CLOUD COMPUTING

CODETITLE        
ITnTCC001A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks
ITnTCC002A Dataflow -Based Scientific Workflow Composition Framework
ITnTCC003A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
ITnTCC004A Stable Network-Aware VM Placement for Cloud Systems
ITnTCC005A Stable Network-Aware VM Placement for Cloud Systems
ITnTCC006An Autonomous Reliability-Aware Negotiation Strategy for Cloud Computing Environments
ITnTCC007Building crawler engine on cloud computing infrastructure
ITnTCC008Client Classification Policies for SLA Enforcement in Shared Cloud Datacenters
ITnTCC009COCA: Computation Offload to Clouds Using AOP
ITnTCC010Efficient Resource Mapping Framework over Networked Clouds via Iterated Local Search based Request Partitioning
ITnTCC011Energy-Aware Autonomic Resource Allocation in Multitier Virtualized Environments
ITnTCC012Environmental and disaster sensing using cloud computing infrastructure
ITnTCC013Framework on large public sector implementation of cloud computing
ITnTCC014Identification of SME readiness to implement cloud computing
ITnTCC015Interactive 3D visualization of soical network data using cloud computing
ITnTCC016MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
ITnTCC017On Handling Large-Scale Polynomial Multiplications in Compute Cloud Environments using Divisible Load Paradigm
ITnTCC018Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
ITnTCC019Optimization of Resource Provisioning Cost in Cloud Computing
ITnTCC020Policy-Based Automation of SLA Establishment for Cloud Computing Services
ITnTCC021Privacy Mechanism for Applications in Cloud Computing
ITnTCC022Real-time rendering for massive terrain data using GPUs
ITnTCC023RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds
ITnTCC024Service Level Agreement for Distributed Mutual Exclusion in Cloud Computing
ITnTCC025SLA-based Optimization of Power and Migration Cost in Cloud Computing
ITnTCC026SLA-based Optimization of Power and Migration Cost in Cloud Computing
ITnTCC027Taking up autonomous SOA framework into cloud computing
ITnTCC028THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
ITnTCC029Toward Secure and Dependable Storage Services in Cloud Computing
ITnTCC030Towards Trusted Services: Result Verification Schemes for MapReduce
ITnTCC031Video analysis tools for cloud-based motion detection
ITnTCC032Using Cloud Computing to Implement a Security Overlay Network
ITnTCC033Cloud computing-based forensic analysis for collaborative network security management system
ITnTCC034Workload-Based Software Rejuvenation in Cloud Systems
ITnTCC035Security Challenges in Vehicular Cloud Computing,
ITnTCC036Security and Privacy in Cloud Computing
ITnTCC037Performance of Virtual Machines Under Networked Denial of Service Attacks: Experiments and Analysis
ITnTCC038NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
ITnTCC039CloudAC: a cloud-oriented multilayer access control system for logic virtual domain
ITnTCC040Towards Trustworthy Resource Scheduling in Clouds
ITnTCC041Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications
ITnTCC042uCloud: a user-centric key management scheme for cloud data protection
ITnTCC043Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data
ITnTCC044Attribute-Based Encryption With Verifiable Outsourced Decryption
ITnTCC045Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
ITnTCC046Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
ITnTCC047Key Challenges in Cloud Computing: Enabling the Future Internet of Services
ITnTCC048Privacy-Preserving Public Auditing for Secure Cloud Storage
ITnTCC049CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
ITnTCC050Visualization framework for inter-domain access control policy integration
ITnTCC051SeDas: A Self-Destructing Data System Based on Active Storage Framework
ITnTCC052Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
ITnTCC053An Effective Network Traffic Classification Method with Unknown Flow Detection
ITnTCC054A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift forĀ  k -NN Search
ITnTCC055From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud
ITnTCC056Dynamic Audit Services for Outsourced Storages in Clouds
ITnTCC057Collaboration in multicloud computing environments: Framework and security issues
ITnTCC058Privacy Preserving Data Sharing With Anonymous ID Assignment
ITnTCC059Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing
ITnTCC060Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds
ITnTCC061Performance Analysis of Network I/O Workloads in Virtualized Data Centers
ITnTCC062Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks
ITnTCC063Secure Logging as a Serviceā€”Delegating Log Management to the Cloud
ITnTCC064Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation
ITnTCC065A Cloud-Based Approach to Interoperable EHRs
ITnTCC066Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
ITnTCC067Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
ITnTCC068On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage
ITnTCC069Cross-Layer Dynamic Admission Control for Cloud-Based Multimedia Sensor Networks
ITnTCC070Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
ITnTCC071Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
ITnTCC072Discovery and Resolution of Anomalies in Web Access Control Policies
ITnTCC073Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions
ITnTCC074Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
ITnTCC075Privacy-Preserving Enhanced Collaborative Tagging
ITnTCC076A UCONabcResilient Authorization Evaluation for Cloud Computing
ITnTCC077Decentralized Access Control with Anonymous Authentication for Securing Data in Clouds
ITnTCC078Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing
ITnTCC079Privacy Preserving Delegated Access Control in Public Clouds
ITnTCC080Cloud video as a Service [VaaS] with storage, streaming, security and Quality of service: Approaches and directions
ITnTCC081Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing
ITnTCC082A Trust Based Approach for Increasing Security in Cloud Computing Infrastructure