[vc_row][vc_column][vc_column_text]

Main Reference PaperDynamic-Hash-Table Based Public Auditing for Secure Cloud Storage, IEEE Transactions on Services Computing, 2016 [Java].

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column css=”.vc_custom_1456723760841{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;background-color: #eeeeee !important;border-left-color: #467db1 !important;border-left-style: solid !important;border-right-color: #467db1 !important;border-right-style: solid !important;border-top-color: #467db1 !important;border-top-style: solid !important;border-bottom-color: #467db1 !important;border-bottom-style: solid !important;}” el_class=”project_short_document_div”][vc_empty_space height=”0px”][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Research Area of the Project” tab_id=”1456231495772-0-1f030-5b4d”][vc_column_text]

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Description” tab_id=”c2f36d6a-352e-6f030-5b4d”][vc_column_text]
  • A public auditing scheme is proposed that allows dynamic auditing by third party auditor (TPA) by migrating the authorized information in dynamic hash table(DHT). It also ensures privacy through authentication using public key and random masking through signature scheme.

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Aim & Objectives” tab_id=”1456230849764-0-4f030-5b4d”][vc_column_text]
  • To preserve privacy, batch and dynamic auditing.

  • To reduce confrontational and communication cost by migration of authorized information.

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Contribution” tab_id=”1456230822819-0-7f030-5b4d”][vc_column_text]
  • A technique is integrated with proposed approach that performs auditing of various types of cloud data.

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Software Tools & Technologies” tab_id=”1456231644788-0-6f030-5b4d”][vc_column_text]
  • Operating System : Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Project Recommended For” tab_id=”1456231810927-0-6f030-5b4d”][vc_column_text]
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

[/vc_column_text][/single_tab][/ult_tab_element][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Order To Delivery ” tab_id=”1456477045723-0-9f030-5b4d”][vc_column_text]
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

[/vc_column_text][/single_tab][/ult_tab_element][vc_empty_space height=”35px”][vc_row_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”Previous Project” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563773053047{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Ftowards-building-forensics-enabled-cloud-through-secure-logging-as-a-service|title:Project%20Titles%20in%20Network%20Security|”][/vc_column_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”Network Security Project List” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563773143823{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fproject-titles-in-network-security-and-cryptography|title:Project%20Titles%20in%20Network%20Security|”][/vc_column_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”Next Project” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563773096824{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fsecure-data-sharing-in-cloud-computing|title:Project%20Titles%20in%20Network%20Security|”][/vc_column_inner][/vc_row_inner][ult_tab_element tab_style=”Style_2″ tab_background_color=”#467db1″ tab_hover_background_color=”#467db1″ acttab_background=”rgba(70,125,177,0.92)” tab_describe_color=”#262626″ enable_bg_color=”#ededed” container_border_style1=”border-style:solid;|border-width:1px;border-radius:0px;|border-color:#cccccc;”][single_tab title=”Go To” tab_id=”1469878537167-0-2″][vc_row_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”WSN Project List” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563432400530{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fprojects-in-wireless-sensor-networks|title:WSN%20Project%20List|”][/vc_column_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”MANET Project List” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563525661549{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fprojects-in-mobile-ad-hoc-networks|title:MANET%20Project%20List|”][/vc_column_inner][vc_column_inner width=”1/3″][vc_custom_heading text=”Wired Network Project List” font_container=”tag:h2|font_size:16|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal” el_class=”sidebar_head” css=”.vc_custom_1563360785730{border-radius: 10px !important;}” link=”url:https%3A%2F%2Fslogix.in%2Fprojects-in-wired-networks|title:Wired%20Network%20Project%20List|”][/vc_column_inner][/vc_row_inner][/single_tab][/ult_tab_element][vc_empty_space height=”35px”][vc_row_inner][vc_column_inner width=”1/3″][ult_buttons btn_title=”Project Inquiry” btn_link=”url:https%3A%2F%2Fslogix.in%2Fproject-enquiry|title:Project%20Enquiry|” btn_size=”ubtn-custom” btn_width=”350″ btn_height=”50″ btn_padding_left=”20″ btn_padding_top=”10″ btn_bg_color=”#eeeeee” btn_bg_color_hover=”#ffffff” icon_size=”32″ btn_icon_pos=”ubtn-sep-icon-at-left” btn_border_style=”solid” btn_color_border=”#467db1″ btn_border_size=”7″ btn_radius=”0″ el_class=”sd_page_button” css_adv_btn=”.vc_custom_1460363650504{padding-top: 5px !important;padding-right: 5px !important;padding-bottom: 5px !important;padding-left: 5px !important;}”][/vc_column_inner][vc_column_inner width=”1/3″][ult_buttons btn_title=”Ph.D Inquiry” btn_link=”url:https%3A%2F%2Fslogix.in%2Fphd-enquiry|title:PhD%20Enquiry|” btn_size=”ubtn-custom” btn_width=”350″ btn_height=”50″ btn_padding_left=”20″ btn_padding_top=”10″ btn_bg_color=”#ffffff” btn_hover=”ubtn-fade-bg” btn_bg_color_hover=”#ffffff” icon_size=”32″ btn_icon_pos=”ubtn-sep-icon-at-left” btn_border_style=”solid” btn_color_border=”#467db1″ btn_border_size=”7″ btn_radius=”0″ el_class=”sd_page_button” css_adv_btn=”.vc_custom_1456728243100{padding-top: 5px !important;padding-right: 5px !important;padding-bottom: 5px !important;padding-left: 5px !important;}”][/vc_column_inner][vc_column_inner width=”1/3″][ult_buttons btn_title=”Ph.D Guidance” btn_link=”url:https%3A%2F%2Fslogix.in%2Fphd-guidance|title:Ph.D%20Guidance|” btn_size=”ubtn-custom” btn_width=”350″ btn_height=”50″ btn_padding_left=”20″ btn_padding_top=”10″ btn_bg_color=”#ffffff” btn_hover=”ubtn-fade-bg” btn_bg_color_hover=”#ffffff” icon_size=”32″ btn_icon_pos=”ubtn-sep-icon-at-left” btn_border_style=”solid” btn_color_border=”#467db1″ btn_border_size=”7″ btn_radius=”0″ el_class=”sd_page_button” css_adv_btn=”.vc_custom_1563275074524{padding-top: 5px !important;padding-right: 5px !important;padding-bottom: 5px !important;padding-left: 5px !important;}”][/vc_column_inner][/vc_row_inner][vc_empty_space height=”20px”][vc_column_text]

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

[/vc_column_text][/vc_column][/vc_row]