Sie sind auf Seite 1von 5

2017-2018 SOFTWARE IEEE FINAL YEAR PROJECT TITLES

S.NO PROJECT TITLES


CLOUD COMPUTING
1 Optimizing Locality-Aware Memory Management of Key-Value Caches

2 Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate


Keys for Online Data Sharing on the Cloud
3 Correlation Modeling and Resource Optimization for Cloud Service with Fault
Recovery
4 Achieving Privacy-friendly Storage and Secure Statistics for Smart Meter Data
on Outsourced Clouds
5 Multimedia Processing Pricing Strategy in GPU-accelerated Cloud Computing

6 Quantitative Modeling and Analytical Calculation of Elasticity in Cloud


Computing
7 Efficiently Translating Complex SQL Query to MapReduce Jobflow on Cloud

8 A Modified Hierarchical Attribute-Based Encryption Access Control Method


for Mobile Cloud Computing
9 Application-Aware Big Data Deduplication in Cloud Environment

10 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data


in Cloud
11 Optimizing Live Migration of Multiple Virtual Machines

12 Customer-Satisfaction-Aware Optimal Multi-server Configuration for Profit


Maximization
13 Identity-Based Private Matching over Outsourced Encrypted Datasets

14 Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted


Data
15 Energy-Aware Data Allocation With Hybrid Memory for Mobile Cloud
Systems
16 Energy-Aware Resource and Revenue Management in Federated Cloud: A
Game-Theoretic Approach
17 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

19 Privacy-Preserving Multi-keyword Similarity Search Over Outsourced Cloud


Data
20 Publicly Verifiable Computation of Polynomials over Outsourced Data with
Multiple Sources
21 SeDaSC: Secure Data Sharing in Clouds

INFORMATION FORENSICS AND SECURITY

22 Deep Representation based feature extraction and recovering for Finger-vein


verification
23 Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path
Identifiers
24 NetSpam: a Network-based Spam Detection Framework for Reviews in Online
Social Media
26 Two-Cloud Secure Database for Numeric-Related SQL Range Queries with
Privacy Preserving
27 A Privacy-preserving Vehicular Crowdsensing based Road surface Condition
Monitoring System Using Fog Computing
INTELLIGENT TRANSPORTATION SYSTEMS
28 EAAP: Efficient Anonymous Authentication With Conditional Privacy-
Preserving Scheme for Vehicular Ad Hoc Networks
29 A Multi-Agent Advanced Traveler Information System for Optimal Trip
Planning in a Co-Modal Framework
PARALLEL AND DISTRIBUTED SYSTEMS
30 Optimal Symbiosis and Fair Scheduling in Shared Cache
31 Enabling Efficient and Reliable Transition from Replication to Erasure
Coding for Clustered File Systems
32 Binary-Tree Based Estimation of File Requests for Efficient Data Replication

DEPENDABLE AND SECURE COMPUTING


33 MMBcloud -Tree: Authenticated Index for Verifiable Cloud Service Selection

34 Yes, Machine Learning Can Be More Secure! A Case Study on Android


Malware Detection
35 On the Soundness and Security of Privacy-Preserving SVM for Outsourcing
Data Classification
36 SADI: A Novel Model to Study the Propagation of Social Worms in
Hierarchical Networks
37 A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service
Provisioning in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING
38 Majority Voting and Pairing with Multiple Noisy Labeling
39 Efficient Keyword-aware Representative Travel Route Recommendation
40 Detecting Stress Based on Social Interactions in Social Networks
41 Efficient Clue-based Route Search on Road Networks
42 Probabilistic Models For Ad Viewability Prediction On The Web
43 Large-scale Location Prediction for Web Pages
44 Modeling and Learning Distributed Word Representation with Metadata for
Question Retrieval
45 Engagement dynamics and sensitivity analysis of YouTube videos
46 Confusion-matrix-based Kernel Logistic Regression for Imbalanced Data
Classification
SERVICES COMPUTING
47 A Hybrid Bio-Inspired Algorithm for Scheduling and Resource Management
in Cloud Environment
48 Resource renting for periodical cloud workflow applications
49 Transactional Behavior Verification in Business Process as a Service
Configuration
50 A semi-automatic and trustworthy scheme for continuous cloud service
certification
SUSTAINABLE COMPUTING
51 Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit
Maximization in Cloud Computing
52 A Belief Rule Based Expert System for Datacenter PUE Prediction under
Uncertainty
MOBLIE COMPUTING AND NETWORKING
53 An Efficient Cloud Market Mechanism for Computing Jobs With Soft
Deadlines
54 Utility Maximization for Multimedia Data Dissemination in Large-scale
VANETs
55 DIVERT: A Distributed Vehicular Traffic Re-routing System for Congestion
Avoidance
56 User Authentication Via PRNU-Based Physical Unclonable Function
57 Sybil Defense Techniques in Online Social Networks: A Survey
58 Two-Factor Data Access Control With Efficient Revocation for Multi-
Authority Cloud Storage Systems

59 A Trust Model based on Cloud Theory in Underwater Acoustic Sensor


Networks
60 Joint Admission Control and Routing Via Approximate Dynamic Programming
for Streaming Video over Software-Defined Networking

61 Fine-Grained Analysis of Packet Loss in MANETs


WIRELESS COMMUNICATION
62 Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-
/Half-Duplex Receiver Deployment Strategy
63 Cooperative Spectrum Sensing with M-ary Quantized Data in Cognitive Radio
Networks under SSDF Attacks
NETWORKING

64 Twitter Trends Manipulation: A First Look Inside the Security of Twitter


Trending
65 Privacy-Preserving Aggregate Queries for Optimal Location Selection

66 Person Identification by Keystroke Dynamics using Pairwise User Coupling

67 FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data


68 Efficiently Promoting Product Online Outcome: An Iterative Rating Attack
Utilizing Product and Market Property

69 An Efficient Cloud Market Mechanism for Computing Jobs With Soft


Deadlines
70 A Delay-Sensitive Multicast Protocol for Network Capacity Enhancement in
Multi-rate MANETs
71 Optimal Capacity-Delay Tradeoff in MANETs with Correlation of Node
Mobility
72 Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in
Wireless Smart Grid Networks

Das könnte Ihnen auch gefallen