An ISO 9001:2000 certified organization
  • Call: 040 - 4443 3434
  • Mail: ramu.krest@gmail.com

M.Tech-CSE-JAVA 2016-2017

 Download Project List

Sno

Projects List

IEEE

Base Paper

Abstract

Cloud Computing

1. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2016 Download Download
2. Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud 2016 Download Download
3. Two-Factor Data Security Protection Mechanism for Cloud Storage System 2016 Download Download
4. CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System 2016 Download Download
5. Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing 2016 Download Download
6. CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services 2016 Download Download
7. Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email 2016 Download Download
8. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage 2016 Download Download
9. Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services 2016 Download Download
10. An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing 2016 Download Download
11. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2016 Download Download
12. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing 2016 Download Download
13. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud 2016 Download Download
14. Privacy-Preserving Data Aggregation in Mobile Phone Sensing 2016 Download Download
15. An Efficient Privacy-Preserving Ranked Keyword Search Method 2016 Download Download
16. Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds 2016 Download Download
17. Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage 2016 Download Download
18. Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates 2016 Download Download
19. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing 2016 Download Download
20. Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud 2016 Download Download
21. Secure Cloud Storage Meets with Secure Network Coding 2016 Download Download
22. A Hybrid Cloud Approach for Secure Authorized Deduplication 2015 Download Download
23. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 2015 Download Download
24. Supporting multi data stores applications in cloud environments 2015 Download Download
25. BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value Store 2015 Download Download
26. Secure Distributed Deduplication Systems with Improved Reliability 2015 Download Download
27. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption 2015 Download Download
28. PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System 2015 Download Download
29. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 2015 Download Download
30. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform 2015 Download Download
31. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data 2014 Download Download
32. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 2014 Download Download
33. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud 2014 Download Download
34. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds 2014 Download Download
35. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 2014 Download Download
36. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation 2014 Download Download
37. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 2014 Download Download
38. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage 2014 Download Download
39. A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud 2013 Download Download
40. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring 2013 Download Download
41. QoS Ranking Prediction for Cloud Services 2013 Download Download
42. Winds of Change: From Vendor Lock-In to the Meta Cloud 2013 Download Download
43. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud 2013 Download Download
44. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption 2013 Download Download
45. Efficient similarity search over encrypted data 2012 Download Download
46. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data 2012 Download Download

Data Mining

1. A Simple Message-Optimal Algorithm for Random Sampling from a Distributed Stream 2016 Download Download
2. Clustering Data Streams Based on Shared Density between Micro-Clusters 2016 Download Download
3. Booster in High Dimensional Data Classification 2016 Download Download
4. Efficient Algorithms for Mining Top-K High Utility Itemsets 2016 Download Download
5. Automatically Mining Facets for Queries from Their Search Results 2016 Download Download
6. Domain-Sensitive Recommendation with User-Item Subgroup Analysis 2016 Download Download
7. A Novel Recommendation Model Regularized with User Trust and Item Ratings 2016 Download Download
8. DARE: A Deduplication-Aware Resemblance Detection and Elimination Scheme for Data Reduction with Low Overheads 2016 Download Download
9. A Mixed Generative-Discriminative Based Hashing Method 2016 Download Download
10. DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud 2016 Download Download
11. Exploit Every Bit: Effective Caching for High-Dimensional Nearest Neighbor Search 2016 Download Download
12. Location Aware Keyword Query Suggestion Based on Document Proximity 2016 Download Download
13. Nearest Keyword Set Search in Multi-Dimensional Datasets 2016 Download Download
14. Probabilistic Static Load-Balancing of Parallel Mining of Frequent Sequences 2016 Download Download
15. Top-Down XML Keyword Query Processing 2016 Download Download
16. Top-k Spatio-Textual Similarity Join 2016 Download Download
17. Making Digital Artifacts on the Web Verifiable and Reliable 2015 Download Download
18. Structured Learning from Heterogeneous Behavior for Social Identity Linkage 2015 Download Download
19. K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data 2015 Download Download
20. Rank-Based Similarity Search: Reducing the Dimensional Dependence 2015 Download Download
21. Best Keyword Cover Search 2015 Download Download
22. Context-Based Diversification for Keyword Queries Over XML Data 2015 Download Download
23. Progressive Duplicate Detection 2015 Download Download
24. Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services 2015 Download Download
25. A Cocktail Approach for Travel Package Recommendation 2014 Download Download
26. Fast Nearest Neighbor Search with Keywords 2014 Download Download
27. Privacy-Preserving and Content-Protecting Location Based Queries 2014 Download Download
28. Motif-Based Hyponym Relation Extraction from Wikipedia Hyperlinks 2014 Download Download
29. Spatial Approximate String Search 2013 Download Download
30. A Survey of XML Tree Patterns 2013 Download Download
31. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data 2013 Download Download
32. Privacy Preserving Delegated Access Control in Public Clouds 2013 Download Download
33. Dynamic Query Forms for Database Queries 2013 Download Download

