ABSTRACT: The Personal Health Record (PHR) is an emerging framework of health data exchange, which is regularly stored at cloud servers. Be that as it may, there are as still different privacy problems as personal health data could be discovered to unauthorized people. To ensure the patient’s control over to their own particular PHRs, it is […]
.NET PROJECTS
CC12-Energy-Efficient Scheduling of Servers with Multi-Sleep Modes for Cloud Data Center
ABSTRACT: In a cloud data center, servers are always over-provisioned in an active state to meet the peak demand of requests, wasting a large amount of energy as a result. One of the options to reduce the power utilization of server farms is to diminish the quantity of sit still servers or to switch idle […]
CC10-Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage
ABSTRACT: Proof of Storage (POR or PDP) is a cryptographic tool, which enables information proprietor or third-party auditor to audit integrity of information stored remotely in a cloud storage server, without keeping a local copy of information or downloading information back during auditing. We observe that all existing publically verifiable POS plans to experience the ill effects of a serious […]
CC09- Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server
ABSTRACT: Outsourcing paradigm is one of the most attractive benefits of cloud computing, where computation workloads can be outsourced to cloud servers by the resource-constrained devices, for example, RFID tags. With this paradigm, cloud clients can avoid setting up their own infrastructures. Accordingly, some new challenges, for example, security and checkability, are inevitably introduced. In this project, […]
CC08- Dynamic VM Scaling: Provisioning and Pricing through an Online Auction
ABSTRACT: The present IaaS cloud allows dynamic scaling of VMs allocated to a client, according to real-time demand of the client. There are two kinds of scaling: horizontal scaling (scale-out) by distributing more VM instances to the client, and vertical scaling (scale-up) by boosting assets of VMs claimed by the client. It has been a daunting issue […]
CC07-A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
ABSTRACT: The temporary keyword search on confidential information in a cloud environment is the primary focal point of this research. The cloud suppliers are not fully trusted. In this way, it is important to outsource information in the encrypted form. In the attribute-based keyword search (ABKS) plans, the authorized clients can generate some search tokens and […]
CC06-A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
ABSTRACT: With the popularity of cloud computing, cell phone devices can store/retrieve personal information from anywhere at any time.Consequently, the information security issue in mobile cloud turns out to be increasingly severe and prevents the improvement of mobile cloud. There are substantial studies that have been directed to enhance the cloud security. Notwithstanding, the greater part of […]
CC04-Resource provisioning for task-batch based workflows with deadlines in public clouds
ABSTRACT: Distributed computing is the most recent conveyed registering worldview and it offers colossal chances to illuminate extensive scale logical issues. Notwithstanding, it presents different difficulties that should be tended to so as to be productively used for work process applications. Despite the fact that the work process booking issue has been broadly considered, there are not […]
CCO5-Cost Optimization for Dynamic Replication and Migration of Data in Cloud Data Centers
ABSTRACT: Cloud Storage Providers (CSPs) offer geographically information stores providing a few storage classes with various prices. An important issue looking by cloud clients is how to exploit these capacity classes to serve an application with a time-varying workload on its items at least cost. This cost consists of residential cost (i.e., storage, Put and […]
CCO3-TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud
ABSTRACT: Cloud storage gives a convenient, massive, and scalable storage at a low cost, however, information protection is a major concern that keeps clients from storing files on the cloud trustingly. One method for improving privacy from information proprietor point is to encrypt the records before outsourcing them into the cloud and decrypt the documents after […]