2016 - 2017 IEEE Dotnet Projects Titles

Cloud Computing

1. Secure Data Sharing in Cloud Computing Using Revocable Storage Identity Based Encryption

2. Dynamic and Public Auditing with Fair Arbitration for Cloud Data

3. Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud

Data Mining

1. A Mixed Generative-Discriminative Based Hashing Method

2. Text Mining the Contributors to Rail Accidents

3. Quantifying Political Leaning from Tweets, Re tweets, and Re tweeters

4. Using Hash tag Graph-Based Topic Model to Connect Semantically-Related Words Without Co-Occurrence in Micro blogs

5. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata

MultiMedia

1. User-Service Rating Prediction by Exploring Social Users Rating Behaviors

Image Processing

1. Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation

Networking

1. Secure and Efficient data communication protocol for Wireless Body Area Networks

2. Efficient Certificateless Access Control for Wireless Body Area Networks

Parallel And Distributed System

1. Authenticated Key Exchange Protocols for Parallel Network File Systems

2. Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing

3. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

4. Real Time Semantic Search Using Approximate Methodology for Large Scale Storage Systems

Secure Computing

1. Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data.

Service Computing

1. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys

2. Cloud workflow scheduling with deadlines and time slot availability

3. Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage

Information Forensics and Security

1. Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services

2. Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

3. Fine Grained Two Factor Access Control for Web Based Cloud Computing Services

Big Data

1. Personalized Travel Sequence Recommendation on Multi Source Big Social Media