JAVA B.TECH/B.E IEEE 2018-19
Download Project List |
Sno
|
Project Title
|
Year
|
Abstract
|
CLOUD COMPUTING
|
1. |
CypherDB: A Novel Architecture for Outsourcing Secure Database Processing |
2018 |
Download |
2. |
A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage |
2018 |
Download |
3. |
DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security |
2018 |
Download |
4. |
Audit-Free Cloud Storage via Deniable Attribute-based Encryption |
2018 |
Download |
5. |
Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things |
2017 |
Download |
6. |
Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing |
2017 |
Download |
7. |
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud |
2017 |
Download |
8. |
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data |
2017 |
Download |
9. |
Fast Phrase Search for Encrypted Cloud Storage |
2017 |
Download |
10. |
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud |
2017 |
Download |
11. |
Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data |
2017 |
Download |
12. |
Privacy Protection based Access Control Scheme in Cloud-based Services |
2017 |
Download |
13. |
RAAC Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage |
2017 |
Download |
14. |
A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing |
2017 |
Download |
15. |
Securing Cloud Data under Key Exposure |
2017 |
Download |
16. |
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing |
2017 |
Download |
17. |
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing |
2016 |
Download |
18. |
Two-Factor Data Security Protection Mechanism for Cloud Storage System |
2016 |
Download |
19. |
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email |
2016 |
Download |
20. |
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services |
2016 |
Download |
21. |
CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System |
2016 |
Download |
22. |
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
2016 |
Download |
23. |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
2016 |
Download |
24. |
CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services |
2016 |
Download |
25. |
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data |
2016 |
Download |
26. |
PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System |
2015 |
Download |
27. |
Audit-Free Cloud Storage via Deniable Attribute-based Encryption |
2015 |
Download |
28. |
Secure Distributed Deduplication Systems with Improved Reliability |
2015 |
Download |
29. |
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems |
2015 |
Download |
30. |
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security |
2015 |
Download |
31. |
A Hybrid Cloud Approach for Secure Authorized Deduplication |
2015 |
Download |
32. |
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value Store |
2015 |
Download |
33. |
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data |
2015 |
Download |
DATA MINING
|
1. |
Complementary Aspect-based Opinion Mining |
2018 |
Download |
2. |
Weakly-supervised Deep Embedding for Product Review Sentiment Analysis |
2018 |
Download |
3. |
Analyzing Sentiments in One Go A Supervised Joint Topic Modeling Approach |
2017 |
Download |
4. |
Personal Web Revisitation by Context and Content Keywords with Relevance Feedback |
2017 |
Download |
5. |
Identifying Objective and Subjective Words via Topic Modeling |
2017 |
Download |
6. |
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data |
2017 |
Download |
7. |
An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques |
2017 |
Download |
8. |
Learning Supervised Topic Models for Classification and Regression from Crowds |
2017 |
Download |
9. |
Using Semantic Similarity in Crawling-based Web Application Testing |
2017 |
Download |
10. |
Detecting Stress Based on Social Interactions in Social Networks |
2017 |
Download |
11. |
Continuous Top-k Monitoring on Document Streams |
2017 |
Download |
12. |
Nearest Keyword Set Search in Multi-Dimensional Datasets |
2016 |
Download |
13. |
Top-Down XML Keyword Query Processing |
2016 |
Download |
14. |
Location Aware Keyword Query Suggestion Based on Document Proximity |
2016 |
Download |
15. |
A Novel Recommendation Model Regularized with User Trust and Item Ratings |
2016 |
Download |
16. |
DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud |
2016 |
Download |
17. |
DARE: A Deduplication-Aware Resemblance Detection and Elimination Scheme for DataReduction with Low Overheads |
2016 |
Download |
18. |
Resolving Multi-Party Privacy Conflicts in Social Media |
2016 |
Download |
19. |
Booster in High Dimensional Data Classification |
2016 |
Download |
20. |
Progressive Duplicate Detection |
2015 |
Download |
21. |
Context-Based Diversification for Keyword Queries Over XML Data |
2015 |
Download |
22. |
Best Keyword Cover Search |
2015 |
Download |
23. |
Rank-Based Similarity Search: Reducing the Dimensional Dependence |
2015 |
Download |
24. |
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data |
2015 |
Download |
25. |
Structured Learning from Heterogeneous Behavior for Social Identity Linkage |
2015 |
Download |
NET WORKING & NETWORK SECURITY
|
1. |
Priority Queuing for Packets With Two Characteristics |
2018 |
Download |
2. |
Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks |
2018 |
Download |
3. |
Secure Range Search over Encrypted Uncertain IoT Outsourced Data |
2018 |
Download |
4. |
Socially-Driven Learning-Based Prefetching in Mobile Online Social Networks |
2017 |
Download |
5. |
Location Privacy Preservation in Database-driven Wireless Cognitive Networks through Encrypted Probabilistic Data Structures |
2017 |
Download |
6. |
ECL-EKM: An Enhanced Certificateless Effective Key Management Protocol for Dynamic WSN |
2017 |
Download |
7. |
Network Capability in Localizing Node Failures via End-to-End Path Measurements |
2017 |
Download |
8. |
An Overlay Architecture for Throughput Optimal Multipath Routing |
2017 |
Download |
9. |
High Throughput Opportunistic Cooperative Device-to-Device Communications With Caching |
2017 |
Download |
10. |
Multi-Grained Block Management to Enhance the Space Utilization of File Systems on PCM Storages |
2016 |
Download |
11. |
Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks |
2016 |
Download |
12. |
ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks |
2016 |
Download |
13. |
Resource-Saving File Management Scheme for Online Video Provisioning on Content Delivery Networks |
2016 |
Download |
14. |
Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks |
2016 |
Download |
15. |
A Stable Approach for Routing Queries in Unstructured P2P Networks |
2016 |
Download |
16. |
PASER: Secure and Efficient Routing Approach for Airborne Mesh Networks |
2016 |
Download |
17. |
Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks |
2015 |
Download |
18. |
Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks |
2015 |
Download |
19. |
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though
Replication for Efficient File Sharing |
2015 |
Download |
20. |
Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design |
2015 |
Download |
21. |
Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks |
2015 |
Download |
22. |
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks |
2014 |
Download |
23. |
Automatic Test Packet Generation |
2014 |
Download |
24. |
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices |
2014 |
Download |
25. |
A Two-stage Deanonymization Attack Against Anonymized Social Networks |
2014 |
Download |
BIG DATA
|
1. |
Fast and Parallel Trust Computing Scheme Based on Big Data Analysis For Collaboration Cloud Service |
2018 |
Download |
2. |
HDM: A Composable Framework for Big Data Processing |
2018 |
Download |
3. |
NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users |
2017 |
Download |
4. |
Online Data Deduplication for In-Memory Big-Data Analytic Systems |
2017 |
Download |
5. |
Designing Self-Tuning Split-Map-Merge Applications for High Cost-Efficiency in the Cloud |
2017 |
Download |
6. |
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud |
2017 |
Download |
7. |
Secure k-NN Query on Encrypted Cloud Data with Multiple Keys |
2017 |
Download |
8. |
On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications |
2016 |
Download |
9. |
Hybrid Job-Driven Scheduling for Virtual MapReduce Clusters |
2016 |
Download |
10. |
Operational – Log Analysis for Big Data Systems |
2016 |
Download |
11. |
Dynamic Job Ordering and Slot Configurations for MapReduce Workloads |
2016 |
Download |
12. |
A Parallel Patient Treatment Time Prediction Algorithm and Its Applications in Hospital Queuing-Recommendation in a Big Data Environment |
2016 |
Download |
13. |
H2Hadoop: Improving Hadoop Performance using the Metadata of Related Jobs |
2016 |
Download |
14. |
A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud |
2015 |
Download |
15. |
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value Store |
2015 |
Download |
MOBILE COMPUTING
|
1. |
SUPERMAN Security Using Pre-Existing Routing for Mobile Ad hoc Networks |
2018 |
Download |
2. |
Detecting Mobile Malicious Webpages in Real Time |
2018 |
Download |
3. |
Quantifying Interdependent Privacy Risks with Location Data |
2018 |
Download |
4. |
Energy and Memory Efficient Clone Detection in Wireless Sensor Networks |
2017 |
Download |
5. |
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach |
2017 |
Download |
6. |
Providing Privacy-Aware Incentives in Mobile Sensing Systems |
2017 |
Download |
7. |
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless
Ad Hoc Networks |
2016 |
Download |
8. |
User-Defined Privacy Grid System for Continuous Location-Based Services |
2016 |
Download |
9. |
Wormhole Attack Detection Algorithms in Wireless Network Coding Systems |
2016 |
Download |
SECURE COMPUTING
|
1. |
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data |
2017 |
Download |
2. |
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data |
2017 |
Download |
3. |
Privacy Protection for Wireless Medical Sensor Data |
2016 |
Download |
4. |
Data Lineage in Malicious Environments |
2016 |
Download |
5. |
Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts |
2016 |
Download |
6. |
A Computational Dynamic Trust Model for User Authorization |
2015 |
Download |
7. |
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks |
2015 |
Download |
WEB APPLICATIONS
|
1. |
Online Grievance Management |
Non-IEEE |
Download |
2. |
Car Pooling |
Non-IEEE |
Download |
3. |
College Management System |
Non-IEEE |
Download |
4. |
Expense Calculator |
Non-IEEE |
Download |
5. |
Insurance Policy for Vehicle and Bodily Injured Liability |
Non-IEEE |
Download |
6. |
Automatic lending system |
Non-IEEE |
Download |
7. |
Career Calling |
Non-IEEE |
Download |
8. |
Student Online Voting System |
Non-IEEE |
Download |
9. |
E – Health Care |
Non-IEEE |
Download |
10. |
Automatic Time Table Generator |
Non-IEEE |
Download |
11. |
Online Pharmacy |
Non-IEEE |
Download |
12. |
Online Ticket Reservations |
Non-IEEE |
Download |
13. |
Meditracking System |
Non-IEEE |
Download |
14. |
Government Scheme Alerts |
Non-IEEE |
Download |
15. |
Resume Building |
Non-IEEE |
Download |
16. |
E commerce (Online Shopping) |
Non-IEEE |
Download |
17. |
HR Operations Manager |
Non-IEEE |
Download |
18. |
Crime Record Management System |
Non-IEEE |
Download |
19. |
Multi Banking Transaction System |
Non-IEEE |
Download |
20. |
Online Student Portal |
Non-IEEE |
Download |
ANDROID APPLICATIONS
|
1. |
Employee Task Reminder |
Download |
2. |
Expense Tracker |
Download |
3. |
Online Shopping |
Download |
4. |
Student and Faculty Chatting App |
Download |
5. |
Mobile Application Interface to Register Citizen Complaint |
Download |
6. |
Android Weather Application |
Download |
7. |
Smart Alumni Discovery |
Download |
8. |
Mobile super market |
Download |
9. |
Mobile patient management system |
Download |