Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)
Tags: cloud computing advant, cloud computing architecture, cloud computing applications, cloud computing and security, cloud computing articles, cloud computing alliance, cloud computing apple, cloud computing accounting, cloud computing adoption, cloud computing google, cloud computing growth, cloud computing gartner, cloud computing gaming, cloud computing government, cloud computing green, cloud computing glossary, cloud computing governance, cloud computing giants, cloud computing graphic, cloud computing companies,
Ask More Info Of  A Seminar Ask More Info Of A Project Post Reply  Follow us on Twitter
28-06-2012, 05:17 PM
Post: #21
RE: cloud computing Project Idea
Cloud computing

.doc  Cloud computing project.doc (Size: 242.5 KB / Downloads: 43)


Cloud computing customers do not generally own the physical infrastructure serving as host to the software platform in question. Instead, they avoid capital expenditure by renting usage from a third-party provider. They consume resources as a service and pay only for resources that they use. Many cloud-computing offerings employ the utility computing model, which is analogous to how traditional utility services (such as electricity) are consumed, while others bill on a subscription A side effect of this approach is that overall computer usage rises dramatically, as customers do not have to engineer for peak load limits. Additionally, "increased high-speed bandwidth" .

Cloud computing users can avoid capital expenditure (CapEx) on hardware, software, and services when they pay a provider only for what they use. Consumption is usually billed on a utility (e.g. resources consumed, like electricity) or subscription (e.g. time based, like a newspaper) basis with little or no upfront cost. A few cloud providers are now beginning to offer the service for a flat monthly fee as opposed to on a utility billing basis. Other benefits of this time sharing style approach are low barriers to entry, shared infrastructure and costs, low management overhead, and immediate access to a broad range of applications. Users can generally terminate the contract at any time (thereby avoiding return on investment risk and uncertainty) and the services are often covered by service level agreements (SLAs) with financial penalties.


The "big four" of cloud computing services are said to be Amazon, Google, Microsoft and Cloud computing is also being adopted by individual users through large enterprise customers including General Electric, Procter & Gamble and Valeo.


Because cloud computing does not allow users to physically possess the storage of their data (the exception being the possibility that data can be backed up to a user-owned storage device, such as a USB flash drive or hard disk), it does leave responsibility of data storage and control in the hands of the provider. Responsibility for backup data, disaster recovery and other static "snapshots" has been a long-standing concern for both outsourced as well as resident IT systems. Additional issues are raised around process (methods, functions, transactions, etc.) visibility and transportability given the more complex nature of cloud and web service systems.. QoS (Quality of Service), SLAs (Service Level Agreements) and other parametric behaviors need to be specified as well as monitored for compliance.

Political issues:

The Cloud spans many borders and "may be the ultimate form of globalization." As such, it becomes subject to complex geopolitical issues, and providers are pressed to satisfy myriad regulatory environments in order to deliver service to a global market. This dates back to the early days of the Internet, when libertarian thinkers felt that "cyberspace was a distinct place calling for laws and legal institutions of its own".
30-07-2012, 03:31 PM
Post: #22
RE: cloud computing Project Idea
main theme of cloud computing for agent based urban transpotation systems
14-08-2012, 05:12 PM
Post: #23
RE: cloud computing Project Idea
cloud computing

.rtf  cloud computing .rtf (Size: 232.01 KB / Downloads: 52)


Cloud computing is a promising computing paradigm which recently has drawn extensive attention from both academia and industry. By combining a set of existing andnew techniques from research areas such as Service-Oriented Architectures (SOA) and virtualization, cloud computing is regarded as such a computing paradigm in which resources in the computing infrastructure are provided as services over the Internet.Along with this new paradigm, various business models are developed, which can be described by terminology of “X as a service (XaaS)”,where X could be software,hardware, data storage, and etc. Successful examples are Amazon’s EC2 and S3,Google App Engine and Microsoft Azure which provide users with scalableresources in the pay-as-you use fashion at relatively low prices. For example Amazon S3 data storage service just charges $0.12 to $0.15 per gigabyte month.
As compared to building their own infrastructures, users are able to save their investments significantlyby migrating businesses into the cloud. With the increasing development of cloudcomputing technologies, it is not hard to imagine that in the near future more and morebusinesses will be moved into the cloud.Cloud computing is also facing many challenges that, if not well resolved, may impede its fast growth. Data security, as it exists in many other applications, is among these challenges that would raise great concerns from users when they store sensitive information on cloud servers. These concerns originate from the fact that cloud servers are usually operated by commercial providers which are very likely to be outside of the trusted domain of the users.
Data confidential against cloud servers is hence frequently desired when users outsource data for storage in the cloud. In some practical applicationsystems, data confidentiality is not only a security/privacy issue, but also of juristic concerns. For example, in healthcare application scenarios use and disclosure of protected health information (PHI) should meet the requirements of Health Insurance Portability and Accountability Act (HIPAA), and keeping user data confidential against the storage servers is not just an option, but a requirement.
Furthermore, we observe that there are also cases in which cloud users themselves are content providers. They publish data on cloud servers for sharing and need fine-grained data access control in terms of which user (data consumer) has the access privilege to which types of data. In thehealth care case, for example, a medical center would be the data owner who stores millions of healthcare records in the cloud. It would allow data consumers such as doctors, patients, researchers and etc, to access various types of healthcare records under policies admitted by HIPAA. To enforce these access policies, the data owners on one hand would like to take advantage of the abundant resources that the cloud provides for efficiency and economy, on the other hand, they may want to keep the data contents confidential against cloud servers.
We address this open issue and propose a secure and scalable fine-grained dataaccess control scheme for cloud computing. Our proposed scheme is partially based on our observation that, in practical application scenarios each data file can be associated with a set of attributes which are meaningful in the context of interest. The access structure of each user can thus be defined as a unique logical expression over these attributes to reflect the scope of data files that the user is allowed to access.As the logical expression can represent any desired data file set, fine-grainedness of data access control is achieved.

To enforce these access structures, we define a publickey component for each attribute. Data files are encrypted using public key components corresponding to their attributes. User secret keys are defined to reflect their accessstructures so that a user is able to decrypt a cipher text if and only if the data file attributes satisfy his access structure. Such a design also brings about the efficiency benefit, as compared to previous works.1) the complexity of encryption is just related the number of attributes associated to the data file, and is independent to the number of users in the system
2) data file creation/deletion and new user grantoperations just affect current file/user without involving system-wide data file update or re-keying.

One extremely challenging issue with this design is the implementation of user revocation, which would inevitably require re-encryption of data files accessible to the leaving user, and may need update of secret keys for all the remaining users. If all these tasks are performed by the data owner himself/herself, it would introduce a heavy computation overhead on him/her and may also require the data owner to be always online. To resolve this challenging issue, our proposed scheme enables the data owner to delegate tasks of data file re-encryption and user secret key update to cloud servers without disclosing data contents or user access privilege information. We achieve ourdesign goals by exploiting a novel cryptographic primitive, namely key policy attribute-based encryption.

System Models

Similar to Enabling Public Verifiability and Data Dynamics for Storage Securityin Cloud Computing,we assume that the system is composed of the following parties,the Data Owner, many Data Consumers, many Cloud Servers, and a Third Party Auditor if necessary. To access data files shared by the data owner, Data Consumers, or users for brevity, download data files of their interest from Cloud Servers and then decrypt.
Neither the data owner nor users will be always online. They come online just on the necessity basis. For simplicity, we assume that the only access privilege for users is datafile reading. Extending our proposed scheme to support data file writing is trivial by asking the data writer to sign the new data file on each update as does. From now on,we will also call data files by files for brevity.
Cloud Servers are always online and operated by the Cloud Service Provider (CSP). They are assumed to have abundant storage capacity and computation power. The Third Party Auditor is also an online party which is used for auditing every file access event. In addition, we also assume that the data owner can not only store data files but also run his own code on Cloud Servers to manage his data files.
This assumption coincides with the unified ontology of cloudcomputing which is recently proposed by Youseff et al.

Security Models

In this work, we just consider Honest but Curious Cloud Servers as Over-encryption: Management of access control evolution on outsourced data does. That is to say, Cloud Servers will follow our proposed protocol in general, but try to find out as much secret information as possible based on their inputs. More specifically, we assume Cloud Servers are more interested in file contents and user access privilege information than other secret information. Cloud Servers might collude with a small number of malicious users for the purpose of harvesting file contents when it is highly beneficial.Communication channel between the data owner/users and Cloud Servers are assumed to be secured under existing security protocols such as SSL. Users would try to access files either within or outside the scope of their access privileges. To achieve this goal,unauthorized users may work independently or cooperatively. In addition, each party is preloaded with a public/private key pair and the public key can be easily obtained byother parties when necessary.

Design Goals

Our main design goal is to help the data owner achieve fine-grained access control on files stored by Cloud Servers. Specifically, we want to enable the data owner to enforce a unique access structure on each user, which precisely designates the set of files that the user is allowed to access. We also want to prevent Cloud Servers from beingable to learn both the data file contents and user access privilege information. In addition,the proposed scheme should be able to achieve security goals like user accountability and support basic operations such as user grant/revocation as a general one-to-many communication system would require. All these design goals should be achieved efficiently in the sense that the system is scalable.


