Revise Search
Issue | Title | |
Vol 1, No 4 (2013): JUNE - JULY | IMPLEMENTATION OF CLOUD COMPUTING IN E-GOVERNANCE – A GREEN REVOLUTION | Abstract PDF |
Saju Mathew | ||
Vol 2, No 5 (2014): August - September 2014 | RE-CONFIGURABLE RESOURCE SCHEDULER FOR CLOUD COMPUTING ENVIRONMENT UNDER DYNAMIC VIRTUAL MODEL | Abstract |
K. Kanthi Sri, D.L. Prasanna | ||
Vol 4, No 6 (2016): October - November 2016 | PROVIDING A VIBRANT HIGHER-PROFITABILITY MECHANISM FOR SERVICE PROVIDERS | Abstract PDF |
Bhaskaruni Palani Sai Krishna, Y Sravana Sandhya | ||
Vol 6, No 3 (2018): April - May 2018 | A RELIABLE DATA OUTSOURCING WITH REVOCABLE REPOSITORY IDENTITY-BASED CONVERSION IN CLOUD COMPUTING | Abstract PDF |
Lochar Sowmya, Thalla Shankar | ||
Vol 2, No 5 (2014): August - September 2014 | A NEW EFFICIENT VENDOR LOCK-IN CHURN IN SUPER-INTER CLOUD ENVIRONMENT | Abstract |
A. Satyam, K. Jeswanth Kumar | ||
Vol 10, No 2 (2022): February - March 2022 | A Protected And Lightweight Data Distribution Program For Mobile Cloud Computing | Abstract PDF |
GUNDEBOINA NAGARAJU, G RAVI | ||
Vol 3, No 4 (2015): June - July 2015 | IMPLEMENTATION OF EFFECTIVE SYSTEM FOR CONSISTENT DATA VERIFICATION | Abstract PDF |
D.Venkat Nikhil Kumar, D.Koteswara Rao, Dr. J.Sasi Kiran | ||
Vol 9, No 1 (2021): December - January 2021 | Identity And Influence Control For Cipher Schema For Defining Strings | Abstract PDF |
REDDY APPALASWAMY, B.S.S MONICA, GOPISETTI GURUKESAVA DASU | ||
Vol 3, No 3 (2015): April - May 2015 | OVERVIEW TOWARDS STABILIZING OF DATA STORAGE IN CLOUD SYSTEM | Abstract PDF |
S. Narendar, U. Sivaji | ||
Proceedings of International Web Conference “Cyber Security” 30th November 2022, Organized by Sbyte Technologies | Focus On Some Cyber Security Topics: Literature Based Study | Abstract PDF |
DESAM SUDHAKAR REDDY, D. DEEPSHIKA | ||
Proceedings of International Web Conference “Cyber Security” 30th November 2022, Organized by Sbyte Technologies | Some Cyber Security Topics: Review Study | Abstract PDF |
PRAMOD KUMAR | ||
Vol 10, No 5 (2022): August - September 2022 | Literature based Cyber Security Topics: Handbook | Abstract PDF |
Dr SRIDHAR SESHADRI | ||
Vol 4, No 5 (2016): August - September 2016 | INTRODUCING A SWITCHING THEORY IN DIFFERENT STRATEGIES AND SITUATIONS | Abstract PDF |
D. Sangeetha, Y. Prasanna | ||
Vol 5, No 5 (2017): August - September 2017 | ALLOCATION OF THE LARGE CLUSTER SETUPS IN MAPREDUCE | Abstract PDF |
Daggupati Saidamma | ||
Vol 8, No 4 (2020): June - July 2020 | Profit Renting Schema for cloud Service Providers in Cloud Computing | Abstract PDF |
MAKA SAMPATH KUMAR, SUNKARAPALLI SRINIVAS | ||
Vol 5, No 2 (2017): February - March 2017 | HYBRID CLOUD METHODOLOGY FOR SAFE APPROVED DEDUPLICATIONS | Abstract PDF |
Thirumanikuppam Govindarajan Bhanurekha, Challa Bhaskar Rao | ||
