Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds Abstract? Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds.Cloud computing is growing exponentially, whereby there are now hundreds of cloud service providers (CSPs) of various sizes. While the cloud consumers may enjoy cheaper data storage and computation offered in this multi-cloud environment, they are also in face…
Towards Secure Data Distribution Systems in Mobile Cloud Computing Abstract– In the first place, cloud computing is though the electronic technologies have undergone fast developments in recent years, mobile devices such as smartphones are still comparatively weak in contrast to desktops in terms of computational capability, storage etc, and are not able to meet the…
Towards Trustworthy Resource Scheduling in Clouds Abstract? Towards Trustworthy Resource Scheduling in Clouds. Managing the allocation of cloud virtual machines at physical resources is a key requirement for the success of clouds. Current implementations of cloud schedulers do not consider the entire cloud infrastructure neither do they consider the overall user and infrastructure properties….
Transparently Exploiting Device-Reserved Memory for Application Performance in Mobile System Abstract? Most embedded systems require contiguous memory space to be reserved for devices, which may lead to memory under-utilization. Although several approaches have been proposed to address this issue, they have limitations of either inefficient memory usage or long latency for switching the reserved memory…
Travel Guide (Android App) Abstract-This project android travel guide provides the tourist with city map depending on its current location entered by the android phone user. This information helps the tourists to find the desired locations to visit. Well it consists of entire details of those locations or how to reach the location but it…
Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage Abstract? Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage.Cloud data storage has provided significant benefits by allowing users to store massive amount of data on demand in a cost-effective manner. To protect the privacy of data stored in the cloud, cryptographic…
Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage Abstract? Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage. Cloud data storage has provided signi?cant bene?ts by allowing users to store massive amount of data on demand in a cost-effective manner. To protect the privacy of data stored in the cloud,…
Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing Abstract? Cloud service certifications (CSC) attempt to assure a high level of security and compliance. However, considering that cloud services are part of an ever-changing environment, multi-year validity periods may put in doubt reliability of such certifications. We argue that continuous auditing (CA)…
Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing Abstract? Cloud service certifications (CSC) attempt to assure a high level of security and compliance. However, considering that cloud services are part of an ever-changing environment, multi-year validity periods may put in doubt reliability of such certifications. We argue that continuous auditing (CA)…
Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds Abstract? Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds. A major challenging problem for cloud providers is designing ef?cient mechanisms for virtual machine < Final Year Projects 2016 > VM provisioning and allocation. Such mechanisms enable the cloud providers…
Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds Abstract? A major challenging problem for cloud providers is designing efficient mechanisms for virtual machine (VM) provisioning and allocation. Such mechanisms enable the cloud providers to effectively utilize their available resources and obtain higher profits. Recently, cloud providers have introduced auction-based models for…
TruXy: Trusted Storage Cloud for Scientific Workflows Abstract? TruXy: Trusted Storage Cloud for Scientific Workflows. A wide array of Clouds have been built and adopted by business and research communities. Similarly, many research communities use workflow environments and tools such as < Final Year Projects 2016 > Taverna and Galaxy to model the execution of…