Our existing solution applies cryptographic methods by disclosing data decryption keys only to authorized users. These solutions inevitably introduce a heavy computationoverhead on the data owner for key distribution and data management when fine graineddata access control is desired, and thus do not scale well.

Software update/patches-
could change security settings, assigning privileges too low, or even more alarmingly too high allowing access to your data by other parties.

Experts claim that their clouds are 100% secure - but it will not be their head on the block when things go away. It's often stated that cloudcomputing security is better than most enterprises. Also, how do you decide which data to handle in the cloud and which to keep to internal systems – once decided keeping it secure could well be a full-time task?

Control of your data/system by third-party. Data - once in the cloud always in the cloud! Can you be sure that once you delete data from your cloud account will it not exist any more or will traces remain in the cloud?


Main Idea

In order to achieve secure, scalable and fine-grained access control on outsourceddata in the cloud, we utilize and uniquely combine the following three advancedcryptographic techniques:
•Key Policy Attribute-Based Encryption (KP-ABE).
•Proxy Re-Encryption (PRE)
•Lazy re-encryption

•Low initial capital investment
•Shorter start-up time for new services
•Lower maintenance and operation costs
•Higher utilization through virtualization
•Easier disaster recovery

More specifically, we associate each data file with a set of attributes, and assign each user an expressive access structure which is defined over these attributes. To enforce this kind of access control,we utilize KP-ABE to escort data encryption keys of data files. Such a construction enables us to immediately enjoy fine-grainedness of access control. However, this construction, if deployed alone, would introduce heavy computation overhead and cumbersome onlineburden towards the data owner, as he is in charge of all the operations of data/user management. Specifically, such an issue is mainly caused by the operation of user revocation, which inevitably requires the dataowner to re-encrypt all the data files accessible to the leaving user, oreven needs the data owner to stay online to update secret keys for users. To resolve this challenging issue and make the construction suitable for cloud computing, we uniquely combine PRE with KP-ABEand enable the data owner to delegate most of the computation intensive operations to Cloud Servers without disclosing the underlying file contents. Such a construction allows the data owner to control access of his data files with a minimal overhead in terms of computation effort and online time, and thus fits well into the cloud environment. Data confidentiality is also achieved since Cloud Servers are not able to learn the plaintext of any data file in our construction.For further reducing the computation overhead on Cloud Servers and thus saving the data owner’s investment, we take advantage of the lazy re-encryption technique and allow Cloud Servers to “aggregate”computation tasks of multiple system operations. As the computation complexity on Cloud Servers is either proportional to the number of system attributes, or linear to the size of the user access structure/tree, which is independent to the number of users in the system. Scalability is thus achieved. In addition, our construction also protects user access privilege information against Cloud Servers. Accountability of user secret key can also be achieved by using an enhanced scheme of KP-ABE.
04-10-2012, 11:09 AM
Post: #24
RE: cloud computing Project Idea
to get information about the topic "cloud computing " full report ppt and related topic refer the link bellow

22-10-2012, 11:56 AM
Post: #25
RE: cloud computing Project Idea
Cloud computing

.docx  Cloud computing.docx (Size: 81.6 KB / Downloads: 26)

In Computer science, Cloud computing is a marketing term. In the case of electricity, users can simply use it. They do not need to worry where the electricity is from, how it is generated, or transported. At the end of the month, they will get a bill for the amount of electricity they consumed.
The idea behind cloud computing is similar: The user can simply use storage, computing power, or specially crafted development environments, without having to worry how these work internally. Cloud computing is a systems architecture model for Internet-based computing. It is the development and use of computer technology on the Internet. The cloud is a metaphor for the Internet based on how the internet is described in computer network diagrams; which means it is an abstraction hiding the complex infrastructure of the internet.[1] It is a style of computing in which IT-related capabilities are provided “as a service”,[2] allowing users to access technology-enabled services from the Internet ("in the cloud")[3] without knowledge of, or control over the technologies behind these servers.[4]
According to a paper published by IEEE Internet Computing in 2008 "Cloud Computing is a paradigm in which information is permanently stored in servers on the Internet and cached temporarily on clients that include computers, laptops, handhelds, sensors, etc."[5]
Cloud computing is a general concept that utilizes software as a service (SaaS), such as Web 2.0 and other technology trends, all of which depend on the Internet for satisfying users' needs. For example, Google Apps provides common business applications online that are accessed from a web browser, while the software and data are stored on the Internet servers.



