IEEE JAVA PROJECT LIST 2015-2016
SNO | Projects List |
---|---|
1 | Identity Based Encryption with Outsourced Revocation in Cloud Computing |
2 | Secure Distributed Deduplication Systems with Improved Reliability |
3 | A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems |
4 | A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing |
5 | Secure Auditing and Deduplicating Data in Cloud |
7 | User Anonymous Authentication Scheme for Decentralized Access Control in Clouds |
8 | Cost Effective Authentic and Anonymous Data Sharing with Forward Security |
9 | Audit Free Cloud Storage via deniable Attribute based Encryption |
10 | Energy Efficient Fault Tolerant Data Storage And Processing In Mobile Cloud |
11 | CHARM: A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability |
12 | Malware Propagation in Large Scale Networks |
13 | Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection |
14 | A Cocktail Approach for Travel Package Recommendation |
15 | Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge |
16 | Context-Based Diversification for Keyword Queries over XML Data |
17 | A Computational Dynamic Trust Model for User Authorization |
18 | m-Privacy for Collaborative Data Publishing |
19 | A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks |
20 | A Distributed Three-Hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks |
21 | User-Defined Privacy Grid System for Continuous Location-Based Services |
22 | Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks |
23 | Friendbook: A Semantic-based Friend Recommendation System for Social Networks |
24 | A Case Based Recommendation Approach for Market Basket Data |
25 | Secure and dynamic multi keyword ranked search over encrypted data |
26 | A Proximity-Aware Interest-Clustered P2P File Sharing System |
27 | A Hybrid Cloud Approach for Secure Authorized Deduplication |
28 | A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems |
29 | A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
30 | A Social Compute Cloud Allocating and Sharing Infrastructure Resources via Social Networks |
31 | A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud |
CLOUD COMPUTING PROJECTS
1 | Identity Based Encryption with Outsourced Revocation in Cloud Computing |
2 | Secure Distributed Deduplication Systems with Improved Reliability |
3 | A Scalable and Reliable Matching Service for Content-Based PublishSubscribe Systems |
4 | A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing |
5 | Secure Auditing and Deduplicating Data in Cloud |
6 | User Anonymous Authentication Scheme for Decentralized Access Control in Clouds |
7 | Cost Effective Authentic and Anonymous Data Sharing with Forward Security |
8 | Audit Free Cloud Storage via deniable Attribute based Encryption |
9 | Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform |
10 | Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing |
11 | Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage |
12 | Deleting Secret Data with Public Verifiability |
DATA MINING
1 | Malware Propagation in Large Scale Networks |
2 | Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection |
3 | Context-Based Diversification for Keyword Queries over XML Data |
4 | Towards Effective Bug Triage with Software Data Reduction Techniques |
5 | Best Keyword Cover Search |
6 | Data Mining Based Crime Investigation Systems Taxonomy and Relevance |
7 | Discovery of Ranking Fraud for Mobile Apps |
8 | Efficient heart disease prediction system using decision tree |
9 | Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word/a> |
10 | Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites |
11 | Scalable Feature Selection in High-Dimensional Data Based on GRASP |
12 | A Local Mining and Global Learning Approach for Bridging the Vocabulary Gap |
13 | Filtering Mechanism for Unwanted Messages on OSN User Wall Using CBMF |
14 | Smart Crawler A Two stage Crawler for Efficiently Harvesting Deep Web Interfaces |
15 | EMR A Scalable Graph based Ranking Model for Content based Image Retrieval |
16 | Progressive Duplicate Detection |
17 | On Summarization and Timeline Generation for Evolutionary Tweet Streams |
18 | Route-Saver Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services |
19 | Structured Learning from Heterogeneous Behavior for Social Identity Linkage |
20 | Sparsity Learning Formulations for Mining Time-Varying Data |
21 | Anonymizing Collections of Tree-Structured Data |
22 | Rule-Based Method for Entity Resolution |
23 | Security Evaluation of Pattern Classifiers under Attack |
24 | Real-Time Detection of Traffic From Twitter Stream Analysis |
25 | FOCS Fast Overlapped Community Search |
26 | Tracking Temporal Community Strength in Dynamic Networks |
NETWORKING
1 | Cloud cyber attack against Social Network |
2 | Energy Efficient Fault Tolerant Data Storage And Processing In Mobile Cloud |
3 | Detecting Malicious Facebook Applications |
4 | Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks |
DEPENDABLE AND SECURE COMPUTING
1 | Secure Spatial Top-k Query Processing via Untrusted Location- Based Service Providers |
2 | A Computational Dynamic Trust Model for User Authorization |
3 | Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks |
4 | A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks |
5 | Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted |
6 | Continuous and Transparent User Identity Verification for Secure Internet |
7 | My Privacy My Decision Control of Photo Sharing on Online Social Networks |
8 | Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks |
MOBILE COMPUTING
1 | User-Defined Privacy Grid System for Continuous Location-Based Services |
2 | Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks |
3 | Friendbook A Semantic-based Friend Recommendation System for Social Networks |
IMAGE PROCESSING
1 | An Attribute-Assisted Reranking Model for Web Image Search |
2 | Learning to Rank Image Tags With Limited Training Examples |
3 | Friendbook A Semantic-based Friend Recommendation System for Social Networks |
INFORMATION FORENSICS AND SECURITY
1 | Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption |
2 | Passive IP Traceback Disclosing the Locations of IP Spoofers from Path Backscatter |
3 | Key Updating for Leakage Resiliency with Application to AES Modes of Operation |
4 | Software Puzzle A Countermeasure to Resource-Inflated Denial-of-Service Attacks |
5 | Provable Multicopy Dynamic Data Possession in Cloud Computing Systems |
6 | A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations |
7 | An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration |
IMAGE PROCESSING
1 | An Attribute-Assisted Reranking Model for Web Image Search |
2 | Learning to Rank Image Tags With Limited Training Examples |
3 | Friendbook A Semantic-based Friend Recommendation System for Social Networks |
PARALLEL & DISTRIBUTED SYSTEMS
1 | Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud |
2 | CloudArmor Supporting Reputation-based Trust Management for Cloud Services |
3 | Shared Authority Based Privacy preserving Authentication Protocol in Cloud Computing |
4 | Parallel processing of dynamic continuous queries over streaming data flows |
5 | Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds |
6 | A Hybrid Cloud Approach for Secure Authorized Deduplication |
7 | A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
8 | A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud |
SOFTWARE APPLICATION
1 | Towards Secure Cryptographic Software Implementation Against Side Channel Power |
SERVICES COMPUTING
1 | Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation |
2 | Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System |
INTELLIGENT SYSTEMS
1 | A Case Based Recommendation Approach for Market Basket Data |