Sie sind auf Seite 1von 6

2015 - 2016 JAVAIEEE FINALYEAR Projects @ OCTOPUS

S.N
O
Project

IEEE 2015 JAVA Project Titles

Domain

A Hybrid Cloud Approach for Secure


Authorized Deduplication

CLOUD
COMPUTING

JAVA/201
5

A Profit Maximization Scheme with


Guaranteed Quality of

CLOUD
COMPUTING

JAVA/201
5

CLOUD
COMPUTING

Lang/Year
JAVA/201
5

CLOUD
COMPUTING

JAVA/201
5

CLOUD
COMPUTING

JAVA/201
5

CLOUD
COMPUTING

JAVA/201
5

CLOUD
COMPUTING

JAVA/201
5

CLOUD
COMPUTING

JAVA/201
5

CLOUD
COMPUTING

JAVA/201
5

CLOUD
COMPUTING

JAVA/201
5

CLOUD
COMPUTING

JAVA/201
5

Code

J1501

J1502

Service in Cloud Computing

J1503

A Scalable and Reliable Matching Service for


Content-Based
Publish/Subscribe Systems

J1504

A Secure and Dynamic Multi-keyword Ranked


Search Scheme
over Encrypted Cloud Data

J1505

A Secure Anti-Collusion Data Sharing Scheme


for Dynamic Groups
in the Cloud

J1506

An Authenticated Trust and Reputation


Calculation and
Management System for Cloud and Sensor
Networks Integration

J1507

Audit-Free Cloud Storage via Deniable


Attribute-based
Encryption

J1508

Circuit Ciphertext-policy Attribute-based


Hybrid Encryption with
Verifiable Delegation in Cloud Computing

J1509

CloudArmor: Supporting Reputation-based


Trust Management
for Cloud Services

10

J1510

Control Cloud Data Access Privilege and


Anonymity with Fully
Anonymous Attribute-Based Encryption

11

J1511

Enabling Cloud Storage Auditing With KeyExposure Resistance

12

13

J1512

Enabling Fine-grained Multi-keyword Search


Supporting

CLOUD
COMPUTING

JAVA/201
5

CLOUD
COMPUTING

JAVA/201
5

CLOUD
COMPUTING

JAVA/201
5

Classified Sub-dictionaries over Encrypted


Cloud Data

J1513

Identity-Based Encryption with Outsourced


Revocation in Cloud
Computing

14

J1514

Key-Aggregate Searchable Encryption (KASE)


