M.Tech JAVA Projects CLOUD COMPUTING 1 Dynamic

advertisement
M.Tech JAVA Projects
CLOUD COMPUTING
1
Dynamic Heterogeneity-Aware Resource Provisioning in the Cloud
2014
2
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
2014
3
Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit ability
2014
4
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
2014
5
A Hybrid Cloud Approach for Secure Authorized Deduplication
2014
6
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
2014
7
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
2014
8
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
2014
A Scalable Two-Phase Top-DownSpecialization Approach for Data Anonymization Using
MapReduce on Cloud
A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing
Systems
2014
11
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
2014
12
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
2014
13
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
2014
14
Consistency as a Service: Auditing Cloud Consistency
2014
15
Towards Differential Query Services in Cost-Efficient Clouds
2014
9
10
16
17
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy
Preserving of Intermediate Data Sets in Cloud
AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video
Sharing in the Clouds
2014
2013
2013
2013
18
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
19
Privacy-Preserving Public Auditing for Secure Cloud Storage
20
QoS Ranking Prediction for Cloud Services
21
Winds of Change: From Vendor Lock-In to the Meta Cloud
22
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
2013
23
Collaboration in Multi cloud Computing Environments: Framework and Security Issues
2013
24
Outsourcing Privacy-Preserving Social Networks to a Cloud
2013
25
Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attributebased Encryption
2013
26
Costing of Cloud Computing Services: A Total Cost of Ownership Approach
2012
27
Efficient similarity search over encrypted data
2012
28
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
2012
29
Ensuring Distributed Accountability for Data Sharing in the Cloud
2012
30
Anchor: A Versatile and Efficient Framework for Resource Management in the Clouds
2012
2013
2013
2013
DATA MINING
1
Supporting Privacy Protection in Personalized Web Search
2014
2
A Cocktail Approach for Travel Package Recommendation
2014
3
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
2014
4
Efficient Prediction of Difficult Keyword Queries over Databases
2014
5
Facilitating Document Annotation using Content and Querying Value
2014
6
Fast Nearest Neighbor Search with Keywords
2014
7
Keyword Query Routing
2014
8
Privacy-Preserving and Content-Protecting Location Based Queries
2014
9
Towards Online Shortest Path Computation
2014
10
Data Mining with Big Data
2014
11
Dealing With Concept Drifts in Process Mining
2014
12
Privacy-Preserving Enhanced Collaborative Tagging
2014
13
OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage
2014
14
Motif-Based Hyponym Relation Extraction from Wikipedia Hyperlinks
2014
15
Task Trail: An Effective Segmentation of User Search Behavior
2014
16
Spatial Approximate String Search
17
A Survey of XML Tree Patterns
2013
18
A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
2013
19
Optimal Route Queries with Arbitrary Order Constraints
2013
20
Crowd sourcing Predictors of Behavioral Outcomes
2013
21
Mining User Queries with Markov Chains: Application to Online Image Retrieval
2013
22
m-Privacy for Collaborative Data Publishing
2013
23
Privacy Preserving Delegated Access Control in Public Clouds
2013
24
T-Drive: Enhancing Driving Directions with Taxi Drivers’ Intelligence
2013
25
Relationships between Diversity of Classification Ensembles and Single-Class Performance
Measures
2013
26
Ranking on Data Manifold with Sink Points
2013
27
Sampling Online Social Networks
2013
2013
Estimating Information from Image Colors: An Application to Digital Cameras and Natural
28
Scenes
2013
29
Facilitating Document Annotation Using Content And Querying Value
2013
230
FOCUS Learning to Crawl Web Forums
2013
31
Incentive Compatible Privacy-Preserving Data Analysis
2013
32
PMSE A Personalized Mobile Search Engine
2013
33
Secure Mining of Association Rules in Horizontally Distributed Databases
2013
34
Dynamic Query Forms for Database Queries
2013
35
Improving Security and Efficiency in Attribute-Based Data Sharing
2013
36
Facilitating Effective User Navigation through Website Structure Improvement
2013
37
Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
2013
38
Supporting Search-As-You-Type Using SQL in Databases
2013
39
A Link-Based Cluster Ensemble Approach for Categorical Data Clustering
2012
40
Answering General Time-Sensitive Queries
2012
41
Creating Evolving User Behavior Profiles Automatically
2012
42
Effective Pattern Discovery for Text Mining
2012
43
Incremental Information Extraction Using Relational Databases
2012
NET WORKING & NETWORK SECURITY
1
Automatic Test Packet Generation
2014
2
Boundary Cutting for Packet Classification
2014
3
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
2014
4
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
2014
5
Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
2014
6
A Two-stage Deanonymization Attack Against Anonymized Social Networks
2014
7
Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
8
Multiparty Access Control for Online Social Networks: Model and Mechanisms
9
Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization
10
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
11
Sink Trail: A Proactive Data Reporting Protocol for Wireless Sensor Networks
12
Importance of Coherence Protocols with Network Applications on Multi core Processors
13
