ABSTRACT: These days information is crucial in numerous fields, for example, such as, medicine, science, and business, where databases are utilized effectively for data sharing. In any case, the databases face the risk of being pirated, stolen or abused, which may bring about a lot of security threats concerning proprietorship rights, data tempering and privacy protection. […]
.NET PROJECTS
PDC01-Budget and Deadline Aware e-Science Workflow Scheduling in Clouds
ABSTRACT: Essential science is becoming ever more computationally intensive, expanding the requirement for large-scale compute and storage resources, be they inside a High-Performance Computer cluster, or most recently within the cloud. As a rule, the large-scale scientific calculation is represented to as a workflow for planning and runtime provisioning. Such planning turns into a much additionally challenging […]
MC02-Dynamic Connectivity Establishment and Cooperative Scheduling for QoS-Aware Wireless Body Area Networks
ABSTRACT: In a hospital environment, the total number of Wireless Body Area Network (WBAN) equipped patients asking ubiquitous healthcare services benefits in an area increments fundamentally. Along these lines, increased traffic load and group-based mobility of WBANs degrades the execution of each WBAN fundamentally, concerning service delay and network throughput. What’s more, the mobility of […]
KDE01-Exploiting the Dynamic Mutual Influence for Predicting Social Event Participation
ABSTRACT: It is commonly observed that social events are organized through online social network services, and in this manner, there are vested interests in studying event-oriented social gathering through SNSs. The focal point of existing studies has been put on the analysis of event profiles or individual participation records. While there is the dynamic mutual […]
MC01-Selfish Decentralized Computation Offloading for Mobile Cloud Computing in Dense Wireless Networks
ABSTRACT: Offloading computation to a mobile cloud is a promising solution to augment the calculation capabilities of the cell phone devices. In this project, we consider selfish mobile phones in a dense wireless network, in which individual mobile phones can offload calculations through multiple access point or through the base station to a mobile cloud to […]
DSC02-Enabling Efficient User Revocation in Identity-based Cloud Storage Auditing for Shared Big Data
ABSTRACT: Cloud storage auditing plans for shared data refer to checking the integrity of the cloud data shared by a group of clients. The client revocation is commonly supported in such plans, as clients might be subject to group membership changes for different reasons. Already, the computational overhead for client revocation in such plans is […]
DSC01-Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks
ABSTRACT: Location-based service (LBS) gives an ever increasing number of convenience to people. However, it brings opportunities to leak clients’ privacy. The greater part of the existing privacy-preserving LBS plans depend on traditional hardness issues, for example, the integer factorization or the discrete logarithm problems. However, with the advancement of a quantum calculation, these traditional hardness issues […]
SC06-SEPDP Secure and Efficient Privacy-Preserving Provable Data Possession in Cloud Storage
ABSTRACT: Cloud computing is a developing paradigm to give reliable and resilient infrastructure enabling the clients (data proprietors) to store their data and the data consumers (clients) can access the data from cloud servers. This paradigm reduces the storage and maintenance cost of the data proprietor. In the meantime, the data proprietor loses the physical […]
SC07-Achieving Fairness-aware Two-level Scheduling for Heterogeneous Distributed Systems
ABSTRACT: In a heterogeneous distributed system made out of different kinds of computing platforms, for example, supercomputers, gird, and clouds, a two-level scheduling methodology can be utilized to effectively distributed resources of the platforms to clients in the first level, and map tasks of the clients in nodes for every platform in the second-level for […]
SC04-Secure Data Group Sharing and Dissemination with Attribute and Time Conditions
ABSTRACT: Cloud computing has increasingly popular among clients and business around the world. Although cryptographic schemes can give data protection to clients in public cloud, a few issues likewise remain problematic, for example, secure data group information and fine-grained access control of time-sensitive data. In this project, we propose an identity-based data group sharing and […]