Search - Cloud Computing
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments
Aim:The main aim of this project is Secure and efficient file storage and sharing via authenticated physical devices, data can be shared among n number of client connected in the cloud. Abstract: The data that stored in clouds is highly sensitive, for example, medical records and social networks information, person information,..
A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing
Aim:The main aim of this project is to combined approach to security and cyber insurance provisioning in the cloud based resources. Synopsis:In this paper we have presented a joint approach to security and cyber insurance provisioning in the cloud. Using a stochastic optimization, we have presented a method of optimally provisioning both ser..
A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud
AimThe main aim of this project is to preserve the outsourced data in cloud through gateway encryption, and to implement personalized search over the encrypted data in a secure way by NLP process without downloading and decrypting the entire group member file contents. Abstract Research in cloud computi..
An IoT-Based Intelligent System for Real-Time Parking Monitoring and Automatic Billing
Aim: The aim of the project, IOT based fully automated parking system for vehicle parking stations implemented by microcontroller and the RFID module. The main aim of this project is reduces human interaction in parking area.Abstract: &..
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
Aim: The main aim of this project is to achieve new distributed de-duplication systems we present an attribute-based storage system with secure deduplication in a hybrid cloud setting with higher reliability. Synopsis:  ..
Crypt Cloud+: Secure and Expressive Data Access Control for Cloud Storage
Aim:The main aim of this project is to provide integrity of an organization data which is in public cloud.Synopsis:Data owners will store their data in public cloud along with encryption and particular set of attributes to access control on the cloud data. While uploading the data into public cloud they will assign some attribute set to their ..
Crypt-DAC Cryptographically Enforced Dynamic Access Control in the Cloud
Aim: The main aim of this project is to provide integrity of an organization data which is in public cloud.Synopsis: Data owners will store their data in public cloud along with encryption and particular set of attributes to..
Designing Secure and Efficient Biometric-Based Secure Access Mechanism for Cloud Services
Aim: The main aim of the project is used to derive a unique identity from the user's biometric data, which is further used to generate the user's private key. Proposed SystemIn Proposed system, we introduced secure and efficient file storage and sharing cloud environment using Remote cloud. Mutual authentication is very important between..
Efficient Regular Language Search for Secure Cloud Storage
Aim: The main aim of this project is to provide integrity of an organization data’s which is in public cloud and retrieving data’s in encrypted form and retrieving information. Synopsis: C..
Heterogeneous Data Storage Management with Deduplication in Cloud Computing
Aim: The main aim of this project is to control file duplication in cloud computing.Synopsis: Cloud storage as one of the most important services of cloud computing. Data ownership proof is an essential process of data deduplication, especially for encr..
IoT Based Smart Helmet For Construction Workers
AIM: Safety is a major problem in construction works. This project aims to develop smart wearable devices such as band and helmet using various sensors that will help in monitoring the health and safety of workers.Introduction:  ..
OTPaaS One Time Password as a Service
Aim: The main aim of this project is to build a secure, privacy-friendly, and sound OTP provider in the cloud to outsource the second factor of authentication. Synopsis: Password-based authentication is considered inadequate by users as many online ..
Privacy Protection in Interactive Content Based Image Retrieval
Aim: To propose a secure framework for outsourced privacy-preserving storage and retrieval in large shared image repositories.Synopsis: Cloud computing is a new form of internet-based computing that provides shared computer processing resources and data ..
Privacy-Preserving Outsourced Support Vector Machine Design for Secure Drug Discovery
AimTo allow the cloud to securely use multiple drug formula providers’ drug formulas to train Support Vector Machine (SVM) and Naïve Bayes (NB) provided by the analytical model provider.AbstractIn this paper, we propose a framework for privacy-preserving outsourced drug discovery in the cloud, which we refer to as POD. Specifically, POD is desi..
Similarity Search for Encrypted Images in Secure Cloud Computing
Aim: To propose a secure framework for outsourced privacy-preserving storage and retrieval in large shared image repositories.Synopsis: Cloud computing is a new form of internet-based computing that provides shared computer processing resources and d..