IEEE JAVA PROJECTS 2016-2017

S NO

PROJECT NAMES

YEAR

 

CLOUD COMPUTING

 

 1

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification

2017

 2

A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

2017

 3

A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing

2017

 4

A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users

2017

 5

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage

2017

 6

A robust reputation management mechanism in the federated cloud

2017

 7

Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in Smart Grid

2017

 8

Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data

2017

 9

Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems

2017

 10

Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing

2017

11 

Efficient and Expressive Keyword Search Over Encrypted Data in Cloud

2017

12 

Fast Phrase Search for Encrypted Cloud Storage

2017

 13

Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds

2017

 14

Identity-Based Encryption with Cloud Revocation Authority and Its Applications

2017

 15

Identity-Based Private Matching over Outsourced Encrypted Datasets

2017

 16

Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage

2017

 17

On the Security of Data Access Control for Multi-authority  Cloud Storage Systems

2017

 18

Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing

2017

 19

Privacy Protection based Access Control Scheme in Cloud-based Services

2017

 20

Privacy-Preserving Multi keyword Similarity Search Over Outsourced Cloud Data

2017

 21

Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud

2017

 22

RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage

2017

 23

Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

2017

 24

Securing Cloud Data under Key Exposure

2017

 25

TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud

2017

 26

TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud

2017

 27

Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving

2017

 28

An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing 

2016

 29

 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud

2016

 30

 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

2016

 31

 CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System

2016

32

 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email

2016

33

 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

2016

34

 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

2016

35

 Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

2016

 36

 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

2016

37 

 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing

2016

38 

An Efficient Privacy-Preserving Ranked Keyword Search Method 

2016

39 

Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing 

2016

40 

Cloud Armor Supporting Reputation-Based Trust Management for Cloud Services

2016

 41

DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud

2016

42

Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storag 

2016

43

Dynamic and Public Auditing with Fair Arbitration for Cloud Data 

2016

44

Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services

2016

45 

Geometric Range Search on Encrypted Spatial Data

2016

46 

Identity-Based Encryption with Cloud Revocation Authority and Its Applications 

2016

47 

Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems

2016

48 

Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming

2016

49

TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

2016

50

DeyPoS:  Deduplicatable Dynamic Proof of Storage for Multi-User Environments

2016

51

Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing

2016

52

SecRBAC: Secure data in the Clouds 

2016

 

DATA MINING

 

53

An Iterative Classification Scheme for Sanitizing Large-Scale Datasets

2017

 54

Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach

2017

 55

Collaborative Filtering-Based Recommendation of Online Social Voting

2017

56 

Computing Semantic Similarity of Concepts in Knowledge Graphs

2017

 57

Detecting Stress Based on Social Interactions in Social Networks

2017

58

Dynamic Facet Ordering for Faceted Product Search Engines

2017

59

Efficient Clue-based Route Search on Road Networks

2017

60

Efficient Keyword-aware Representative Travel Route Recommendation

2017

61

Energy-efficient Query Processing in Web Search Engines

2017

62

Generating Query Facets using Knowledge Bases

2017

63

Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach

2017

64

l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items

2017

65

Mining Competitors from Large Unstructured Datasets

2017

66

Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction

2017

67 

Personal Web Revisitation by Context and Content Keywords with Relevance Feedback

2017

68

PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks

2017

69

QDA: A Query-Driven Approach to Entity Resolution

2017

70 

Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data

2017

71 

RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem

2017

72 

SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors

2017

73

Towards Real-Time, Country-Level Location Classification of Worldwide Tweets

2017

74

Trajectory Community Discovery and Recommendation by Multi-source Diffusion Modeling

2017

75

Understand Short Texts by Harvesting and Analyzing Semantic Knowledge

2017

76

User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network

2017

77

PerspectiveUser-Centric Similarity Search

2017

78

When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks

2017

79

 A Novel Recommendation Model Regularized with User Trust and Item Ratings

2016

80

 Automatically Mining Facets for Queries from Their Search Results

2016

81

 Crowdsourcing for Top-K Query Processing over Uncertain Data

2016

82

 Location Aware Keyword Query Suggestion Based on Document Proximity

2016

83

 Sentiment Embeddings with Applications to Sentiment Analysis

2016

84

 Rating Prediction based on Social Sentiment from Textual Reviews

2016

85

Efficient Algorithms for Mining Top-K High Utility Itemsets

2016

86

Nearest Keyword Set Search in Multi-Dimensional Datasets

2016

87

Quantifying Political Leaning from Tweets, Retweets, and Retweeters

2016

88

TopicSketch: Real-time Bursty Topic Detection from Twitter

2016

89

Booster in High Dimensional Data Classification 

2016

90

Building an intrusion detection system using a filter-based feature selection algorithm 

