Java-Project Title 2021
Java-Project Title 2021
2 A Context-Aware Service Evaluation Approach over Big Data for Cloud Applications CLOUD COMPUTING
3 A Data and Task Co-Scheduling Algorithm for Scientific Cloud Workflows CLOUD COMPUTING
4 A Distributed Auction-based Framework for Scalable IaaS Provisioning in Geo-Data Centers CLOUD COMPUTING
6 A Framework for a Cloud-Based Electronic Health Records System for Developing Countries CLOUD COMPUTING
7 A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage CLOUD COMPUTING
A Resource Usage Intensity Aware Load Balancing Method for Virtual Machine Migration in
8 CLOUD COMPUTING
Cloud Datacenters
9 A Robust Formulation for Efficient Application Offloading to Clouds CLOUD COMPUTING
A Scalable Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of
10 CLOUD COMPUTING
Access Privileges for Cloud Storage
11 A Secure Privacy Preserving Cloud-based Framework for Sharing Electronic Health Data CLOUD COMPUTING
13 A Truthful (1−ϵ)(1-ε)-Optimal Mechanism for On-Demand Cloud Resource Provisioning CLOUD COMPUTING
17 An Efficient Privacy-Preserving Multi-keyword Query Scheme in Location Based Services CLOUD COMPUTING
20 Blockchain-based Data Storage with Privacy and Authentication in Internet-of-Things CLOUD COMPUTING
24 Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud CLOUD COMPUTING
25 Cyber Security and Artificial Intelligence for Cloud-based Internet of Transportation Systems CLOUD COMPUTING
Data Consistency in Multi-Cloud Storage Systems With Passive Servers and Non-Communicating
26 CLOUD COMPUTING
Clients
27 DeepfakeStack: A Deep Ensemble-based Learning Technique for Deepfake Detection CLOUD COMPUTING
28 Design and Implementation of an Overlay File System for Cloud-Assisted Mobile Apps CLOUD COMPUTING
29 Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments CLOUD COMPUTING
30 Designing aFog-Cloud Architecture using Blockchain and Analyzing Security Improvements CLOUD COMPUTING
32 Dynamic Reciprocal Authentication Protocol for Mobile Cloud Computing CLOUD COMPUTING
EDoS-ADS: An Enhanced Mitigation Technique Against Economic Denial of Sustainability
33 CLOUD COMPUTING
(EDoS) Attacks
34 Efficient Data Access Control with Fine-Grained Data Protection in Cloud-Assisted IIoT CLOUD COMPUTING
35 Efficient Decentralized Attribute Based Access Control for Mobile Clouds CLOUD COMPUTING
36 Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage CLOUD COMPUTING
Page 1 Final
37 Efficient Regular Language Search for Secure Cloud Storage CLOUD COMPUTING
38 Efficient Traceable Authorization Search System for Secure Cloud Storage CLOUD COMPUTING
39 Efficiently Translating Complex SQL Query to MapReduce Jobflow on Cloud CLOUD COMPUTING
40 Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack CLOUD COMPUTING
41 Energy Efficient Scheduling of Servers with Multi-Sleep Modes for Cloud Data Center CLOUD COMPUTING
42 Enhancing the Access Privacy of IDaaS System using SAML Protocol in Fog Computing CLOUD COMPUTING
43 Fair Online Power Capping for Emergency Handling in Multi-Tenant Cloud Data Centers CLOUD COMPUTING
FASE: A Fast and Accurate Privacy-Preserving Multi-keyword Top-k Retrieval Scheme over
44 CLOUD COMPUTING
Encrypted Cloud Data
FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-
45 CLOUD COMPUTING
assisted Industrial Internet of Things
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud
46 CLOUD COMPUTING
Computing
47 GraphLib: A Parallel Graph Mining Library for Joint Cloud Computing CLOUD COMPUTING
48 Green Cloudlet Network: A Sustainable Platform for Mobile Cloud Computing CLOUD COMPUTING
How to Extract Image Features Based on Co-Occurrence Matrix Securely and Efficiently in Cloud
49 CLOUD COMPUTING
Computing
Instance Data Protection on Cloud Environment using Multi-Layered Approach based on Fog
50 CLOUD COMPUTING
Computing
Integrity Measurement Method for Key Business Code Segments in Power Dispatching Cloud
51 CLOUD COMPUTING
Control System
52 Intelligent Health Vessel ABC-DE: An Electrocardiogram Cloud Computing Service CLOUD COMPUTING
53 Jupiter: A Modern Federated Learning Platform for Regional Medical Care CLOUD COMPUTING
54 Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map CLOUD COMPUTING
LEVER: Secure Deduplicated Cloud Storage with Encrypted Two-Party Interactions in Cyber-
55 CLOUD COMPUTING
Physical Systems
56 Locality-Aware Scheduling for Containers in Cloud Computing CLOUD COMPUTING
59 On Security of an Identity-Based Dynamic Data Auditing Protocol for Big Data Storage CLOUD COMPUTING
61 PP-CSA: A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing CLOUD COMPUTING
62 Practical Multi-keyword Ranked Search with Access Control over Encrypted Cloud Data CLOUD COMPUTING
63 Predicted Affinity Based Virtual Machine Placement in Cloud Computing Environments CLOUD COMPUTING
Predicting Workflow Task Execution Time in the Cloud Using A Two-Stage Machine Learning
64 CLOUD COMPUTING
Approach
65 Privacy Aware Data Deduplication for Side Channel in Cloud Storage CLOUD COMPUTING
66 Privacy Preserving Deep Learning using Secure Multiparty Computation CLOUD COMPUTING
71 Research on Load Forecasting Method of Distribution Transformer based on Deep Learning CLOUD COMPUTING
73 Revenue Maximization for Dynamic Expansion of Geo-Distributed Cloud Data Centers CLOUD COMPUTING
74 RRect: A Novel Server-Centric Data Center Network with High Power Efficiency and Availability CLOUD COMPUTING
75 SecDedup: Secure Encrypted Data Deduplication with Dynamic Ownership Updating CLOUD COMPUTING
Page 2 Final
76 Secure cloud storage system based on ciphertext retrieval CLOUD COMPUTING
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud
77 CLOUD COMPUTING
Computing
78 Security Issues With Functions as a Service CLOUD COMPUTING
79 Smart Applications in Edge Computing: Overview on Authentication and Data Security CLOUD COMPUTING
80 Splitting Large Medical Data Sets Based on Normal Distribution in Cloud Environment CLOUD COMPUTING
Statistical Model Checking-Based Evaluation and Optimization for Cloud Workflow Resource
81 CLOUD COMPUTING
Allocation
82 TIMER-Cloud: Time-Sensitive VM Provisioning in Resource-Constrained Clouds CLOUD COMPUTING
83 Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data CLOUD COMPUTING
84 Towards Security-Based Formation of Cloud Federations: A Game Theoretical Approach CLOUD COMPUTING
85 VMGuard: A VMI-Based Security Architecture for Intrusion Detection in Cloud Environment CLOUD COMPUTING
87 A Generalized Locally Linear Factorization Machine with Supervised Variational Encoding DATA MINING
88 A Hybrid E-Learning Recommendation Approach Based on Learners’ Influence Propagation DATA MINING
96 Asymptotic Convergence Rate of Alternating Minimization for Rank One Matrix Completion DATA MINING
97 Control Node Selection Algorithm for Nonlinear Dynamic Networks DATA MINING
100 Data Selection for Multi-Task Learning Under Dynamic Constraints DATA MINING
101 Data-Based Receding Horizon Control of Linear Network Systems DATA MINING
103 Fast Adaptive Task Offloading in Edge Computing based on Meta Reinforcement Learning DATA MINING
104 GERF: A Group Event Recommendation Framework Based on Learning-to-Rank DATA MINING
105 Learning New Words from Keystroke Data with Local Differential Privacy DATA MINING
106 LTSA-LE: A Local Tangent Space Alignment Label Enhancement Algorithm DATA MINING
107 Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis DATA MINING
108 Multi-Party High-Dimensional Data Publishing Under Differential Privacy DATA MINING
109 NewMCOS: Towards a Practical Multi-Cloud Oblivious Storage Scheme DATA MINING
