Using Crowdsourcing to Provide QoS for Mobile Cloud Computing Abstract? Quality of cloud service (QoS) is one of the crucial factors for the success of cloud providers in mobile cloud computing. Context-awareness is a popular method for automatic awareness of the mobile environment and choosing the most suitable cloud provider. Lack of context information may…
Using Data Mining Techniques for Detecting Terror-Related Activities on the Web Abstract? Using Data Mining Techniques for Detecting Terror-Related Activities on the Web. An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology learns the typical behavior (?profile?) of terrorists by applying a data…
Using Virtual Machine Allocation Policies to Defend against Co-resident Attacks in Cloud Computing Abstract? Using Virtual Machine Allocation Policies to Defend against Co-resident Attacks in Cloud Computing. Cloud computing enables users to consume various < Final Year Projects 2016 > IT resources in an on-demand manner, and with low management overhead. However, customers can face…
Vehicle Service Remainder (Android App) Abstract-This project Vehicle Service Remainder (Android App) was developed to maintain the vehicle Service Details. Mostly people forget the date of vehicle service, So to avoid this we created an app. In this app user should enter the details of bill received during the vehicle service. The details like name…
Verifiable and Exculpable Outsourced Attribute-Based Encr yption for Access Control in Cloud Computing Abstract-In the first place, propose two ciphertext-policy attribute-based key encapsulation mechanism (CP-AB-KEM) schemes that for the first time achieve both outsourced encryption and outsourced decryption in two system storage models and give corresponding security analysis. In our schemes, heavy computations are outsourced…
Verifiable Auditing for Outsourced Database in Cloud Computing Abstract? Verifiable Auditing for Outsourced Database in Cloud Computing. The notion of database outsourcing enables the data owner to delegate the database management to a cloud service provider < Final Year Projects 2016 > CSP that provides various database services to different users. Recently, plenty of research…
Village Website Abstract-Village Website provides brief information and overall description about particular village. It also provides the information of the village location, events and people. Community details contain people, place and census details. Events details contain particular village functions and important schedules of village . News/Blog details contain important updates and articles of village .Contact…
Virtual Servers Co-Migration for Mobile Accesses: Online vs. Off-line Abstract?Virtual Servers Co-Migration for Mobile Accesses Online vs. Off-line .Firstly we study the problem of co-migrating a set of service replicas residing on one or more redundant virtual servers in clouds in order to satisfy a sequence of mobile batch-request emands in a cost effective way….
VMThunder: Fast Provisioning of Large-Scale Virtual Machine Clusters Abstract? VMThunder: Fast Provisioning of Large-Scale Virtual Machine Clusters. Infrastructure as a service (IaaS) allows users to rent resources from the Cloud to meet their various computing requirements. The pay-as-you-use model, however, poses a nontrivial technical challenge to the IaaS cloud service providers: how to fast provision…
VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud Abstract– Remote data access control is of crucial importance in public cloud. Based on its own inclinations, the data owner predefines the access policy. When the user satisfies the data owner?s access policy, it has the right to access the data…
Vulnerable Concealed Map-Reading Inside Mobile Ad Hoc Networks Abstract– In the first place , number of techniques has been used based on packet encryption to protect the dat forwarding in MANETs, Still MANETs are attacked by hackers. To get over these attack a new technique called statistical traffic pattern discovery system can be used. It…
Vulnerable Concealed Map-Reading Inside Mobile Ad Hoc Networks Abstract-Number of techniques has been used based on packet encryption to protect the data forwarding in MANETs, Still MANETs are attacked by hackers. To get over these attack a new technique called statistical traffic pattern discovery system can be used. It is an approach to discover entire…