IEEE DOTNET PROJECT LIST 2016-2017
CLOUD COMPUTING
SNO | Projects List |
---|---|
1 | Secure Data Sharing in Cloud Computing Using Revocable Storage Identity Based Encryption |
2 | Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
3 | Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud |
4 | CDStore Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal |
5 | privacy protection and intrusion avoidance for cloudlet-based medical data sharing |
DATA MINING
1 | A Mixed Generative Discriminative Based Hashing Method |
2 | Text Mining the Contributors to Rail Accidents |
3 | Quantifying Political Leaning from Tweets, Retweets, and Re tweeters |
4 | Using Hashtag Graph-Based Topic Model to Connect Semantically-Related Words Without Co-Occurrence in Microblogs |
5 | Inference Attack on Browsing History of Twitter Users using Public |
6 | WORAL A Witness Oriented Secure Location Provenance Framework for Mobile Devices |
PARALLEL AND DISTRIBUTED SYSTEM
1 | Authenticated Key Exchange Protocols for Parallel Network File Systems |
2 | Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
3 | A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data |
4 | Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems |
SECURE COMPUTING
1 | Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data |
MULTIMEDIA
1 | User-Service Rating Prediction by Exploring Social Users Rating Behaviors |
NETWORKING
1 | Secure and Efficient data communication protocol for Wireless Body Area Networks |
2 | Efficient Certificateless Access Control For Wireless Body Area Networks |
3 | Optimizing Cost for Online Social Networks on Geo-Distributed Clouds |
IMAGE PROCESSING
1 | Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation |
2 | Content Adaptive Steganography by Minimizing Statistical Detectability |
3 | Securing SIFT Privacy-preserving Outsourcing Computation of Feature Extractions over Encrypted Image Data |
SERVICE COMPUTING
1 | Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys |
2 | Cloud workflow scheduling with deadlines and time slot availability |
3 | Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage |
4 | Online Learning in Large-scale Contextual Recommender Systems |
BIG DATA
1 | Personalized Travel Sequence Recommendation on Multi Source Big Social Media |
INFORMATION FORENSICS AND SECURITY
1 | Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates |
2 | Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services |