Find the below 2015-2016 Latest  IEEE Java, Android Projects for B.Tech, B.E and M.Tech Students.

 

Sl.No

Project Title

Year
 

Cloud Computing

 
     
1 Identity-based Encryption with Outsourced Revocation in Cloud Computing 2015
2 Cloud Armor Supporting Reputation-based Trust Management for Cloud Services 2015
3 SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks 2015
4 Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation 2015
5 Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds 2015
6 Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds 2015
7 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute Based Encryption 2015
8 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing 2015
9 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 2015
10 Audit Free Cloud Storage via Deniable Attribute based Encryption 2015
11 CHARM: A Cost-efficient Multi cloud Data Hosting Scheme with High Availability 2015
12 Demystifying the Clouds: Harnessing Resource Utilization Models for Cost Effective Infrastructure Alternatives 2015
13 Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing 2015
14 Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud 2015
15 Combining Efficiency, Fidelity, and Flexibility in Resource Information Services 2015
16 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 2015
17 Enabling Cloud Storage Auditing with Key Exposure Resistance 2015
18 Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem 2015
19 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage 2015
20 OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices 2015
21 Privacy Preserving Public Auditing for Regenerating Code Based Cloud Storage 2015
22 Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud 2015
23 Provable Multi copy Dynamic Data Possession in Cloud Computing Systems 2015
24 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation 2015
25 Reactive Resource Provisioning Heuristics for Dynamic Data flows on Cloud Infrastructure 2015
26 Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing 2015
27 Reducing Fragmentation for In-line De duplication Backup Storage via Exploiting Backup History and Cache Knowledge 2015
28 Secure Auditing and De duplicating Data in Cloud 2015
29 Secure Distributed De duplication Systems with Improved Reliability 2015
30 Public Integrity Auditing for Dynamic Data Sharing with Multi User Modification 2015
31 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems 2015
32 Cloud-Trust a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds 2015
33 Cloud-Based Multimedia Content Protection System 2015
34 A secure data self-destructing scheme in cloud computing 2015
35 Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage 2015
36 A Hybrid Cloud Approach for Secure Authorized De duplication 2015
37 Stealthy Denial of Service Strategy in Cloud Computing 2015
38 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2015
39 An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration 2015
40 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data 2015
41 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing 2015
42 SelCSP: A Framework to Facilitate Selection of Cloud Service Providers 2015
43 Guest Editorial: Recommendation Techniques for Services Computing and Cloud Computing 2015
44 PSMPA: Patient Self-Controllable and Multi-Level Privacy Preserving Cooperative Authentication in Distributed m- Healthcare Cloud Computing System 2015
45 MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework 2015
46 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications 2015
47 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 2015
48 Enabling Fine grained Multi keyword Search Supporting Classified Sub dictionaries over Encrypted Cloud Computing 2015
49 A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud 2015
50 On the Security of Data Access Control for Multi Authority cloud storage systems 2015
     
 

Network Security & Secure Computing

 
     
1 Key recovery Attacks on KIDS, a Keyed Anomaly Detection System 2015
2 Authenticated Key Exchange Protocols for Parallel Network File Systems 2015
3 CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes 2015
4 My Privacy My Decision Control of Photo Sharing on Online Social Networks 2015
5 Passive IP Trace back: Disclosing the Locations of IP Spoofers from Path Backscatter 2015
6 Generating Searchable Public-Key Cipher texts with Hidden Structures for Fast Keyword Search 2015
7 Software Puzzle: A Countermeasure to Resource-Inflated Denial of- Service Attacks 2015
8 Secure Distributed De duplication Systems with Improved Reliability 2015
9 Vote Trust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils 2015
10 Group Key Agreement with Local Connectivity 2015
11 Key Updating for Leakage Resiliency with Application to AES Modes of Operation 2015
12 A Computational Dynamic Trust Model for User Authorization 2015
13 Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts 2015
14 Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems 2015
15 Continuous and Transparent User Identity Verification for Secure Internet Services 2015
16 Data Lineage in Malicious Environments 2015
17 Secure Spatial Top-k Query Processing via Un trusted Location- Based Service Providers 2015
18 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks 2015
19 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints 2015
     
  Data Mining  
     
1 Towards Effective Bug Triage with Software Data Reduction Techniques 2015
2 Active Learning for Ranking through Expected Loss Optimization 2015
3 Discovery of Ranking Fraud for Mobile Apps 2015
4 k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data 2015
5 Entity Linking with a Knowledge Base: Issues, Techniques, and Solutions 2015
6 PAGE: A Partition Aware Engine for Parallel Graph Computation 2015
7 Query Aware Determinization of Uncertain Objects 2015
8 RRW – A Robust and Reversible Watermarking Technique for Relational Data 2015
9 Rule-Based Method for Entity Resolution 2015
10 Secure Distributed De duplication Systems with Improved Reliability 2015
11 Smart Crawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces 2015
12 Best Keyword Cover Search 2015
13 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model 2015
14 Context-Based Diversification for Keyword Queries over XML Data 2015
15 Malware Propagation in Large-Scale Networks 2015
16 On Summarization and Timeline Generation for Evolutionary Tweet Streams 2015
17 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites 2015
18 Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection 2015
19 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services 2015
20 Scalable Constrained Spectral Clustering 2015
21 Tweet Segmentation and Its Application to Named Entity Recognition 2015
22 Tracking Temporal Community Strength in Dynamic Networks 2015
23 Anonymizing Collections of Tree-Structured Data 2015
24 Making Digital Artifacts on the Web Verifiable and Reliable 2015
25 Privacy Policy Inference of User Uploaded Images on Content Sharing Sites 2015
26 Structured Learning from Heterogeneous Behavior for Social Identity Linkage 2015
27 Sub graph Matching with Set Similarity in a Large Graph Database 2015
28 Tweet Segmentation and Its Application to Named Entity Recognition 2015
     
