ABSTRACT: Secure document storage and retrieval are one of the hottest research headings in cloud computing. Despite the fact that many searchable encryption plans have been proposed, few of them bolster effective retrieval over the documents which are encrypted based of their attributes. In this project, a hierarchical attribute-based encryption scheme is first designed for […]
.NET MINI PROJECTS
KDE07-PrivateGraph: Privacy-Preserving Spectral Analysis of Encrypted Graphs in the Cloud
ABSTRACT: With the wide deployment of public clouds, proprietors of big graphs need to utilize the cloud to deal with the scalability issues. However, the privacy and ownership for graphs in the cloud has turned into a major concern. In this project, we examine privacy-preserving algorithms for graph spectral analysis of outsourced encrypted graph in […]
KDE06-Secure and Efficient Skyline Queries on Encrypted Data-knowledge
ABSTRACT: Outsourcing data to cloud server gives a cost-effective way approach to support large-scale data storage and query processing. Be that as it may, because of security and privacy concerns, sensitive information (e.g., medical records) should be protected from the cloud server and other unauthorized clients. One approach is to outsource encrypted data to the cloud server […]
KDE05-DeepClue: Visual Interpretation of Text-based Deep Stock Prediction-knowledge
ABSTRACT: The recent advance of deep learning has enabled trading algorithms to predict stock value developments all the more accurately. Unfortunately, there is a critical gap in the real-world deployment of this breakthrough. This project presents DeepClue, a system develop to connect text-based deep learning models and end clients through visually interpreting the key elements learned […]
KDE04-Location Inference for Non-geotagged Tweets in User Timelines
ABSTRACT: As social media clients are increasingly going mobile, different location based Services (LBS) have been sent via web-based social media like Twitter. The success of them heavily relies upon the availability and accuracy of clients’ location data. Be that as it may, just a little fraction of tweets are geo-tagged. In this way, it […]
KDE03-Modeling and Predicting Community Structure Changes in Time-Evolving Social Networks
ABSTRACT: As time evolves, a community in a social network may experience different changes known as critical events. For example, a community can either split into a few different communities, project into a larger community, shrink to a smaller community, remain stable or merge into another network. Prediction of critical events has attracted in expanding […]
KDE02-A New Robust Approach for Reversible Database Watermarking With Distortion Control
ABSTRACT: These days information is crucial in numerous fields, for example, such as, medicine, science, and business, where databases are utilized effectively for data sharing. In any case, the databases face the risk of being pirated, stolen or abused, which may bring about a lot of security threats concerning proprietorship rights, data tempering and privacy protection. […]
PDC01-Budget and Deadline Aware e-Science Workflow Scheduling in Clouds
ABSTRACT: Essential science is becoming ever more computationally intensive, expanding the requirement for large-scale compute and storage resources, be they inside a High-Performance Computer cluster, or most recently within the cloud. As a rule, the large-scale scientific calculation is represented to as a workflow for planning and runtime provisioning. Such planning turns into a much additionally challenging […]
MC02-Dynamic Connectivity Establishment and Cooperative Scheduling for QoS-Aware Wireless Body Area Networks
ABSTRACT: In a hospital environment, the total number of Wireless Body Area Network (WBAN) equipped patients asking ubiquitous healthcare services benefits in an area increments fundamentally. Along these lines, increased traffic load and group-based mobility of WBANs degrades the execution of each WBAN fundamentally, concerning service delay and network throughput. What’s more, the mobility of […]
KDE01-Exploiting the Dynamic Mutual Influence for Predicting Social Event Participation
ABSTRACT: It is commonly observed that social events are organized through online social network services, and in this manner, there are vested interests in studying event-oriented social gathering through SNSs. The focal point of existing studies has been put on the analysis of event profiles or individual participation records. While there is the dynamic mutual […]