B.Tech JAVA Projects -2014-2015 (Selected Projects)

  1. Key – Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
  2. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
  3. A Hybrid Cloud Approach for Secure Authorized Deduplication
  4. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
  5. Accuracy Constrained Privacy-Preserving Access Control Mechanism for Relational Data
  6. Supporting Privacy Protection in Personalized Web Search
  7. Security Evaluation of Pattern Classifiers under Attack
  8. Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
  9. Efficient Authentication for Mobile and Pervasive Computing
  10. Friend book: A Semantic-based Friend Recommendation System for Social Networks
  11. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
  12. Secure Continuous Aggregation in Wireless Sensor Networks
  13. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
  14. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
  15. Securing Broker Less Publish Subscribe Systems Using Identity-Based Encryption
  16. Automatic Test Packet Generation
  17. A System for Denial-of-Ser vice Attack Detection Based on Multivar iate Correlation Analysis
  18. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
  19. Trajectory Improves Data Delivery in Urban Vehicular Networks
  20. Click Prediction for Web Image Reranking Using Multimodal Sparse Coding
  21. Captcha as Graphical Passwords-A New Security Primitive Based on Hard AI Problems
  22. Privacy-Enhanced Web Service Composition
  23. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attacker’s Impact
  24. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
  25. CLOUDQUAL A Quality Model for Cloud Services
  26. Multi-Core Embedded Wireless Sensor Networks Architecture and Applications
  27. Cross-Layer Approach for Minimizing Routing Disruption in IP Networks
  28. Multicast Capacity in MANET with Infrastructure Support
  29. Efficient Data Collection for Large-Scale Mobile Monitoring Applications
  30. Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks
  31. Joint Topology-Transparent Scheduling and QoS Routing in Ad Hoc Networks
  32. Quality of Service Provision in Cloud-based Storage System for Multimedia Delivery
  33. Distributed Mobile Sink Routing for Wireless Sensor Networks A Survey
  34. The Design and Evaluation of An Information Sharing System for Human Networks
  35. Web Service Recommendation via Exploiting Location and QoS Information
  36. Congestion Aware Routing in Nonlinear Elastic Optical Networks
  37. Leveraging Social Networks for P2P Content based File Sharing in Disconnected MANETs
  38. Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
  39. Energy Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks
  40. Building Confidential And Efficient Query Services In The Cloud With RASP Data
  41. An Empirical Performance Evaluation of Relational Keyword Search Systems
  42. ITA Innocuous Topology Awareness
  43. Cloning, Resource Exchange, and Relation Adaptation: An Integrative Self-Organization Mechanism in a Distributed Agent Network.

.NET Projects- 2014-15 ( Selected Projects)

  1. Optimized multicast routing algorithm based on tree structure in MANETs
  2. Security Analysis of Handover Key Management in 4G LTESAE Networks
  3. Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication
  4. Key Aggregate Cryptosystem For Scalable Data Sharing In Cloud Storage
  5. An Empirical Performance Evaluation of Relational Keyword Search Systems
  6. Supporting Privacy Protection in Personalized Web Search
  7. Building Confidential And Efficient Query Services In The Cloud With RASP Data

 

DATA MINING – JAVA

  1. Facilitating Document Annotation Using Content and Querying Value
  2. An Empirical Performance Evaluation of Relational Keyword Search Techniques
  3. Set Predicates in SQL: Enabling Set-Level Comparisons for Dynamically Formed Groups
  4. Keyword Query Routing
  5. Supporting Privacy Protection in Personalized Web Search
  6. Product Aspect Ranking and Its Applications
  7. Interpreting the Public Sentiment Variations on Twitter
  8. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
  9. An Efficient Certificate less Encryption for Secure Data Sharing in Public Clouds

Data Mining – .NET

  1. A Group Incremental Approach to Feature Selection Applying Rough Set Technique
  2. Rough Sets, Kernel Set, and Spatiotemporal Outlier Detection
  3. Consensus-Based Ranking of Multivalued Objects: A Generalized Borda Count  Approach
  4. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
  5. Fast nearest Neighbor Search with Keywords
  6. Efficient Prediction of Difficult Keyword Queries over Databases
  7. Web Service Recommendation via Exploiting Location and QoS Information (Data Mining with Networking)
  8. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data (Data Mining with Network Security)

NETWORKING – JAVA

  1. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
  2. A Tag Encoding Scheme against Pollution Attack to Linear Network Coding
  3. Exploiting Service Similarity for Privacy in Location-Based Search Queries
  4. Network Coding Aware Cooperative MAC Protocol for Wireless Ad Hoc Networks
  5. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
  6. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
  7. Behavioral Malware Detection in Delay Tolerant Networks
  8. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
  9. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

NETWORKING – .NET

  1. LocaWard: A Security and Privacy Aware Location-Based Rewarding System
  2. Power Cost Reduction in Distributed Data Centers: A Two-Time-Scale Approach for Delay Tolerant Workloads
  3. Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks (Networking)
  4. Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption

CLOUD COMPUTING – JAVA

  1. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
  2. Modeling of Distributed File Systems for Practical Performance Analysis
  3. A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud
  4. A Hybrid Cloud Approach for Secure Authorized Deduplication
  5. Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions
  6. Secure Deduplication with Efficient and Reliable Convergent Key Management
  7. Transformation-Based Monetary Cost Optimizations for Workflows in the Cloud
  8. Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing
  9. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage (Cloud Java)

Cloud Computing – .NET

  1. A Novel Economic Sharing Model in a Federation of Selfish Cloud Providers
  2. A UCONABC Resilient Authorization Evaluation for Cloud Computing
  3. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
  4. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
  5. Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
  6. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
  7. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
  8. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing

Mobile Computing – JAVA

  1. Preserving Location Privacy in Geosocial Applications
  2. A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
  3. Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
  4. Cooperative Spectrum Sharing: A Contract-Based Approach

Dependable and Secure Computing  (Network Security) – JAVA

  1. Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data
  2. Bandwidth Distributed Denial of Service: Attacks and Defenses (Dependable and secure computing
  3. k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities
  4. On the Security of Trustee-Based Social Authentications
  5. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices

Image Processing – JAVA

  1. Vector-Valued Image Processing by Parallel Level Sets
  2. Accelerated Learning-Based Interactive Image Segmentation Using Pairwise Constraints
  3. Large Discriminative Structured Set Prediction Modeling With Max-Margin Markov Network for Lossless Image Coding
  4. Image Reconstruction from Double Random Projection
  5. Saliency-Aware Video Compression
  6. Translation Invariant Directional Framelet Transform Combined With Gabor Filters for Image Denoising

S. No

All Project Titles

Year
Cloud Computing  
1 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud 2014
2 NCCloud: A Network Coding Based Storage System in a Cloud-of-Clouds 2014
3 Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation 2014
4 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 2014
5 Privacy Preserving Multi keyword Ranked Search over Encrypted Cloud Data 2014
6 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds 2014
7 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation 2014
8 Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud. 2014
9 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications 2014
10 Cloud Assisted Mobile Access of Health Data With Privacy and Audit ability 2014
11 Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing 2014
12 Optimal Power Allocation and Load Distribution for Multiple Heterogeneous Multi core Server Processors across Clouds and Data Centers 2014
13 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 2014
14 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems 2014
15 Towards Differential Query Services in Cost Efficient Clouds 2014
16 An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing 2014
17 A Hybrid Cloud Approach for Secure Authorized De duplication 2014
18 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 2014
19 On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multi cloud Storage 2014
20 Identity Based Distributed Provable Data Possession in Multi-Cloud Storage 2014
21 Consistency as a Service Auditing :Cloud Consistency 2014
22 A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks 2014
23 Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds. 2014
24 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage 2014
25 Secure kNN Query Processing in Un trusted Cloud Environments 2014
26 A Mechanism Design Approach to Resource Procurement in Cloud Computing 2014
27 A Secure Client Side De duplication Scheme in Cloud Storage Environments 2014
28 Balancing Performance Accuracy and Precision for Secure Cloud Transactions 2014
29 Performance and cost evaluation of an adaptive encryption architecture for cloud databases 2014
30 Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor 2014
   
  Network Security  
     
1  Behavioral Malware Detection in Delay Tolerant Networks 2014
2 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 2014
3 Secure Deduplication with Efficient and Reliable Convergent Key Management 2014
4 Building a Scalable System for Stealthy P2P-Botnet Detection 2014
5 An Error Minimizing Framework for Localizing Jammers in Wireless Networks 2014
6 Securing Broker Less Publish Subscribe Systems Using Identity-Based Encryption 2014
7 Bandwidth Distributed Denial of Service: Attacks and Defenses 2014
8 E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels. 2014
9 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 2014
10 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems 2014
11 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing 2014
12 PROFILR: Toward Preserving Privacy and Functionality in Geo Social Networks Nodes 2014
13 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices 2014
   
  Ad hoc Networks & VANET & MANET
   
1 Optimal Multicast Capacity and Delay Tradeoffs in MANETs 2014
2 STARS: A Statistical Traffic Pattern Discovery System for MANETs 2014
3 Trajectory Improves Data Delivery in Urban Vehicular Networks 2014
4 Energy Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks 2014
5 VSPN: VANET-Based Secure and Privacy-Preserving Navigation 2014
6 Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks 2014
7 Multicast Capacity in MANET with Infrastructure Support 2014
8 Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs 2014
9 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs in Adversarial Environment 2014
10 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks 2014
11 Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach 2014
12 Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks 2014
13 Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs 2014
 
  Mobile Computing
 
1 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing 2014
2 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks 2014
3 A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks 2014
4 Efficient Authentication for Mobile and Pervasive Computing 2014
5 Friend book: A Semantic-based Friend Recommendation System for Social Networks 2014
6 Preserving Location Privacy in Geo Social Applications 2014
7 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices 2014
8 Video Dissemination over Hybrid Cellular and Ad Hoc Networks 2014
 
  Wireless Sensor Networks
   
1 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks 2014
2 An Error Minimizing Framework for Localizing Jammers in Wireless Networks 2014
3 A Survey of Intrusion Detection Systems in Wireless Sensor Networks 2014
4 QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks 2014
5 Link Quality Aware Code Dissemination in Wireless Sensor Networks 2014
6 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks 2014
7 ALBAR Load-Balancing Geographic Routing Around Connectivity Holes in Wireless Sensor Networks 2014
8 Secure Continuous Aggregation in Wireless Sensor Networks 2014
9 Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks. 2014
10 Top-k Query Result Completeness Verification in Tiered Sensor Networks 2014
11 Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing 2014
12 Data Density Correlation Degree Clustering Method for Data Aggregation in WSN 2014
13 An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless Sensor Networks 2014
14 Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks 2014
15  Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker’s Impact 2014
     
  Android Projects  
     
1 Friend book: A Semantic-based Friend Recommendation System for Social Networks 2014
2 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications 2014
3 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices 2014
4 Efficient Authentication for Mobile and Pervasive Computing 2014
5 Smart DC Mobility Prediction-based Adaptive Duty Cycling for Everyday Location Monitoring 2014
6 LocaWard A Security and Privacy Aware Location-Based Rewarding System 2014
7 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 2014
8 Discovering Emerging Topics in Social Streams via Link-Anomaly 2014
9 Cooperative Positioning and Tracking in Disruption Tolerant Networks 2014
10 MOSES: Supporting and Enforcing Security Profiles on Smart phones 2014
11 Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks 2014
12 SOS A Distributed Mobile Q&A System Based on Social Networks 2014
13 A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless Access Networks 2014
14 Improving Fairness, Efficiency, and Stability in HTTP-Based Adaptive Video Streaming With Festive 2014
16 Android College Campus 2014
 
  Data Mining  
     
1 Fast Nearest Neighbor Search with Keywords 2014
2 An Empirical Performance Evaluation of Relational Keyword Search Systems 2014
3 Facilitating Document Annotation using Content and Querying Value 2014
4 Supporting Privacy Protection in Personalized Web Search 2014
5 Secure Mining of Association Rules in Horizontally Distributed Databases 2014
6 Efficient Ranking on Entity Graphs with Personalized Relationships 2014
7 SOS: A Distributed Mobile Q&A System Based on Social Networks 2014
8 Privacy-Preserving and Content-Protecting Location Based Queries 2014
9 Discovering Emerging Topics in Social Streams via Link-Anomaly 2014
10 Security Evaluation of Pattern Classifiers under Attack 2014
11 LARS An Efficient and Scalable Location-Aware Recommender System 2014
12 Privacy-Preserving Authenticated Key-Exchange Over Internet. 2014
13 Accuracy Constrained Privacy-Preserving Access Control Mechanism for Relational Data 2014
14 Efficient Instant-Fuzzy Search with Proximity Ranking 2014
15 Efficient Prediction of Difficult Keyword Queries over Databases 2014
16 Temporal Workload-Aware Replicated Partitioning for Social Networks 2014
17 Best Peer++: A Peer-to-Peer Based Large-Scale Data Processing Platform 2014
18 Trusted DB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality 2014
19 Distributed Web Systems Performance Forecasting Using Turning Bands Method 2014
20 Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks 2014
   
  Networking and Wireless Communication  
1 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks 2014
2 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 2014
3 Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks 2014
4 Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks 2014
5 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes 2014
6 Automatic Test Packet Generation 2014
7 HALO: Hop-by-Hop Adaptive Link-State Optimal Routing 2014
8 A Two stage Deanonymization Attack Against Anonymized Social Networks 2014
9 Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks 2014
   
  Image Processing and Multimedia  
     
1 Web Image Re-Ranking Using Query-Specific Semantic Signatures 2014
2 Click Prediction for Web Image Re ranking Using Multimodal Sparse Coding 2014
3 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems 2014
4 Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images 2014
5 Personalized Geo-Specific Tag Recommendation for Photos on Social Websites 2014
6 Multi sensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics (Dot Net) 2014
7 Sharing Visual Secrets in Single Image Random Dot Stereograms (Dot Net) 2014
8 Feature Match: A General ANNF Estimation Technique and its Applications (Dot Net) 2014
   
  J2ME Mobile Based Projects
   
1 Adaptation of a virtual campus for mobile learning devices 2014
2 Bluetooth Mobile Based College Campus 2014
3 ECops via Handheld Mobile Devices 2014
4 Privacy-Conscious Location-Based Queries in Mobile Environments 2014
5 Ranking Model Adaptation for Domain-Specific Search 2014
6 SPOC A Secure and Privacy-preserving Opportunistic Computing Framework For Mobile-Healthcare Emergency 2014
7 The Word in a nut shell : CONCISE RANGE QUERIES 2014
  Parallel and Distributed System
 
1 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 2014
2 Exploiting Service Similarity for Privacy in Location-Based Search Queries 2014
3 LocaWard: A Security and Privacy Aware Location-Based Rewarding System 2014
4 On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures 2014
5 Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks 2014
6 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks 2014
7 SOS: A Distributed Mobile Q&A System Based on Social Networks 2014
8 Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks 2014
9 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks 2014
10 Secure Deduplication with Efficient and Reliable Convergent Key Management 2014