JAVA PROJECTS

JAVA-2015 IEEE PROJECTS
CLOUD COMPUTING

S.NO
TITLES
1A Hybrid Cloud Approach for Secure Authorized Deduplication
2A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
3A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
4A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
5A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
6Audit-Free Cloud Storage via Deniable Attribute-based Encryption
7Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
8CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
9Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
10Enabling Cloud Storage Auditing With Key-Exposure Resistance
11Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
12Identity-Based Encryption with Outsourced Revocation in Cloud
13Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
14Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
15Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
16Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
17Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
18Secure Auditing and Deduplicating Data in Cloud
19Stealthy Denial of Service Strategy in Cloud Computing
20An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration

JAVA-2015 IEEE PROJECTS
DATA MINING

S.NO
TITLES
21Best Keyword Cover Search
22Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
23Context-Based Diversification for Keyword Queries over XML Data
24Discovery of Ranking Fraud for Mobile Apps
25Malware Propagation in Large-Scale Networks
26On Summarization and Timeline Generation for Evolutionary Tweet Streams
27Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
28Progressive Duplicate Detection
29Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
30Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services
31Scalable Constrained Spectral Clustering
32Towards Effective Bug Triage with Software Data Reduction Techniques
33Tweet Segmentation and Its Application to Named Entity Recognition

JAVA-2015 IEEE PROJECTS
NETWORKING

S.NO
TITLES
34A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks
35A Proximity-Aware Interest-Clustered P2P File Sharing System
36Detecting Malicious Facebook Applications
37Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing

JAVA-2015 IEEE PROJECTS
MOBILE COMPUTING

S.NO
TITLES
38Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks
39Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
40Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
41User-Defined Privacy Grid System for Continuous Location-Based Services

JAVA-2015 IEEE PROJECTS
SECURE COMPUTING

S.NO
TITLES
42A Computational Dynamic Trust Model for User Authorization
43A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
44Continuous and Transparent User Identity Verification for Secure Internet Services
45Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
46DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
47Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints
48Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
49Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers

JAVA-2015 IEEE PROJECTS
PARALLEL & DISTRIBUTED SYSTEMS

S.NO
TITLES
50Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
51Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
52Secure Distributed Deduplication Systems with Improved Reliability

JAVA-2015 IEEE PROJECTS
INFORMATION FORENSICS AND SECURITY

S.NO
TITLES
53A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients,Applied to Recommendations
54Effective Key Management in Dynamic Wireless Sensor Networks
55Key Updating for Leakage Resiliency with Application to AES Modes of Operation
56Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter
57Software Puzzle: A Countermeasure to Resource-Inflated Denialof-Service Attacks

JAVA-2015 IEEE PROJECTS
IMAGE PROCESSING

S.NO
TITLES
58An Attribute-Assisted Reranking Model for Web Image Search
59EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
60Learning to Rank Image Tags With Limited Training Examples

JAVA-2015 IEEE PROJECTS
SERVICE COMPUTING (WEB SERVICE)

S.NO
TITLES
61Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System