for Group Data
Sharing via Cloud Storage

Privacy Preserving Ranked Multi-Keyword Search


for Multiple
CLOUD COMPUTING JAVA/2015
Data Owners in Cloud Computing

15

J1515

16

J1516

Privacy-Preserving Public Auditing for


Regenerating-Code-Based
Cloud Storage

CLOUD COMPUTING JAVA/2015

17

J1517

Provable Multicopy Dynamic Data Possession in


Cloud Computing
Systems

CLOUD COMPUTING JAVA/2015

18

J1518

Public Integrity Auditing for Shared Dynamic Cloud


Data with
CLOUD COMPUTING JAVA/2015
Group User Revocation

19

J1519

Secure Auditing and Deduplicating Data in Cloud CLOUD COMPUTING JAVA/2015

20

J1520

Stealthy Denial of Service Strategy in Cloud


Computing

21

J1521

Best Keyword Cover Search

DATA MINING

JAVA/2015

22

J1522

Co-Extracting Opinion Targets and Opinion Words


from Online
Reviews Based on the Word Alignment Model

DATA MINING

JAVA/2015

23

J1523

Context-Based Diversification for Keyword Queries


over XML
Data

DATA MINING

JAVA/2015

24

J1524

Discovery of Ranking Fraud for Mobile Apps

DATA MINING

JAVA/2015

25

J1525

Malware Propagation in Large-Scale Networks

DATA MINING

JAVA/2015

26

J1526

On Summarization and Timeline Generation for


Evolutionary
Tweet Streams

DATA MINING

JAVA/2015

CLOUD COMPUTING JAVA/2015

27

J1527

Privacy Policy Inference of User-Uploaded Images


on Content
Sharing Sites

DATA MINING

JAVA/2015

28

J1528

Progressive Duplicate Detection

DATA MINING

JAVA/2015

29

J1529

Reverse Nearest Neighbors in Unsupervised


Distance-Based
Outlier Detection

DATA MINING

JAVA/2015

30

J1530

Route-Saver: Leveraging Route APIs for Accurate


and Efficient
Query Processing at Location-Based Services

DATA MINING

JAVA/2015

31

J1531

Scalable Constrained Spectral Clustering

DATA MINING

JAVA/2015

32

J1532

Towards Effective Bug Triage with Software Data


Reduction
Techniques

DATA MINING

JAVA/2015

33

J1533

Tweet Segmentation and Its Application to Named


Entity
Recognition

DATA MINING

JAVA/2015

34

J1534

A Distortion-Resistant Routing Framework for


Video Traffic in
Wireless Multihop Networks

NETWORKING

JAVA/2015

35

J1535

A Proximity-Aware Interest-Clustered P2P File


Sharing System

NETWORKING

JAVA/2015

36

J1536

Detecting Malicious Facebook Applications

NETWORKING

JAVA/2015

37

J1537

NETWORKING

JAVA/2015

38

J1538

Dynamic Routing for Data Integrity and Delay


Differentiated
Services in Wireless Sensor Networks

MOBILE
COMPUTING

JAVA/2015

39

J1539

Friendbook: A Semantic-Based Friend


Recommendation System
for Social Networks

MOBILE
COMPUTING

JAVA/2015

40

J1540

Privacy-Preserving and Truthful Detection of


Packet Dropping
Attacks in Wireless Ad Hoc Networks

MOBILE
COMPUTING

JAVA/2015

41

J1541

User-Defined Privacy Grid System for Continuous


Location-Based
Services

MOBILE
COMPUTING

JAVA/2015

42

J1542

A Computational Dynamic Trust Model for User


Authorization

SECURE
COMPUTING

JAVA/2015

43

J1543

A Lightweight Secure Scheme for Detecting


Provenance Forgery
and Packet Drop Attacks in Wireless Sensor
Networks

SECURE
COMPUTING

JAVA/2015

44

J1544

Continuous and Transparent User Identity


Verification for Secure
Internet Services

SECURE
COMPUTING

JAVA/2015

45

J1545

Contributory Broadcast Encryption with Efficient


Encryption and
Short Ciphertexts

SECURE
COMPUTING

JAVA/2015

46

J1546

DDSGA: A Data-Driven Semi-Global Alignment


Approach for
Detecting Masquerade Attacks

SECURE
COMPUTING

JAVA/2015

Maximizing P2P File Access Availability in Mobile


Ad Hoc
Networks though Replication for Efficient File
Sharing

47

J1547

Improved Privacy-Preserving P2P Multimedia


Distribution Based
on Recombined Fingerprints

SECURE
COMPUTING

JAVA/2015

48

J1548

Secure Data Aggregation Technique for Wireless


Sensor
Networks in the Presence of Collusion Attacks

SECURE
COMPUTING

JAVA/2015

49

J1549

Secure Spatial Top-k Query Processing via


Untrusted LocationBased Service Providers

SECURE
COMPUTING

JAVA/2015

50

J1550

Asymmetric Social Proximity Based Private


Matching Protocols
for Online Social Networks

51

J1551

Cost-Effective Authentic and Anonymous Data


Sharing with
Forward Security

52

J1552

Secure Distributed Deduplication Systems with


Improved
Reliability

J1553
53

J1554

A Framework for Secure Computations with Two


Non-Colluding
Servers and Multiple Clients, Applied to
Recommendations

Effective Key Management in Dynamic Wireless


Sensor Networks

54

J1555
55

J1556
56

J1557
57

58

J1558

Key Updating for Leakage Resiliency with


Application to AES
Modes of Operation

Passive IP Traceback: Disclosing the Locations of


IP Spoofers from
Path Backscatter

Software Puzzle: A Countermeasure to ResourceInflated Denialof-Service Attacks

An Attribute-Assisted Reranking Model for Web


Image Search

PARALLEL &
DISTRIBUTED
SYSTEMS

JAVA/2015

PARALLEL &
DISTRIBUTED
SYSTEMS

JAVA/2015

PARALLEL &
DISTRIBUTED
SYSTEMS

JAVA/2015

INFORMATION
FORENSICS AND
SECURITY

JAVA/2015

INFORMATION
FORENSICS AND
SECURITY

JAVA/2015

INFORMATION
FORENSICS AND
SECURITY

JAVA/2015

INFORMATION
FORENSICS AND
SECURITY

JAVA/2015

INFORMATION
FORENSICS AND
SECURITY

JAVA/2015

IMAGE
PROCESSING

JAVA/2015

EMR: A Scalable Graph-based Ranking Model for


Content-based
Image Retrieval

IMAGE
PROCESSING

JAVA/2015

Learning to Rank Image Tags With Limited Training


Examples

IMAGE
PROCESSING

JAVA/2015

Designing High Performance Web-Based


Computing Services to
Promote Telemedicine Database Management
System

SERVICE
COMPUTING

JAVA/2015

(WEB SERVICE)

62

J1562

Location-Aware and Personalized Collaborative


Filtering for Web
Service Recommendation

SERVICE
COMPUTING
(WEB SERVICE)

JAVA/2015

63

J1563

A Fuzzy Preference Tree-Based Recommender


System for
Personalized Business-to-Business E-Services

FUZZY SYSTEMS

JAVA/2015

59

J1559

60

J1560

61

J1561