Cloud Computing

Cloud Computing Projects
Projects on Cloud Computing

Cloud Computing

Cloud Computing is the new generation computing technique in which all software and data is kept into the remote secured server despite keeping it on local system. This has made cloud computing one of the most popular final year project selection among engineering college students. In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Cloud computing, also on-demand computing, is a kind of Internet-based computing that provides shared processing resources and data to computers and other devices on demand.

Here at CITL Tech Vasrsity, Bangalore, we work on real cloud by using public cloud for storage purpose which are provided on-demand, typically by the minute or the hour basis. We only pay for the CPU cycles, storage or bandwidth we consume, which will work mostly free of cost or not more than 100INR to 500INR. Our transparent cloud computing projects has made us one of the most popular and trusted cloud computing training institute in Bangalore.

CITL has more than 6years of vast experience in developing IEEE Cloud Computing projects and has more than 50 to 80 projects final year projects on cloud computing for cse in its credits under 2016 IEEE cloud computing domain. We offer the latest 2016 IEEE Cloud Computing projects for CSE Students and Mtech students and also assist those who are looking for their research wok in cloud computing domain. Below is the list of 2016 IEEE cloud computing final year projects which are sourced from various popular journals like springer, 2016 IEEE and Elsevier which are 2016/2015 based papers and need any assisstance please call us or fill the form, we will get back to you soon.

  1. An Anomalous Behavior Detection Model in Cloud Computing
  2. Cryptographic Public Verification of Data Integrity for Cloud Storage Systems
  3. Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing
  4. IFCaaS: Information Flow Control as a Service for Cloud Security
  5. Anonymous Authentication for Secure Data Stored on Cloud with Decentralized Access Control
  6. Deleting Secret Data with Public Verifiability
  7. Secure Cloud Storage Meets with Secure Network Coding
  8. Multi-Objective Tasks Scheduling Algorithm for Cloud Computing Throughput Optimization
  9. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
  10. Secure and Efficient Cloud Computing Framework
  11. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
  12. A Hybrid Cloud Approach for Secure Authorized Deduplication
  13. On the Security ofDataAccess Control for Multiauthority CloudStorageSystems
  14. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
  15. Implementation OF DNA cryptography in cloud computing and using socket programming
  16. Task Scheduling in Cloud Computing
  17. An Optimized Task Scheduling Algorithm in CloudComputing
  18. Attribute-Based Access Control for Multi-Authority with constant size ciphertext in cloud Computing
  19. A Study on Secure Intrusion Detection System in Wireless MANETs to Increase the Performance of Eaack
  20. Privacy-Preserving Detection of Sensitive Data Exposure
  21. A Secure Client Side Deduplication Scheme in Cloud Storage Environments
  22. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
  23. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
  24. Secure Auditing and Deduplicating Data in Cloud
  25. An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration
  26. Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds
  27. DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security
  28. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
  29. A packet marking approach to protect cloud environment against DDoS attacks
  30. EasySMS: A Protocol for End-to-End Secure Transmission of SMS
  31. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
  32. CloudMoV: Cloud-based Mobile Social TV
  33. Load Balancing for Privacy-Preserving Access to Big Data in Cloud
  34. Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
  35. Enabling Efficient Access Control with Dynamic Policy Updating for Big Data in the Cloud
  36. Toward Efficient and Privacy-Preserving Computing in Big Data Era
  37. Privacy Preserving Data Analytics for Smart Homes
  38. KASR: A Keyword-Aware Service Recommendation Method on MapReduce for Big Data
  39. Cost Minimization for Big Data Processing in Geo-Distributed Data Centers
  40. Dache: A Data Aware Caching for Big-Data Applications Using the MapReduce Framework
  41. A Load Balancing Model Based on Cloud Partitioning
  42. ClubCF: A Clustering-based Collaborative Filtering Approach for Big Data Application
  43. Identity-Based Encryption with Outsourced Revocation in Cloud Computing
  44. An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments
  45. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
  46. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
  47. A Secure Client Side Deduplication Scheme in Cloud Storage Environments
  48. A Framework For Selection Of Best Cloud Service Provider Using Ranked Voting Method
  49. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
  50. iFarm: Development of Cloud-based System of Cultivation Management for Precision Agriculture
  51. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
  52. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
  53. Load Rebalancing for Distributed File Systems in Clouds
  54. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
  55. Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization
  56. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
  57. Secure Logging As a Service—Delegating Log Management to the Cloud
  58. Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing
  59. A cloud computing based telemedicine service
  60. Privacy-Preserving Public Auditing for Secure Cloud Storage
  61. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
  62. An Improved Mutual Authentication Framework for Cloud Computing
  63. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
  64. Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications
  65. NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds
  66. Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
  67. Using Location Based Encryption to Improve the Security of Data Access in Cloud Computing
  68. C-MART: Benchmarking the Cloud Parallel and Distributed Systems
  69. Pre-emptive scheduling of on-line real time services with task migration for cloud computing
  70. Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data
  71. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud