0% found this document useful (0 votes)
108 views

Java-Project Title 2021

The document is a list of 66 projects related to cloud computing. The projects cover a wide range of topics within cloud computing including security, data sharing, resource management, machine learning, blockchain, and more. Many of the projects focus on improving privacy and security when using cloud services and applications.

Uploaded by

Helloproject
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
108 views

Java-Project Title 2021

The document is a list of 66 projects related to cloud computing. The projects cover a wide range of topics within cloud computing including security, data sharing, resource management, machine learning, blockchain, and more. Many of the projects focus on improving privacy and security when using cloud services and applications.

Uploaded by

Helloproject
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

IEEE BASEPAPER 2020-2021

S.No PROJECT TITLE DOMAIN


A Clustering-Based Multi-Layer Distributed Ensemble for Neurological Diagnostics in Cloud
1 CLOUD COMPUTING
Services

2 A Context-Aware Service Evaluation Approach over Big Data for Cloud Applications CLOUD COMPUTING

3 A Data and Task Co-Scheduling Algorithm for Scientific Cloud Workflows CLOUD COMPUTING

4 A Distributed Auction-based Framework for Scalable IaaS Provisioning in Geo-Data Centers CLOUD COMPUTING

5 A Fog-centric Secure Cloud Storage Scheme CLOUD COMPUTING

6 A Framework for a Cloud-Based Electronic Health Records System for Developing Countries CLOUD COMPUTING

7 A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage CLOUD COMPUTING

A Resource Usage Intensity Aware Load Balancing Method for Virtual Machine Migration in
8 CLOUD COMPUTING
Cloud Datacenters
9 A Robust Formulation for Efficient Application Offloading to Clouds CLOUD COMPUTING
A Scalable Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of
10 CLOUD COMPUTING
Access Privileges for Cloud Storage

11 A Secure Privacy Preserving Cloud-based Framework for Sharing Electronic Health Data CLOUD COMPUTING

12 A Tight Estimate of Job Completion Time in Vehicular Clouds CLOUD COMPUTING

13 A Truthful (1−ϵ)(1-ε)-Optimal Mechanism for On-Demand Cloud Resource Provisioning CLOUD COMPUTING

14 Abuse of the Cloud as an Attack Platform CLOUD COMPUTING


Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud
15 CLOUD COMPUTING
Data
16 AIR5: Five Pillars of Artificial Intelligence Research CLOUD COMPUTING

17 An Efficient Privacy-Preserving Multi-keyword Query Scheme in Location Based Services CLOUD COMPUTING

18 Anonymous Authentication on Trust in Blockchain-Based Mobile Crowdsourcing CLOUD COMPUTING


Attribute-Based Encryption Approach for Storage, Sharing and Retrieval of Encrypted Data in the
19 CLOUD COMPUTING
Cloud

20 Blockchain-based Data Storage with Privacy and Authentication in Internet-of-Things CLOUD COMPUTING

21 Blockchain-Based Secure Computation Offloading in Vehicular Networks CLOUD COMPUTING

22 BlockEdge: Blockchain-Edge Framework for Industrial IoT Networks CLOUD COMPUTING

23 Cloud Colonography: Distributed Medical Testbed over Cloud CLOUD COMPUTING

24 Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud CLOUD COMPUTING

25 Cyber Security and Artificial Intelligence for Cloud-based Internet of Transportation Systems CLOUD COMPUTING

Data Consistency in Multi-Cloud Storage Systems With Passive Servers and Non-Communicating
26 CLOUD COMPUTING
Clients

27 DeepfakeStack: A Deep Ensemble-based Learning Technique for Deepfake Detection CLOUD COMPUTING

28 Design and Implementation of an Overlay File System for Cloud-Assisted Mobile Apps CLOUD COMPUTING

29 Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments CLOUD COMPUTING

30 Designing aFog-Cloud Architecture using Blockchain and Analyzing Security Improvements CLOUD COMPUTING

31 Detecting Performance Anomalies in Cloud Platform Applications CLOUD COMPUTING

32 Dynamic Reciprocal Authentication Protocol for Mobile Cloud Computing CLOUD COMPUTING
EDoS-ADS: An Enhanced Mitigation Technique Against Economic Denial of Sustainability
33 CLOUD COMPUTING
(EDoS) Attacks

34 Efficient Data Access Control with Fine-Grained Data Protection in Cloud-Assisted IIoT CLOUD COMPUTING

35 Efficient Decentralized Attribute Based Access Control for Mobile Clouds CLOUD COMPUTING

36 Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage CLOUD COMPUTING

Page 1 Final
37 Efficient Regular Language Search for Secure Cloud Storage CLOUD COMPUTING

38 Efficient Traceable Authorization Search System for Secure Cloud Storage CLOUD COMPUTING

39 Efficiently Translating Complex SQL Query to MapReduce Jobflow on Cloud CLOUD COMPUTING

40 Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack CLOUD COMPUTING

41 Energy Efficient Scheduling of Servers with Multi-Sleep Modes for Cloud Data Center CLOUD COMPUTING

42 Enhancing the Access Privacy of IDaaS System using SAML Protocol in Fog Computing CLOUD COMPUTING

43 Fair Online Power Capping for Emergency Handling in Multi-Tenant Cloud Data Centers CLOUD COMPUTING

FASE: A Fast and Accurate Privacy-Preserving Multi-keyword Top-k Retrieval Scheme over
44 CLOUD COMPUTING
Encrypted Cloud Data
FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-
45 CLOUD COMPUTING
assisted Industrial Internet of Things
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud
46 CLOUD COMPUTING
Computing
47 GraphLib: A Parallel Graph Mining Library for Joint Cloud Computing CLOUD COMPUTING

48 Green Cloudlet Network: A Sustainable Platform for Mobile Cloud Computing CLOUD COMPUTING
How to Extract Image Features Based on Co-Occurrence Matrix Securely and Efficiently in Cloud
49 CLOUD COMPUTING
Computing
Instance Data Protection on Cloud Environment using Multi-Layered Approach based on Fog
50 CLOUD COMPUTING
Computing
Integrity Measurement Method for Key Business Code Segments in Power Dispatching Cloud
51 CLOUD COMPUTING
Control System

52 Intelligent Health Vessel ABC-DE: An Electrocardiogram Cloud Computing Service CLOUD COMPUTING

53 Jupiter: A Modern Federated Learning Platform for Regional Medical Care CLOUD COMPUTING

54 Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map CLOUD COMPUTING

LEVER: Secure Deduplicated Cloud Storage with Encrypted Two-Party Interactions in Cyber-
55 CLOUD COMPUTING
Physical Systems
56 Locality-Aware Scheduling for Containers in Cloud Computing CLOUD COMPUTING

57 Mental Health Data Analysis Using Cloud CLOUD COMPUTING


Microaggregation Sorting Framework for K-Anonymity Statistical Disclosure Control in Cloud
58 CLOUD COMPUTING
Computing

59 On Security of an Identity-Based Dynamic Data Auditing Protocol for Big Data Storage CLOUD COMPUTING

60 Online VM Auto-Scaling Algorithms for Application Hosting in a Cloud CLOUD COMPUTING

61 PP-CSA: A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing CLOUD COMPUTING

62 Practical Multi-keyword Ranked Search with Access Control over Encrypted Cloud Data CLOUD COMPUTING

63 Predicted Affinity Based Virtual Machine Placement in Cloud Computing Environments CLOUD COMPUTING

Predicting Workflow Task Execution Time in the Cloud Using A Two-Stage Machine Learning
64 CLOUD COMPUTING
Approach
65 Privacy Aware Data Deduplication for Side Channel in Cloud Storage CLOUD COMPUTING

66 Privacy Preserving Deep Learning using Secure Multiparty Computation CLOUD COMPUTING

67 Privacy-preserving Spatio-Textual Skylines Based on Location Aggregation CLOUD COMPUTING

68 Providing Performance Guarantees for Cloud-Deployed Applications CLOUD COMPUTING

69 RAitc: Securely Auditing the Remotely Executed Applications CLOUD COMPUTING

70 RE_BBC: Requirements Engineering in a Blockchain-Based CloudSystem CLOUD COMPUTING

71 Research on Load Forecasting Method of Distribution Transformer based on Deep Learning CLOUD COMPUTING

72 Research on Multi-Authority CP-ABE Access Control Model in Multicloud CLOUD COMPUTING

73 Revenue Maximization for Dynamic Expansion of Geo-Distributed Cloud Data Centers CLOUD COMPUTING

74 RRect: A Novel Server-Centric Data Center Network with High Power Efficiency and Availability CLOUD COMPUTING

75 SecDedup: Secure Encrypted Data Deduplication with Dynamic Ownership Updating CLOUD COMPUTING

Page 2 Final
76 Secure cloud storage system based on ciphertext retrieval CLOUD COMPUTING
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud
77 CLOUD COMPUTING
Computing
78 Security Issues With Functions as a Service CLOUD COMPUTING

