Home || About us || Contact us || Sales || Course || Multimedia || Project || Netwoking || Back

 

2015 TO 2008 Project Titles in JAVA     

 

 

S.NO

2015 JAVA

DOMAIN

YEAR

1

A Hybrid Cloud Approach for Secure Authorized   Deduplication

CLOUD COMPUTING

JAVA/2015

2

A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing

CLOUD COMPUTING

JAVA/2015

3

A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems

CLOUD COMPUTING

JAVA/2015

4

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

CLOUD COMPUTING

JAVA/2015

5

A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud

CLOUD COMPUTING

JAVA/2015

6

An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks   Integration

CLOUD COMPUTING

JAVA/2015

7

Audit-Free Cloud Storage via Deniable Attribute-based Encryption

CLOUD COMPUTING

JAVA/2015

8

Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud  Computing

CLOUD COMPUTING

2015

9

CloudArmor: Supporting Reputation-based Trust Management for Cloud Services

CLOUD COMPUTING

2015

10

Control Cloud Data Access Privilege and Anonymity with Fully Anonymous  Attribute-Based Encryption

CLOUD COMPUTING

2015

11

Enabling Cloud Storage  Auditing With Key-Exposure  Resistance

CLOUD COMPUTING

2015

12

Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud  Data

CLOUD COMPUTING

2015

13

Identity-Based Encryption with Outsourced Revocation in Cloud Computing

CLOUD COMPUTING

2015

14

 

Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage

CLOUD COMPUTING

2015

15

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud  Computing

CLOUD COMPUTING

2015

16

Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

CLOUD COMPUTING

2015

17

Provable Multicopy Dynamic Data Possession in Cloud Computing Systems

CLOUD COMPUTING

2015

18

Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation

CLOUD COMPUTING

2015

19

Secure Auditing and Deduplicating Data in  Cloud

CLOUD COMPUTING

2015

20

Stealthy Denial of Service Strategy in Cloud  Computing

CLOUD COMPUTING

2015

21

Best Keyword Cover Search

DATA MINING

2015

22

Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment  Model

DATA MINING

2015

23

Context-Based Diversification for Keyword Queries over XML Data

DATA MINING

2015

24

Discovery of Ranking Fraud for Mobile  Apps

DATA MINING

2015

25

Malware Propagation in Large-Scale  Networks

DATA MINING

2015

26

On Summarization and Timeline Generation for Evolutionary Tweet Streams

DATA MINING

2015

27

Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites

DATA MINING

2015

28

Progressive  Duplicate Detection

DATA MINING

2015

29

Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection

DATA MINING

2015

30

Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based  Services

DATA MINING

2015

31

Scalable Constrained Spectral  Clustering

DATA MINING

2015

32

Towards Effective Bug Triage with Software Data Reduction Techniques

DATA MINING

2015

33

Tweet Segmentation and Its Application to Named Entity Recognition

DATA MINING

2015

34

A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks

NETWORKING

2015

35

A Proximity-Aware Interest-Clustered P2P File Sharing System

NETWORKING

2015

36

Detecting Malicious Facebook Applications

NETWORKING

2015

37

Maximizing P2P File Access Availability in Mobile Ad Hoc

Networks though Replication for Efficient File Sharing

NETWORKING

2015

38

Dynamic Routing for Data Integrity and Delay Differentiated

Services in Wireless Sensor Networks

MOBILE COMPUTING

2015

39

Friendbook: A Semantic-Based Friend Recommendation System

for Social Networks

MOBILE COMPUTING

2015

40

Privacy-Preserving and Truthful Detection of Packet Dropping

Attacks in Wireless Ad Hoc Networks

MOBILE COMPUTING

2015

41

User-Defined Privacy Grid System for Continuous Location-Based

Services

MOBILE COMPUTING

2015

42

A Computational Dynamic Trust Model for User Authorization

SECURE COMPUTING

2015

43

A Lightweight Secure Scheme for Detecting Provenance Forgery

and Packet Drop Attacks in Wireless Sensor Networks

SECURE COMPUTING

2015

44

Continuous and Transparent User Identity Verification for Secure

Internet Services

SECURE COMPUTING

2015

45

Contributory Broadcast Encryption with Efficient Encryption and

Short Ciphertexts

SECURE COMPUTING

2015

46

DDSGA: A Data-Driven Semi-Global Alignment Approach for

Detecting Masquerade Attacks

SECURE COMPUTING

2015

47

Improved Privacy-Preserving P2P Multimedia Distribution Based

on Recombined Fingerprints

SECURE COMPUTING

2015

48

Secure Data Aggregation Technique for Wireless Sensor

Networks in the Presence of Collusion Attacks

SECURE COMPUTING

2015

49

Secure Spatial Top-k Query Processing via Untrusted Location-

Based Service Providers

SECURE COMPUTING

2015

50

Asymmetric Social Proximity Based Private Matching Protocols

for Online Social Networks

PARALLEL &

DISTRIBUTED SYSTEMS

2015

51

Cost-Effective Authentic and Anonymous Data Sharing with

Forward Security

PARALLEL &

DISTRIBUTED SYSTEMS

2015

52

Secure Distributed Deduplication Systems with Improved

Reliability

PARALLEL &

DISTRIBUTED SYSTEMS

2015

53

A Framework for Secure Computations with Two Non-Colluding

Servers and Multiple Clients, Applied to Recommendations

INFORMATION

FORENSICS AND

SECURITY

2015

54

Effective Key Management in Dynamic Wireless Sensor Networks

INFORMATION

FORENSICS AND

SECURITY

2015

55

Key Updating for Leakage Resiliency with Application to AES

Modes of Operation

INFORMATION

FORENSICS AND

SECURITY

2015

56

Passive IP Traceback: Disclosing the Locations of IP Spoofers from

Path Backscatter

INFORMATION

FORENSICS AND

SECURITY

2015

57

Software Puzzle: A Countermeasure to Resource-Inflated Denial-

of-Service Attacks

INFORMATION

FORENSICS AND

SECURITY

2015

58

An Attribute-Assisted Reranking Model for Web Image Search

IMAGE PROCESSING

2015

59

EMR: A Scalable Graph-based Ranking Model for Content-based

Image Retrieval

IMAGE PROCESSING

2015

60

Learning to Rank Image Tags With Limited Training Examples

 

 

IMAGE PROCESSING

2015

61

Designing High Performance Web-Based Computing Services to

Promote Telemedicine Database Management System

SERVICE COMPUTING

(WEB SERVICE)

2015

62

Location-Aware and Personalized Collaborative Filtering for Web

Service Recommendation

SERVICE COMPUTING

(WEB SERVICE)

2015

63

 

A Fuzzy Preference Tree-Based Recommender System for

Personalized Business-to-Business E-Services

FUZZY SYSTEMS

2015

64

Prediction of Atomic Web Services Reliability for QoS-Aware

Recommendation

SERVICE COMPUTING

(WEB SERVICE)

2015

65

Real-Time Detection of Traffic From Twitter Stream Analysis

DATA MINING

2015

66

t-Closeness through Microaggregation: Strict Privacy with

Enhanced Utility Preservation

DATA MINING

2015