M.Tech JAVA Projects CLOUD COMPUTING 1 Dynamic Heterogeneity-Aware Resource Provisioning in the Cloud 2014 2 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data 2014 3 Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit ability 2014 4 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 2014 5 A Hybrid Cloud Approach for Secure Authorized Deduplication 2014 6 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud 2014 7 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds 2014 8 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 2014 A Scalable Two-Phase Top-DownSpecialization Approach for Data Anonymization Using MapReduce on Cloud A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems 2014 11 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation 2014 12 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 2014 13 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage 2014 14 Consistency as a Service: Auditing Cloud Consistency 2014 15 Towards Differential Query Services in Cost-Efficient Clouds 2014 9 10 16 17 A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds 2014 2013 2013 2013 18 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring 19 Privacy-Preserving Public Auditing for Secure Cloud Storage 20 QoS Ranking Prediction for Cloud Services 21 Winds of Change: From Vendor Lock-In to the Meta Cloud 22 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud 2013 23 Collaboration in Multi cloud Computing Environments: Framework and Security Issues 2013 24 Outsourcing Privacy-Preserving Social Networks to a Cloud 2013 25 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attributebased Encryption 2013 26 Costing of Cloud Computing Services: A Total Cost of Ownership Approach 2012 27 Efficient similarity search over encrypted data 2012 28 Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data 2012 29 Ensuring Distributed Accountability for Data Sharing in the Cloud 2012 30 Anchor: A Versatile and Efficient Framework for Resource Management in the Clouds 2012 2013 2013 2013 DATA MINING 1 Supporting Privacy Protection in Personalized Web Search 2014 2 A Cocktail Approach for Travel Package Recommendation 2014 3 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data 2014 4 Efficient Prediction of Difficult Keyword Queries over Databases 2014 5 Facilitating Document Annotation using Content and Querying Value 2014 6 Fast Nearest Neighbor Search with Keywords 2014 7 Keyword Query Routing 2014 8 Privacy-Preserving and Content-Protecting Location Based Queries 2014 9 Towards Online Shortest Path Computation 2014 10 Data Mining with Big Data 2014 11 Dealing With Concept Drifts in Process Mining 2014 12 Privacy-Preserving Enhanced Collaborative Tagging 2014 13 OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage 2014 14 Motif-Based Hyponym Relation Extraction from Wikipedia Hyperlinks 2014 15 Task Trail: An Effective Segmentation of User Search Behavior 2014 16 Spatial Approximate String Search 17 A Survey of XML Tree Patterns 2013 18 A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data 2013 19 Optimal Route Queries with Arbitrary Order Constraints 2013 20 Crowd sourcing Predictors of Behavioral Outcomes 2013 21 Mining User Queries with Markov Chains: Application to Online Image Retrieval 2013 22 m-Privacy for Collaborative Data Publishing 2013 23 Privacy Preserving Delegated Access Control in Public Clouds 2013 24 T-Drive: Enhancing Driving Directions with Taxi Drivers’ Intelligence 2013 25 Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures 2013 26 Ranking on Data Manifold with Sink Points 2013 27 Sampling Online Social Networks 2013 2013 Estimating Information from Image Colors: An Application to Digital Cameras and Natural 28 Scenes 2013 29 Facilitating Document Annotation Using Content And Querying Value 2013 230 FOCUS Learning to Crawl Web Forums 2013 31 Incentive Compatible Privacy-Preserving Data Analysis 2013 32 PMSE A Personalized Mobile Search Engine 2013 33 Secure Mining of Association Rules in Horizontally Distributed Databases 2013 34 Dynamic Query Forms for Database Queries 2013 35 Improving Security and Efficiency in Attribute-Based Data Sharing 2013 36 Facilitating Effective User Navigation through Website Structure Improvement 2013 37 Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases 2013 38 Supporting Search-As-You-Type Using SQL in Databases 2013 39 A Link-Based Cluster Ensemble Approach for Categorical Data Clustering 2012 40 Answering General Time-Sensitive Queries 2012 41 Creating Evolving User Behavior Profiles Automatically 2012 42 Effective Pattern Discovery for Text Mining 2012 43 Incremental Information Extraction Using Relational Databases 2012 NET WORKING & NETWORK SECURITY 1 Automatic Test Packet Generation 2014 2 Boundary Cutting for Packet Classification 2014 3 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 2014 4 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices 2014 5 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes 2014 6 A Two-stage Deanonymization Attack Against Anonymized Social Networks 2014 7 Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality 8 Multiparty Access Control for Online Social Networks: Model and Mechanisms 9 Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization 10 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 11 Sink Trail: A Proactive Data Reporting Protocol for Wireless Sensor Networks 12 Importance of Coherence Protocols with Network Applications on Multi core Processors 13 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 2013 14 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 2013 15 Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks 2013 16 Dynamic Control of Coding for Progressive Packet Arrivals in DTNs 2013 17 Fast Transmission to Remote Cooperative Groups A New Key Management Paradigm 2013 18 Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols 2013 19 On the Node Clone Detection in Wireless Sensor Networks 2013 20 Opportunistic MANETs Mobility Can Make Up for Low Transmission Power 2013 21 Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks 2013 22 A Decentralized Service Discovery Approach on Peer-to-Peer Networks 2013 23 Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks 2013 24 DRINA A Lightweight And Reliable Routing 2012 25 Cut Detection In Wireless Sensor Network 2012 2013 2013 2013 2013 2013 2013 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile26 Healthcare Emergency 2012 27 AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies 2012 28 FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks 2012 29 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 2012 MOBILE COMPUTING 1 Preserving Location Privacy in Geo-Social Applications 2014 2 Efficient Authentication for Mobile and Pervasive Computing 2014 3 An Incentive Framework for Cellular Traffic Offloading 2014 4 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks 2014 5 A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks 2013 6 IP-Geo location Mapping for Moderately Connected Internet Regions 7 Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks 8 Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization 9 A Rank Correlation Based Detection against Distributed Reflection DoS Attacks 10 11 12 13 14 15 Delay-Optimal Broadcast for Multi hop Wireless Networks Using Self-Interference Cancellation Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks Search Me If You Can Privacy-preserving Location Query Service Vampire attacks Draining life from wireless ad-hoc sensor networks Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless 2013 2013 2013 2013 2013 2013 2013 2013 2012 2012 Networks SECURE COMPUTING 1 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing 2014 2 Top-k Query Result Completeness Verification in Tiered Sensor Networks 2014 3 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems 2014 4 5 Extracting Spread-Spectrum Hidden Data from Digital Media Two tales of privacy in online social networks 2013 2013 6 Risk-Aware Mitigation for MANET Routing Attacks 2012 7 Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? 2012 8 Detecting Spam Zombies by Monitoring Outgoing Messages 2012 PARALLEL & DISTRIBUTED SYSTEMS 1 Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing 2014 2 Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption 2014 3 LocaWard: A Security and Privacy Aware Location-Based Rewarding System 2014 4 Exploiting Service Similarity for Privacy in Location-Based Search Queries 2014 5 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 2014 6 Secure Out sourced Attribute-based Signatures 2014 7 CONDESA: A Framework for Controlling Data Distribution on Elastic Server Architectures 2014 8 Reliable Bulk-Data Dissemination in Delay Tolerant Networks 2014 9 Securely Outsourcing Attribute-Based Encryption with Checkability 2014 10 A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud 2013 11 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation 2013 12 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 2013 13 Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment 2013 14 Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems 2013 15 IP-Geo location Mapping for Moderately Connected Internet Regions 2013 16 Load Rebalancing for Distributed File Systems in Clouds 2013 SOFTWARE ENGINEERING 1 Ranking and Clustering Software Cost Estimation Models through a Multiple Comparisons Algorithm 2013 2 Self-Management of Adaptable Component-Based Applications 2013 3 4 5 Ant Colony Optimization for Software Project Scheduling and Staffing with an Event-Based Scheduler Automatic Detection of Unsafe Dynamic Component Loadings QoS Assurance for Dynamic Reconfiguration of Component-Based Software Systems 2013 2012 2012 NS2 1 SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems 2013 2 Vampire attacks: Draining life from wireless ad-hoc sensor networks 2013 3 A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks 2013 4 Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks 2013 5 Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks 2013 6 Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation 2013 7 An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks 2013 8 GAODV: A Modified AODV against single and collaborative Black Hole attacks in MANETs 2013 9 Risk-Aware Mitigation for MANET Routing Attacks 2012 10 Packet-Hiding Methods for Preventing Selective Jamming Attacks 2012 11 CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks 2012 12 TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS 2012 13 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 2012 14 A New Kind of Cluster-based Key Management Protocol in Wireless Sensor Network 2011 15 Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks 2011 Download Abstracts & Base Papers from Web site: www.kresttechnology.com Head Office: 2nd Floor Solitaire Plaza, Beside Image Hospital, Ameerpet.040-44433434, 9885112363 For more queries and for new ideas mail us at java@kresttechnology.com