112 Reducing Uncertainty of Schema Matching via Crowdsourcing with Accuracy Rates DATA MINING
113 Reducing Web Page Complexity to Facilitate Effective User Navigation DATA MINING
Re-Revisiting Learning on Hypergraphs: Confidence Interval, Subgradient Method, and Extension
114 DATA MINING
to Multiclass
115 Rusty: Runtime Interference-Aware Predictive Monitoring for Modern Multi-Tenant Systems DATA MINING
Page 3 Final
117 Sova: A Software-Defined Autonomic Framework for Virtual Network Allocations DATA MINING
118 Translation-Based Sequential Recommendation for Complex Users on Sparse Data DATA MINING
120 Unsupervised Nonlinear Adaptive Manifold Learning for Global and Local Information DATA MINING
A Logical Key Hierarchy Based Approach to Preserve Content Privacy in Decentralized Online DEPENDABLE AND SECURE
121
Social Networks COMPUTING
DEPENDABLE AND SECURE
122 A Security Analysis and Revised Security Extension for the Precision Time Protocol
COMPUTING
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for DEPENDABLE AND SECURE
123
Industrial Internet of Things COMPUTING
DEPENDABLE AND SECURE
124 Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data
COMPUTING
Bilateral Privacy-Preserving Utility Maximization Protocol in Database-Driven Cognitive Radio DEPENDABLE AND SECURE
125
Networks COMPUTING
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic DEPENDABLE AND SECURE
126
Confidentiality COMPUTING
DEPENDABLE AND SECURE
127 Cloud Centric Authentication for Wearable Healthcare Monitoring System
COMPUTING
DEPENDABLE AND SECURE
128 Disclose More and Risk Less: Privacy Preserving Online Social Network Data Sharing
COMPUTING
DEPENDABLE AND SECURE
129 Distributed Group Key Management for Event Notification Confidentiality Among Sensors
COMPUTING
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big DEPENDABLE AND SECURE
130
Data COMPUTING
DEPENDABLE AND SECURE
131 Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency
COMPUTING
DEPENDABLE AND SECURE
132 Key Based Artificial Fingerprint Generation for Privacy Protection
COMPUTING
DEPENDABLE AND SECURE
133 Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language
COMPUTING
DEPENDABLE AND SECURE
134 Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage
COMPUTING
Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication DEPENDABLE AND SECURE
135
System COMPUTING
DEPENDABLE AND SECURE
136 Precision-Enhanced Differentially-Private Mining of High-Confidence Association Rules
COMPUTING
DEPENDABLE AND SECURE
137 Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks
COMPUTING
DEPENDABLE AND SECURE
138 Privacy Protection in Interactive Content Based Image Retrieval
COMPUTING
DEPENDABLE AND SECURE
139 Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud
COMPUTING
DEPENDABLE AND SECURE
140 Privacy-Preserving Data Processing with Flexible Access Control
COMPUTING
Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud DEPENDABLE AND SECURE
141
Environment COMPUTING
Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog DEPENDABLE AND SECURE
142
Computing COMPUTING
DEPENDABLE AND SECURE
143 Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy
COMPUTING
Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the DEPENDABLE AND SECURE
144
IEEE P1363 Standard for Public Key Cryptography COMPUTING
DEPENDABLE AND SECURE
145 Secure Dependency Enforcement in Package Management Systems
COMPUTING
Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the DEPENDABLE AND SECURE
146
Encrypted Domain COMPUTING
DEPENDABLE AND SECURE
147 Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
COMPUTING
DEPENDABLE AND SECURE
148 Sensitivity Analysis for Non-Interactive Differential Privacy: Bounds and Efficient Algorithms
COMPUTING
149 A Blockchain-Based Model for Cloud Service Quality Monitoring BLOCK CHAIN
