IEEE 2018-2019 : Cloud Computing Projects

DHS Informatics providing latest 2018-2019 IEEE projects on IEEE Cloud Computing Projects bangalore | 2018 IEEE Cloud Computing Projects for the final year engineering students. DHS Informatics trains all students to develop their project with good idea what they need to submit in college to get good marks. DHS Informatics offers placement training in Bangalore and the program name is OJT – On Job Training, job seekers as well as final year college students can join in this placement training program and job opportunities in their dream IT companies. We are providing IEEE Cloud Computing Projects Bangalore | CSE ISE Cloud Computing Projects for B.E / B.TECH, M.TECH, MCA, BCA, DIPLOMA students from more than two decades.

cloud computing

Abstract: Bio-metric identification has become increasingly popular in recent years.With the development of cloud computing, database owners are motivated to outsource the large size of bio metric data and identification tasks to the cloud to get rid of the expensive storage and computation costs, which, however, brings potential threats to users’ privacy. In this paper, we propose an efficient and privacy-preserving bio-metric identification outsourcing scheme. Specially, the bio metric To execute a bio metric identification, the database owner encrypts the query data and submits it to the cloud. The cloud performs identification operations over the encrypted database and returns the result to the database owner. A thorough security analysis indicates that the proposed scheme is secure even if attackers can forge identification requests and collude with the cloud. Compared with previous protocols, experimental results show that the proposed scheme achieves a better performance in both preparation and identification procedures.                                                                                                                       Contact:                                                                                                                                                                                                                                                                                                                 +91-98451 66723                                                                                                                                                                                                                                                                                                       ☎ 080-413 07435  

Abstract: User activity logs can be a valuable source of information in cloud forensic investigations; hence, ensuring the reliability  and integrity of such logs is crucial. Most existing solutions for secure logging are designed for conventional systems rather than  the complexity of a cloud environment. In this paper, we propose the Cloud Log Assuring Soundness and Secrecy (CLASS)  process as an alternative scheme for the securing of logs in a cloud environment. In CLASS, logs are encrypted using the  individual user’s public key so that only the user is able to decrypt the content. In order to prevent unauthorized modification of  the log, we generate proof of past log (PPL) using Rabin’s fingerprint and Bloom filter. Such an approach reduces verification time  significantly. Findings from our experiments deploying CLASS in Open Stack demonstrate the utility of CLASS in a real-world  context.                                                                                         Contact:                                                                                                                                                                                                                                                                                                                 +91-98451 66723                                                                                                                                                                                                                                                                                                       ☎ 080-413 07435  

Abstract: Outsourcing data to a third-party administrative control, as is done in cloud computing, gives rise to security concerns. The data compromise may occur due to attacks by other users and nodes within the cloud. Therefore, high security measures are required to protect data within the cloud. However, the employed security strategy must also take into account the optimization of the data retrieval time. In this paper, we propose Division and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) that collectively approaches the security and performance issues. In the DROPS methodology, we divide a file into fragments, and replicate the fragmented data over the cloud nodes. Each of the nodes stores only a single fragment of a particular data file that ensures that even in case of a successful attack, no meaningful information is revealed to the attacker. Moreover, the nodes storing the fragments, are separated with certain distance by means of graph T-coloring to prohibit an attacker of guessing the locations of the fragments. Furthermore, the DROPS methodology does not rely on the traditional cryptographic techniques for the data security; thereby relieving the system of computationally expensive methodologies. We show that the probability to locate and compromise all of the nodes storing the fragments of a single file is extremely low. We also compare the performance of the DROPS methodology with ten other schemes. The higher level of security with slight performance overhead was observed                                                      Contact:                                                                                                                                                                                                                                                                                                                 +91-98451 66723                                                                                                                                                                                                                                                                                                       ☎ 080-413 07435  

Abstract :In the past decade, Cloud-Computing emerged as  a new computing concept with a distributed nature using virtual  network and systems. Many businesses rely on this technology to  keep their systems running but concerns are rising about security  breaches in cloud computing. Cloud providers (CPs) are taking  significant measures to maintain the security and privacy of the  data stored on their premises, in order to preserve the customers’  trust. Nevertheless, in certain applications, such as medical  health records for example, the medical facility is responsible for  preserving the privacy of the patients’ data. Although the facility  can offload the overhead of storing large amounts of data by  using cloud storage, relying solely on the security measures taken  by the CP might not be sufficient. Any security breach at the  CP’s premises does not protect the medical facility from being  held accountable. This work aims to solve this problem by  presenting a secure approach for storing data on the cloud while  keeping the customer in control of the security and privacy of  their data.                                                                                                                                                                                                                                                                                                                                                              Contact:                                                                                                                                                                                                                                                                                                                 +91-98451 66723                                                                                                                                                                                                                                                                                                       ☎ 080-413 07435  

Final year IEEE Cloud Computing projects 2018-2019

Project CODE
1. IEEE 2018: An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing Title Title Title
2. IEEE 2018: Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain inElectronic Health Records Systems Title Title Title
3. IEEE 2018: CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics M Title Title Title
4. IEEE 2018: DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security Title Title Title
5. IEEE 2018: Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage Title Title Title
6. IEEE 2018: Optimizing the Cost-Performance Tradeoff for Coflows across Geo-distributed Datacenters Title Title Title
7. IEEE 2018: A Secure Client-Side Framework for Protecting the Privacy of Health DataStored on the Cloud Title Title Title
8. IEEE 2018: Dynamic Mobile Cloudlet Clustering for Fog Computing Title Title Title
9. IEEE 2018: Towards Deadline Guaranteed Cloud Storage Services Title Title Title
10. IEEE 2018: Stability of Evolving Fuzzy Systems based on Data Clouds Title Title Title
11. IEEE 2018: Anonymous and Traceable Group Data Sharing in Cloud Computing Title Title Title
12. IEEE 2018: SDN-enabled Traffic-aware Load Balancing for M2M Networks Title Title Title
13. IEEE 2018: TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain Title Title Title
14. IEEE 2017:  Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud Title Title Title
15. IEEE 2017:  A Collision-Mitigation Cuckoo Hashing Scheme for Large-scale Storage Systems Title Title Title
16. IEEE 2017:  Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds Title Title Title
17. IEEE 2017: Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage Title Title Title
18. IEEE 2017: Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing Title Title Title
19. IEEE 2017: RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage Title Title Title
20. IEEE 2017: Vehicular Cloud Data Collection for Intelligent Transportation Systems Title Title Title
21. IEEE 2017: Cost Minimization Algorithms for Data Center Management Title Title Title
22. IEEE 2017: Optimizing Green Energy, Cost, and Availability in Distributed Data Centers Title Title Title
23. IEEE 2017:  Live Data Analytics With Collaborative Edge and Cloud Processing in Wireless IoT Networks Title Title Title
24. IEEE 2017:  Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems Title Title Title
25. IEEE 2017: Optimizing Cloud-Service Performance: Efficient Resource Provisioning via Optimal Workload Allocation Title Title Title
26. IEEE 2017: TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud Title Title Title
27. IEEE 2017:  FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data Title Title Title
28. IEEE 2017:  Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories Title Title Title
29. IEEE 2017: Temporal Task Scheduling With Constrained Service Delay for Profit Maximization in Hybrid Clouds Title Title Title
30. IEEE 2016: Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming. Title Title Title
31. IEEE 2016: Ensures Dynamic access and Secure E-Governance system in Clouds Services – EDSE Title Title Title
32. IEEE 2016: On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications Title Title Title
33. IEEE 2016: Anonymous Authentication for Secure Data Stored on Cloud with Decentralized Access Control Title Title Title
35. IEEE 2016: Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing Title Title Title

IEEE Cloud Computing Projects bangalore | 2018-2019 Cloud Computing Projects

IEEE Cloud Computing Projects bangalore | 2018 IEEE Cloud Computing Projects

Cloud computing:

Cloud computing is an information technology (IT) paradigm that enables ubiquitous access to shared pools of configurable system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the Internet. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a public utility. Third-party clouds enable organizations to focus on their core businesses instead of expending resources on computer infrastructure and maintenance. Advocates note that cloud computing allows companies to avoid or minimize up-front IT infrastructure costs.IEEE Cloud Computing Projects bangalore | 2018 IEEE Cloud Computing Projects

Proponents also claim that cloud computing allows enterprises to get their applications up and running faster, with improved manageability and less maintenance, and that it enables IT teams to more rapidly adjust resources to meet fluctuating and unpredictable demand. Cloud providers typically use a “pay-as-you-go” model, which can lead to unexpected operating expenses if administrators are not familiarized with cloud-pricing models. IEEE Cloud Computing Projects bangalore | 2018 IEEE Cloud Computing Projects

Security and Privacy:

Cloud computing poses privacy concerns because the service provider can access the data that is in the cloud at any time. It could accidentally or deliberately alter or even delete information. Many cloud providers can share information with third parties if necessary for purposes of law and order even without a warrant. That is permitted in their privacy policies, which users must agree to before they start using cloud services. Solutions to privacy include policy and legislation as well as end users’ choices for how data is stored. Users can encrypt data that is processed or stored within the cloud to prevent unauthorized access.IEEE Cloud Computing Projects bangalore | 2018 IEEE Cloud Computing Projects

According to the Cloud Security Alliance, the top three threats in the cloud are Insecure Interfaces and API’s, Data Loss & Leakage, and Hardware Failure—which accounted for 29%, 25% and 10% of all cloud security outages respectively. Together, these form shared technology vulnerabilities. In a cloud provider platform being shared by different users there may be a possibility that information belonging to different customers resides on same data server. Additionally, Eugene Schultz, chief technology officer at Emagined Security, said that hackers are spending substantial time and effort looking for ways to penetrate the cloud.IEEE Cloud Computing Projects bangalore | 2018 IEEE Cloud Computing Projects

“There are some real Achilles’ heels in the cloud infrastructure that are making big holes for the bad guys to get into”. Because data from hundreds or thousands of companies can be stored on large cloud servers, hackers can theoretically gain control of huge stores of information through a single attack—a process he called “hyperjacking”. Some examples of this include the Dropbox security breach, and iCloud 2014 leak. Dropbox had been breached in October 2014, having over 7 million of its users passwords stolen by hackers in an effort to get monetary value from it by Bitcoins (BTC). By having these passwords, they are able to read private data as well as have this data be indexed by search engines (making the information public).IEEE Cloud Computing Projects bangalore | 2018 IEEE Cloud Computing Projects

There is the problem of legal ownership of the data (If a user stores some data in the cloud, can the cloud provider profit from it?). Many Terms of Service agreements are silent on the question of ownership. Physical control of the computer equipment (private cloud) is more secure than having the equipment off site and under someone else’s control (public cloud). This delivers great incentive to public cloud computing service providers to prioritize building and maintaining strong management of secure services. Some small businesses that don’t have expertise in IT security could find that it’s more secure for them to use a public cloud.IEEE Cloud Computing Projects bangalore | 2018 IEEE Cloud Computing Projects

There is the risk that end users do not understand the issues involved when signing on to a cloud service (persons sometimes don’t read the many pages of the terms of service agreement, and just click “Accept” without reading). This is important now that cloud computing is becoming popular and required for some services to work, for example for an intelligent personal assistant (Apple’s Siri or Google Now). Fundamentally, private cloud is seen as more secure with higher levels of control for the owner, however public cloud is seen to be more flexible and requires less time and money investment from the user.IEEE Cloud Computing Projects bangalore | 2018 IEEE Cloud Computing Projects

