• +91 7036987111
  • triad.tts@gmail.com

JAVA M.TECH/M.E IEEE 2018-19

 Download Project List

Sno

Project Title

Year

Abstract

CLOUD COMPUTING

1. Audit-Free Cloud Storage via Deniable Attribute-based Encryption 2018 Download
2. Chaotic Searchable Encryption for Mobile Cloud Storage 2018 Download
3. Combining Data Owner-side and Cloud-side Access Control for Encrypted Cloud Storage 2018 Download
4. CypherDB: A Novel Architecture for Outsourcing Secure Database Processing 2018 Download
5. DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security 2018 Download
6. HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems 2018 Download
7. RASP-Boost: Confidential Boosting-Model Learning with Perturbed Data in the Cloud 2018 Download
8. Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing 2018 Download
9. Semantic-aware Searching over Encrypted Data for Cloud Computing 2018 Download
10. Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage 2018 Download
11. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage 2018 Download
12. Anonymous and Traceable Group Data Sharing in Cloud Computing 2018 Download
13. A New Lightweight Symmetric Searchable Encryption Scheme for String Identification 2018 Download
14. Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things 2017 Download
15. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud 2017 Download
16. Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data 2017 Download
17. Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing 2017 Download
18. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds 2017 Download
19. Fast Phrase Search for Encrypted Cloud Storage 2017 Download
20. Privacy Protection based Access Control Scheme in Cloud-based Services 2017 Download
21. Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data 2017 Download
22. RAAC Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage 2017 Download
23. A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing 2017 Download
24. Securing Cloud Data under Key Exposure 2017 Download
25. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 2017 Download
26. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in cloud Computing 2017 Download
27. Two-Factor Data Security Protection Mechanism for Cloud Storage System 2016 Download
28. CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System 2016 Download
29. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2016 Download
30. Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud 2016 Download
31. CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services 2016 Download
32. Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email 2016 Download
33. An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing 2016 Download
34. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2016 Download
35. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing 2016 Download
36. Privacy-Preserving Data Aggregation in Mobile Phone Sensing 2016 Download
37. Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage 2016 Download
38. Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates 2016 Download
39. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing 2016 Download

DATA MINING

1. Mining Precise-positioning Episode Rules from Event Sequences 2018 Download
2. Topic Models for Unsupervised Cluster Matching 2018 Download
3. Correlated Matrix Factorization for Recommendation with Implicit Feedback 2018 Download
4. Complementary Aspect-based Opinion Mining 2018 Download
5. Weakly-supervised Deep Embedding for Product Review Sentiment Analysis 2018 Download
6. Hashtagger+: Efficient High-Coverage Social Tagging of Streaming News 2018 Download
7. DeepClue: Visual Interpretation of Text-based Deep Stock Prediction 2018 Download
8. Analyzing Sentiments in One Go A Supervised Joint Topic Modeling Approach 2017 Download
9. Identifying Objective and Subjective Words via Topic Modeling 2017 Download
10. Learning Supervised Topic Models for Classification and Regression from Crowds 2017 Download
11. Using Semantic Similarity in Crawling-based Web Application Testing 2017 Download
12. Opinion Dynamics-Based Group Recommender Systems 2017 Download
13. Collaborative Filtering-Based Recommendation of Online Social Voting 2017 Download
14. Detecting Stress Based on Social Interactions in Social Networks 2017 Download
15. Continuous Top-k Monitoring on Document Streams 2017 Download
16. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback 2017 Download
17. Clustering Data Streams Based on Shared Density between Micro-Clusters 2016 Download
18. Booster in High Dimensional Data Classification 2016 Download
19. Efficient Algorithms for Mining Top-K High Utility Item sets 2016 Download
20. Domain-Sensitive Recommendation with User-Item Subgroup Analysis 2016 Download
21. DARE: A Deduplication-Aware Resemblance Detection and Elimination Scheme for Data Reduction with Low Overheads 2016 Download
22. A Mixed Generative-Discriminative Based Hashing Method 2016 Download
23. DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud 2016 Download
24. Location Aware Keyword Query Suggestion Based on Document Proximity 2016 Download
25. Nearest Keyword Set Search in Multi-Dimensional Datasets 2016 Download
26. Top-Down XML Keyword Query Processing 2016 Download

NET WORKING & NETWORK SECURITY

1. Caching Encrypted Content Via Stochastic Cache Partitioning 2018 Download
2. Joint Optimization of Multicast Energy in Delay-Constrained Mobile Wireless Networks 2018 Download
3. Fast Rerouting Against Multi-Link Failures Without Topology Constraint 2018 Download
4. Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic 2018 Download
5. Priority Queuing for Packets With Two Characteristics 2018 Download
6. Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks 2018 Download
7. Secure Range Search over Encrypted Uncertain IoT Outsourced Data 2018 Download
8. Distributed Channel Access, Relay Selection and Time Assignment for QoE-Aware Relay Networks 2017 Download
9. An Overlay Architecture for Throughput Optimal Multipath Routing 2017 Download
10. Network Capability in Localizing Node Failures via End-to-End Path Measurements 2017 Download
11. Socially-Driven Learning-Based Prefetching in Mobile Online Social Networks 2017 Download
12. A Coalition Formation Game for Distributed Node Clustering in Mobile Ad Hoc Networks 2017 Download
13. Location Privacy Preservation in Database-driven Wireless Cognitive Networks through Encrypted Probabilistic Data Structures 2017 Download
14. High Throughput Opportunistic Cooperative Device-to-Device Communications With Caching 2017 Download
15. Multi-Grained Block Management to Enhance the Space Utilization of File Systems on PCM Storages 2017 Download
16. Resource-Saving File Management Scheme for Online Video Provisioning on Content Delivery Networks 2017 Download
17. Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks 2016 Download
18. PASER: Secure and Efficient Routing Approach for Airborne Mesh Networks 2016 Download
19. Active Trust : Secure and Trustable Routing in Wireless Sensor Networks 2016 Download
20. Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 2016 Download
21. Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks 2016 Download

BIG DATA

1. Fast and Parallel Trust Computing Scheme Based on Big Data Analysis For Collaboration Cloud Service 2018 Download
2. Providing Healthcare-as-a-Service Using Fuzzy Rule-Based Big Data Analytics in Cloud Computing 2018 Download
3. HDM: A Composable Framework for Big Data Processing 2018 Download
4. MR-Mafia: Parallel Subspace Clustering Algorithm Based on MapReduce For Large Multi-dimensional 2018 Download
5. On Scalable and Robust Truth Discovery in Big Data Social Media Sensing Applications 2018 Download
6. NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users 2017 Download
7. Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud 2017 Download
8. Secure k-NN Query on Encrypted Cloud Data with Multiple Keys 2017 Download
9. Heterogeneous Data Storage Management with Deduplication in Cloud Computing 2017 Download
10. On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications 2016 Download
11. Dynamic Job Ordering and Slot Configurations for MapReduce Workloads 2016 Download
12. Operational-Log Analysis for Big Data Systems 2016 Download
13. Hybrid Job-Driven Scheduling for Virtual MapReduce Clusters 2016 Download

MOBILE COMPUTING

1. Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing 2018 Download
2. Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services 2018 Download
3. A Distributed Truthful Auction Mechanism for Task Allocation in Mobile Cloud Computing 2018 Download
4. Fair Resource Allocation for System Throughput Maximization in Mobile Edge Computing 2018 Download
5. SUPERMAN Security Using Pre-Existing Routing for Mobile Ad hoc Networks 2017 Download
6. Quantifying Interdependent Privacy Risks with Location Data 2017 Download
7. Detecting Mobile Malicious Webpages in Real Time 2017 Download
8. Providing Privacy-Aware Incentives in Mobile Sensing Systems 2016 Download
9. Energy and Memory Efficient Clone Detection in Wireless Sensor Networks 2016 Download
10. Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach 2016 Download

SECURE COMPUTING

1. Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness 2018 Download
2. Multi-CDN: Towards Privacy in Content Delivery Networks 2018 Download
3. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data 2017 Download
4. Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data 2017 Download
5. Privacy Protection for Wireless Medical Sensor Data 2016 Download
6. Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata 2016 Download
7. Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts 2016 Download