JAVA Projects CLOUD COMPUTING 1 A Hybrid Cloud Approach for Secure Authorized Deduplication IEEE 2 BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value Store IEEE 3 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data IEEE 4 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud IEEE 5 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds IEEE 6 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 7 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation IEEE 8 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases IEEE 9 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage IEEE 10 Consistency as a Service: Auditing Cloud Consistency IEEE 11 Towards Differential Query Services in Cost-Efficient Clouds IEEE 12 13 A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds 14 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring 15 Privacy-Preserving Public Auditing for Secure Cloud Storage 16 QoS Ranking Prediction for Cloud Services 17 Winds of Change: From Vendor Lock-In to the Meta Cloud 18 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud IEEE IEEE IEEE IEEE IEEE IEEE IEEE IEEE 19 Outsourcing Privacy-Preserving Social Networks to a Cloud IEEE 20 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attributebased Encryption IEEE 21 Efficient similarity search over encrypted data IEEE 22 Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data IEEE 23 Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment IEEE DATA MINING 1 A Cocktail Approach for Travel Package Recommendation IEEE 2 Efficient Prediction of Difficult Keyword Queries over Databases IEEE 3 Fast Nearest Neighbor Search with Keywords IEEE 4 Privacy-Preserving and Content-Protecting Location Based Queries IEEE 5 Towards Online Shortest Path Computation IEEE 6 Motif-Based Hyponym Relation Extraction from Wikipedia Hyperlinks IEEE 7 Task Trail: An Effective Segmentation of User Search Behavior IEEE 8 Spatial Approximate String Search 9 A Survey of XML Tree Patterns IEEE 10 Crowd sourcing Predictors of Behavioral Outcomes IEEE 11 Mining User Queries with Markov Chains: Application to Online Image Retrieval IEEE 12 m-Privacy for Collaborative Data Publishing IEEE 13 Privacy Preserving Delegated Access Control in Public Clouds IEEE 14 T-Drive: Enhancing Driving Directions with Taxi Drivers’ Intelligence IEEE 15 Dynamic Query Forms for Database Queries IEEE IEEE 16 Supporting Search-As-You-Type Using SQL in Databases IEEE 17 Association Rule – Extracting Knowledge Using Market Basket Analysis IEEE 18 Detecting Targeted Malicious Email IEEE 19 Efficient Fuzzy Type-Ahead Search in XML Data IEEE 20 BLINKS: Ranked Keyword Searches on Graphs IEEE NET WORKING & NETWORK SECURITY 1 Automatic Test Packet Generation IEEE 2 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks IEEE 3 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices IEEE 4 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes IEEE 5 A Two-stage Deanonymization Attack Against Anonymized Social Networks IEEE 6 Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality 7 Sink Trail: A Proactive Data Reporting Protocol for Wireless Sensor Networks 8 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks IEEE 9 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks IEEE 10 Fast Transmission to Remote Cooperative Groups A New Key Management Paradigm IEEE 11 Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks IEEE 12 A Decentralized Service Discovery Approach on Peer-to-Peer Networks IEEE 13 DRINA A Lightweight And Reliable Routing IEEE 14 Cut Detection In Wireless Sensor Network IEEE IEEE IEEE 15 AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies IEEE 16 FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks IEEE 17 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks IEEE 18 Separable Reversible Data Hiding in Encrypted Image IEEE BIG DATA 1 On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications IEEE 2 A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud IEEE 3 BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value Store IEEE 4 Data Mining with Big Data IEEE 5 A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud IEEE MOBILE COMPUTING 1 An Incentive Framework for Cellular Traffic Offloading IEEE 2 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks IEEE 3 IP-Geo location Mapping for Moderately Connected Internet Regions 4 Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks 5 6 7 Delay-Optimal Broadcast for Multi hop Wireless Networks Using Self-Interference Cancellation Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks Search Me If You Can Privacy-preserving Location Query Service IEEE IEEE IEEE IEEE IEEE 8 Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions IEEE 9 Understanding Node Localizability of Wireless Ad Hoc and Sensor Networks IEEE Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless 10 IEEE Networks SECURE COMPUTING 1 2 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing Extracting Spread-Spectrum Hidden Data from Digital Media IEEE IEEE 3 Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? IEEE 4 Detecting Spam Zombies by Monitoring Outgoing Messages IEEE PARALLEL & DISTRIBUTED SYSTEMS 1 Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing IEEE 2 Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption IEEE 3 A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud IEEE 4 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis IEEE 5 Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment IEEE 6 IP-Geo location Mapping for Moderately Connected Internet Regions IEEE 7 Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems IEEE WEB APPLICATION 1 Automatic Time Table Generator Non-IEEE 2 Online Pharmacy Non-IEEE 3 Non-IEEE 4 E- Health Care Meditracking System 5 Resume Building Non-IEEE 6 Government Scheme Alerts Non-IEEE 7 E commerce (Online Shopping) Non-IEEE Non-IEEE 8 HR Operations Manager Non-IEEE 9 Crime Record Management System Non-IEEE 10 Multi Banking Transaction System Non-IEEE 11 Online Venue Booking Non-IEEE 12 Birth Certificate Issue System Non-IEEE 13 Online Student Portal Non-IEEE 14 Change Request Tracker Non-IEEE Android Applications 1 Mobile super market 2 Mobile patient management system 3 Flight tracking system 4 Flat management system 5 Android Application for Autism and Cerebral palsy Patients 6 Design and Implementation of Improved Authentication System for Smartphone Users Address: Download Abstracts & Base Papers from Web site: www.kresttechnology.com Head Office: 2nd Floor Solitaire Plaza, Beside Image Hospital, Ameerpet.040-44433434, 9885112363 Branches: Dilsukhnagar, Ph: 9000404181, Vijayawada, for more inquiries mail us: java@kresttechnology.com Ph: 9000404182.