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
2013
14
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
2013
15
Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
2013
16
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs
2013
17
Fast Transmission to Remote Cooperative Groups A New Key Management Paradigm
2013
18
Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols
2013
19
On the Node Clone Detection in Wireless Sensor Networks
2013
20
Opportunistic MANETs Mobility Can Make Up for Low Transmission Power
2013
21
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed
Networks
2013
22
A Decentralized Service Discovery Approach on Peer-to-Peer Networks
2013
23
Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks
2013
24
DRINA A Lightweight And Reliable Routing
2012
25
Cut Detection In Wireless Sensor Network
2012
2013
2013
2013
2013
2013
2013
SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile26
Healthcare Emergency
2012
27
AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
2012
28
FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
2012
29
The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
2012
MOBILE COMPUTING
1
Preserving Location Privacy in Geo-Social Applications
2014
2
Efficient Authentication for Mobile and Pervasive Computing
2014
3
An Incentive Framework for Cellular Traffic Offloading
2014
4
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
2014
5
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in
Mobile Ad Hoc Networks
2013
6
IP-Geo location Mapping for Moderately Connected Internet Regions
7
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
8
Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization
9
A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
10
11
12
13
14
15
Delay-Optimal Broadcast for Multi hop Wireless Networks Using Self-Interference
Cancellation
Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
Search Me If You Can Privacy-preserving Location Query Service
Vampire attacks Draining life from wireless ad-hoc sensor networks
Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of
Transmissions
Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless
2013
2013
2013
2013
2013
2013
2013
2013
2012
2012
Networks
SECURE COMPUTING
1
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
2014
2
Top-k Query Result Completeness Verification in Tiered Sensor Networks
2014
3
Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems
2014
4
5
Extracting Spread-Spectrum Hidden Data from Digital Media
Two tales of privacy in online social networks
2013
2013
6
Risk-Aware Mitigation for MANET Routing Attacks
2012
7
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
2012
8
Detecting Spam Zombies by Monitoring Outgoing Messages
2012
PARALLEL & DISTRIBUTED SYSTEMS
1
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
2014
2
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
2014
3
LocaWard: A Security and Privacy Aware Location-Based Rewarding System
2014
4
Exploiting Service Similarity for Privacy in Location-Based Search Queries
2014
5
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
2014
6
Secure Out sourced Attribute-based Signatures
2014
7
CONDESA: A Framework for Controlling Data Distribution on Elastic Server Architectures
2014
8
Reliable Bulk-Data Dissemination in Delay Tolerant Networks
2014
9
Securely Outsourcing Attribute-Based Encryption with Checkability
2014
10
A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy
Preserving of Intermediate Datasets in Cloud
2013
11
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
2013
12
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
2013
13
Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
2013
14
Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
2013
15
IP-Geo location Mapping for Moderately Connected Internet Regions
2013
16
Load Rebalancing for Distributed File Systems in Clouds
2013
SOFTWARE ENGINEERING
1
Ranking and Clustering Software Cost Estimation Models through a Multiple Comparisons
Algorithm
2013
2
Self-Management of Adaptable Component-Based Applications
2013
3
4
5
Ant Colony Optimization for Software Project Scheduling and Staffing with an Event-Based
Scheduler
Automatic Detection of Unsafe Dynamic Component Loadings
QoS Assurance for Dynamic Reconfiguration of Component-Based Software Systems
2013
2012
2012
NS2
1
SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems
2013
2
Vampire attacks: Draining life from wireless ad-hoc sensor networks
2013
3
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in
Mobile Ad Hoc Networks
2013
4
Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
2013
5
Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
2013
6
Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference
Cancellation
2013
7
An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks
2013
8
GAODV: A Modified AODV against single and collaborative Black Hole attacks in MANETs
2013
9
Risk-Aware Mitigation for MANET Routing Attacks
2012
10
Packet-Hiding Methods for Preventing Selective Jamming Attacks
2012
11
CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks
2012
12
TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE
COMMUNICATIONS
2012
13
The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
2012
14
A New Kind of Cluster-based Key Management Protocol in Wireless Sensor Network
2011
15
Design and Performance Analysis of Mobility Management Schemes Based on Pointer
Forwarding for Wireless Mesh Networks
2011
Download Abstracts & Base Papers from Web site: www.kresttechnology.com
Head Office: 2nd Floor Solitaire Plaza, Beside Image Hospital, Ameerpet.040-44433434, 9885112363
For more queries and for new ideas mail us at java@kresttechnology.com
Download