     
  Mobile Computing  
     
1 A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks 2015
2 Optimum Power Allocation in Sensor Networks for Active Radar Applications 2015
3 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks 2015
4 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks 2015
5 User-Defined Privacy Grid System for Continuous Location-Based Services 2015
6 Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks 2015
7 Towards Information Diffusion in Mobile Social Networks 2015
8 Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc Networks 2015
9 Minimizing Transmission Cost for Third-Party Information Exchange with Network Coding 2015
     
     
 

Wireless Sensor Networks

 
     
1 Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks 2015
2 Data Collection in Multi Application Sharing Wireless Sensor Networks 2015
3 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks 2015
4 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks 2015
5 Effective Key Management in Dynamic Wireless Sensor Networks 2015
6 Congestion Aware Load Balancing for Multi radio Wireless MeshNetwork 2015
7 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks 2015
8 Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks 2015
9 An Efficient Distributed Trust Model for Wireless Sensor Networks 2015
10 Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks 2015
11 Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs 2015
12 Efficient Coverage and Connectivity Preservation With Load Balance for Wireless Sensor Networks 2015
13 Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks 2015
     
 

Android Projects

 
     
1 Cooperative Positioning and Tracking in Disruption Tolerant Networks 2015
2 Friend book A Semantic-based Friend Recommendation System for Social Networks 2015
3 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications 2015
4 A Location and Diversity aware News Feed System for Mobile Users 2015
5 ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware 2015
6 Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud 2015
7 Privacy-Preserving Relative Location Based Services for Mobile Users 2015
8 Smartphone-Based Wound Assessment System for Patients with Diabetes 2015
9 User Privacy and Data Trustworthiness in Mobile Crowd Sensing 2015
10 User-Defined Privacy Grid System for Continuous Location-Based Services 2015
11 VULHUNTER: Toward Discovering Vulnerabilities in Android Applications 2015
12 The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps 2015
13 Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds 2015
14 Context-Based Access Control Systems for Mobile Devices 2015
15 Extend Your Journey Considering Signal Strength and Fluctuation in Location Based Applications 2015
16 CWC: A Distributed Computing Infrastructure Using Smart phones 2015
     
  Adhoc Networks & VANET & MANET  
     
1 Efficient Data Query in Intermittently Connected Mobile Ad Hoc Social Networks 2015
2 Defending Against Collaborative Attacks by Malicious Nodes in MANETs A Cooperative Bait Detection Approach 2015
3 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing 2015
4 Optimal Configuration of Network Coding in Ad Hoc Networks 2015
5 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks 2015
6 Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc Networks 2015
7   2015
8   2015
     
  Networking and Service Computing, Secure Computing  
     
1 Smart Crawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces 2015
2 Generating Searchable Public-Key Cipher texts with Hidden Structures for Fast Keyword Search 2015
3 Vote Trust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils 2015
4 Detecting Malicious Face book Applications 2015
5 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks 2015
6 A Proximity-Aware Interest-Clustered P2P File Sharing System 2015
7 Universal Network Coding-Based Opportunistic Routing for Unicast 2015
8 Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization 2015
9 My Privacy My Decision: Control of Photo Sharing on Online Social Networks 2015
10 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation 2015
11 Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis 2015
     
     
 

Image Processing and Multimedia

 
     
1 Learning to Rank Image Tags with Limited Training Examples 2015
2 An Attribute assisted Re ranking Model for Web Image Search 2015
3 EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval 2015
4 Steganography Using Reversible Texture Synthesis 2015
5 Query Aware Determinization of Uncertain Objects 2015
6 Detection and Rectification of Distorted Fingerprints 2015
7 Learning Fingerprint Reconstruction: From Minutiae to Image 2015
8 Multi view Alignment Hashing for Efficient Image Search 2015
9 Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images 2015
10   2015
     
 

Parallel and Distributed System

 
     
1 A Computational Dynamic Trust Model for User Authorization 2015
2 Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks 2015
3 Authenticated Key Exchange Protocols for Parallel Network File Systems 2015
4 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 2015
5 Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds 2015
6 Data Collection in Multi-Application Sharing Wireless Sensor Networks 2015
7 Reducing Fragmentation for In-line De duplication Backup Storage via Exploiting Backup History 2015
8 Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds 2015
9 Secure Distributed De duplication Systems with Improved Reliability 2015
10 Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks 2015
11 A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud  
12 Dominating Set and Network Coding-based Routing in Wireless Mesh Networks  
     
 

SERVICE COMPUTING

 
     
1 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation 2015
2 A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services 2015
3 Guest Editorial: Recommendation Techniques for Services Computing and Cloud Computing 2015
4 Diversifying Web Service Recommendation Results via Exploring Service Usage History 2015
5 A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values 2015
6 Smart Crawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces 2015