Cloud computing is often confused with grid computing (a form of distributed computing whereby a "super and virtual computer" is composed of a cluster of networked, loosely-coupled computers, working together to perform very large tasks), utility computing (the packaging of computing resources, such as computation and storage are provided as a measured service that have to be paid similar to a traditional public utility such as electricity)[6] and autonomic computing (computer systems capable of self-management).[7]
Many cloud computing deployments are today powered by grids, have autonomic characteristics and are billed like utilities, but cloud computing can be seen as a natural next step from the grid-utility model.[8] Some successful cloud architectures have little or no centralised infrastructure or billing systems at all including peer-to-peer networks like BitTorrent and Skype.[9]


The majority of cloud computing infrastructure currently consists of reliable services delivered through data centers that are built on computer and storage virtualization technologies. The services are accessible anywhere in the world, with The Cloud appearing as a single point of access for all the computing needs of consumers. Commercial offerings need to meet the quality of service requirements of customers and typically offer service level agreements.[10] Open standards and open source software are also critical to the growth of cloud computing.[11]


As customers generally do not own the infrastructure or know all details about it, mainly they are accessing or renting, so they can consume resources as a service, and may be paying for what they do not need, instead of what they actually do need to use. Many cloud computing providers have adopted the utility computing model which is analogous to how traditional public utilities like electricity are consumed, while others are billed on a subscription basis. By sharing consumable and "intangible" computing power between multiple "tenants", utilization rates can be improved (as servers are not left idle) which can reduce costs significantly while increasing the speed of application development. A side effect of this approach is that "computer capacity rises dramatically" as customers do not have to engineer for peak loads.[12] Adoption has been enabled by "increased high-speed bandwidth" which makes it possible to receive the same response times from centralized infrastructure at other sites.


Cloud computing is being driven by providers including Google,, and Yahoo! as well as traditional vendors including IBM, Intel[13], Microsoft[14] and SAP[15]. It is adopted from individual users through large enterprises as General Electric.


The Cloud[18] is a metaphor for the Internet,[19] or more generally components and services which are managed by others.[1]
The underlying concept dates back to 1960 when John McCarthy expressed his opinion that "computation may someday be organized as a public utility" and the term Cloud was already in commercial use in the early 1990s to refer to large ATM networks.[20] By the turn of the 21st century, cloud computing solutions had started to appear on the market,[21] though most of the focus at this time was on Software as a service. played a key role in the development of cloud computing when upgrading their data centers after the dot-com bubble and providing access to their systems by way of Amazon Web Services in 2002 on a utility computing basis. They found the new cloud architecture resulted in significant internal efficiency improvements.[22]
2007 observed increased activity, including Google, IBM and a number of universities starting large scale cloud computing research project,[23] around the time the term started gaining popularity in the mainstream press. It was a hot topic by mid-2008 and numerous cloud computing events had been scheduled.[24]
Rating cloud computing Project Idea Options
Share cloud computing Project Idea To Your Friends :- Seminar Topics Bookmark
Post Reply 

Marked Categories : seminar project on cloud coputing, project report on cloud computing with abstract, project titles in cloud computing, cloud projects ideas, cloud idea, cloud computing projects in net ppt, projectreport on cloud computing, abstract for cloud computing, cloud computing ideas, cloud computing abstract, project topics for computer science on cloud computing, cloud computers, project topics on cloud computing, cloud, project report on cloud computing, seminar topic on cloud computing for be project, project for 2computer, project titles on cloud computing, cloud computing project topics, cloud computing project ideas, cloud computing project result, cloud computing,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Student Project Allocation and Management with Online Testing System computer science technology 9 9,786 Yesterday 09:44 PM
Last Post: subhan6
Last Post: subhan6
  Data Sharing Using Cloud Computing seminar code 0 59 14-11-2014 02:56 PM
Last Post: seminar code
  document tracking with cloud computing seminar code 0 53 14-11-2014 10:57 AM
Last Post: seminar code
  IT company project tracking system web & mobile seminar code 0 52 13-11-2014 04:22 PM
Last Post: seminar code
  A cloud based platform for mobile data collection seminar code 0 43 13-11-2014 04:08 PM
Last Post: seminar code
  Campus Cloud seminar code 0 33 12-11-2014 10:18 AM
Last Post: seminar code
Thumbs Down 800 project titles 14 54,908 11-11-2014 04:09 PM
Last Post: Guest
  PROJECT TRACKING SYSTEM seminar code 0 69 11-11-2014 03:23 PM
Last Post: seminar code
  Real-Time Analysis Of Cloud Database seminar code 0 40 11-11-2014 10:16 AM
Last Post: seminar code
This Page May Contain What is cloud computing Project Idea And Latest Information/News About cloud computing Project Idea,If Not ...Use Search to get more info about cloud computing Project Idea Or Ask Here