Aislyn Technologies Pvt Ltd



Passion for Learning

Cloud Computing

Cloud computing, also known as on-demand computing, is a kind of internet-based computing, where shared resources and information are provided to computers and other devices on-demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources.Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers.It relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services.Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort.

Titles

  1. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
  2. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
  3. An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
  4. An Efficient Privacy-Preserving Ranked Keyword Search Method
  5. Circuit Ciphertext-Policy Attribute-BasedHybridEncryption with Verifiable Delegation in Cloud Computing
  6. Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
  7. Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
  8. DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud
  9. Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
  10. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
  11. Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
  12. Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
  13. Geometric Range Search on Encrypted Spatial Data
  14. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
  15. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
  16. Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
  17. Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems
  18. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
  19. Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
  20. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
  21. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
  22. Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
  23. SecRBAC: Secure data in the Clouds
  24. Dynamic Operations of Cloud Radio Access Networks (C-RAN) for Mobile Cloud Computing Systems
  25. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
  26. MetaSync: Coordinating Storage across Multiple File Synchronization Services
  27. Optimizing Cost for Online Social Networks on Geo-Distributed Clouds
  28. CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System
  29. DCloud: Deadline-Aware Resource Allocation for Cloud Computing Jobs
  30. Decentralized and Energy-Efficient Workload Management in Enterprise Clouds
  31. ECope: Workload-Aware Elastic Customization for Power Efficiency of High-End Servers
  32. EnReal: An Energy-Aware Resource Allocation Method for Scientific Workflow Executions in Cloud Environment
  33. Improving Multicore Server Performance and Reducing Energy Consumption by Workload Dependent Dynamic Power Management
  34. CO2-Aware Adaptation Strategies for Cloud Applications
  35. Encrypted Data Management with Deduplication in Cloud Computing
  36. Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data
  37. A Survey Of Architectural Approaches for Data Compression in Cache and Main Memory Systems
  38. CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services
  39. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
  40. Probabilistic Optimization of Resource Distribution and Encryption for Data Storage in the Cloud
  41. Towards Achieving Data Security with the Cloud Computing Adoption Framework
  42. An Efficient Algorithm for the Bursting of Service-Based Applications in Hybrid Clouds
  43. Cloud-Assisted Key Distribution in Batch for Secure Real-time Mobile Services
  44. A Cloud Brokerage Architecture for Efficient Cloud Service Selection
  45. User Differentiated Verifiable File Search on the Cloud
  46. A Fund-Constrained Investment Scheme for Profit Maximization in Cloud Computing
  47. KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
  48. Automatically Enforcing Security SLAs in the Cloud
  49. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
  50. A Hybrid Cloud Approach for Secure Authorized Deduplication
  51. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
  52. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
  53. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
  54. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
  55. Secure Auditing and Deduplicating Data in Cloud
  56. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage
  57. Adaptive Workflow Scheduling on Cloud Computing Platforms with Iterative Ordinal Optimization
  58. Cloud-Based Multimedia Content Protection System
  59. Reducing Fragmentation for In-line De duplication Backup Storage via Exploiting Backup History and Cache Knowledge
  60. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
  61. An Efficient and Secure Remote Data Back-up Technique for Cloud Computing
  62. A Self-tuning Failure Detection Scheme for Cloud Computing Service
  63. Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
  64. DROPS: Division and Replication of Data in the Cloud for Optimal Performance and Security