.NET PROJECTS

.NET-2014 IEEE PROJECTS
CLOUD COMPUTING

S.NO
TITLES
1Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions
2Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
3Consistency as a Service: Auditing Cloud Consistency
4Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
5Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
6Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation
7Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
8Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
9Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
10Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
11Scalable Distributed Service Integrity Attestation for Software-asa-Service Clouds

.NET-2014 IEEE PROJECTS
DATA MINING

S.NO
TITLES
12A Cocktail Approach for Travel Package Recommendation
13An Empirical Performance Evaluation of Relational Keyword Search Techniques
14LARS*: An Efficient and Scalable Location-Aware Recommender System
15Product Aspect Ranking and Its Applications
16Secure Mining of Association Rules in Horizontally Distributed Databases
17Supporting Privacy Protection in Personalized Web Search
18TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality
19Typicality-Based Collaborative Filtering Recommendation

.NET-2014 IEEE PROJECTS
SECURE COMPUTING

S.No
TITLES
20Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems

.NET-2014 IEEE PROJECTS
NETWORKING

S.NO
TITLES
21Content Caching and Scheduling in Wireless Networks With Elastic and Inelastic Traffic
22Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

.NET-2014 IEEE PROJECTS
PARALLEL & DISTRIBUTED SYSTEMS

S.NO
TITLES
23A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
24A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
25An Error-Minimizing Framework for Localizing Jammers in Wireless Networks
26Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks
27Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks
28Multicast Capacity in MANET with Infrastructure Support
29Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
30Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing

.NET-2014 IEEE PROJECTS
MOBILE COMPUTING

S.NO
TITLES
31A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
32Autonomous Mobile Mesh Networks
33DA-Sync: A Doppler-Assisted Time-Synchronization Scheme for Mobile Underwater Sensor Networks
34Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs
35Preserving Location Privacy in Geosocial Applications

.NET-2014 IEEE PROJECTS
PATTERN ANALYSIS & MACHINE INTELLIGENCE

S.NO
TITLES
36Web Image Re-Ranking Using Query-Specific Semantic Signatures

.NET-2014 IEEE PROJECTS
IMAGE PROCESSING

S.NO
TITLES
37Click Prediction for Web Image Reranking Using Multimodal Sparse Coding
38Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation