Contact: +91 9791938249, 0413-2211159 Mail:

IEEE Java 2015 Projects

1. A robust digital watermarking scheme for video copyright protection in the wavelet domain
2. Orchestrating Bulk Data Transfers across geo-distributed datacenters
3. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
4. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
5. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
6. Secure Auditing and Deduplicating Data in Cloud
7. Identity-based Encryption with Outsourced Revocation in Cloud Computing
8. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
9. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
10. Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory
11. An efficient algorithm for the bursting of service-based applications in hybrid Clouds
12. Cloud-based Multimedia Content Protection System
13. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
14. Cloud Armor Supporting Reputation-based Trust Management for Cloud Services
15. Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications
16. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
17. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute Based Encryption
18. Audit Free Cloud Storage via Deniable Attribute based Encryption
19. CHARM: A Cost-efficient Multi cloud Data Hosting Scheme with High Availability
20. Demystifying the Clouds: Harnessing Resource Utilization Models for Cost Effective Infrastructure Alternatives
21. Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
22. Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud
23. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
24. Enabling Cloud Storage Auditing with Key Exposure Resistance
25. Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
26. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
27. Privacy Preserving Public Auditing for Regenerating Code Based Cloud Storage
28. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
29. Provable Multi copy Dynamic Data Possession in Cloud Computing Systems
30. Reactive Resource Provisioning Heuristics for Dynamic Data flows on Cloud Infrastructure
31. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
32. Reducing Fragmentation for In-line De duplication Backup Storage via Exploiting Backup History and Cache Knowledge
33. Secure Auditing and De duplicating Data in Cloud
34. Secure Distributed De duplication Systems with Improved Reliability
35. Public Integrity Auditing for Dynamic Data Sharing with Multi User Modification
36. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
37. Cloud-Trust a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds
38. CPU Provisioning Algorithms for Service Differentiation in Cloud-Based Environments
39. A secure data self-destructing scheme in cloud computing
40. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
41. Discovery of Ranking Fraud for Mobile Apps
42. Towards Effective Bug Triage with Software Data Reduction Techniques
43. Entity Linking with a Knowledge Base: Issues, Techniques, and Solutions
44. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
45. Rule-Based Method for Entity Resolution
46. Subgraph Matching with Set Similarity in a Large Graph Database
47. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
48. Fast Best-Effort Pattern Matching in Large Attributed Graphs
49. CAHR: A Contextually Adaptive Home-Based Rehabilitation Framework
50. Query Aware Determinization of Uncertain Objects
51. PAGE: A Partition Aware Engine for Parallel Graph Computation
52. Active Learning for Ranking through Expected Loss Optimization
53. RRW – A Robust and Reversible Watermarking Technique for Relational Data
54. Smart Crawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
55. Learning to Rank Image Tags with Limited Training Examples
56. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
57. Multiview Alignment Hashing for Efficient Image
58. Single Image Super-Resolution Based on Gradient Profile Sharpness
59. Detection and Rectification of Distorted Fingerprints
60. Learning Fingerprint Reconstruction: From Minutiae to Image
61. An Attribute assisted Re ranking Model for Web Image Search
62. Steganography Using Reversible Texture Synthesis/strong>
63. Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images
64. FRAppE: Detecting Malicious Facebook Applications
65. Key recovery Attacks on KIDS, a Keyed Anomaly Detection System
66. Authenticated Key Exchange Protocols for Parallel Network File Systems
67. Generating Searchable Public-Key Cipher texts with Hidden Structures for Fast Keyword Search
68. Secure Distributed De duplication Systems with Improved Reliability
69. A Computational Dynamic Trust Model for User Authorization
70. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
71. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
72. A Computational Dynamic Trust Model for User Authorization
73. Secure Distributed Deduplication Systems with Improved Reliability
74. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
75. New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations
76. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
77. A Trusted IaaS Environment with Hardware Security Module
78. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
79. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
80. Data Collection in Multi-Application Sharing Wireless Sensor Networks
81. Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks
82. Data Collection in Multi Application Sharing Wireless Sensor Networks
83. A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
84. User-Defined Privacy Grid System for Continuous Location-Based Services
85. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
86. Optimum Power Allocation in Sensor Networks for Active Radar Applications
87. Efficient Data Query in Intermittently Connected Mobile Ad Hoc Social Networks
88. Defending Against Collaborative Attacks by Malicious Nodes in MANETs A Cooperative Bait Detection Approach
89. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
90. Detecting Malicious Face book Applications