Vol 5, No 5 (2017): August - September 2017 | INVESTIGATION OF CLOUD COMPUTING SUPERVISION | Abstract PDF |
V.Rajendra Medicharla, K.V.V.B. Durgaprasad | ||
Vol 5, No 1 (2017): December - January 2017 | SECURING OUTSOURCED DATA REMOTELY ON OPEN NETS | Abstract PDF |
Divyashu Banerjee, G. Appa Rao | ||
Vol 4, No 2 (2016): February - March 2016 | CLOUD COMPUTING MADE EASY | Abstract PDF |
S. Sridhar | ||
Vol 5, No 3 (2017): April - May 2017 | A STRUCTURE TO ASSIST COLLECTION OF CLOUD PROVISION PROVIDERS | Abstract PDF |
R.Venkata Anuja, Venkata Ramaiah Kavuri | ||
Vol 4, No 6 (2016): October - November 2016 | A CROSS CLOUD METHOD FOR PROTECTED APPROVED DEDUPLICATION | Abstract PDF |
Murali . J, V Krishna Chaitanya | ||
Vol 4, No 5 (2016): August - September 2016 | A HIGH-SECURE COMPRESSION UTILITY FOR CROSS ARCHITECTURE DATA STORE | Abstract PDF |
Thipparapu Vijetha, M. Naresh Choudary | ||
Vol 10, No 5 (2022): August - September 2022 | A Literature Based Study on Cyber Security Vulnerabilities | Abstract PDF |
ROSHINI SOWRIRAJAN | ||
Vol 3, No 5 (2015): August - September 2015 | DELIVERING OF DATA SERVICES BY EMPLOYING CLOUD BASED PLATFORM FOR CORPORATE NETWORKS | Abstract PDF |
Naveen Yerramshetti | ||
Vol 4, No 6 (2016): October - November 2016 | A MIX CLOUD TO ELIMINATE REPLICA DATA CERTIFIED SAFE APPROACH | Abstract PDF |
Pericharla Mukhesh Varma, Gonaboyena Subramanyam | ||
Vol 2, No 4 (2014): June - July 2014 | SECURE DATA DISTRIBUTION FOR VIBRANT GROUPS IN THE CLOUD | Abstract PDF |
Ch. Naveen, G.Charles Babu | ||
Vol 4, No 4 (2016): June - July 2016 | TOWARDS A NOVEL HYBRID APPROACH FOR REMOVING DUPLICATE COPIES OF REPEATED DATA | Abstract PDF |
D. Sravani, P. Giridhar | ||
Vol 5, No 2 (2017): February - March 2017 | SECURE ENDORSED AVOIDING REPETITION IN PUBLIC AND PRIVATE APPROACH | Abstract PDF |
T. Monica, M.Bhanu Prakash, J. Deepthi | ||
Vol 4, No 4 (2016): June - July 2016 | A RELIABLE MANAGEMENT SYSTEM FOR CLOUD AND SENSOR NETWORKS | Abstract PDF |
Md. Nusrath, G. Lakpathi | ||
Vol 5, No 4 (2017): June - July 2017 | LIVELINESS-ALERT CAPACITY COMPLEMENTARY AND PRESENTATION ASCENDING FOR THE MIST NETWORK | Abstract PDF |
Boda Mohan, K. Deepika | ||
Vol 4, No 6 (2016): October - November 2016 | DATA SHARING WITH FORWARD SECURITY | Abstract PDF |
Gorikapudi Mahesh, B.V. Srinivasulu | ||
Vol 4, No 6 (2016): October - November 2016 | INDIVIDUALITY-FOUNDED CIRCULATED ATTESTABLE RECORDS CONTROL NOW MULTI-HAZE PACKING | Abstract PDF |
Shaik Sabir, M. V. Pavan Kumar, Dr. S. Gopi Krishna | ||
Vol 4, No 4 (2016): June - July 2016 | A EVIDENCE MULTICOPY DYNAMIC DATA POSSESSION IN MULTI CLOUD COMPUTING SYSTEM | Abstract PDF |
G. Venkata Tejaswi, B. Subba Reddy | ||
Vol 2, No 3 (2014): April - May 2014 | EFFICIENT DATA STORAGE IN CLOUD | Abstract PDF |
Ankush Sharma, Vinayak U C | ||
Vol 9, No 5 (2021): August - September 2021 | Verifiable Secret Key Generation for Ranked Multi-Keyword Search in Cloud | Abstract PDF |
VALLABHANENI SAI CHANDU, KONAPALLI VENKATA DURGA DEVI | ||
Vol 5, No 5 (2017): August - September 2017 | ENABLE CLOUD ACCUMULATE APPRAISAL WITH PROVABLE FOR OUT SOURCE OF EXPLANATION UPDATES | Abstract PDF |
Suneetha Thaduri, Katta Padmaja | ||
Proceedings of Cloud based International Conference Organized by Sybe Technologies on 5th June 2020 | Literature Based Study On Cloud Computing For Health And Sustainability In View Of Covid19 | Abstract PDF |
PRAMOD KUMAR | ||
Vol 4, No 6 (2016): October - November 2016 | AN ENCRYPTION SCHEME WITH SUPPORTABLE ALLOCATION IN CLOUD COMPUTING | Abstract PDF |
Mamidi Swetha, Y.Jeevan Nagendra Kumar | ||
Vol 11, No 3 (2023): April - May 2023 | Cloud Storage System Towards Dynamic Encrypted Cloud Data With Symmetric-Key Based Verification | Abstract PDF |
KAKARA MADHUSUDHANA RAJU, B. MAHA LAKSHMI RAO | ||
Vol 5, No 3 (2017): April - May 2017 | A PERSONALIZED HIERARCHICAL QUALITY-BASED CIPHER TEXT CONTACT CONTROL PROCESS FOR MOBILE CLOUD COMPUTING | Abstract PDF |
Anusha R, P. Tara Kumari | ||
Vol 9, No 5 (2021): August - September 2021 | Attribute-Based Encryption Scheme for Secured data Storage in Cloud Computing | Abstract PDF |
V.S.VARA LAKSHMI, SARAKULA DEVANAM PRIYA | ||
Vol 4, No 5 (2016): August - September 2016 | A SURVEY ON PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE | Abstract PDF |
M. Kalpana, T. Neetha | ||
Vol 2, No 6 (2014): October - November 2014 | AN EFFECTIVE CACHING SCHEME FOR AMES | Abstract |
Eesub Mohammad, Dr.Y. Venkateswarlu | ||
Vol 5, No 6 (2017): October - November 2017 | STABILIZING SERVER LOAD AND MEASUREMENT OF APPLICATION RELIABILITY FOR THE CLOUD ENVIRONMENT | Abstract PDF |
Renwa Anurag Sharma, Dr. Ekbal Rashid | ||
Vol 4, No 5 (2016): August - September 2016 | CONTROL-CURRENT ACCURATE AND SECRET TRUTHS ALLOCATION WITH ADVANCING SAFETY | Abstract PDF |
K. Deepthi Sree, N. Sujata Kumari | ||
Vol 4, No 2 (2016): February - March 2016 | ENHANCED REAL-TIME GROUP AUCTION SYSTEM FOR EFFICIENT ALLOCATION OF CLOUD INTERNET APPLICATIONS | Abstract PDF |
Naveen Kumar, S A Gowri Sankar, M Naveen Kumar, Polabathula Manikanta, V Sakthi Aravind | ||
Vol 2, No 5 (2014): August - September 2014 | SOLVING OPTIMALITY AND STORAGE CONSTRAINT PROBLEMS IN DATA STAGING CLOUDS | Abstract |
P.V.V.S.D. Nagendrudu, M.Srinivasa Chakravarthy | ||
Vol 5, No 5 (2017): August - September 2017 | OUTSOURCING A RELIABLE OPTIMIZATION COMPUTATION IN DISTORT COMPUTING: A MEDICAL RECORD OF PRECARIOUS PROGRAMMING | Abstract PDF |
Doomavath Shashikanth | ||
Vol 9, No 5 (2021): August - September 2021 | Secure Searching Mechanism for Cloud Computing Based Cloud Storage System | Abstract PDF |
M.PRIYANKA REDDY, YEDIDA RAMA KRISHNA | ||
Vol 5, No 1 (2017): December - January 2017 | DISTRIBUTING WORKLOADS AND MANAGEMENT FOR THE CLOUD NETWORKS | Abstract PDF |
