JAVA PROJECTS

JAVA-2014 IEEE PROJECTS
CLOUD COMPUTING

S.NO
TITLES
1A Hybrid Cloud Approach for Secure Authorized Deduplication
2A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce on Cloud
3A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
4Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
5Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
6Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
7Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
8Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
9Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
11PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
12Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
13Scalable Distributed Service Integrity Attestation for Software-as-a-Service Cloud
14Towards Differential Query Services in Cost-Efficient Clouds

JAVA-2014 IEEE PROJECTS
DATA MINING

S.NO
TITLES
14A Cocktail Approach for Travel Package Recommendation
15Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
16BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform
17Data Mining with Big Data
18Dealing With Concept Drifts in Process Mining
19Discovering Emerging Topics in Social Streams via Link-Anomaly
20Efficient Prediction of Difficult Keyword Queries over Databases
21Facilitating Document Annotation Using Content and Querying Value
22Fast Nearest Neighbor Search with Keywords
23Keyword Query Routing
24Privacy-Preserving and Content-Protecting Location Based Queries
25Security Evaluation of Pattern Classifiers under Attack
26Supporting Privacy Protection in Personalized Web Search
27Towards Online Shortest Path Computation

JAVA-2014 IEEE PROJECTS
SECURE COMPUTING

S.NO
TITLES
28Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems
29Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
30PROFILR: Toward Preserving Privacy and Functionality in Geosocial Networks
31Top-k Query Result Completeness Verification in Tiered Sensor Networks

JAVA-2014 IEEE PROJECTS
NETWORKING

S.NO
TITLES
32Automatic Test Packet Generation
33Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
34Boundary Cutting for Packet Classification
35Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

JAVA-2014 IEEE PROJECTS
PARALLEL & DISTRIBUTED SYSTEMS

S.NO
TITLES
36Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
37Exploiting Service Similarity for Privacy in Location-Based Search Queries
38LocaWard: A Security and Privacy Aware Location-Based Rewarding System
39On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures
40RRE: A Game-Theoretic Intrusion Response and Recovery Engine
41Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
42SOS: A Distributed Mobile Q&A System Based on Social Networks
43The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluation
44The Design and Evaluation of An Information Sharing System for Human Networks
45Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks
46Secure Outsourced Attribute-based Signatures

JAVA-2014 IEEE PROJECTS
MOBILE COMPUTING

S.NO
TITLES
47An Incentive Framework for Cellular Traffic Offloading
48Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
49Efficient Authentication for Mobile and Pervasive Computing
50Friendbook: A Semantic-based Friend Recommendation System for Social Networks
51Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices

JAVA-2014 IEEE PROJECTS
SERVICE COMPUTING(WEB SERVICE)

S.NO
TITLES
52Privacy-Enhanced Web Service Composition
53Web Service Recommendation via Exploiting Location and QoS Information