An ISO 9001:2000 certified organization
  • Call: 040 - 4443 3434
  • Mail:

B.Tech-IT-JAVA 2016-2017

 Download Poject List


Projects List



Cloud Computing

1. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement IEEE Download
2. Dynamic and Public Auditing with Fair Arbitration for Cloud Data IEEE Download
3. Identity-Based Encryption with Cloud Revocation Authority and Its Applications IEEE Download
4. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption IEEE Download
5. CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services IEEE Download
6. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud IEEE Download
7. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data IEEE Download
8. Secure Distributed Deduplication Systems with Improved Reliability IEEE Download
9. Audit-Free Cloud Storage via Deniable Attribute-based Encryption IEEE Download
10. Supporting multi data stores applications in cloud environments IEEE Download
11. PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System IEEE Download
12. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems IEEE Download
13. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security IEEE Download
14. A Hybrid Cloud Approach for Secure Authorized Deduplication IEEE Download
15. BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value Store IEEE Download
16. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data IEEE Download
17. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud IEEE Download
18. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds IEEE Download
19. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System IEEE Download
20. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation IEEE Download
21. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases IEEE Download
22. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage IEEE Download
23. Towards Differential Query Services in Cost-Efficient Clouds IEEE Download
24. A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud IEEE Download
25. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring IEEE Download
26. QoS Ranking Prediction for Cloud Services IEEE Download
27. Winds of Change: From Vendor Lock-In to the Meta Cloud IEEE Download
28. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud IEEE Download
29. Outsourcing Privacy-Preserving Social Networks to a Cloud IEEE Download
30. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption IEEE Download
31. Efficient similarity search over encrypted data IEEE Download
32. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data IEEE Download
33. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment IEEE Download


1. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks IEEE Download
2. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm IEEE Download
3. Resolving Multi-Party Privacy Conflicts in Social Media IEEE Download
4. DARE: A Deduplication-Aware Resemblance Detection and Elimination Scheme for Data Reduction with Low Overheads IEEE Download
5. Best Keyword Cover Search IEEE Download
6. Context-Based Diversification for Keyword Queries Over XML Data IEEE Download
7. Progressive Duplicate Detection IEEE Download
8. Structured Learning from Heterogeneous Behavior for Social Identity Linkage IEEE Download
9. K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data IEEE Download
10. Rank-Based Similarity Search: Reducing the Dimensional Dependence IEEE Download
11. A Cocktail Approach for Travel Package Recommendation IEEE Download
12. Fast Nearest Neighbor Search with Keywords IEEE Download
13. Privacy-Preserving and Content-Protecting Location Based Queries IEEE Download
14. Spatial Approximate String Search IEEE Download
15. A Survey of XML Tree Patterns IEEE Download
16. Crowd sourcing Predictors of Behavioral Outcomes IEEE Download
17. M-Privacy for Collaborative Data Publishing IEEE Download
18. Privacy Preserving Delegated Access Control in Public Clouds IEEE Download
19. Dynamic Query Forms for Database Queries IEEE Download
20. Supporting Search-As-You-Type Using SQL in Databases IEEE Download
21. Association Rule Extracting Knowledge Using Market Basket Analysis IEEE Download
22. Detecting Targeted Malicious Email IEEE Download
23. Efficient Fuzzy Type-Ahead Search in XML Data IEEE Download

Net Working & Network Security

1. A Stable Approach for Routing Queries in Unstructured P2P Networks IEEE Download
2. IPath: Path Inference in Wireless Sensor Networks IEEE Download
3. ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks IEEE Download
4. Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks IEEE Download
5. Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing IEEE Download
6. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks IEEE Download
7. Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks IEEE Download
8. Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design IEEE Download
9. Automatic Test Packet Generation IEEE Download
10. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks IEEE Download
11. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices IEEE Download
12. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes IEEE Download
13. A Two-stage Deanonymization Attack Against Anonymized Social Networks IEEE Download
14. Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality IEEE Download
15. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks IEEE Download
16. Fast Transmission to Remote Cooperative Groups A New Key Management Paradigm IEEE Download
17. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks IEEE Download
18. A Decentralized Service Discovery Approach on Peer-to-Peer Networks IEEE Download
19. DRINA A Lightweight And Reliable Routing IEEE Download
20. Cut Detection In Wireless Sensor Network IEEE Download
21. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies IEEE Download
22. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks IEEE Download
23. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks IEEE Download
24. Separable Reversible Data Hiding in Encrypted Image IEEE Download

Big Data

1. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn IEEE Download
2. A Parallel Patient Treatment Time Prediction Algorithm and Its Applications in Hospital Queuing-Recommendation in a Big Data Environment IEEE Download
3. Operational Log Analysis for Big Data Systems IEEE Download
4. On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications IEEE Download
5. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud IEEE Download
6. BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value Store IEEE Download
7. Data Mining with Big Data IEEE Download
8. A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud IEEE Download

Mobile Computing

1. EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data IEEE Download
2. Wormhole Attack Detection Algorithms in Wireless Network Coding Systems IEEE Download
3. User-Defined Privacy Grid System for Continuous Location-Based Services IEEE Download
4. Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks IEEE Download
5. An Incentive Framework for Cellular Traffic Offloading IEEE Download
6. Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks IEEE Download
7. IP-Geo location Mapping for Moderately Connected Internet Regions IEEE Download
8. Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks IEEE Download
9. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks IEEE Download
10. Search Me If You Can Privacy-preserving Location Query Service IEEE Download
11. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions IEEE Download
12. Understanding Node Localizability of Wireless Ad Hoc and Sensor Networks IEEE Download

Secure Computing

1. Data Lineage in Malicious Environments IEEE Download
2. Detecting Malicious Facebook Applications IEEE Download
3. A Computational Dynamic Trust Model for User Authorization IEEE Download
4. Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks IEEE Download
5. Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers IEEE Download
6. Enabling Cloud Storage Auditing With Key-Exposure Resistance IEEE Download
7. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing IEEE Download
8. Extracting Spread-Spectrum Hidden Data from Digital Media IEEE Download
9. Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? IEEE Download
10. Detecting Spam Zombies by Monitoring Outgoing Messages IEEE Download

Parallel & Distributed Systems

1. Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing IEEE Download
2. Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption IEEE Download
3. A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud IEEE Download
4. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis IEEE Download
5. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment IEEE Download

Web Applications

1. Automatic lending system NON-IEEE Download
2. Career Calling NON-IEEE Download
3. Expense Calculator NON-IEEE Download
4. Online Ticket Reservations NON-IEEE Download
5. Automatic Time Table Generator NON-IEEE Download
6. Online Pharmacy NON-IEEE Download
7. E- Health Care NON-IEEE Download
8. Meditracking System NON-IEEE Download
9. Resume Building NON-IEEE Download
10. Government Scheme Alerts NON-IEEE Download
11. E commerce (Online Shopping) NON-IEEE Download
12. HR Operations Manager NON-IEEE Download
13. Crime Record Management System NON-IEEE Download
14. Multi Banking Transaction System NON-IEEE Download
15. Online Venue Booking NON-IEEE Download
16. Birth Certificate Issue System NON-IEEE Download
17. Online Student Portal NON-IEEE Download
18. Change Request Tracker NON-IEEE Download

Android Applications

1. Mobile Application Interface to Register Citizen Complaint NON-IEEE Download
2. Protect yourself NON-IEEE Download
3. Student and Faculty Chatting App NON-IEEE Download
4. Android Weather Application NON-IEEE Download
5. Smart Alumni Discovery NON-IEEE Download
6. Mobile super market NON-IEEE Download
7. Mobile patient management system NON-IEEE Download
8. Android Application for Autism and Cerebral palsy Patients NON-IEEE Download