2014 – 2015 IEEE JAVA PROJECT TITLES
CLOUD COMPUTING TITLES
1) JPJ1401 - A Hybrid Cloud Approach for Secure Authorized Deduplication
2) JPJ1402 - A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud
3) JPJ1403 - A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
4) JPJ1404 - Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
5) JPJ1405 - Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
6) JPJ1406 -Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
7) JPJ1407 - Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
8) JPJ1408 - Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
9) JPJ1409 - Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
10) JPJ1410 - PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
11) JPJ1411 - Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
12) JPJ1412 - Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
13) JPJ14013 - Towards Differential Query Services in Cost-Efficient Clouds
DATA MINING TITLES
14) JPJ14014 - A Cocktail Approach for Travel Package Recommendation
15) JPJ14015 - Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
16) JPJ14016 - BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform
17) JPJ14017 - Data Mining with Big Data
18) JPJ14018 - Dealing With Concept Drifts in Process Mining
19) JPJ14019 - Discovering Emerging Topics in Social Streams via Link-Anomaly Detection
20) JPJ14020 - Efficient Prediction of Difficult Keyword Queries over Databases
21) JPJ14021 - Facilitating Document Annotation Using Content and Querying Value
22) JPJ14022 - Fast Nearest Neighbor Search with Keywords
23) JPJ14023 - Keyword Query Routing
24) JPJ14024 - Privacy-Preserving and Content-Protecting Location Based Queries
25) JPJ14025 - Security Evaluation of Pattern Classifiers under Attack
26) JPJ14026 - Supporting Privacy Protection in Personalized Web Search
27) JPJ14027 - Towards Online Shortest Path Computation
SECURE COMPUTING TITLES
28) JPJ14028 - Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems
29) JPJ14029 - Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
30) JPJ14030 - PROFILR: Toward Preserving Privacy and Functionality in Geosocial Networks
31) JPJ14031 - Top-k Query Result Completeness Verification in Tiered Sensor Networks
NETWORKING TITLES:
32) JPJ14032 - Automatic Test Packet Generation
33) JPJ14033 - Cost-Effective Resource Allocation of Overlay Routing Relay
34) JPJ14034 - Boundary Cutting for Packet Classification
35) JPJ14035 - Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
PARALLEL AND DISTRIBUTED SYSTEMS TITLES
36) JPJ14036 - Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
37) JPJ14037 - Exploiting Service Similarity for Privacy in Location-Based Search Queries
38) JPJ14038 - LocaWard: A Security and Privacy Aware Location-Based Rewarding System
39) JPJ14039 - On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures
40) JPJ14040 - RRE: A Game-Theoretic Intrusion Response and Recovery Engine
41) JPJ14041 - Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
42) JPJ14042 - SOS: A Distributed Mobile Q&A System Based on Social Networks
43) JPJ14043 - The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluation
44) JPJ14044 - The Design and Evaluation of An Information Sharing System for Human Networks
45) JPJ14045 - Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks
46) JPJ14046 - Secure Outsourced Attribute-based Signatures
MOBILE COMPUTING TITLES:
47) JPJ14047 - An Incentive Framework for Cellular Traffic Offloading
48) JPJ14048 - Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
49) JPJ14049 - Efficient Authentication for Mobile and Pervasive Computing
50) JPJ14050 - Friendbook: A Semantic-based FriendRecommendation System for Social Networks
51) JPJ14051 - Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices
SERVICE COMPUTING (Web Service) TITLES:
52) JPJ14052 - Privacy-Enhanced Web Service Composition
53) JPJ14053 - Web Service Recommendation via Exploiting Location and QoS Information
ADDITIONAL TITLES:
Privacy Preserving Delegated Access Control in Public Clouds
An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
XSPath: Navigation on XML Schemas Made Easy
m-Privacy for Collaborative Data Publishing
Dynamic Query Forms for Database Queries
K-Anonymity for Crowdsourcing Database
A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
Abductive Analysis of Administrative Policies in Rule-Based Access Control
Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks
Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection
Malware Propagation in Large-Scale Networks
Multi-Path Routing and Forwarding in Non-Cooperative Wireless Networks
SocialTube: P2P-Assisted Video Sharing in Online Social Networks
A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks
Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
A General Self-Organized Tree-Based Energy-Balance Routing Protocol
Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
Image Search Reranking With Query-Dependent Click-Based Relevance Feedback
Probabilistic Aspect Mining Model for Drug Reviews
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
LARS An Efficient and Scalable Location-Aware Recommender System
Congestion Aware Routing in Nonlinear Elastic Optical Networks
Hiding in the Mobile Crowd: Location Privacy through Collaboration