150 A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries SECURE COMPUTING
151 A Framework of Hypergraph-Based Data Placement Among Geo-Distributed Datacenters SERVICE COMPUTING
Page 4 Final
154 A Privacy-Preserving Localization Service for Assisted Living Facilities SERVICE COMPUTING
155 A Semi-Automatic and Trustworthy Scheme for Continuous Cloud Service Certification SERVICE COMPUTING
156 A Service-Oriented Permissioned Blockchain for the Internet of Things SERVICE COMPUTING
A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public
157 SECURE COMPUTING
Cloud
158 Arbitrarily Strong Utility-Privacy Tradeoff in Multi-Agent Systems SECURE COMPUTING
159 Assessing Invariant Mining Techniques for Cloud-Based Utility Computing Systems SERVICE COMPUTING
160 Blockchain at the Edge: Performance of Resource-Constrained IoT Networks BLOCK CHAIN
161 Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as a Service BLOCK CHAIN
162 Blockchain for AI: Review and Open Research Challenges BLOCK CHAIN
Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing
163 BLOCK CHAIN
Attacks for Cloud Storage
164 Blockchain-Based Object Name Service With Tokenized Authority BLOCK CHAIN
Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating
165 BLOCK CHAIN
Auditors
166 BoR: Toward High-Performance Permissioned Blockchain in RDMA-Enabled Network BLOCK CHAIN
167 Chronos++: An Accurate Blockchain-Based Time-Stamping Scheme for Cloud Storage BLOCK CHAIN
168 Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe Systems SECURE COMPUTING
171 DEAL: Differentially Private Auction for Blockchain-Based Microgrids Energy Trading SERVICE COMPUTING
177 Full Verifiability for Outsourced Decryption in Attribute Based Encryption SERVICE COMPUTING
178 Game-Theoretic Resource Pricing and Provisioning Strategies in Cloud Systems SERVICE COMPUTING
179 GUARDIAN: Blockchain-Based Secure Demand Response Management in Smart Grid System SERVICE COMPUTING
180 Guest Editorial: Special Issue on Blockchain-Based Services Computing SERVICE COMPUTING
181 Identification of Malicious Injection Attacks in Dense Rating and Co-visitation Behaviors SECURE COMPUTING
182 Measures of Scatter and Fisher Discriminant Analysis for Uncertain Data SECURE COMPUTING
183 Mining Domain Knowledge on Service Goals from Textual Service Descriptions SERVICE COMPUTING
184 Modelling Behavioural Dynamics for Asymmetric Application Layer DDoS Detection SECURE COMPUTING
185 Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud SERVICE COMPUTING
189 Private Information Retrieval Schemes with Product-Matrix MBR Codes SECURE COMPUTING
190 QoS Constrained Large Scale Web Service Composition Using Abstraction Refinement SERVICE COMPUTING
QShield: Protecting Outsourced Cloud Data Queries With Multi-User Access Control Based on
191 BLOCK CHAIN
SGX
192 Resource Renting for Periodical Cloud Workflow Applications SERVICE COMPUTING
193 Sampling-Based Approximate Skyline Query in Sensor Equipped IoT Networks BLOCK CHAIN
Page 5 Final
194 Scalable Discovery of Hybrid Process Models in a Cloud Computing Environment SERVICE COMPUTING
195 Smart and Practical Privacy-preserving Data Aggregation for Fog-based Smart Grids SECURE COMPUTING
196 Soft Semantic Representation for Cross-Domain Face Recognition SECURE COMPUTING
197 Sorting of Fully Homomorphic Encrypted Cloud Data: Can Partitioning be Effective? SERVICE COMPUTING
TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public
198 SERVICE COMPUTING
Cloud
199 Targeted Addresses Identification for Bitcoin with Network Representation Learning BLOCK CHAIN
200 Trustworthy Electronic Voting Using Adjusted Blockchain Technology BLOCK CHAIN
Virtual Machine Consolidation with Multiple Usage Prediction for Energy-Efficient Cloud Data
201 SERVICE COMPUTING
Centers
Page 6 Final