79 Smart Applications in Edge Computing: Overview on Authentication and Data Security CLOUD COMPUTING

80 Splitting Large Medical Data Sets Based on Normal Distribution in Cloud Environment CLOUD COMPUTING

Statistical Model Checking-Based Evaluation and Optimization for Cloud Workflow Resource
81 CLOUD COMPUTING
Allocation
82 TIMER-Cloud: Time-Sensitive VM Provisioning in Resource-Constrained Clouds CLOUD COMPUTING

83 Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data CLOUD COMPUTING

84 Towards Security-Based Formation of Cloud Federations: A Game Theoretical Approach CLOUD COMPUTING

85 VMGuard: A VMI-Based Security Architecture for Intrusion Detection in Cloud Environment CLOUD COMPUTING

Conversion Prediction from Clickstream: Modeling Market Prediction and Customer


86 DATA MINING
Predictability

87 A Generalized Locally Linear Factorization Machine with Supervised Variational Encoding DATA MINING

88 A Hybrid E-Learning Recommendation Approach Based on Learners’ Influence Propagation DATA MINING

89 A Review of Judgment Analysis Algorithms for Crowdsourced Opinions DATA MINING


A Scalable Multi-Data Sources Based Recursive Approximation Approach for Fast Error
90 DATA MINING
Recovery in Big Sensing Data on Cloud
An Attribute-Specific Ranking Method Based on Language Models for Keyword Search over
91 DATA MINING
Graphs
92 An Effective Clustering Method over CF + + Tree Using Multiple Range Queries DATA MINING
An Efficient Destination Prediction Approach Based on Future Trajectory Prediction and
93 DATA MINING
Transition Matrix Optimization
94 Answering Top-k k Graph Similarity Queries in Graph Databases DATA MINING

95 Answering Why-Not Group Spatial Keyword Queries DATA MINING

96 Asymptotic Convergence Rate of Alternating Minimization for Rank One Matrix Completion DATA MINING

97 Control Node Selection Algorithm for Nonlinear Dynamic Networks DATA MINING

98 Cost-Effective App Data Distribution in Edge Computing DATA MINING

99 DAG: A General Model for Privacy-Preserving Data Mining DATA MINING

100 Data Selection for Multi-Task Learning Under Dynamic Constraints DATA MINING

101 Data-Based Receding Horizon Control of Linear Network Systems DATA MINING

102 Dynamic Connection-Based Social Group Recommendation DATA MINING

103 Fast Adaptive Task Offloading in Edge Computing based on Meta Reinforcement Learning DATA MINING

104 GERF: A Group Event Recommendation Framework Based on Learning-to-Rank DATA MINING

105 Learning New Words from Keystroke Data with Local Differential Privacy DATA MINING

106 LTSA-LE: A Local Tangent Space Alignment Label Enhancement Algorithm DATA MINING

107 Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis DATA MINING

108 Multi-Party High-Dimensional Data Publishing Under Differential Privacy DATA MINING

109 NewMCOS: Towards a Practical Multi-Cloud Oblivious Storage Scheme DATA MINING

110 Online Collaborative Data Caching in Edge Computing DATA MINING

111 Privacy-Preserving User Profile Matching in Social Networks DATA MINING

112 Reducing Uncertainty of Schema Matching via Crowdsourcing with Accuracy Rates DATA MINING

113 Reducing Web Page Complexity to Facilitate Effective User Navigation DATA MINING
Re-Revisiting Learning on Hypergraphs: Confidence Interval, Subgradient Method, and Extension
114 DATA MINING
to Multiclass

115 Rusty: Runtime Interference-Aware Predictive Monitoring for Modern Multi-Tenant Systems DATA MINING

116 Scalable Detection of Crowd Motion Patterns DATA MINING

Page 3 Final
117 Sova: A Software-Defined Autonomic Framework for Virtual Network Allocations DATA MINING

