharing Platform for Collaborative
27 Identity Based Distributed Provable Data Possession in Multi-Cloud Storage
28 A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce
29 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS
30 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
31 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority
32 PACK Prediction Based Cloud Bandwidth and Cost Reduction System
33 Towards Differential Query Services in Cost Efficient Clouds
34 Decreasing Impact of SLA Violations: A Proactive Resource Allocation Approach
35 To Design a framework to compare cloud storage providers dropbox, google drive,box,one drive
36 Web Image Re Ranking Using Query Specific Sematic Signatures
37 optimistic fuzzy based signature identification in cloud using datamining analysis
38 Sampling Online social Networks
39 Consistency as a Service Auditing Cloud Consistency
1 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS
2 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
3 CloudMoV Cloud-based Mobile Social TV
4 Privacy Preserving Public Auditing for Secure Cloud Storage
5 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing
6 Error Tolerant Resource Allocation and Payment Minimization for Cloud System
7 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear
8 Mona Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
9 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage
10 Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization
11 Attribute Based Encryption With Verifiable Outsourced Decryption
12 Mining Contracts for Business Events and Temporal Constraints in Service Engagements
13 Winds of Change From Vendor Lock In to the Meta Cloud
14 Ames cloud a framework of adaptive mobile video streaming and efficient
15 Cloud Computing For Mobile Users: Can Offloading Computation Save Energy?
16 A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy preserving of intermediate datasets
17 Hint based execution of workloads in clouds with nefeli
18 Fog Computing Mitigating Insider Data Theft Attacks in the Cloud
19 An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
20 Load Rebalancing for Distributed File Systems in Clouds
1 A Cloud Computing Security From Single to Multi Clouds
2 A Secure Intrusion detection system against DDOS attack in Wireless Mobile.
3 Ensuring Data Storage Security in Cloud Computing
4 Towards Secure and Dependable Storage Services in Cloud Computing
1 Authorized Private Keyword Search over Encrypted Data in Cloud Computing
2 Enabling Efficient Fuzzy Keyword Search over Encrypted Data in
3 Collaborative Writing Support Tools on the Cloud
Call us : (+91) 9030333433 / 08772261612
Mail us :