JAVA PROJECTS

JAVA-2017 IEEE PROJECTS
CLOUD COMPUTING

S.NO
TITLES
1A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
2A Lightweight Secure Data Sharing Scheme for Mobile CloudComputing
3A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
4A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users
5A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
6A robust reputation management mechanism in the federated cloud
7Achieving Efficient and Secure Data Acquisition for Cloud supported Internet of Things in Smart Grid
8Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud

data
9Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems
10Customer-Satisfaction-Aware Optimal Multi server Configuration for Profit Maximization in Cloud Computing
11Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
12Fast Phrase Search for Encrypted Cloud Storage
13Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
14Identity-Based Encryption with Cloud Revocation Authority and Its Applications
15Identity-Based Private Matching over Outsourced Encrypted Datasets
16Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage
17On the Security of Data Access Control for Multi-authority Cloud Storage Systems
18Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing
19Privacy Protection based Access Control Scheme in Cloud-based Services
20Privacy-Preserving Multi keyword Similarity Search Over Outsourced Cloud Data
21Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud
22RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
23Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
24Securing Cloud Data under Key Exposure
25TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud
26TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud
27Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving

JAVA-2017 IEEE PROJECTS
DATA MINING

S.NO
TITLES
1An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
2Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
3Collaborative Filtering-Based Recommendation of Online Social Voting
4Computing Semantic Similarity of Concepts in Knowledge Graphs
5Detecting Stress Based on Social Interactions in Social Networks
6Dynamic Facet Ordering for Faceted Product Search Engines
7Efficient Clue-based Route Search on Road Networks
8Efficient Keyword-aware Representative Travel Route Recommendation
9Energy-efficient Query Processing in Web Search Engines
10Generating Query Facets using Knowledge Bases
11Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
12I-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items
13Mining Competitors from Large Unstructured Datasets
14Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction
15Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
16PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
17QDA: A Query-Driven Approach to Entity Resolution
18Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
19RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem
20SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors
21Towards Real-Time, Country-Level Location Classification of Worldwide Tweets
22Trajectory Community Discovery and Recommendation by Multisource Diffusion Modeling
23Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
24User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
25User-Centric Similarity Search
26When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks

JAVA-2017 IEEE PROJECTS
NETWORKING

S.NO
TITLES
1An Overlay Architecture for Throughput Optimal Multipath Routing
2FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control
3Network Capability in Localizing Node Failures via End-to-End Path Measurements
4Privacy and Integrity Preserving Top-k Query Processing for TwoTiered Sensor Network
5Routing in Accumulative Multi-Hop Networks
6SWEET: Serving the Web by Exploiting Email Tunnels

JAVA-2017 IEEE PROJECTS
MOBILE COMPUTING

S.NO
TITLES
1A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption
2Detecting Mobile Malicious Webpages in Real Time
3Quantifying Interdependent Privacy Risks with Location Data
4Searching Trajectories by Regions of Interest
5SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks

JAVA-2017 IEEE PROJECTS
PARALLEL AND DISTRIBUTED SYSTEMS

S.NO
TITLES
1iASK: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence

JAVA-2017 IEEE PROJECTS
SECURE COMPUTING

S.NO
TITLES
1A Credibility Analysis System for Assessing Information on Twitte
2Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
3FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
4My Privacy My Decision: Control of Photo Sharing on Online Social Networks
5Privacy-Preserving Selective Aggregation of Online User Behavior Data
6ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions
7Search Rank Fraud and Malware Detection in Google Play
8Towards Detecting Compromised Accounts on Social Networks

JAVA-2017 IEEE PROJECTS
INFORMATION FORENSICS & SECURITY

S.NO
TITLES
1NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media
2Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers
3Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending

JAVA-2017 IEEE PROJECTS
INTERNET OF THINGS (IOT)

S.NO
TITLES
1A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT
2An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy
3An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy
4Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems
5SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud

JAVA-2017 IEEE PROJECTS
BIG DATA

S.NO
TITLES
1Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
2SocialQ&A: An Online Social Network Based Question and Answer System

JAVA-2017 IEEE PROJECTS
IMAGE PROCESSING

S.NO
TITLES
1Automatic Generation of Social Event Storyboard from Image Click-through Data
2Image Re-ranking based on Topic Diversity
3Tri-Clustered Tensor Completion for Social-Aware Image Tag Refinement

JAVA-2017 IEEE PROJECTS
MULTIMEDIA

S.NO
TITLES
1Two-Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model

JAVA-2017 IEEE PROJECTS
SOFTWARE ENGINEERING

S.NO
TITLES
1A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection
2Improving Automated Bug Triaging with Specialized Topic Model

JAVA-2017 IEEE PROJECTS
SERVICE COMPUTING(WEB SERVICE)

S.NO
TITLES
1Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method
2Transactional Behavior Verification in Business Process as a Service Configuration