Cloud – Trust – a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds Abstract?Cloud – Trust – a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds. The vulnerability of Cloud Computing Systems (CCSs) to Advanced Persistent Threats < Final Year Projects 2016 > APTs is a significant concern to government and…
Cloud based secure passport Checking system using android Abstract? Remote data integrity checking (RDIC) enables a data storage server, say a cloud server, to prove to a verifier that it is actually storing a data owner?s data honestly. To date, a number of RDIC protocols have been proposed in the literature, but most of the…
Cloud Federations in the Sky: Formation Game and Mechanism Abstract? Cloud Federations in the Sky: Formation Game and Mechanism. The amount of computing resources required by current and future data-intensive applications is expected to increase dramatically, creating high demands for cloud resources. The cloud providers? available resources may not be sufficient enough to cope with…
Cloud-Assisted Safety Message Dissemination in VANET?Cellular Heterogeneous Wireless Network Abstract?In vehicular ad hoc networks (VANETs), ef?cient message dissemination is critical to road safety and traf?c ef?ciency. Since many VANET-based schemes suffer from high transmission delay and data redundancy, the integrated VANET? cellular heterogeneous network has been proposed recently and attracted signi?cant attention. However, most existing…
CloudArmor: Supporting Reputation-based Trust Management for Cloud Services Abstract? Trust management is one of the most challenging issues for the adoption and growth of cloud computing. The highly dynamic, distributed, and non-transparent nature of cloud services introduces several challenging issues such as privacy, security, and availability. Preserving consumers? privacy is not an easy task due…
CloudArmor: Supporting Reputation-based Trust Management for Cloud Services Abstract? Trust management is one of the most challenging issues for the adoption and growth of cloud computing. The highly dynamic, distributed, and non-transparent nature of cloud services introduces several challenging issues such as privacy, security, and availability. Preserving consumers? privacy is not an easy task due…
CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework Abstract? Explosive growth in the number of passwords for web based applications and encryption keys for outsourced data storage well exceeds the management limit of users. Therefore outsourcing keys < Final Year Projects 2016 > including passwords and data encryption keys) to professional password managers (honest-but-curious…
ClubCF: A Clustering-based Collaborative Filtering Approach for Big Data Application Abstract?ClubCF: Spurred by service computing and cloud computing, an increasing number of services are emerging on the Internet. As a result, service-relevant data become too big to be effectively processed by traditional approaches. In view of this challenge, a clustering-based collaborative filtering approach is proposed…
Cluster ensemble selection based on relative validity indexes Abstract?Cluster ensemble selection based on relative validity indexes. Selective clustering ensemble is usually based on the reference partition to select members of the ensemble. General method of generating reference partition is to use preliminary ensemble results, < Final Year Projects > yet it cannot eliminate the influence…
Cluster ensemble selection based on relative validity indexes Abstract?There are variety of methods available to solve multi-objective optimization problems, very few utilizes criterion linkage between data objects in the searching phase, to improve final result. This article proposes an evolutionary clustering algorithm for multi-objective optimization. This paper aims to identify more relevant features based on…
Clustering Deviations for Black Box Regression Testing of Database Applications Abstract? Clustering Deviations for Black Box Regression Testing of Database Applications.Regression tests often result in many deviations < Final Year Projects 2016 > differences between two system versions, either due to changes or regression faults. For the tester to analyze such deviations efficiently, it would…
Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm Abstract?Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm. In comparison with hard clustering methods, in which a pattern belongs to a single cluster, fuzzy clustering algorithms allow patterns to belong to all clusters with differing degrees of membership. This is important in domains…