ABSTRACT: Secure search over encrypted remote information is crucial in cloud computing to guarantee the data privacy and usability. To prevent unauthorized data utilization, fine-grained access to control is essential in the multi-client system. However, the authorized client may initially leak the secret key for financial benefit. Consequently, tracing and revoking the malicious client who […]
.NET PROJECTS
CC15-A New Lightweight Symmetric Searchable Encryption Scheme for String Identification
ABSTRACT: In this project, we give an efficient and simple-to-implement symmetric searchable encryption scheme (SSE) for string search, which takes one round of communication, O(n) times of calculations over n documents. Not at all like previous scheme, we utilize hash-chaining rather than the chain of encryption tasks for an index generation, which makes it reasonable […]
CC14-Disaggregated Cloud Memory with Elastic Block Management
ABSTRACT: With the growing importance of in-memory data processing, cloud service providers have launched large memory virtual machine services to accommodate memory-intensive workloads. Such large memory services utilizing low volume scaled-up machines are far less cost-proficient than scaled-out services consisting of high volume commodity servers. By exploiting memory utilization imbalance across over cloud nodes, disaggregated […]
CC13-Provably secure and lightweight identity-based authenticated data sharing protocol for the cyber-physical cloud environment
ABSTRACT: Secure and efficient file storage and sharing by means of authenticated physical devices remain challenging to accomplish in a cyber-physical cloud environment, especially because of the diversity of devices used to get to the services and data. In this manner in this project, we exhibit a lightweight identity based authenticated data sharing protocol to […]
CC11-SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud
ABSTRACT: The Personal Health Record (PHR) is an emerging framework of health data exchange, which is regularly stored at cloud servers. Be that as it may, there are as still different privacy problems as personal health data could be discovered to unauthorized people. To ensure the patient’s control over to their own particular PHRs, it is […]
CC12-Energy-Efficient Scheduling of Servers with Multi-Sleep Modes for Cloud Data Center
ABSTRACT: In a cloud data center, servers are always over-provisioned in an active state to meet the peak demand of requests, wasting a large amount of energy as a result. One of the options to reduce the power utilization of server farms is to diminish the quantity of sit still servers or to switch idle […]
CC10-Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage
ABSTRACT: Proof of Storage (POR or PDP) is a cryptographic tool, which enables information proprietor or third-party auditor to audit integrity of information stored remotely in a cloud storage server, without keeping a local copy of information or downloading information back during auditing. We observe that all existing publically verifiable POS plans to experience the ill effects of a serious […]
CC09- Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server
ABSTRACT: Outsourcing paradigm is one of the most attractive benefits of cloud computing, where computation workloads can be outsourced to cloud servers by the resource-constrained devices, for example, RFID tags. With this paradigm, cloud clients can avoid setting up their own infrastructures. Accordingly, some new challenges, for example, security and checkability, are inevitably introduced. In this project, […]
CC08- Dynamic VM Scaling: Provisioning and Pricing through an Online Auction
ABSTRACT: The present IaaS cloud allows dynamic scaling of VMs allocated to a client, according to real-time demand of the client. There are two kinds of scaling: horizontal scaling (scale-out) by distributing more VM instances to the client, and vertical scaling (scale-up) by boosting assets of VMs claimed by the client. It has been a daunting issue […]
CC07-A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
ABSTRACT: The temporary keyword search on confidential information in a cloud environment is the primary focal point of this research. The cloud suppliers are not fully trusted. In this way, it is important to outsource information in the encrypted form. In the attribute-based keyword search (ABKS) plans, the authorized clients can generate some search tokens and […]