  • Clients would be able to access their applications and data from anywhere at any time. They could access the cloud computing system using any computer linked to the Internet. Data wouldn’t be confined to a hard drive on one user’s computer or even a corporation’s internal network.IEEE Cloud Computing Projects bangalore | 2018 IEEE Cloud Computing Projects
  • It could bring hardware costs down. Cloud computing systems would reduce the need for advanced hardware on the client side. You wouldn’t need to buy the fastest computerwith the most memory, because the cloud system would take care of those needs for you. Instead, you could buy an inexpensive computer terminal. The terminal could include a monitor, input devices like a keyboard and mouse and just enough processing power to run the middleware necessary to connect to the cloud system. You wouldn’t need a large hard drive because you’d store all your information on a remote computer.IEEE Cloud Computing Projects bangalore | 2018 IEEE Cloud Computing Projects
  • Corporations that rely on computers have to make sure they have the right software in place to achieve goals. Cloud computing systems give these organizations company-wide access to computer applications. The companies don’t have to buy a set of software or software licenses for every employee. Instead, the company could pay a metered fee to a cloud computing company.IEEE Cloud Computing Projects bangalore | 2018 IEEE Cloud Computing Projects
  • Servers and digital storage devices take up space. Some companies rent physical space to store servers and databases because they don’t have it available on site. Cloud computing gives these companies the option of storing data on someone else’s hardware, removing the need for physical space on the front end.IEEE Cloud Computing Projects bangalore | 2018 IEEE Cloud Computing Projects
  • Corporations might save money on IT support. Streamlined hardware would, in theory, have fewer problems than a network of heterogeneous machines and operating systems.IEEE Cloud Computing Projects bangalore | 2018 IEEE Cloud Computing Projects
  • If the cloud computing system’s back end is a grid computing system, then the client could take advantage of the entire network’s processing power. Often, scientists and researchers work with calculations so complex that it would take years for individual computers to complete them. On a grid computing system, the client could send the calculation to the cloud for processing. The cloud system would tap into the processing power of all available computers on the back end, significantly speeding up the calculation. IEEE Cloud Computing Projects bangalore | 2018 IEEE Cloud Computing Projects


According to Bruce Schneier, “The downside is that you will have limited customization options. Cloud computing is cheaper because of economics of scale, and — like any outsourced task — you tend to get what you get. A restaurant with a limited menu is cheaper than a personal chef who can cook anything you want. Fewer options at a much cheaper price: it’s a feature, not a bug.” He also suggests that “the cloud provider might not meet your legal needs” and that businesses need to weigh the benefits of cloud computing against the risks. In cloud computing, the control of the back end infrastructure is limited to the cloud vendor only.IEEE Cloud Computing Projects bangalore | 2018 IEEE Cloud Computing Projects

Cloud providers often decide on the management policies, which moderates what the cloud users are able to do with their deployment. Cloud users are also limited to the control and management of their applications, data and services. This includes data caps, which are placed on cloud users by the cloud vendor allocating certain amount of bandwidth for each customer and are often shared among other cloud users.IEEE Cloud Computing Projects bangalore | 2018 IEEE Cloud Computing Projects

Privacy and confidentiality are big concerns in some activities. For instance, sworn translators working under the stipulations of an NDA, might face problems regarding sensitive data that are not encrypted.IEEE Cloud Computing Projects bangalore | 2018 IEEE Cloud Computing Projects

Cloud computing is beneficial to many enterprises; it lowers costs and allows them to focus on competence instead of on matters of IT and infrastructure. Nevertheless, cloud computing has proven to have some limitations and disadvantages, especially for smaller business operations, particularly regarding security and downtime. Technical outages are inevitable and occur sometimes when cloud service providers become overwhelmed in the process of serving their clients. This may result to temporary business suspension. Since this technology’s systems rely on the internet, an individual cannot be able to access their applications, server or data from the cloud during an outage.IEEE Cloud Computing Projects bangalore | 2018 IEEE Cloud Computing Projects

dhs Javaprojects cloud computing
dhs Javaprojects cloud computing