JAVA M.TECH/M.E IEEE 2018-19
Download Project List |
Sno
|
Project Title
|
Year
|
Abstract
|
CLOUD COMPUTING
|
1. |
Audit-Free Cloud Storage via Deniable Attribute-based Encryption |
2018 |
Download |
2. |
Chaotic Searchable Encryption for Mobile Cloud Storage |
2018 |
Download |
3. |
Combining Data Owner-side and Cloud-side Access Control for Encrypted Cloud Storage |
2018 |
Download |
4. |
CypherDB: A Novel Architecture for Outsourcing Secure Database Processing |
2018 |
Download |
5. |
DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security |
2018 |
Download |
6. |
HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems |
2018 |
Download |
7. |
RASP-Boost: Confidential Boosting-Model Learning with Perturbed Data in the Cloud |
2018 |
Download |
8. |
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing |
2018 |
Download |
9. |
Semantic-aware Searching over Encrypted Data for Cloud Computing |
2018 |
Download |
10. |
Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage |
2018 |
Download |
11. |
A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage |
2018 |
Download |
12. |
Anonymous and Traceable Group Data Sharing in Cloud Computing |
2018 |
Download |
13. |
A New Lightweight Symmetric Searchable Encryption Scheme for String Identification |
2018 |
Download |
14. |
Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things |
2017 |
Download |
15. |
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud |
2017 |
Download |
16. |
Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data |
2017 |
Download |
17. |
Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing |
2017 |
Download |
18. |
Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds |
2017 |
Download |
19. |
Fast Phrase Search for Encrypted Cloud Storage |
2017 |
Download |
20. |
Privacy Protection based Access Control Scheme in Cloud-based Services |
2017 |
Download |
21. |
Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data |
2017 |
Download |
22. |
RAAC Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage |
2017 |
Download |
23. |
A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing |
2017 |
Download |
24. |
Securing Cloud Data under Key Exposure |
2017 |
Download |
25. |
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing |
2017 |
Download |
26. |
Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in cloud Computing |
2017 |
Download |
27. |
Two-Factor Data Security Protection Mechanism for Cloud Storage System |
2016 |
Download |
28. |
CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System |
2016 |
Download |
29. |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
2016 |
Download |
30. |
Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud |
2016 |
Download |
31. |
CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services |
2016 |
Download |
32. |
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email |
2016 |
Download |
33. |
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing |
2016 |
Download |
34. |
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data |
2016 |
Download |
35. |
Attribute-Based Data Sharing Scheme Revisited in Cloud Computing |
2016 |
Download |
36. |
Privacy-Preserving Data Aggregation in Mobile Phone Sensing |
2016 |
Download |
37. |
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage |
2016 |
Download |
38. |
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates |
2016 |
Download |
39. |
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing |
2016 |
Download |
DATA MINING
|
1. |
Mining Precise-positioning Episode Rules from Event Sequences |
2018 |
Download |
2. |
Topic Models for Unsupervised Cluster Matching |
2018 |
Download |
3. |
Correlated Matrix Factorization for Recommendation with Implicit Feedback |
2018 |
Download |
4. |
Complementary Aspect-based Opinion Mining |
2018 |
Download |
5. |
Weakly-supervised Deep Embedding for Product Review Sentiment Analysis |
2018 |
Download |
6. |
Hashtagger+: Efficient High-Coverage Social Tagging of Streaming News |
2018 |
Download |
7. |
DeepClue: Visual Interpretation of Text-based Deep Stock Prediction |
2018 |
Download |
8. |
Analyzing Sentiments in One Go A Supervised Joint Topic Modeling Approach |
2017 |
Download |
9. |
Identifying Objective and Subjective Words via Topic Modeling |
2017 |
Download |
10. |
Learning Supervised Topic Models for Classification and Regression from Crowds |
2017 |
Download |
11. |
Using Semantic Similarity in Crawling-based Web Application Testing |
2017 |
Download |
12. |
Opinion Dynamics-Based Group Recommender Systems |
2017 |
Download |
13. |
Collaborative Filtering-Based Recommendation of Online Social Voting |
2017 |
Download |
14. |
Detecting Stress Based on Social Interactions in Social Networks |
2017 |
Download |
15. |
Continuous Top-k Monitoring on Document Streams |
2017 |
Download |
16. |
Personal Web Revisitation by Context and Content Keywords with Relevance Feedback |
2017 |
Download |
17. |
Clustering Data Streams Based on Shared Density between Micro-Clusters |
2016 |
Download |
18. |
Booster in High Dimensional Data Classification |
2016 |
Download |
19. |
Efficient Algorithms for Mining Top-K High Utility Item sets |
2016 |
Download |
20. |
Domain-Sensitive Recommendation with User-Item Subgroup Analysis |
2016 |
Download |
21. |
DARE: A Deduplication-Aware Resemblance Detection and Elimination Scheme for Data
