You are on page 1of 22

S.

No

Project Title

Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

NCCloud: A Network Coding Based Storage System in a Cloud-of-Clouds

Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation

Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

Privacy Preserving Multi keyword Ranked Search over Encrypted Cloud Data

Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds

Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation

Dynamic Backlight Scaling Optimization: A Cloud-Based Energy-Saving Service for Mobile Streaming Applications

Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications

10 Low-Emissions Routing for Cloud Computing in IP-over-WDM Networks with Data Centers
11 On the CostQoE Tradeoff for Cloud-Based Video Streaming Under Amazon EC2s Pricing Models
12 Optimal Power Allocation and Load Distribution for Multiple Heterogeneous Multicore Server Processors across Clouds and Data Centers
13 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
14 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems

15 Towards Differential Query Services in Cost Efficient Clouds


16 An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing
17 A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization
18 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
19 On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage
20 Identity Based Distributed Provable Data Possession in Multi-Cloud Storage
21 QoS Aware Data Replication for Data-Intensive Applications in Cloud Computing Systems
22 Dynamic Cloud Pricing for Revenue Maximization
23 Integrity for Join Queries in the Cloud
24 Compatibility-Aware Cloud Service Composition under Fuzzy Preferences of Users
25 Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds.
26 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
27 Secure kNN Query Processing in Un trusted Cloud Environments
28 A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce on Cloud
29 Compatibility aware Cloud Service Composition Under Fuzzy Preferences of Users

30 Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud.
31 Consistency as a Service Auditing :Cloud Consistency
32 A Secure Client Side De duplication Scheme in Cloud Storage Environments
33 Collaborative Scheduling in Dynamic Environments Using Error Inference
34 Behavioral Malware Detection in Delay Tolerant Networks
35 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
36 An Optimal Distributed Malware Defense System for Mobile Networks with Heterogeneous Devices
37 Building a Scalable System for Stealthy P2P-Botnet Detection
38 An Error Minimizing Framework for Localizing Jammers in Wireless Networks
39 A Scalable and Modular Architecture for High-Performance Packet Classification
40 Bandwidth Distributed Denial of Service: Attacks and Defenses
41 E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels.
42 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
43 Captcha as Graphical PasswordsA New Security Primitive Based on Hard AI Problems
44 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing

45 PROFILR: Toward Preserving Privacy and Functionality in GeoSocial Networks Nodes


46 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
47 STARS: A Statistical Traffic Pattern Discovery System for MANETs
48 Trajectory Improves Data Delivery in Urban Vehicular Networks
49 Energy Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks
50 Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs.
51 Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks
52 Multicast Capacity in MANET with Infrastructure Support
53 Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs
54 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs in Adversarial Environment
55 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
56 Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach
57 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
58 Large Scale Synthetic Social Mobile Networks with SWIM
59 Stochastic Bandwidth Estimation in Networks With Random Service

60 Efficient Authentication for Mobile and Pervasive Computing


61 Friendbook: A Semantic-based Friend Recommendation System for Social Networks
62 A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
63 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
64 An Error Minimizing Framework for Localizing Jammers in Wireless Networks
65 A Survey of Intrusion Detection Systems in Wireless Sensor Networks
66 Impact of UPFC on Power Swing Characteristic and Distance Relay Behavior
67 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
68 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
69 Optimization Decomposition for Scheduling and System Configuration in Wireless Networks
70 Secure Continuous Aggregation in Wireless Sensor Networks
71 Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks.
72 Top-k Query Result Completeness Verification in Tiered Sensor Networks
73 Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing
74 DA-Sync: A Doppler-Assisted Time-Synchronization Scheme for Mobile Underwater Sensor Networks

75 An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless Sensor Networks
76 Joint Routing and Medium Access Control in Fixed Random Access Wireless Multihop Networks
77 Data Density Correlation Degree Clustering Method for Data Aggregation in WSN
78 Improving Fairness, Efficiency, and Stability in HTTP-Based Adaptive Video Streaming With Festive
79 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications
80 Mobility Prediction-based Smartphone Energy Optimization for Everyday Location Monitoring
81 A Scalable and Mobility-Resilient Data Search System for Large-Scale Mobile Wireless Networks
82 Smart DC Mobility Prediction-based Adaptive Duty Cycling for Everyday Location Monitoring
83 A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless Access Networks
84 Collaborative Policy Administration
85 Cooperative Positioning and Tracking in Disruption Tolerant Networks
86 GreenDroid: Automated Diagnosis of Energy Inefficiency for Smartphone Applications
87 MOSES: Supporting and Enforcing Security Profiles on Smartphones
88 Security Threats to Mobile Multimedia Applications: Camera Based Attacks on Mobile Phones
89 Fast Nearest Neighbor Search with Keywords

90 An Empirical Performance Evaluation of Relational Keyword Search Systems


91 Facilitating Document Annotation using Content and Querying Value
92 Supporting Privacy Protection in Personalized Web Search
93 Secure Mining of Association Rules in Horizontally Distributed Databases
94 Efficient Ranking on Entity Graphs with Personalized Relationships
95 SOS: A Distributed Mobile Q&A System Based on Social Networks
96 Privacy-Preserving and Content-Protecting Location Based Queries
97 Active Learning of Constraints for Semi-Supervised Clustering.
98 An Empirical Performance Evaluation of Relational Keyword Search Techniques.
99 Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme.
100 Privacy-Preserving Authenticated Key-Exchange Over Internet.
101 Accuracy Constrained Privacy-Preserving Access Control Mechanism for Relational Data
102 A generic framework for top k pairs and top k objects queries over sliding windows
103 Efficient Prediction of Difficult Keyword Queries over Databases
104 Discovering Emerging Topics in Social Streams via Link-Anomaly

105 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform


106 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
107 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality
108 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
109 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
110 Data Retrieval Scheduling for Multi-Item Requests in Multi-Channel Wireless Broadcast Environments
111 Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing
112 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
113 Optimization Decomposition for Scheduling and System Configuration in Wireless Networks
114 Adaptive Transmission for Delay-Constrained Wireless Video.
115 Web Image Re-Ranking Using Query-Specific Semantic Signatures
116 Click Prediction for Web Image Reranking Using Multimodal Sparse Coding
117 3D Face Recognition Under Expressions, Occlusions and Pose Variations
118 Iris Recognition Using Possibilistic Fuzzy Matching on Local Features
119 Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval

120 Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords.


121 A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks
122 An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs
123 Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks
124 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
125 Adaptation of a virtual campus for mobile learning devices
126 Bluetooth Mobile Based College Campus
127 ECops via Handheld Mobile Devices
128 Privacy-Conscious Location-Based Queries in Mobile Environments
129 Ranking Model Adaptation for Domain-Specific Search
130 SPOC A Secure and Privacy-preserving Opportunistic Computing Framework For Mobile-Healthcare Emergency
131 The Word in a nut shell : CONCISE RANGE QUERIES
132 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
133 Exploiting Service Similarity for Privacy in Location-Based Search Queries
134 LocaWard: A Security and Privacy Aware Location-Based Rewarding System

135 On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures
136 Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks
137 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
138 SOS: A Distributed Mobile Q&A System Based on Social Networks
139 Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks

CC- Cloud Computing


NS -Network Security
A and V and M- Networks Adhoc & VANET & MANET
MC- Mobile Computing
WSN-Wireless Sensor Networks
N and WC-Networking and Wireless Communication
IP and MM -Image Processing and Multimdia
p and DS- Parallel and Distributed System

Domain

Year

CC

Mar-14

CC

Jan-14

CC

Feb-14

CC

Feb-14

CC

Jan-14

CC

Feb-14

CC

Feb-14

CC

Feb-14

CC

Apr-14

CC

Jan-14

CC

Apr-14

CC

Jan-14

CC

Feb-14

CC

Mar-14

CC

Jun-14

CC

Apr-14

CC

Apr-14

CC

Feb-14

CC

Jan-14

CC

Mar-14

CC

Jun-13

CC

Dec-13

CC

Dec-13

CC

Mar-14

CC

Mar-14

CC

Jul-14

CC

Jan-14

CC

Feb-14

CC

Mar-14

CC

Dec-13

CC

Mar-14

CC

Apr-14

CC

Mar-14

NS

Jan-14

NS

Feb-14

NS

Jun-11

NS

Jan-14

NS

Feb-14

NS

May-14

NS

Feb-14

NS

Jan-14

NS

Feb-14

NS

Jun-14

NS

Apr-14

NS

Apr-14

A and V and M

Apr-11

A and V and M

Apr-14

A and V and M

Apr-14

A and V and M

Feb-14

A and V and M

Feb-14

A and V and M

Apr-14

A and V and M

Jul-14

A and V and M

Feb-14

A and V and M

Mar-14

A and V and M

Feb-14

A and V and M

Jan-14

MC

Apr-14

MC

Jan-14

MC

Apr-14

MC

Mar-14

MC

May-14

MC

Mar-14

WSN

Mar-14

WSN

Feb-14

WSN

14

WSN

Feb-14

WSN

Mar-14

WSN

Mar-12

WSN

Feb-14

WSN

Mar-14

WSN

Mar-14

WSN

Jan-14

WSN

Mar-14

WSN

Mar-14

WSN

Feb-14

WSN

Feb-14

WSN

Apr-14

Android Projects

Feb-14

Android Projects

Apr-14

Android Projects

14

Android Projects

May-14

Android Projects

Mar-14

Android Projects

Apr-14

Android Projects

Feb-14

Android Projects

Mar-14

Android Projects

May-14

Android Projects

Jun-14

Android Projects

Mar-14

Data Mining

Apr-14

Data Mining

Jan-14

Data Mining

Feb-14

Data Mining

Feb-14

Data Mining

Apr-14

Data Mining

Apr-14

Data Mining

Jun-12

Data Mining

Apr-12

Data Mining

Jan-14

Data Mining

Jan-14

Data Mining

Apr-12

Data Mining

Jan-14

Data Mining

Apr-14

Data Mining

Jun-14

Data Mining

Jun-14

Data Mining

Jan-14

Data Mining

Apr-12

Data Mining

Apr-14

Data Mining

Mar-14

N and WC

Jan-14

N and WC

Feb-14

N and WC

Apr-14

N and WC

May-14

N and WC

Apr-14

N and WC

Feb-14

N and WC

Jan-14

IP and MM

Apr-14

IP and MM

May-14

IP and MM

Sep-13

IP and MM

Feb-12

IP and MM

Apr-12

IP and MM

Aug-13

IP and MM

Jan-13

IP and MM

Jan-13

IP and MM

Jul-12

IP and MM

Jun-12

J2ME Projects

Apr-11

J2ME Projects

14

J2ME Projects

14

J2ME Projects

Mar-10

J2ME Projects

Apr-12

J2ME Projects

Mar-13

J2ME Projects

14

P and DS

Feb-14

P and DS

Feb-14

P and DS

Feb-14

P and DS

Mar-14

P and DS

Feb-14

P and DS

Mar-14

P and DS

Apr-14

P and DS

Feb-14

CC- Cloud Computing


NS -Network Security
A and V and M- Networks Adhoc & VANET & MANET
MC- Mobile Computing
WSN-Wireless Sensor Networks
N and WC-Networking and Wireless Communication
IP and MM -Image Processing and Multimdia
p and DS- Parallel and Distributed System

You might also like