118 Translation-Based Sequential Recommendation for Complex Users on Sparse Data DATA MINING

119 Trust Relationship Prediction in Alibaba E-Commerce Platform DATA MINING

120 Unsupervised Nonlinear Adaptive Manifold Learning for Global and Local Information DATA MINING

A Logical Key Hierarchy Based Approach to Preserve Content Privacy in Decentralized Online DEPENDABLE AND SECURE
121
Social Networks COMPUTING
DEPENDABLE AND SECURE
122 A Security Analysis and Revised Security Extension for the Precision Time Protocol
COMPUTING
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for DEPENDABLE AND SECURE
123
Industrial Internet of Things COMPUTING
DEPENDABLE AND SECURE
124 Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data
COMPUTING
Bilateral Privacy-Preserving Utility Maximization Protocol in Database-Driven Cognitive Radio DEPENDABLE AND SECURE
125
Networks COMPUTING
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic DEPENDABLE AND SECURE
126
Confidentiality COMPUTING
DEPENDABLE AND SECURE
127 Cloud Centric Authentication for Wearable Healthcare Monitoring System
COMPUTING
DEPENDABLE AND SECURE
128 Disclose More and Risk Less: Privacy Preserving Online Social Network Data Sharing
COMPUTING
DEPENDABLE AND SECURE
129 Distributed Group Key Management for Event Notification Confidentiality Among Sensors
COMPUTING
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big DEPENDABLE AND SECURE
130
Data COMPUTING
DEPENDABLE AND SECURE
131 Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency
COMPUTING
DEPENDABLE AND SECURE
132 Key Based Artificial Fingerprint Generation for Privacy Protection
COMPUTING
DEPENDABLE AND SECURE
133 Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language
COMPUTING
DEPENDABLE AND SECURE
134 Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage
COMPUTING
Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication DEPENDABLE AND SECURE
135
System COMPUTING
DEPENDABLE AND SECURE
136 Precision-Enhanced Differentially-Private Mining of High-Confidence Association Rules
COMPUTING
DEPENDABLE AND SECURE
137 Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks
COMPUTING
DEPENDABLE AND SECURE
138 Privacy Protection in Interactive Content Based Image Retrieval
COMPUTING
DEPENDABLE AND SECURE
139 Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud
COMPUTING
DEPENDABLE AND SECURE
140 Privacy-Preserving Data Processing with Flexible Access Control
COMPUTING
Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud DEPENDABLE AND SECURE
141
Environment COMPUTING
Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog DEPENDABLE AND SECURE
142
Computing COMPUTING
DEPENDABLE AND SECURE
143 Releasing Correlated Trajectories: Towards High Utility and Optimal Differential Privacy
COMPUTING
Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the DEPENDABLE AND SECURE
144
IEEE P1363 Standard for Public Key Cryptography COMPUTING
DEPENDABLE AND SECURE
145 Secure Dependency Enforcement in Package Management Systems
COMPUTING
Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the DEPENDABLE AND SECURE
146
Encrypted Domain COMPUTING
DEPENDABLE AND SECURE
147 Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
COMPUTING
DEPENDABLE AND SECURE
148 Sensitivity Analysis for Non-Interactive Differential Privacy: Bounds and Efficient Algorithms
COMPUTING
149 A Blockchain-Based Model for Cloud Service Quality Monitoring BLOCK CHAIN

150 A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries SECURE COMPUTING

151 A Framework of Hypergraph-Based Data Placement Among Geo-Distributed Datacenters SERVICE COMPUTING

A Hybrid Bio-Inspired Algorithm for Scheduling and Resource Management in Cloud


152 SERVICE COMPUTING
Environment
153 A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN SERVICE COMPUTING

Page 4 Final
154 A Privacy-Preserving Localization Service for Assisted Living Facilities SERVICE COMPUTING

155 A Semi-Automatic and Trustworthy Scheme for Continuous Cloud Service Certification SERVICE COMPUTING

156 A Service-Oriented Permissioned Blockchain for the Internet of Things SERVICE COMPUTING
A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public
157 SECURE COMPUTING
Cloud
158 Arbitrarily Strong Utility-Privacy Tradeoff in Multi-Agent Systems SECURE COMPUTING

159 Assessing Invariant Mining Techniques for Cloud-Based Utility Computing Systems SERVICE COMPUTING

160 Blockchain at the Edge: Performance of Resource-Constrained IoT Networks BLOCK CHAIN

161 Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as a Service BLOCK CHAIN

162 Blockchain for AI: Review and Open Research Challenges BLOCK CHAIN
Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing
163 BLOCK CHAIN
Attacks for Cloud Storage
164 Blockchain-Based Object Name Service With Tokenized Authority BLOCK CHAIN
Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating
165 BLOCK CHAIN
Auditors

166 BoR: Toward High-Performance Permissioned Blockchain in RDMA-Enabled Network BLOCK CHAIN

167 Chronos++: An Accurate Blockchain-Based Time-Stamping Scheme for Cloud Storage BLOCK CHAIN

168 Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe Systems SECURE COMPUTING

169 Customized Network Security for Cloud Service SERVICE COMPUTING

170 Data-Driven Attack Detection for Linear Systems SECURE COMPUTING

171 DEAL: Differentially Private Auction for Blockchain-Based Microgrids Energy Trading SERVICE COMPUTING

Decentralized Services Computing Paradigm for Blockchain-Based Data Governance:


172 BLOCK CHAIN
Programmability, Interoperability, and Intelligence
Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated
173 SERVICE COMPUTING
Merkle Hash Tree
174 Elastic Scheduling for Microservice Applications in Clouds BLOCK CHAIN
Facilitating Application-Aware Bandwidth Allocation in the Cloud with One-Step-Ahead Traffic
175 SERVICE COMPUTING
Information
176 Flexible Wildcard Searchable Encryption System SERVICE COMPUTING

177 Full Verifiability for Outsourced Decryption in Attribute Based Encryption SERVICE COMPUTING

178 Game-Theoretic Resource Pricing and Provisioning Strategies in Cloud Systems SERVICE COMPUTING

179 GUARDIAN: Blockchain-Based Secure Demand Response Management in Smart Grid System SERVICE COMPUTING

180 Guest Editorial: Special Issue on Blockchain-Based Services Computing SERVICE COMPUTING

181 Identification of Malicious Injection Attacks in Dense Rating and Co-visitation Behaviors SECURE COMPUTING

182 Measures of Scatter and Fisher Discriminant Analysis for Uncertain Data SECURE COMPUTING

183 Mining Domain Knowledge on Service Goals from Textual Service Descriptions SERVICE COMPUTING

184 Modelling Behavioural Dynamics for Asymmetric Application Layer DDoS Detection SECURE COMPUTING

185 Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud SERVICE COMPUTING

PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage


186 BLOCK CHAIN
Management
187 Policy-Driven Blockchain and Its Applications for Transport Systems SERVICE COMPUTING

188 Preserving Statistical Privacy in Distributed Optimization SECURE COMPUTING

189 Private Information Retrieval Schemes with Product-Matrix MBR Codes SECURE COMPUTING

190 QoS Constrained Large Scale Web Service Composition Using Abstraction Refinement SERVICE COMPUTING

QShield: Protecting Outsourced Cloud Data Queries With Multi-User Access Control Based on
191 BLOCK CHAIN
SGX
192 Resource Renting for Periodical Cloud Workflow Applications SERVICE COMPUTING

193 Sampling-Based Approximate Skyline Query in Sensor Equipped IoT Networks BLOCK CHAIN

Page 5 Final
194 Scalable Discovery of Hybrid Process Models in a Cloud Computing Environment SERVICE COMPUTING

195 Smart and Practical Privacy-preserving Data Aggregation for Fog-based Smart Grids SECURE COMPUTING

196 Soft Semantic Representation for Cross-Domain Face Recognition SECURE COMPUTING

197 Sorting of Fully Homomorphic Encrypted Cloud Data: Can Partitioning be Effective? SERVICE COMPUTING

TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public
198 SERVICE COMPUTING
Cloud

199 Targeted Addresses Identification for Bitcoin with Network Representation Learning BLOCK CHAIN

200 Trustworthy Electronic Voting Using Adjusted Blockchain Technology BLOCK CHAIN
Virtual Machine Consolidation with Multiple Usage Prediction for Energy-Efficient Cloud Data
201 SERVICE COMPUTING
Centers

Page 6 Final

You might also like