Reduction with Low Overheads |
2016 |
Download |
22. |
A Mixed Generative-Discriminative Based Hashing Method |
2016 |
Download |
23. |
DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud |
2016 |
Download |
24. |
Location Aware Keyword Query Suggestion Based on Document Proximity |
2016 |
Download |
25. |
Nearest Keyword Set Search in Multi-Dimensional Datasets |
2016 |
Download |
26. |
Top-Down XML Keyword Query Processing |
2016 |
Download |
NET WORKING & NETWORK SECURITY
|
1. |
Caching Encrypted Content Via Stochastic Cache Partitioning |
2018 |
Download |
2. |
Joint Optimization of Multicast Energy in Delay-Constrained Mobile Wireless Networks |
2018 |
Download |
3. |
Fast Rerouting Against Multi-Link Failures Without Topology Constraint |
2018 |
Download |
4. |
Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic |
2018 |
Download |
5. |
Priority Queuing for Packets With Two Characteristics |
2018 |
Download |
6. |
Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks |
2018 |
Download |
7. |
Secure Range Search over Encrypted Uncertain IoT Outsourced Data |
2018 |
Download |
8. |
Distributed Channel Access, Relay Selection and Time Assignment for QoE-Aware Relay Networks |
2017 |
Download |
9. |
An Overlay Architecture for Throughput Optimal Multipath Routing |
2017 |
Download |
10. |
Network Capability in Localizing Node Failures via End-to-End Path Measurements |
2017 |
Download |
11. |
Socially-Driven Learning-Based Prefetching in Mobile Online Social Networks |
2017 |
Download |
12. |
A Coalition Formation Game for Distributed Node Clustering in Mobile Ad Hoc Networks |
2017 |
Download |
13. |
Location Privacy Preservation in Database-driven Wireless Cognitive Networks through Encrypted Probabilistic Data Structures |
2017 |
Download |
14. |
High Throughput Opportunistic Cooperative Device-to-Device Communications With Caching |
2017 |
Download |
15. |
Multi-Grained Block Management to Enhance the Space Utilization of File Systems on PCM Storages |
2017 |
Download |
16. |
Resource-Saving File Management Scheme for Online Video Provisioning on Content Delivery Networks |
2017 |
Download |
17. |
Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks |
2016 |
Download |
18. |
PASER: Secure and Efficient Routing Approach for Airborne Mesh Networks |
2016 |
Download |
19. |
Active Trust : Secure and Trustable Routing in Wireless Sensor Networks |
2016 |
Download |
20. |
Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks |
2016 |
Download |
21. |
Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks |
2016 |
Download |
BIG DATA
|
1. |
Fast and Parallel Trust Computing Scheme Based on Big Data Analysis For Collaboration Cloud Service |
2018 |
Download |
2. |
Providing Healthcare-as-a-Service Using Fuzzy Rule-Based Big Data Analytics in Cloud Computing |
2018 |
Download |
3. |
HDM: A Composable Framework for Big Data Processing |
2018 |
Download |
4. |
MR-Mafia: Parallel Subspace Clustering Algorithm Based on MapReduce For Large Multi-dimensional |
2018 |
Download |
5. |
On Scalable and Robust Truth Discovery in Big Data Social Media Sensing Applications |
2018 |
Download |
6. |
NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users |
2017 |
Download |
7. |
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud |
2017 |
Download |
8. |
Secure k-NN Query on Encrypted Cloud Data with Multiple Keys |
2017 |
Download |
9. |
Heterogeneous Data Storage Management with Deduplication in Cloud Computing |
2017 |
Download |
10. |
On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications |
2016 |
Download |
11. |
Dynamic Job Ordering and Slot Configurations for MapReduce Workloads |
2016 |
Download |
12. |
Operational-Log Analysis for Big Data Systems |
2016 |
Download |
13. |
Hybrid Job-Driven Scheduling for Virtual MapReduce Clusters |
2016 |
Download |
MOBILE COMPUTING
|
1. |
Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing |
2018 |
Download |
2. |
Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services |
2018 |
Download |
3. |
A Distributed Truthful Auction Mechanism for Task Allocation in Mobile Cloud Computing |
2018 |
Download |
4. |
Fair Resource Allocation for System Throughput Maximization in Mobile Edge Computing |
2018 |
Download |
5. |
SUPERMAN Security Using Pre-Existing Routing for Mobile Ad hoc Networks |
2017 |
Download |
6. |
Quantifying Interdependent Privacy Risks with Location Data |
2017 |
Download |
7. |
Detecting Mobile Malicious Webpages in Real Time |
2017 |
Download |
8. |
Providing Privacy-Aware Incentives in Mobile Sensing Systems |
2016 |
Download |
9. |
Energy and Memory Efficient Clone Detection in Wireless Sensor Networks |
2016 |
Download |
10. |
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach |
2016 |
Download |
SECURE COMPUTING
|
1. |
Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness |
2018 |
Download |
2. |
Multi-CDN: Towards Privacy in Content Delivery Networks |
2018 |
Download |
3. |
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data |
2017 |
Download |
4. |
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data |
2017 |
Download |
5. |
Privacy Protection for Wireless Medical Sensor Data |
2016 |
Download |
6. |
Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata |
2016 |
Download |
7. |
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts |
2016 |
Download |