2015 – 2016 IEEE JAVA PROJECTS TITLES
Cloud Computing
- Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud
- CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
- Identity Based Encryption with Outsourced Revocation in Cloud Computing
- Secure Distributed Deduplication Systems with Improved Reliability
- Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted
- A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
- A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
- Secure Auditing and Deduplicating Data in Cloud
- User Anonymous Authentication Scheme for Decentralized Access Control in Clouds
- A Hybrid Cloud Approach for Secure Authorized Deduplication
- Median Filtering Forensics Based on Convolutional Neural NetworkS
- Continuous and Transparent User Identity Verification for Secure Internet
- Cost Effective Authentic and Anonymous Data Sharing with Forward Security
- Shared Authority Based Privacy preserving Authentication Protocol in Cloud Computing
- Privacy Preserving Multi Keyword Ranked Search over Encrypted Cloud Data
- Audit Free Cloud Storage via deniable Attribute based Encryption
Data Mining
- Malware Propagation in Large Scale Networks
- Designing High Performance Web-Based Computing Services to Promote Telemedicine Database
- Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
- Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge
- Context-Based Diversification for Keyword Queries over XML Data
- Towards Effective Bug Triage with Software Data Reduction Techniques
- Designing High Performance Web-Based Computing Services to Promote Telemedicine Database
- Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers
- Best Keyword Cover Search
- Data Mining Based Crime Investigation Systems Taxonomy and Relevance
- Discovery of Ranking Fraud for Mobile Apps
- Efficient heart disease prediction system using decision tree
- Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word
- Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
- Scalable Feature Selection in High-Dimensional Data Based on GRASP
- Parallel processing of dynamic continuous queries over streaming data flows
- Towards Secure Cryptographic Software Implementation Against Side Channel Power
- Filtering Mechanism for Unwanted Messages on OSN User Wall Using CBMF
- A Case Based Recommendation Approach for Market Basket Data
- SmartCrawler A Two stage Crawler for Efficiently Harvesting Deep Web Interfaces
Image Processing
- Query Specific Rank Fusion for Image Retrieval
- Mining weakly labeled web facial images for search based face annotation
- Learning to Rank Image Tags With Limited Training Examples
- An Attribute-Assisted Reranking Model for Web Image Search
- EMR A Scalable Graph based Ranking Model for Content based Image Retrieval
Information and Forensic Security
- Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
- Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter
- Key Updating for Leakage Resiliency with Application to AES Modes of Operation
Networking
- Cloud cyber attack against Social Network
- A Distortion Resistant Routing Framework for Video Traffic in Wireless Multihop Networks
- Energy Efficient Fault Tolerant Data Storage And Processing In Mobile Cloud
- A Distributed Three-Hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
- Secure Data Aggregation Technique for WSN in the Presence of Collusion Attacks
- Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient
- A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks
- Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks
- Detecting Malicious Facebook Applications
Secure Computing
- Secure Spatial Top-k Query Processing via Untrusted Location- Based Service Providers
- A Computational Dynamic Trust Model for User Authorization
- Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
Mobile Computing
- User-Defined Privacy Grid System for Continuous Location-Based Services
Services Computing
- Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation