2015 - 2016 IEEE Java Projects Titles

Cloud Computing

1. Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud

2. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services

3. Identity Based Encryption with Outsourced Revocation in Cloud Computing

4. Secure Distributed Deduplication Systems with Improved Reliability

5. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted

6. A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems

7. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing

8. Secure Auditing and Deduplicating Data in Cloud

9. User Anonymous Authentication Scheme for Decentralized Access Control in Clouds

10. A Hybrid Cloud Approach for Secure Authorized Deduplication

11. Median Filtering Forensics Based on Convolutional Neural NetworkS

12. Continuous and Transparent User Identity Verification for Secure Internet

13. Cost Effective Authentic and Anonymous Data Sharing with Forward Security

14. Shared Authority Based Privacy preserving Authentication Protocol in Cloud Computing

15. Privacy Preserving Multi Keyword Ranked Search over Encrypted Cloud Data

16. Audit Free Cloud Storage via deniable Attribute based Encryption

Data Mining

1. Malware Propagation in Large Scale Networks

2. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database

3. Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection

4. Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge

5. Context-Based Diversification for Keyword Queries over XML Data

6. Towards Effective Bug Triage with Software Data Reduction Techniques

7. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database

8. Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers

9. Best Keyword Cover Search

10. Data Mining Based Crime Investigation Systems Taxonomy and Relevance

11. Discovery of Ranking Fraud for Mobile Apps

12. Efficient heart disease prediction system using decision tree

13. Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word

14. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites

15. Scalable Feature Selection in High-Dimensional Data Based on GRASP

16. Parallel processing of dynamic continuous queries over streaming data flows

17. Towards Secure Cryptographic Software Implementation Against Side Channel Power

18. Filtering Mechanism for Unwanted Messages on OSN User Wall Using CBMF

19. A Case Based Recommendation Approach for Market Basket Data

20. SmartCrawler A Two stage Crawler for Efficiently Harvesting Deep Web Interfaces

Image Processing

1. Query Specific Rank Fusion for Image Retrieval

2. Mining weakly labeled web facial images for search based face annotation

3. Learning to Rank Image Tags With Limited Training Examples

4. An Attribute-Assisted Reranking Model for Web Image Search

5. EMR A Scalable Graph based Ranking Model for Content based Image Retrieval

Information and Forensic Security

1. Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption

2. Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter

3. Key Updating for Leakage Resiliency with Application to AES Modes of Operation


1. Cloud cyber attack against Social Network

2. A Distortion Resistant Routing Framework for Video Traffic in Wireless Multihop Networks

3. Energy Efficient Fault Tolerant Data Storage And Processing In Mobile Cloud

4. A Distributed Three-Hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks

5. Secure Data Aggregation Technique for WSN in the Presence of Collusion Attacks

6. Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient

7. A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks

8. Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks

9. Detecting Malicious Facebook Applications

Secure Computing

1. Secure Spatial Top-k Query Processing via Untrusted Location- Based Service Providers

2. A Computational Dynamic Trust Model for User Authorization

3. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks

4. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks

Mobile Computing

1. User-Defined Privacy Grid System for Continuous Location-Based Services

Services Computing

1. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation