2014 - 2015 IEEE Java Projects Titles

Cloud computing

1. Oruta Privacy Preserving Public Auditing for Shared Data in the Cloud

2. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds

3. Privacy Preserving Multi Keyword Ranked Search over Encrypted Cloud Data

4. Privacy Preserving Delegated Access Control in Public Clouds (JAVA)

5. Key Aggregate Searchable Encryption KASE for Group Data Sharing via Cloud Storage

6. Reliability - Based Design Optimization for Cloud Migration

7. Privacy Preserving Delegated Access Control in Public Clouds

Data Mining

1. Secure Mining of Association Rules in Horizontally Distributed Databases

2. Supporting Privacy Protection in Personalized Web Search

3. A Cocktail Approach for Travel Package Recommendation

4. keyword query routing

5. Annotating Search Results From Web Databases

6. New Algorithm for Inferring User Search Goals with Feedback Sessions

7. m-Privacy for Collaborative Data Publishing

8. Fast Nearest Neighbor Search with Keywords

Image Processing

1. Click Prediction for Web Image Reranking Using Multimodal Sparse Code

2. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems

3. Uniform Embedding for Efficient JPEG Steganography (Java)


1. Top-k Query Result Completeness Verification in Tiered Sensor Networks


1. Automatic Test Packet Generation

2. Effects of Internet Path Selection on Video QoE Analysis and Improvements (JAVA)

3. Improving Security and Efficiency for Encrypted Data Sharing in Online Social Networks

4. Secure Data Retrieval for Decentralized Disruption Tolerant Military Networks

Parallel and Distributed Systems

1. Securing Broker Less Publish Subscribe Systems Using Identity Based Encryption

2. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems

Secure Computing

1. PROFILR Toward Preserving Privacy and Functionality in Geosocial Networks

Services Computing

1. A Social Compute Cloud Allocating and Sharing Infrastructure Resources via Social Networks

2. preserving location privacy in geosocial applications