ABSTRACT: With the growing importance of in-memory data processing, cloud service providers have launched large memory virtual machine services to accommodate memory-intensive workloads. Such large memory services utilizing low volume scaled-up machines are far less cost-proficient than scaled-out services consisting of high volume commodity servers. By exploiting memory utilization imbalance across over cloud nodes, disaggregated […]
.NET MINI PROJECTS
CC13-Provably secure and lightweight identity-based authenticated data sharing protocol for the cyber-physical cloud environment
ABSTRACT: Secure and efficient file storage and sharing by means of authenticated physical devices remain challenging to accomplish in a cyber-physical cloud environment, especially because of the diversity of devices used to get to the services and data. In this manner in this project, we exhibit a lightweight identity based authenticated data sharing protocol to […]
CC11-SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud
ABSTRACT: The Personal Health Record (PHR) is an emerging framework of health data exchange, which is regularly stored at cloud servers. Be that as it may, there are as still different privacy problems as personal health data could be discovered to unauthorized people. To ensure the patient’s control over to their own particular PHRs, it is […]
CC12-Energy-Efficient Scheduling of Servers with Multi-Sleep Modes for Cloud Data Center
ABSTRACT: In a cloud data center, servers are always over-provisioned in an active state to meet the peak demand of requests, wasting a large amount of energy as a result. One of the options to reduce the power utilization of server farms is to diminish the quantity of sit still servers or to switch idle […]
CC10-Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage
ABSTRACT: Proof of Storage (POR or PDP) is a cryptographic tool, which enables information proprietor or third-party auditor to audit integrity of information stored remotely in a cloud storage server, without keeping a local copy of information or downloading information back during auditing. We observe that all existing publically verifiable POS plans to experience the ill effects of a serious […]
CC09- Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server
ABSTRACT: Outsourcing paradigm is one of the most attractive benefits of cloud computing, where computation workloads can be outsourced to cloud servers by the resource-constrained devices, for example, RFID tags. With this paradigm, cloud clients can avoid setting up their own infrastructures. Accordingly, some new challenges, for example, security and checkability, are inevitably introduced. In this project, […]
CC08- Dynamic VM Scaling: Provisioning and Pricing through an Online Auction
ABSTRACT: The present IaaS cloud allows dynamic scaling of VMs allocated to a client, according to real-time demand of the client. There are two kinds of scaling: horizontal scaling (scale-out) by distributing more VM instances to the client, and vertical scaling (scale-up) by boosting assets of VMs claimed by the client. It has been a daunting issue […]
CC07-A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
ABSTRACT: The temporary keyword search on confidential information in a cloud environment is the primary focal point of this research. The cloud suppliers are not fully trusted. In this way, it is important to outsource information in the encrypted form. In the attribute-based keyword search (ABKS) plans, the authorized clients can generate some search tokens and […]
CC06-A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
ABSTRACT: With the popularity of cloud computing, cell phone devices can store/retrieve personal information from anywhere at any time.Consequently, the information security issue in mobile cloud turns out to be increasingly severe and prevents the improvement of mobile cloud. There are substantial studies that have been directed to enhance the cloud security. Notwithstanding, the greater part of […]
CC04-Resource provisioning for task-batch based workflows with deadlines in public clouds
ABSTRACT: Distributed computing is the most recent conveyed registering worldview and it offers colossal chances to illuminate extensive scale logical issues. Notwithstanding, it presents different difficulties that should be tended to so as to be productively used for work process applications. Despite the fact that the work process booking issue has been broadly considered, there are not […]