2015 IEEE Projects


IEEE 2014 – 2015 JAVA TITLES
PROJECT CODE
TITLE
DOMAIN
LANJ1501
TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud
CLOUD COMPUTING
LANJ1502
DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security
CLOUD COMPUTING

LANJ1503
CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
CLOUD COMPUTING
LANJ1504
Audit-Free Cloud Storage via Deniable Attribute-based Encryption
CLOUD COMPUTING
LANJ1505
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
CLOUD COMPUTING

LANJ1506
Control Cloud Data Access Privilege and
Anonymity With Fully Anonymous
Attribute-Based Encryption
CLOUD COMPUTING

LANJ1507
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
CLOUD COMPUTING
LANJ1508
Audit-Free Cloud Storage via Deniable Attribute-based
Encryption
CLOUD COMPUTING

LANJ1509
A Hybrid Cloud Approach for Secure Authorized Deduplication
CLOUD COMPUTING

LANJ1510
A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
CLOUD COMPUTING

LANJ1511
Enabling Cloud Storage Auditing with
Key-Exposure Resistance
CLOUD COMPUTING
LANJ1512
Stealthy Denial of Service Strategy in Cloud Computing
CLOUD COMPUTING

LANJ1513
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
CLOUD COMPUTING

LANJ1514
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
CLOUD COMPUTING

LANJ1515
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds
CLOUD COMPUTING
LANJ1516
Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
CLOUD COMPUTING

LANJ1517
A Dynamic Secure Group Sharing Framework In Public Cloud Computing
CLOUD COMPUTING

LANJ1518
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
CLOUD COMPUTING
LANJ1519
Detecting Malicious Facebook Applications
NETWORKING
LANJ1520
Universal Network Coding-Based Opportunistic Routing for Unicast
NETWORKING
LANJ1521
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing
NETWORKING
LANJ1522
Scaling Social Media Applications Into Geo-Distributed Clouds
NETWORKING
LANJ1523
Privacy-Preserving Quantification of Cross-Domain Network Reachability
NETWORKING
LANJ1524
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
KNOWLEDGE & DATA ENGINEERING
LANJ1525
Tweet Segmentation and Its Application to Named Entity Recognition
KNOWLEDGE & DATA ENGINEERING
LANJ1526
Best Keyword Cover Search
KNOWLEDGE & DATA ENGINEERING
LANJ1527
On Summarization and Timeline Generation for Evolutionary Tweet Streams
KNOWLEDGE & DATA ENGINEERING
LANJ1528
FOCS: Fast Overlapped Community Search
KNOWLEDGE & DATA ENGINEERING
LANJ1529
Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
KNOWLEDGE & DATA ENGINEERING
LANJ1530
Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services
KNOWLEDGE & DATA ENGINEERING
LANJ1531
Translating Relational Queries into Spreadsheets
KNOWLEDGE & DATA ENGINEERING
LANJ1532

PAGE: A Partition Aware Engine for Parallel Graph Computation

KNOWLEDGE & DATA ENGINEERING
LANJ1533
Efficient Enforcement of Action-aware Purpose-based Access Control within Relational Database Management Systems
KNOWLEDGE & DATA ENGINEERING
        LANJ1534

Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
MOBILE COMPUTING
LANJ1535
User-Defined Privacy Grid System for Continuous Location-Based Services
MOBILE COMPUTING

LANJ1536
DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks
MOBILE COMPUTING
LANJ1537
A New Multiple Service Key Management Scheme for Secure Wireless Mobile Multicast
MOBILE COMPUTING
LANJ1538
A privacy-preserving framework for managing mobile ad requests and billing information
MOBILE COMPUTING
LANJ1539
Practical Secret Key Agreement for Full-Duplex Near Field Communications
MOBILE COMPUTING
LANJ1540
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
SECURE COMPUTING

LANJ1541
Deleting Secret Data with Public Verifiability
SECURE COMPUTING
LANJ1542
Key-recovery Attacks on KIDS, a Keyed Anomaly Detection System
SECURE COMPUTING
LANJ1543
My Privacy My Decision: Control of Photo Sharing on Online Social Networks
SECURE COMPUTING

LANJ1544
A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
SECURE COMPUTING
LANJ1545
Between Worlds: Securing Mixed JavaScript/ActionScript Multi-party Web Content
SECURE COMPUTING
LANJ1546
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints
SECURE COMPUTING
LANJ1547
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
SECURE COMPUTING

LANJ1548
A Computational Dynamic Trust Model for User Authorization
SECURE COMPUTING

LANJ1549
A Proximity-aware Interest-clustered P2P File Sharing System
PARALLEL & DISTRIBUTED SYSTEMS
LANJ1550
CAMF: Context-aware Message Forwarding in Selfish Mobile Social Networks
PARALLEL & DISTRIBUTED SYSTEMS
LANJ1546
Secure Distributed Deduplication Systems with ImprovedReliability
PARALLEL & DISTRIBUTED SYSTEMS
LANJ1547
A General Scalable and Elastic Content-Based Publish/Subscribe Service
PARALLEL & DISTRIBUTED SYSTEMS
LANJ1548
Goodput-Aware Load Distribution for Real-Time Traffic over Multipath Networks
PARALLEL & DISTRIBUTED SYSTEMS
LANJ1549
Software Puzzle: A Countermeasure to Resource-Inflated Denial of-Service Attacks
INFORMATION
FORENSICS AND
SECURITY
LANJ1550
Key Updating for Leakage Resiliency with Application to AES Modes of Operation
INFORMATION
FORENSICS AND
SECURITY

LANJ1551
Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
INFORMATION
FORENSICS AND
SECURITY

No comments:

Post a Comment