Mobile : +91 965 551 7583

Final Year IEEE Java Project Titles – 2015


1CP_JA_1501 A Hybrid Cloud Approach for Secure Authorized Deduplication
1CP_JA_1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
1CP_JA_1503 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
1CP_JA_1504 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
1CP_JA_1505 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
1CP_JA_1506 An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration
1CP_JA_1507 Audit-Free Cloud Storage via Deniable Attribute-based Encryption
1CP_JA_1508 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
1CP_JA_1509 CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
1CP_JA_1510 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
1CP_JA_1511 Enabling Cloud Storage Auditing With Key-Exposure Resistance
1CP_JA_1512 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
1CP_JA_1513 Identity-Based Encryption with Outsourced Revocation in Cloud Computing
1CP_JA_1514 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
1CP_JA_1515 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
1CP_JA_1516 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1CP_JA_1517 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
1CP_JA_1518 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
1CP_JA_1519 Secure Auditing and Deduplicating Data in Cloud
1CP_JA_1520 Stealthy Denial of Service Strategy in Cloud Computing
1CP_JA_1521 Best Keyword Cover Search
1CP_JA_1522 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
1CP_JA_1523 Context-Based Diversification for Keyword Queries over XML Data
1CP_JA_1524 Discovery of Ranking Fraud for Mobile Apps
1CP_JA_1525 Malware Propagation in Large-Scale Networks
1CP_JA_1526 On Summarization and Timeline Generation for Evolutionary Tweet Streams
1CP_JA_1527 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
1CP_JA_1528 Progressive Duplicate Detection
1CP_JA_1529 Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
1CP_JA_1530 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services
1CP_JA_1531 Scalable Constrained Spectral Clustering
1CP_JA_1532 Towards Effective Bug Triage with Software Data Reduction Techniques
1CP_JA_1533 Tweet Segmentation and Its Application to Named Entity Recognition
1CP_JA_1534 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks
1CP_JA_1535 A Proximity-Aware Interest-Clustered P2P File Sharing System
1CP_JA_1536 Detecting Malicious Facebook Applications
1CP_JA_1537 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing
1CP_JA_1539 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks
1CP_JA_1540 Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
1CP_JA_1541 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
1CP_JA_1542 User-Defined Privacy Grid System for Continuous Location-Based Services
1CP_JA_1543 A Computational Dynamic Trust Model for User Authorization
1CP_JA_1544 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
1CP_JA_1545 Continuous and Transparent User Identity Verification for Secure Internet Services
1CP_JA_1546 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
1CP_JA_1547 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
1CP_JA_1548 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints
1CP_JA_1549 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
1CP_JA_1550 Secure Spatial Top-k Query Processing via Untrusted Location- Based Service Providers
1CP_JA_1551 Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
1CP_JA_1552 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
1CP_JA_1553 Secure Distributed Deduplication Systems with Improved Reliability
1CP_JA_1554 A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations
1CP_JA_1555 Effective Key Management in Dynamic Wireless Sensor Networks
1CP_JA_1556 Key Updating for Leakage Resiliency with Application to AES Modes of Operation
1CP_JA_1557 Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter
1CP_JA_1558 Software Puzzle: A Countermeasure to Resource-Inflated Denial- of-Service Attacks
1CP_JA_1559 An Attribute-Assisted Reranking Model for Web Image Search
1CP_JA_1560 EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
1CP_JA_1561 Learning to Rank Image Tags With Limited Training Examples
1CP_JA_1562 Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
1CP_JA_1563 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation