2015 – 2016 IEEE DOTNET PROJECTS TITLES
Cloud Computing
- Trust enhanced cryptography role based access control for secure cloud data storage
- Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints
- A Time efficient approach for detecting errors in big sensor data on cloud
- Cost Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
- Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
- Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
- Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
- PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative
- Enabling Fine-grained Multi-keyword Search Supporting Classified
- A Secure and Dynamic Multi keyword Ranked Search Scheme over Encrypted cloud
Data Mining
- Real-time Twitter sentiment analysis with Stream Analytics
- COMIC Cost Optimization for Internet Content Multihoming
- Discovery of Ranking Fraud for Mobile Apps
- Query Aware Determinization of Uncertain Objects
Image Processing
- RRW – A Robust and Reversible Watermarking Technique for Relational Data
- Combining Multiple Classification Methods for Hyperspectral Data Interpretation
- A Secure Data Hiding Technique in Compressed Video Using a Secret Key
- Steganography Using Reversible Texture Synthesis
- Robust Watermarking Techniques For Color Images
Networking
- Authenticated Key Exchange Protocols for Parallel Network File Systems
- Assessment In Wireless Sensor Network Security
- Energy aware Load Balancing and Application Scaling for the Cloud
- Universal Network Coding-Based Opportunistic Routing for Unicast
- Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization
Secure Computing
- Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical
- Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
- Continuous and Transparent User Identity Verification for Secure Internet
Services Computing
- Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System