Java IEEE Projects 2015 2016 in Chennai

IEEE JAVA PROJECT LIST 2015-2016

SNOProjects List
1Identity Based Encryption with Outsourced Revocation in Cloud Computing
2Secure Distributed Deduplication Systems with Improved Reliability
3A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
4A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
5Secure Auditing and Deduplicating Data in Cloud
7User Anonymous Authentication Scheme for Decentralized Access Control in Clouds
8Cost Effective Authentic and Anonymous Data Sharing with Forward Security
9Audit Free Cloud Storage via deniable Attribute based Encryption
10Energy Efficient Fault Tolerant Data Storage And Processing In Mobile Cloud
11CHARM: A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability
12Malware Propagation in Large Scale Networks
13Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
14A Cocktail Approach for Travel Package Recommendation
15Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge
16Context-Based Diversification for Keyword Queries over XML Data
17A Computational Dynamic Trust Model for User Authorization
18m-Privacy for Collaborative Data Publishing
19A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks
20A Distributed Three-Hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
21User-Defined Privacy Grid System for Continuous Location-Based Services
22Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks
23Friendbook: A Semantic-based Friend Recommendation System for Social Networks
24A Case Based Recommendation Approach for Market Basket Data
25Secure and dynamic multi keyword ranked search over encrypted data
26A Proximity-Aware Interest-Clustered P2P File Sharing System
27A Hybrid Cloud Approach for Secure Authorized Deduplication
28A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
29A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
30A Social Compute Cloud Allocating and Sharing Infrastructure Resources via Social Networks
31A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud

CLOUD COMPUTING PROJECTS

1Identity Based Encryption with Outsourced Revocation in Cloud Computing
2Secure Distributed Deduplication Systems with Improved Reliability
3A Scalable and Reliable Matching Service for Content-Based PublishSubscribe Systems
4A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
5Secure Auditing and Deduplicating Data in Cloud
6User Anonymous Authentication Scheme for Decentralized Access Control in Clouds
7Cost Effective Authentic and Anonymous Data Sharing with Forward Security
8Audit Free Cloud Storage via deniable Attribute based Encryption
9Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
10Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
11Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
12Deleting Secret Data with Public Verifiability

DATA MINING

1Malware Propagation in Large Scale Networks
2Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
3Context-Based Diversification for Keyword Queries over XML Data
4Towards Effective Bug Triage with Software Data Reduction Techniques
5Best Keyword Cover Search
6Data Mining Based Crime Investigation Systems Taxonomy and Relevance
7Discovery of Ranking Fraud for Mobile Apps
8Efficient heart disease prediction system using decision tree
9Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word/a>
10Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
11Scalable Feature Selection in High-Dimensional Data Based on GRASP
12A Local Mining and Global Learning Approach for Bridging the Vocabulary Gap
13Filtering Mechanism for Unwanted Messages on OSN User Wall Using CBMF
14Smart Crawler A Two stage Crawler for Efficiently Harvesting Deep Web Interfaces
15EMR A Scalable Graph based Ranking Model for Content based Image Retrieval
16Progressive Duplicate Detection
17On Summarization and Timeline Generation for Evolutionary Tweet Streams
18Route-Saver Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services
19Structured Learning from Heterogeneous Behavior for Social Identity Linkage
20Sparsity Learning Formulations for Mining Time-Varying Data
21Anonymizing Collections of Tree-Structured Data
22Rule-Based Method for Entity Resolution
23Security Evaluation of Pattern Classifiers under Attack
24Real-Time Detection of Traffic From Twitter Stream Analysis
25FOCS Fast Overlapped Community Search
26Tracking Temporal Community Strength in Dynamic Networks

NETWORKING

1Cloud cyber attack against Social Network
2Energy Efficient Fault Tolerant Data Storage And Processing In Mobile Cloud
3Detecting Malicious Facebook Applications
4Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

DEPENDABLE AND SECURE COMPUTING

1Secure Spatial Top-k Query Processing via Untrusted Location- Based Service Providers
2A Computational Dynamic Trust Model for User Authorization
3Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
4A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks
5Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted
6Continuous and Transparent User Identity Verification for Secure Internet
7My Privacy My Decision Control of Photo Sharing on Online Social Networks
8Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

MOBILE COMPUTING

1User-Defined Privacy Grid System for Continuous Location-Based Services
2Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks
3Friendbook A Semantic-based Friend Recommendation System for Social Networks

IMAGE PROCESSING

1An Attribute-Assisted Reranking Model for Web Image Search
2Learning to Rank Image Tags With Limited Training Examples
3Friendbook A Semantic-based Friend Recommendation System for Social Networks

INFORMATION FORENSICS AND SECURITY

1Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
2Passive IP Traceback Disclosing the Locations of IP Spoofers from Path Backscatter
3Key Updating for Leakage Resiliency with Application to AES Modes of Operation
4Software Puzzle A Countermeasure to Resource-Inflated Denial-of-Service Attacks
5Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
6A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations
7An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration

IMAGE PROCESSING

1An Attribute-Assisted Reranking Model for Web Image Search
2Learning to Rank Image Tags With Limited Training Examples
3Friendbook A Semantic-based Friend Recommendation System for Social Networks

PARALLEL & DISTRIBUTED SYSTEMS

1Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud
2CloudArmor Supporting Reputation-based Trust Management for Cloud Services
3Shared Authority Based Privacy preserving Authentication Protocol in Cloud Computing
4Parallel processing of dynamic continuous queries over streaming data flows
5Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
6A Hybrid Cloud Approach for Secure Authorized Deduplication
7A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
8A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud

SOFTWARE APPLICATION

1Towards Secure Cryptographic Software Implementation Against Side Channel Power

SERVICES COMPUTING

1Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
2Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

INTELLIGENT SYSTEMS

1A Case Based Recommendation Approach for Market Basket Data