0% found this document useful (0 votes)
9 views2 pages

Cloud Titles

Uploaded by

Sana Shaik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views2 pages

Cloud Titles

Uploaded by

Sana Shaik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

VEDHA TECHNOLOGIES

IEEE JAVA 2024-2025 TOPICS

Sl.No 2024 & 2025 Project Title


CLOUD COMPUTING

1 CryptCloud Secure and Expressive Data Access Control for Cloud Storage

2
Auction based Resource Allocation Mechanism in Federated Cloud Environment TARA
3 Secure Cloud Data Deduplication with Efficient Reencryption
4 Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage

5 DSAS A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System

6
Enabling Efficient Secure and Privacy preserving Mobile Cloud Storage
7 Cloud Raid Detecting Distributed Concurrency Bugs

8
Privacy-Preserving Public Auditing for Shared Cloud Data With Secure Group Management
9

WebCloud Web Based Cloud Storage for Secure Data Sharing across Platforms
10 Enabling Parity Authenticator based Public Auditing with Protection of a Valid User Revocation in
Cloud

11 Efficient Privacy-Friendly and Flexible Wearable Data Processing With User-Centric Access Control

12 A Verifiable and Fair Attribute-based Proxy Re-encryption Scheme for Data Sharing in Clouds
VEDHA TECHNOLOGIES
IEEE JAVA 2024-2025 TOPICS

13 EAFS: An Efficient Accurate and Forward Secure Searchable Encryption Scheme Supporting Range
Search

14 Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage

15 An Encrypted Cloud Email Searching and Filtering Scheme Based on Hidden Policy Ciphertext-
Policy Attribute-Based Encryption With Keyword Search

16 An Efficient Search Method Using Features to Match Joint Keywords on Encrypted Cloud Data

17 Practical Multi-Keyword Ranked Search With Access Control Over


Encrypted Cloud Data
18 Secure Federated Cloud Storage Protection Strategy Using Hybrid Heuristic Attribute-Based
Encryption With Permissioned Blockchain

19
Attribute-Based Management of Secure Kubernetes Cloud Bursting

20
DEDUCT: A Secure Deduplication of Textual Data in Cloud Environments

21 Enabling Parity Authenticator based Public Auditing with Protection of a Valid User Revocation in
Cloud

22 Revocable and Efficient Blockchain-based Fine-grained Access Control against EDoS Attacks in
Cloud Storage

23
Efficacious Novel Intrusion Detection System for Cloud Computing Environment

24 Achieving Efficient Secure Deduplication with User-Defined Access Control in Cloud

25 Secure Federated Cloud Storage Protection Strategy Using Hybrid Heuristic Attribute-Based
Encryption With Permissioned Blockchain

26
EAKE-WC: Efficient and Anonymous Authenticated Key Exchange Scheme for Wearable Computing

27 Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal
Health Record System

You might also like