Global Soft Solutions JAVA IEEE PROJECT TITLES - 2015



Similar documents
JAVA IEEE Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining

IEEE JAVA TITLES

IEEE JAVA Project 2012

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

List of Projects in Application

WEB APPLICATION. A Distributed Control Law for Load Balancing in Content Delivery Networks

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Mobility Management usually includes two parts: location management and handoff management.

Secure Data Sharing in Cloud Computing using Hybrid cloud

Big Data - Security and Privacy

Secure Computation Martin Beck

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

Information Security in Big Data using Encryption and Decryption

NIST Big Data Public Working Group

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

Large-Scale IP Traceback in High-Speed Internet

9.Web Based Customer Favorite vehicle Search Engine. 10.Step by Step Monitoring for Product Purchasing System

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks

Internet of Things (IoT): A vision, architectural elements, and future directions

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

Big Data and Complex Networks Analytics. Timos Sellis, CSIT Kathy Horadam, MGS

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

How To Create A Multi-Keyword Ranked Search Over Encrypted Cloud Data (Mrse)

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

PRIVACY PRESERVING OF HEALTH MONITORING SERVICES IN CLOUD

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Single Sign-On Secure Authentication Password Mechanism

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Privacy-Preserving Distributed Encrypted Data Storage and Retrieval

A Catechistic Method for Traffic Pattern Discovery in MANET

Security for Ad Hoc Networks. Hang Zhao

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

Meeting E-Discovery Challenges with Confidence

TOPOLOGIES NETWORK SECURITY SERVICES

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Role Based Encryption with Efficient Access Control in Cloud Storage

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Self Reconfigurable Distributed Load Balancing For Secure and Privacy-Preserving Information Brokering.

IJCSIET-ISSUE5-VOLUME1-SERIES1 Page 1

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Security and Privacy in Big Data, Blessing or Curse?

Wireless Sensor Network: Challenges, Issues and Research

Formal Methods for Preserving Privacy for Big Data Extraction Software

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma CpE /24/2016

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

About the Authors Preface Acknowledgements List of Acronyms

Policy-based Pre-Processing in Hadoop

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

A Study on Security and Privacy in Big Data Processing

Load Distribution in Large Scale Network Monitoring Infrastructures

Data management using Virtualization in Cloud Computing

1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India

LIST OF FIGURES. Figure No. Caption Page No.

Privacy-preserving Data-aggregation for Internet-of-things in Smart Grid

A Road Map on Security Deliverables for Mobile Cloud Application

A Proxy-Based Data Security Solution in Mobile Cloud

Privacy Preservation and Secure Data Sharing in Cloud Storage

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI

Recent advances in security and privacy in big data

SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY

Efficient File Sharing Scheme in Mobile Adhoc Network

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN

Improving data integrity on cloud storage services

Mobile Cloud Computing: Survey & Discussion. Jianting Yue Sep 27, 2013

Data Integrity Check using Hash Functions in Cloud environment

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Create A Privacy Preserving And Dynamic Load Balancing System In A Distributed System

Fundamentals of Mobile and Pervasive Computing

Query Services in Cost Efficient Cloud Using Query Analysis

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

A Cloud-Assisted Internet of Things Framework for Pervasive Healthcare in Smart City Environment

Secure cloud access system using JAR ABSTRACT:

Transcription:

Global Soft Solutions No : 6, III Floor Chitra Complex Chatram Bus Stand Trichy 620 002 www.globalsoftsolutions.in Email : gsstrichy@gmail.com Ph : 0431 4544308 / Cell : 94431 22110 JAVA IEEE PROJECT TITLES - S.No Title Domain DATA MINING 1 Efficient Filtering Algorithms for Location-Aware Publish/Subscribe 2 Probabilistic Range Query over Uncertain Moving Objects in Constrained Two-Dimensional Space 3 CrowdOp: Query Optimization for Declarative Crowdsourcing Systems 4 Disease Inference from Health-Related Questions via Sparse Deep Learning Data Mining, April Data Mining, March Knowledge and Data Engineering, Aug. 1 Knowledge and Data Engineering, Aug. 1 5 Real-Time City-Scale Taxi Ridesharing Knowledge and Data Engineering, July 6 t-closeness through Microaggregation: Strict Privacy with Knowledge and Data

Enhanced Utility Preservation 7 Anonymous Two-Factor Authentication in Systems: Certain Goals Are Beyond Attainment Engineering, preprint July-Aug. 1 8 A Proximity-aware Interest-clustered P2P File Sharing System June and 9 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks 10 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks 11 Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers May-June Jan Feb Jan Feb 12 Neighbor Similarity Trust against Sybil Attack in P2P E- Commerce 13 Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud March Preprint and

14 Neighbor Discovery in Wireless Networks with Multipacket Reception July 15 Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds February 16 VMbuddies: Coordinating Live Migration of Multi-Tier Applications in Cloud Environments 17 A Hybrid Cloud Approach for Secure Authorized Deduplication April May 18 Path Reconstruction in Dynamic Wireless Sensor Networks Using Compressive Sensing 19 Maximizing P2P File Access Availability in Ad Hoc Networks though Replication for Efficient File Sharing 20 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks Networking, Preprint Computers, April April 21 Tracking Message Spread in Delay Tolerant Networks 22 A privacy-preserving framework for managing mobile ad requests and billing information Aug Aug

23 Towards Large-Scale Histopathological Image Analysis: Hashing-Based Image Retrieval 24 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage Image Processing, Feb Computers, Preprint 25 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks Feb 26 Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage 27 E2R2: Energy-Efficient and Reliable Routing for Wireless Sensor Networks Information forensics and security, Aug Systems Journal, DOTNET IEEE PROJECT TITLES - S.No Title Domain DATA MINING 27 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption 28 Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System Information Forensics and Security, Jan May Jun 29 Secure and Data Discovery and Dissemination in Wireless Sensor Networks

April 30 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Computers, Preprint