• +919751800789
  • 1croreprojects@gmail.com
  • Chennai, Tamilnadu


Cloud Computing

  • Secure Data Sharing in Cloud Computing Using Revocable Storage Identity Based Encryption
  • Dynamic and Public Auditing with Fair Arbitration for Cloud Data
  • Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud

Data Mining

  • A Mixed Generative-Discriminative Based Hashing Method
  • Text Mining the Contributors to Rail Accidents
  • Quantifying Political Leaning from Tweets, Re tweets, and Re tweeters
  • Using Hash tag Graph-Based Topic Model to Connect Semantically-Related Words Without Co-Occurrence in Micro blogs
  • Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata


  • User-Service Rating Prediction by Exploring Social Users Rating Behaviors

Image Processing

  • Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation


  • Secure and Efficient data communication protocol for Wireless Body Area Networks
  • Efficient Certificateless Access Control for Wireless Body Area Networks

Parallel And Distributed System

  • Authenticated Key Exchange Protocols for Parallel Network File Systems
  • Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
  • A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
  • Real Time Semantic Search Using Approximate Methodology for Large Scale Storage Systems

Secure Computing

  • Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data

Service Computing

  • Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
  • Cloud workflow scheduling with deadlines and time slot availability
  • Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage

Information Forensics and Security

  • Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
  • Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
  • Fine Grained Two Factor Access Control for Web Based Cloud Computing Services

Big Data

  • Personalized Travel Sequence Recommendation on Multi Source Big Social Media
Open chat
Reach Us