IEEE 2013 Final Year Projects :: Cloud Computing – Titles & Abstracts

Get it Now! 5000+ IEEE Project Lists
Elysium feels proud in building strategic long-term relationships with the clients across worldwide. We believe that the best solutions evolve from the collaborative relationships with our clients. As a global consultant, we work closely with the clients to understand their unique business transformation goals, design best-in-class solutions and devise the most efficient plan for implementing their strategy across the organization.
Our ETPL is renowned for our reputed services in offering real time projects for the students of engineering and science stream. Our prime motto is to fulfill the needs of the students in every aspect of our work. We also extend our guidance services to the research scholars.
- No.1 : Project Leader in India
- 1,00,000 Sucessive Stories
- 100% Satisfaction
- 100% Privacy
- 5000+ IEEE Project Titles
- Qualified Staff Members
- 24/7 Help Desk Support

Your Information will never be shared
IEEE Titles 2013 :: Cloud Computing
ETPL – CLD001 | Using Cloud Computing to Implement a Security Overlay Network |
ETPL – CLD002 | Cloud computing-based forensic analysis for collaborative network security management system |
ETPL – CLD003 | Workload-Based Software Rejuvenation in Cloud Systems |
ETPL – CLD004 | Security Challenges in Vehicular Cloud Computing, |
ETPL – CLD005 | Security and Privacy in Cloud Computing |
ETPL – CLD006 | Performance of Virtual Machines Under Networked Denial of Service Attacks: Experiments and Analysis |
ETPL – CLD007 | NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems |
ETPL – CLD008 | CloudAC: a cloud-oriented multilayer access control system for logic virtual domain |
ETPL – CLD009 | Towards Trustworthy Resource Scheduling in Clouds |
ETPL – CLD010 | Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications |
ETPL – CLD011 | uCloud: a user-centric key management scheme for cloud data protection |
ETPL – CLD012 | Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data |
ETPL – CLD013 | Attribute-Based Encryption With Verifiable Outsourced Decryption |
ETPL – CLD014 | Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations |
ETPL – CLD015 | Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud |
ETPL – CLD016 | Key Challenges in Cloud Computing: Enabling the Future Internet of Services |
ETPL – CLD017 | Privacy-Preserving Public Auditing for Secure Cloud Storage |
ETPL – CLD018 | CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring |
ETPL – CLD019 | Visualization framework for inter-domain access control policy integration |
ETPL – CLD020 | SeDas: A Self-Destructing Data System Based on Active Storage Framework |
ETPL – CLD021 | Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption |
ETPL – CLD022 | An Effective Network Traffic Classification Method with Unknown Flow Detection |
ETPL – CLD023 | A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for k -NN Search |
ETPL – CLD024 | From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud |
ETPL – CLD025 | Dynamic Audit Services for Outsourced Storages in Clouds |
ETPL – CLD026 | Collaboration in multicloud computing environments: Framework and security issues |
ETPL – CLD027 | Privacy Preserving Data Sharing With Anonymous ID Assignment |
ETPL – CLD028 | Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing |
ETPL – CLD029 | Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds |
ETPL – CLD030 | Performance Analysis of Network I/O Workloads in Virtualized Data Centers |
ETPL – CLD031 | Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks |
ETPL – CLD032 | Secure Logging as a Service—Delegating Log Management to the Cloud |
ETPL – CLD033 | Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation |
ETPL – CLD034 | A Cloud-Based Approach to Interoperable EHRs |
ETPL – CLD035 | Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems |
ETPL – CLD036 | Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases |
ETPL – CLD037 | On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage |
ETPL – CLD038 | Cross-Layer Dynamic Admission Control for Cloud-Based Multimedia Sensor Networks |
ETPL – CLD039 | Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage |
ETPL – CLD040 | Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation |
ETPL – CLD041 | Discovery and Resolution of Anomalies in Web Access Control Policies |
ETPL – CLD042 | Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions |
ETPL – CLD043 | Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds |
ETPL – CLD044 | Privacy-Preserving Enhanced Collaborative Tagging |
ETPL – CLD045 | A UCONabcResilient Authorization Evaluation for Cloud Computing |
ETPL – CLD046 | Decentralized Access Control with Anonymous Authentication for Securing Data in Clouds |
ETPL – CLD047 | Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing |
ETPL – CLD048 | Privacy Preserving Delegated Access Control in Public Clouds |
ETPL – CLD049 | Cloud video as a Service [VaaS] with storage, streaming, security and Quality of service: Approaches and directions |
ETPL – CLD050 | Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing |
ETPL – CLD051 | A Trust Based Approach for Increasing Security in Cloud Computing Infrastructure |