Dr. B.Sankara Babu | ||
Vol 3, No 6 (2015): October - November 2015 | SECURING CLOUD COMPUTING SERVICES USING STRONG USER AUTHENTICATION WITH LOCAL CERTIFICATION AUTHORITY | Abstract PDF |
My Abdelkader Youssefi | ||
Vol 5, No 4 (2017): June - July 2017 | RELIABLE DEVELOPMENT ESTIMATION OUTSOURCING IN DISTORT COMPUTING: A MEDICAL RECORD OF PRECARIOUS PROGRAMMING | Abstract PDF |
Shakeel Ahmed Md, P. Balakeshava Reddy | ||
Vol 4, No 4 (2016): June - July 2016 | CLOUD ENVIRONMENT USING MANY PHRASAL WORDS CONCEALMENT PRESERVING TO PERFORM SAFE SEARCH | Abstract PDF |
N. Grace Naomi, Dr. G. Charles Babu, Dr. Ch. Ramesh Babu | ||
Vol 2, No 5 (2014): August - September 2014 | AN EFFICIENT MECHANISM FOR LOCK-IN VENDOR SERVICES IN SUPER-INTER CLOUD ENVIRONMENT | Abstract |
K.Shyam Umadevi, K. Nagaraju | ||
Vol 5, No 5 (2017): August - September 2017 | REMOTE DATA RELIABILITY CHECKING IN SUPPORTABLE DATA CONTROL IN MULTI CLOUD STORAGE | Abstract PDF |
E. Soundarya, K.S.R.K. Sarma | ||
Vol 5, No 3 (2017): April - May 2017 | ASPECT-BASE PROXY-ORIENTED INFORMATION SAVING AND DISTANT DATA RELIABILITY VERIFICATION IN CLOUD | Abstract PDF |
Prudhvi Raju Manthena, A. Sangeetha | ||
Vol 4, No 4 (2016): June - July 2016 | DYNAMIC MULTI-KEYWORD RANKING SCHEME ON ENCRYPTED CLOUD DATA | Abstract PDF |
K. Narendra, G K V Narasimhareddy | ||
Vol 2, No 5 (2014): August - September 2014 | EXPLORING AND UNDERSTAND USER SEARCH INTENTIONS IN WEB SEARCH ENGINE | Abstract |
P.S.D.D.R. Saraja, M.Srinivasa Aruna | ||
Vol 5, No 5 (2017): August - September 2017 | SUPPORTING CLOUD ASSESSMENT WITH KEY UPDATES CHECKED | Abstract PDF |
Pendyala Ashwini, D.Aruna Kumari | ||
Vol 5, No 5 (2017): August - September 2017 | TRANSPARENT SECURITY OF PRODUCTIVE RELIABLE AND UNAUTHORIZED DATA SHARING | Abstract PDF |
K. Vikram Kumar, Himagiri Danapana | ||
Vol 4, No 5 (2016): August - September 2016 | DEPLOYING AN UNIQUE CONTROL SCHEME TO REDUCE THE IDENTITY LEAKAGE | Abstract PDF |
Z. Noor Fatima, B.V.S. P.Pavan Kumar | ||
Vol 4, No 4 (2016): June - July 2016 | CLOUD COMPUTING STRATEGY FOR OVERFLOW OF DENIED DATA | Abstract PDF |
B. Venkateswara Reddy, U U Veerendra | ||
Vol 4, No 4 (2016): June - July 2016 | BUILDING OF AN EFFECTIVE MAXIMIZATION APPROACH FOR ENSURING QUALITY OF SERVICE IN CLOUD | Abstract PDF |
D. Yamini, P. Giridhar | ||
Vol 6, No 3 (2018): April - May 2018 | PROTECTED OPTIMIZATION AND CALCULATION OUT SOURCE IN CLOUD SUBTRACT: A CONTAINER STUDY OF LINER PROGRAMMING | Abstract PDF |
P. Anjali, G. Swathi | ||
Vol 4, No 6 (2016): October - November 2016 | MIGRATING FROM TRADITIONAL SYSTEM TO CLOUD COMPUTING TECHNOLOGY | Abstract PDF |
Mr. N. Nava Kumar, Mr. A. Arun Kumar Reddy | ||
Vol 5, No 5 (2017): August - September 2017 | PROTECTED COMPUTING AUTO SURFING IN CLOUD COMPUTING: A CONTAINER STUDY OF LP | Abstract PDF |
Bhavani Sravani, K S R K Sharma | ||
Vol 5, No 3 (2017): April - May 2017 | MIXTURE CONVERSION WITH CONFIRMABLE ALLOCATION IN CLOUD USING CP-ABE SCHEM | Abstract PDF |
A.M. Rangaraj, L. Bhargav | ||
Vol 9, No 5 (2021): August - September 2021 | Decentralizing Multi-Authority Attribute-based Data Sharing Scheme in Cloud computing | Abstract PDF |
JEEDIGUNTA SAI DIVYA, V.G.L NARASAMBA | ||
Vol 5, No 4 (2017): June - July 2017 | PRIVACY APPLICABLE DATA RELEASED IN PUBLIC CLOUD WITH ANALYSIS OF LINEAR PROGRAMMING | Abstract PDF |
Santoshi Chintha, B.V. Chowdary | ||
Vol 4, No 4 (2016): June - July 2016 | A MECHANISM OF CLOUDS FAITH CONTROLLING SERVICE FOR REAL-TIME READINESS | Abstract PDF |
B. Ramakrishna Teja, B.V. Srinivasulu | ||
Vol 9, No 5 (2021): August - September 2021 | Cloud Services with A Biometric Authentication Method And Privacy Protection | Abstract PDF |
BUDIMELLA SAGAR BABU, P. CHAITANYA, GOPISETTI GURUKESAVA DASU | ||
Vol 5, No 4 (2017): June - July 2017 | AN PROFICIENT AND SCALABLE ORGANIZATION OF RESOURCE DESCRIPTION FRAMEWORK DATA IN THE CLOUD COMPUTING | Abstract PDF |
Birru Devender | ||
Vol 2, No 4 (2014): June - July 2014 | A KEY BASED DATA SHARING PROTOCOL FOR SECURE INTER GROUP TRANSFERS | Abstract PDF |
K. Balaji, K Nukaraju | ||
Vol 9, No 6 (2021): October - November 2021 | Secure Access control Technology towards Data Sharing and Storage in Cloud Computing | Abstract PDF |
PICHIKA MOOLESWARA RAO, V G L NARASAMBA | ||
Vol 5, No 5 (2017): August - September 2017 | FLEXIBLE DATA STORAGE, RUGGEDLY BEDECKED AND BRILLIANT IN CLOUD COMPUTING | Abstract PDF |
B. Madhava Sai Reddy, Y. Praveen Kumar | ||
Vol 5, No 4 (2017): June - July 2017 | CLINICAL DOCUMENT GENERATION OF MIXING FOR PHYSICAL CONDITION DATA REPLACE IN CLOUD | Abstract PDF |
Birru Devender | ||
Vol 4, No 4 (2016): June - July 2016 | GROUP USER REVOCATION AND INTEGRITY AUDITING OF SHARED DATA IN CLOUD ENVIRONMENT | Abstract PDF |
K. Suresh Babu, J. Mahalakshmi | ||
Vol 2, No 3 (2014): April - May 2014 | IMPROVING PRIVACY IN SHARING OF PERSONAL HEALTH DATA STORAGE ON CLOUD | Abstract PDF |
Vahidhunnisha J., Ramasamy ., Balasubramaniam T | ||
Vol 9, No 5 (2021): August - September 2021 | Multi OwnerSecret Key Generation for Ranked Multi-Keyword Search in Cloud | Abstract PDF |
KUCHIPUDIHARSHA BOBBY, SUNJARAPALLI SREENIVAS | ||
0 - 0 of 79 Items |
Search tips:
- Search terms are case-insensitive
- Common words are ignored
- By default only articles containing all terms in the query are returned (i.e., AND is implied)
- Combine multiple words with OR to find articles containing either term; e.g., education OR research
- Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
- Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
- Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
- Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.