A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing Abstract-With the popularity of cloud computing, mobile devices can store/retrieve personal data from anywhere at any time. Consequently, the data security problem in mobile cloud becomes more and more severe and prevents further development of mobile cloud. There are sustantial studies that have been conducted…
A Load Balancing and Multi-tenancy Oriented Data Center Virtualization Framework Abstract– Virtualization is an essential step before a baremetal data center being ready for commercial usage, because it bridges the foreground interface for cloud tenants and the background resource management on underlying infrastructures. A concept at the heart of the foreground is multi-tenancy, which deals…
A Load Balancing Model Based on Cloud Partitioning Abstract? A Load Balancing Model Based on Cloud Partitioning. Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. This article introduces a better load balance model for the public cloud…
A MAC Sensing Protocol Designfor Data Transmission with More Protection to Primary Users. Abstract?MAC protocols to sense channels for data transmission have been widely investigated for the secondary users to efficiently utilize and share the spectrum licensed by the primary user. One important issue associated with MAC protocols design is how the secondary users determine…
A MapReduce-Based Nearest Neighbor Approach for Big-Data-Driven Traffic Flow Prediction Abstract? In big-data-driven trafc ow prediction systems, the robustness of prediction performance depends on accuracy and timeliness. This paper presents a new MapReduce-based nearest neighbor (NN) approach for trafc ow prediction using correlation analysis (TFPC) on a Hadoop platform. In particular, we develop a real-time…
A Mechanism Design Approach to Resource Procurement in Cloud Computing Abstract? A Mechanism Design Approach to Resource Procurement in Cloud Computing. We present a cloud resource procurement approach which not only automates the selection of an appropriate cloud vendor but also implements dynamic pricing. Three possible mechanisms are suggested for cloud resource procurement: cloud-dominant strategy…
A minimum enclosing ball-based support vector machine approach for detection of phishing websites Abstract?a novel approach based on minimum enclosing ball support vector machine < Final Year Projects 2016 > to phishing Website detection is proposed, which aims at achieving high speed and high accuracy for detecting phishing Website. In order to enhance the integrity…
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing Abstract?In energy harvesting wireless sensor networks (EH-WSNs), maximizing the data collection throughput is one of the most challenging issues. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots…
[vc_row][vc_column][vc_column_text] A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing Abstract? A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing. Cloud computing is an Internet-based computing pattern through which shared resources are provided to devices on-demand. Its an emerging but promising paradigm to integrating mobile devices into cloud computing,…
A New Multiple Service Key Management Scheme for Secure Wireless Mobile Multicast Abstract? A New Multiple Service Key Management Scheme for Secure Wireless Mobile Multicast. Addressing key management in mobile multicast communication is currently a booming topic due to the convergence of wireless and mobile technologies. With the proliferation of multiple group based services that…
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage Abstract– As an important application in cloud computing, cloud storage offers user scalable, flexible, and high-quality data storage and computation services. A growing number of data owners choose to outsource data files to the cloud. Because cloud storage servers are not fully trustworthy, data…
A Novel Encryption Based Framework for Cloud Databases Abstract? A Novel Encryption Based Framework for Cloud Databases. A Cloud database management system < Final Year Projects 2016 > CDBMS is a distributed database that delivers computing as a service instead of a product. Improving confidentiality of information stored in cloud database .It is an important…