2016

91

Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information

2016

92

Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings

2016

93

Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder

2016

94

Domain-Sensitive Recommendation with User-Item Subgroup Analysis 

2016

95

Efficient Cache-Supported Path Planning on Roads 

2016

96

Mining User-Aware Rare Sequential Topic Patterns in Document Streams 

2016

97

Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs

2016

98

Relevance Feedback Algorithms Inspired By Quantum Detection

2016

99

Top-Down XML Keyword Query Processing 

2016

100

Top-k Dominating Queries on Incomplete Data 

2016

101

Understanding Short Texts through Semantic Enrichment and Hashing 

2016

 

NETWORKING

 

102

An Overlay Architecture for Throughput Optimal Multipath Routing

2017

103

FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control

2017

104

Network Capability in Localizing Node Failures via End-to-End Path Measurements

2017

105

Privacy and Integrity Preserving Top-Query Processing for Two-Tiered Sensor Network

2017

106

Routing in Accumulative Multi-Hop Networks

2017

107

SWEET: Serving the Web by Exploiting Email Tunnels

2017

108

A Stable Approach for Routing Queries in Unstructured P2P Networks

2016

109

iPath: Path Inference in Wireless Sensor Networks

2016

110

Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks

2016

111

Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks

2016

112

STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users

2016

 

MOBILE COMPUTING

 

113

A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption

2017

114

Detecting Mobile Malicious WebPages in Real Time

2017

115

Quantifying Interdependent Privacy Risks with Location Data

2017

116

Searching Trajectories by Regions of Interest

2017

117

SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks

2017

118

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

 2016

119

EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data

2016

120

Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach

2016

121

Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach

2016

 

PARALLEL AND DISTRIBUTED SYSTEMS

 

122

iASK: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence

2017

123

A Hop-by-Hop Routing Mechanism for Green Internet

2016

124

Continuous Answering Holistic Queries over Sensor Networks

2016

125

Dictionary Based Secure Provenance Compression for Wireless Sensor Networks

2016

126

The Server Provisioning Problem for Continuous Distributed Interactive Applications

2016

 

SECURE COMPUTING

 

127

A Credibility Analysis System for Assessing Information on Twitter

2017

128

Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems

2017

129

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

2017

130

My Privacy My Decision: Control of Photo Sharing on Online Social Networks

2017

131

Privacy-Preserving Selective Aggregation of Online User Behavior Data

2017

132

ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions

2017

133

Search Rank Fraud and Malware Detection in Google Play

2017

134

Towards Detecting Compromised Accounts on Social Networks

2017

135

FRoDO: Fraud Resilient Device for Off-Line Micro-Payments

2016

136

Resolving Multi-party Privacy Conflicts in Social Media

2016

137

Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata

2016

138

Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

2016

139

Detecting Malicious Facebook Applications

2016

140

Data Lineage in Malicious Environments 

2016

 

INFORMATION FORENSICS AND SECURITY

 

141

Net Spam: a Network-based Spam Detection Framework for Reviews in Online Social Media

2017

142

Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers

2017

143

Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending

2017

 

IOT

 

144

A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT

2017

145

An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy

2017

146

Efficient and Privacy-preserving Polygons Spatial Query Framework for Location-based Services

2017

147

Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems

2017

148

SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud

2017

 

BIG DATA

 

149

Attribute-Based Storage Supporting Secure Reduplication of Encrypted Data in Cloud

2017

150

Social Q&A: An Online Social Network Based Question and Answer System   

2017

 

IMAGE PROCESSING 

 

151

Automatic Generation of Social Event Storyboard from Image Click-through Data

2017

152

Image Re-ranking based on Topic Diversity

2017

153

Tri-Clustered Tensor Completion for Social-Aware Image Tag Refinement

2017

154

A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks

2016

155

A Locality Sensitive Low-Rank Model for Image Tag Completion

2016

156

Learning of Multimodal Representations with Random Walks on the Click Graph

2016

157

Online Multi-Modal Distance Metric Learning with Application to Image Retrieval

2016

158

Tag Based Image Search by Social Re-ranking

2016

 

MULTIMEDIA

 

159

Two-Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model

2017

 

SOFTWARE ENGINEERING

 

160

A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection

2017

161

Improving Automated Bug Triaging with Specialized Topic Model

2017

 

SERVICE COMPUTING

 

162

Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method

2017

163

Transactional Behavior Verification in Business Process as a Service Configuration

2017

About Our Company
Management solution and many more. We bestowed the above services not for the client’s satisfaction but delight them. We gained the local, national and international clients due to the dedicate services since 2012 and our corporate office rooted at Hyderabad, Bangalore, Chennai, noida
Contact Us
Phone: +91  868  652  2186
              +91  868  652  2184
Website: www.esystems.co.in
Email:     info@esystems.co.in
 

Visits Total
Good Performance tracking counter

 
All copyrights reserved by E-SYSTEMS