NET WORKING & NETWORK SECURITY

1. Multi-Grained Block Management to Enhance the Space Utilization of File Systems on PCM Storages 2016 Download Download
2. Resource-Saving File Management Scheme for Online Video Provisioning on Content Delivery Networks 2016 Download Download
3. Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks 2016 Download Download
4. PASER: Secure and Efficient Routing Approach for Airborne Mesh Networks 2016 Download Download
5. Active Trust : Secure and Trustable Routing in Wireless Sensor Networks 2016 Download Download
6. Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 2016 Download Download
7. Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks 2016 Download Download
8. Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing 2015 Download Download
9. Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks 2015 Download Download
10. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks 2015 Download Download
11. Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design 2015 Download Download
12. Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks 2015 Download Download
13. Automatic Test Packet Generation 2014 Download Download
14. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 2014 Download Download
15. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices 2014 Download Download
16. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes 2014 Download Download
17. A Two-stage Deanonymization Attack Against Anonymized Social Networks 2014 Download Download
18. Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality 2013 Download Download
19. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 2013 Download Download
20. Fast Transmission to Remote Cooperative Groups A New Key Management Paradigm 2013 Download Download
21. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks 2013 Download Download
22. DRINA A Lightweight And Reliable Routing 2012 Download Download
23. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies 2012 Download Download
24. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks 2012 Download Download
25. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 2012 Download Download

Big Data

1. Dynamic Job Ordering and Slot Configurations for MapReduce Workloads 2016 Download Download
2. On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications 2016 Download Download
3. Hybrid Job-Driven Scheduling for Virtual MapReduce Clusters 2016 Download Download
4. Operational-Log Analysis for Big Data Systems 2016 Download Download
5. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud 2015 Download Download
6. BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value Store 2015 Download Download
7. Two Steps Genetic Programming for Big Data 2015 Download Download
8. Data Mining with Big Data 2014 Download Download
9. A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud 2014 Download Download

Mobile Computing

1. Providing Privacy-Aware Incentives in Mobile Sensing Systems 2016 Download Download
2. Energy and Memory Efficient Clone Detection in Wireless Sensor Networks 2016 Download Download
3. Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach 2016 Download Download
4. Privacy-Aware High-Quality Map Generation with Participatory Sensing 2016 Download Download
5. Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks 2015 Download Download
6. Wormhole Attack Detection Algorithms in Wireless Network Coding Systems 2015 Download Download
7. Preserving Location Privacy in Geo-Social Applications 2014 Download Download
8. Efficient Authentication for Mobile and Pervasive Computing 2014 Download Download
9. IP-Geo location Mapping for Moderately Connected Internet Regions 2013 Download Download
10. Delay-Optimal Broadcast for Multi hop Wireless Networks Using Self-Interference Cancellation 2013 Download Download
11. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks 2013 Download Download
12. Search Me If You Can Privacy-preserving Location Query Service 2013 Download Download
13. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions 2012 Download Download

Secure Computing

1. Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata 2016 Download Download
2. Privacy Protection for Wireless Medical Sensor Data 2016 Download Download
3. Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data 2016 Download Download
4. Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts 2016 Download Download
5. Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers 2015 Download Download
6. Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks 2015 Download Download
7. A Computational Dynamic Trust Model for User Authorization 2015 Download Download
8. Enabling Cloud Storage Auditing With Key-Exposure Resistance 2015 Download Download

PARALLEL & DISTRIBUTED SYSTEMS

1. Hybrid Job-Driven Scheduling for Virtual MapReduce Clusters 2016 Download Download
2. Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory 2016 Download Download
3. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2016 Download Download
4. Game Theoretic Resource Allocation in Media Cloud with Mobile Social Users 2016 Download Download
5. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 2015 Download Download
6. Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design 2015 Download Download
7. Secure Distributed Deduplication Systems with Improved Reliability 2015 Download Download
8. Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing 2015 Download Download
9. Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption 2014 Download Download
10. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 2013 Download Download
11. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment 2013 Download Download
12. IP-Geo location Mapping for Moderately Connected Internet Regions 2013 Download Download