Cloud Titles
Cloud Titles
1 CryptCloud Secure and Expressive Data Access Control for Cloud Storage
2
Auction based Resource Allocation Mechanism in Federated Cloud Environment TARA
3 Secure Cloud Data Deduplication with Efficient Reencryption
4 Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage
5 DSAS A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System
6
Enabling Efficient Secure and Privacy preserving Mobile Cloud Storage
7 Cloud Raid Detecting Distributed Concurrency Bugs
8
Privacy-Preserving Public Auditing for Shared Cloud Data With Secure Group Management
9
WebCloud Web Based Cloud Storage for Secure Data Sharing across Platforms
10 Enabling Parity Authenticator based Public Auditing with Protection of a Valid User Revocation in
Cloud
11 Efficient Privacy-Friendly and Flexible Wearable Data Processing With User-Centric Access Control
12 A Verifiable and Fair Attribute-based Proxy Re-encryption Scheme for Data Sharing in Clouds
VEDHA TECHNOLOGIES
IEEE JAVA 2024-2025 TOPICS
13 EAFS: An Efficient Accurate and Forward Secure Searchable Encryption Scheme Supporting Range
Search
14 Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage
15 An Encrypted Cloud Email Searching and Filtering Scheme Based on Hidden Policy Ciphertext-
Policy Attribute-Based Encryption With Keyword Search
16 An Efficient Search Method Using Features to Match Joint Keywords on Encrypted Cloud Data
19
Attribute-Based Management of Secure Kubernetes Cloud Bursting
20
DEDUCT: A Secure Deduplication of Textual Data in Cloud Environments
21 Enabling Parity Authenticator based Public Auditing with Protection of a Valid User Revocation in
Cloud
22 Revocable and Efficient Blockchain-based Fine-grained Access Control against EDoS Attacks in
Cloud Storage
23
Efficacious Novel Intrusion Detection System for Cloud Computing Environment
25 Secure Federated Cloud Storage Protection Strategy Using Hybrid Heuristic Attribute-Based
Encryption With Permissioned Blockchain
26
EAKE-WC: Efficient and Anonymous Authenticated Key Exchange Scheme for Wearable Computing
27 Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal
Health Record System