Java Projects

projects for B.Tech students on Java. Abstract List
S. No Project Title Download Abstract
001 A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification Abstract
002 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing Abstract
003 CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System Abstract
004 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email Abstract
005 Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds Abstract
006 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts Abstract
007 DeyPoS Deduplicatable Dynamic Proof of Storage for Multi-User Environments Abstract
008 DiploCloud Efficient and Scalable Management of RDF Data in the Cloud Abstract
009 Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage Abstract
010 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates Abstract
011 EPLQ Efficient Privacy-Preserving Location-Based Abstract
012 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services Abstract
013 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing Abstract
014 Geometric Range Search on Encrypted Spatial Data Abstract
015 Hidden Cipher Text Policy Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions Abstract
016 Identity-based Proxy-Oriented and Uploading and Remote Data Integrity Checking in Public Clouds Abstract
017 Privacy-Preserving Public Auditing for Secure Cloud Storage Abstract
018 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption Abstract
019 Secure Optimization Computation Outsourcing in Cloud Computing A Case Study of Linear Programming Abstract
020 The Server Provisioning Problem for Continuous Distributed Interactive Applications Abstract
021 Two-Factor Data Security Protection Mechanism for Cloud Storage System Abstract
022 Audit-Free Cloud Storage via Deniable Attribute-based Encryption Abstract
023 An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration Abstract
024 Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud Abstract
025 Identity-Based Encryption with Outsourced Revocation in Cloud Computing Abstract
026 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing Abstract
027 A Modified Hierarchical Attribute-based Encryption Access Control Method for Mobile Cloud Computing Abstract
028 Dynamic and Public Auditing with Fair Arbitration for Cloud Data Abstract
029 Enabling Cloud Storage Auditing with KeyExposure Resistance Abstract
030 Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds Abstract
031 Automatically Mining Facets for Queries Abstract
032 Booster in High Dimensional Data Classification Abstract
033 Building an intrusion detection system using a filter-based feature selection algorithm Abstract
034 Connecting Social Media to E-Commerence Abstract
035 Crowdsourcing for Top K Query Processing over Uncertain Data Abstract
036 Domain-Sensitive Recommendation with User-Item Subgroup Analysis Abstract
037 Efficient Algorithms for Mining Top-K High Utility Itemsets Abstract
038 Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata Abstract
039 Mining User-Aware Rare Sequential Topic Patterns in Document Streams Abstract
040 Nearest Keyword Set Search in Multi-Dimensional Datasets Abstract
041 Best Keyword Cover Search Abstract
042 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Mode Abstract
043 Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers Abstract
044 A Locality Sensitive Low-Rank Model for Image Tag Completion Abstract
045 A Mixed Generative-Discriminative Based Hashing Method Abstract
46 A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks Abstract
47 An Efficient Privacy-Preserving Ranked Keyword Search Method Abstract
48 Mapping Bug Reports to Relevant Files A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation Abstract
49 Online Multi-Modal Distance Metric Learning with Application to Image Retrieval Abstract
50 Rating Prediction based on Social Sentiment from Textual Reviews Abstract
51 Tag Based Image Search by Social Re-ranking Abstract
52 An Attribute-assisted Reranking Model for Web Image Search Abstract
53 Privacy Policy Inference of User Uploaded Images on Content Sharing Sites Abstract
54 A Scalable and Reliable Matching Service for Content Based PublishSubscribe Systems Abstract
55 A Stable Approach for Routing Queries in Unstructured P2P Networks Abstract
56 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Abstract
57 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach Abstract
58 Efficient Cache-Supported Path Planning on Roads Abstract
59 FRoDO Fraud Resilient Device for Off-Line Micro-Payments Abstract
60 ID2S Password-Authenticated Key Exchange Protocols Abstract
61 iPath Path Inference in Wireless Sensor Networks Abstract
62 Location Aware Keyword Query Suggestion Based on Document Proximity Abstract
63 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks Abstract
64 Quantifying Political Leaning from Tweets, Retweets, and Retweeters Abstract
65 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks Abstract
66 STAMP Enabling Privacy-Preserving Location Proofs for Mobile User Abstract
67 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks Abstract
68 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks Abstract
69 My Privacy My Decision:Control of Photo Sharing on Online Social Networks Abstract
70 Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks Abstract