• +91 7036987111
  • triad.tts@gmail.com

JAVA B.TECH/B.E IEEE 2018-19

 Download Project List

Sno

Project Title

Year

Abstract

CLOUD COMPUTING

1. CypherDB: A Novel Architecture for Outsourcing Secure Database Processing 2018 Download
2. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage 2018 Download
3. DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security 2018 Download
4. Audit-Free Cloud Storage via Deniable Attribute-based Encryption 2018 Download
5. Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things 2017 Download
6. Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing 2017 Download
7. Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud 2017 Download
8. Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data 2017 Download
9. Fast Phrase Search for Encrypted Cloud Storage 2017 Download
10. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud 2017 Download
11. Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data 2017 Download
12. Privacy Protection based Access Control Scheme in Cloud-based Services 2017 Download
13. RAAC Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage 2017 Download
14. A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing 2017 Download
15. Securing Cloud Data under Key Exposure 2017 Download
16. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 2017 Download
17. An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing 2016 Download
18. Two-Factor Data Security Protection Mechanism for Cloud Storage System 2016 Download
19. Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email 2016 Download
20. Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services 2016 Download
21. CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System 2016 Download
22. Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing 2016 Download
23. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2016 Download
24. CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services 2016 Download
25. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 2016 Download
26. PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System 2015 Download
27. Audit-Free Cloud Storage via Deniable Attribute-based Encryption 2015 Download
28. Secure Distributed Deduplication Systems with Improved Reliability 2015 Download
29. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems 2015 Download
30. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 2015 Download
31. A Hybrid Cloud Approach for Secure Authorized Deduplication 2015 Download
32. BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value Store 2015 Download
33. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data 2015 Download

DATA MINING

1. Complementary Aspect-based Opinion Mining 2018 Download
2. Weakly-supervised Deep Embedding for Product Review Sentiment Analysis 2018 Download
3. Analyzing Sentiments in One Go A Supervised Joint Topic Modeling Approach 2017 Download
4. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback 2017 Download
5. Identifying Objective and Subjective Words via Topic Modeling 2017 Download
6. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data 2017 Download
7. An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques 2017 Download
8. Learning Supervised Topic Models for Classification and Regression from Crowds 2017 Download
9. Using Semantic Similarity in Crawling-based Web Application Testing 2017 Download
10. Detecting Stress Based on Social Interactions in Social Networks 2017 Download
11. Continuous Top-k Monitoring on Document Streams 2017 Download
12. Nearest Keyword Set Search in Multi-Dimensional Datasets 2016 Download
13. Top-Down XML Keyword Query Processing 2016 Download
14. Location Aware Keyword Query Suggestion Based on Document Proximity 2016 Download
15. A Novel Recommendation Model Regularized with User Trust and Item Ratings 2016 Download
16. DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud 2016 Download
17. DARE: A Deduplication-Aware Resemblance Detection and Elimination Scheme for DataReduction with Low Overheads 2016 Download
18. Resolving Multi-Party Privacy Conflicts in Social Media 2016 Download
19. Booster in High Dimensional Data Classification 2016 Download
20. Progressive Duplicate Detection 2015 Download
21. Context-Based Diversification for Keyword Queries Over XML Data 2015 Download
22. Best Keyword Cover Search 2015 Download
23. Rank-Based Similarity Search: Reducing the Dimensional Dependence 2015 Download
24. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data 2015 Download
25. Structured Learning from Heterogeneous Behavior for Social Identity Linkage 2015 Download

NET WORKING & NETWORK SECURITY

1. Priority Queuing for Packets With Two Characteristics 2018 Download
2. Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks 2018 Download
3. Secure Range Search over Encrypted Uncertain IoT Outsourced Data 2018 Download
4. Socially-Driven Learning-Based Prefetching in Mobile Online Social Networks 2017 Download
5. Location Privacy Preservation in Database-driven Wireless Cognitive Networks through Encrypted Probabilistic Data Structures 2017 Download
6. ECL-EKM: An Enhanced Certificateless Effective Key Management Protocol for Dynamic WSN 2017 Download
7. Network Capability in Localizing Node Failures via End-to-End Path Measurements 2017 Download
8. An Overlay Architecture for Throughput Optimal Multipath Routing 2017 Download
9. High Throughput Opportunistic Cooperative Device-to-Device Communications With Caching 2017 Download
10. Multi-Grained Block Management to Enhance the Space Utilization of File Systems on PCM Storages 2016 Download
11. Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks 2016 Download
12. ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks 2016 Download
13. Resource-Saving File Management Scheme for Online Video Provisioning on Content Delivery Networks 2016 Download
14. Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks 2016 Download
15. A Stable Approach for Routing Queries in Unstructured P2P Networks 2016 Download
16. PASER: Secure and Efficient Routing Approach for Airborne Mesh Networks 2016 Download
17. Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks 2015 Download
18. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks 2015 Download
19. Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing 2015 Download
20. Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design 2015 Download
21. Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks 2015 Download
22. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 2014 Download
23. Automatic Test Packet Generation 2014 Download
24. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices 2014 Download
25. A Two-stage Deanonymization Attack Against Anonymized Social Networks 2014 Download

BIG DATA

1. Fast and Parallel Trust Computing Scheme Based on Big Data Analysis For Collaboration Cloud Service 2018 Download
2. HDM: A Composable Framework for Big Data Processing 2018 Download
3. NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users 2017 Download
4. Online Data Deduplication for In-Memory Big-Data Analytic Systems 2017 Download
5. Designing Self-Tuning Split-Map-Merge Applications for High Cost-Efficiency in the Cloud 2017 Download
6. Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud 2017 Download
7. Secure k-NN Query on Encrypted Cloud Data with Multiple Keys 2017 Download
8. On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications 2016 Download
9. Hybrid Job-Driven Scheduling for Virtual MapReduce Clusters 2016 Download
10. Operational – Log Analysis for Big Data Systems 2016 Download
11. Dynamic Job Ordering and Slot Configurations for MapReduce Workloads 2016 Download
12. A Parallel Patient Treatment Time Prediction Algorithm and Its Applications in Hospital Queuing-Recommendation in a Big Data Environment 2016 Download
13. H2Hadoop: Improving Hadoop Performance using the Metadata of Related Jobs 2016 Download
14. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud 2015 Download
15. BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value Store 2015 Download

MOBILE COMPUTING

1. SUPERMAN Security Using Pre-Existing Routing for Mobile Ad hoc Networks 2018 Download
2. Detecting Mobile Malicious Webpages in Real Time 2018 Download
3. Quantifying Interdependent Privacy Risks with Location Data 2018 Download
4. Energy and Memory Efficient Clone Detection in Wireless Sensor Networks 2017 Download
5. Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach 2017 Download
6. Providing Privacy-Aware Incentives in Mobile Sensing Systems 2017 Download
7. Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks 2016 Download
8. User-Defined Privacy Grid System for Continuous Location-Based Services 2016 Download
9. Wormhole Attack Detection Algorithms in Wireless Network Coding Systems 2016 Download

SECURE COMPUTING

1. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data 2017 Download
2. Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data 2017 Download
3. Privacy Protection for Wireless Medical Sensor Data 2016 Download
4. Data Lineage in Malicious Environments 2016 Download
5. Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts 2016 Download
6. A Computational Dynamic Trust Model for User Authorization 2015 Download
7. Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks 2015 Download

WEB APPLICATIONS

1. Online Grievance Management Non-IEEE Download
2. Car Pooling Non-IEEE Download
3. College Management System Non-IEEE Download
4. Expense Calculator Non-IEEE Download
5. Insurance Policy for Vehicle and Bodily Injured Liability Non-IEEE Download
6. Automatic lending system Non-IEEE Download
7. Career Calling Non-IEEE Download
8. Student Online Voting System Non-IEEE Download
9. E – Health Care Non-IEEE Download
10. Automatic Time Table Generator Non-IEEE Download
11. Online Pharmacy Non-IEEE Download
12. Online Ticket Reservations Non-IEEE Download
13. Meditracking System Non-IEEE Download
14. Government Scheme Alerts Non-IEEE Download
15. Resume Building Non-IEEE Download
16. E commerce (Online Shopping) Non-IEEE Download
17. HR Operations Manager Non-IEEE Download
18. Crime Record Management System Non-IEEE Download
19. Multi Banking Transaction System Non-IEEE Download
20. Online Student Portal Non-IEEE Download

ANDROID APPLICATIONS

1. Employee Task Reminder Download
2. Expense Tracker Download
3. Online Shopping Download
4. Student and Faculty Chatting App Download
5. Mobile Application Interface to Register Citizen Complaint Download
6. Android Weather Application Download
7. Smart Alumni Discovery Download
8. Mobile super market Download
9. Mobile patient management system Download