Skip to main content

DIPLOMA AND ENGINEERING PROJECT TITLES 2018

IEEE PROJECTS 2017 – 2018

CLOUD COMPUTING
1.Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption – Java (Mar 2016)

2. Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud – Java (April 2016)

3. Cloud workflow scheduling with deadlines and time slot availability - .NET (Jan 2016)

4. SECRBAC: Secure data in the Clouds - .NET (April 2016)

 5. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data - .NET (Feb 2016)

 6. Dynamic and Public Auditing with Fair Arbitration for Cloud Data - .NET (Feb 2016)

 7. CDstore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal – Java (Mar 2016)

8. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing - .NET (June 2015)

 9. Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation – Java (Jan 2016)

10.Identity-based Encryption with Outsourced Revocation in Cloud Computing - .NET( Feb 2015) 

11.Providing User Security Guarantees in Public Infrastructure Clouds - .NET (Feb 2016)


12.Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud - .NET (Feb 2016)

13.Towards achieving data security with the cloud computing adoption framework – Java (Feb 2016)


MULTIMEDIA

 14.Social Friend Recommendation Based On Multiple Network Correlation – Java (Feb 2016)

15.A Locality Sensitive Low-Rank Model for Image Tag Completion – Java (Mar 2016)

16.Tag based image search by social re-ranking – Java (Aug 2016)

17.Rating prediction based on social sentiment from textual reviews – Java (Sep 2016)

 WIRELESS SENSOR NETWORKS

18.Activetrust: Secure and Trustable Routing in Wireless Sensor Networks – Java (Sept 2016)

19.Efficient Certificateless Access Control for Wireless Body Area Networks - .NET (July 2016)

NETWORKING

 20. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing - .NET (May 2016)

 21. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing - .NET & Java (Aug 2016)

22.Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing - .NET (Aug 2016)

23.Fast Detection of Transformed Data Leaks – March 2016

DEPENDABLE AND SECURE COMPUTING

24.A Shoulder Surfing Resistant Graphical Authentication System – Java & .NET (Mar 2016) COMPUTERS

25.Two-Factor Data Security Protection Mechanism for Cloud Storage System - .NET (June 2016) 

26.ID2S Password-Authenticated Key Exchange Protocols – Java (Dec 2016)


27.Mitigating Cross-Site Scripting Attacks with a Content Security Policy – Java (March 2016)


28. Dynamic resource allocation for MapReduce with partition with skew - .NET (Nov 2016)


INFORMATION FORENSICS AND SECURITY


29.2DCRYPT: Image Scaling and Cropping in Encrypted Domains – Java (June 2016)


30.Privacy preserving outsourced association rule mining on vertically partitioned databases - .NET (Aug 2016)


 31.Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates – June 2016

32.Server-Aided Public Key Encryption With Keyword Search – August 2016


 33.Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services – march 2016

INTELLIGENT TRANSPORTATION SYSTEMS

34.Text Mining the Contributors to Rail Accidents - .NET (Feb 2016)

SECURITY COMPUTING 

35.MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection - .NET (June 2015)

36.Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud – Java (June 2016)

 MOBILE COMPUTING

 37.EPLQ: efficient privacy-preserving location-based query over outsourced encrypted data - .NET (Apr 2016)

38.An Optimization Framework for Mobile Data Collection in EnergyHarvesting Wireless Sensor Networks - .NET – (Dec 2016)

 39.Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach - .NET (July 2016)

40.WORAL A Witness Oriented Secure Location Provenance Framework for Mobile Devices - .NET (Mar 2016)
SERVICE COMPUTING
41.Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys - .NET (Feb 2016)
KNOWLEDGE AND DATA ENGINEERING
42.Privacy preserving outsourced media search - .NET (July 2016)
43.Online Subgraph Skyline Analysis Over Knowledge Graphs - .NET (July 2016)
44.RSKNN: KNN search on road networks by Incorporating social influence – Java (June 2016) 45.Nearest Keyword Set Search in Multi dimensional Datasets – Java (Mar 2016)
46.A Scalable Approach for Content-Based Image Retrieval in Peer-toPeer Networks – Java (April 2016)
47.Relevance Feedback Algorithms Inspired By Quantum Detection - .NET – (Apr 2016)
48.DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments – Java (Apr 2016)
49.Clustering Data Streams Based on Shared Density between MicroClusters – Java (June 2016)
50.Connecting Social Media to E-Commerce: Cold-Start Product Recommendation – Java ( May 2016)
51.Crawling Hidden Objects with kNN Queries – April 2016
 52.DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud – March 2016
 53.Resolving Multi-Party Privacy Conflicts in Social Media – July 2016

DATA MINING
54.Topicsketch: Real-time Bursty Topic Detection from Twitter - .NET (Aug 2016)
55.Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems – Java (Apr 2016)
 56.Mining Health Examination Records — A Graph-based Approach – Java (Sept 2016)
 57.Processing Incomplete k Nearest Neighbor Search - .NET (Jan 2016)
IMAGE PROCESSING
58.Enhancing Sketch-Based Image Retrieval by Re-Ranking and Relevance Feedback - .NET (Jan 2016) 59.Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation - .NET (Mar 2016)
BIG DATA
60.Visual Exploration of Changes in Passenger Flows and Tweets on Mega-City Metro Network - .NET (Mar 2016)
 61.Personalized Travel sequence recommendation on multi-source big social media – March 2016
62.Hadoop Based Scalable Cluster Deduplication for Big Data – Java (June 2016)
PARALLEL AND DISTRIBUTED SYSTEMS
63.Online Resource Scheduling under Concave Pricing for Cloud Computing – Java (April 2016)
64.FiDoop-DP: Data Partitioning in Frequent Itemset Mining on Hadoop Clusters – Java (April 2016)
65.Reducing Fragmentation for In-line Deduplication Backup Storage via Exploiting Backup History and Cache Knowledge – Java (March 2016)

INTELLIGENT TRANSPORTATION SYSTEMS
66.Bilevel Feature Extraction-Based Text Mining for Fault Diagnosis of Railway Systems – April 2016 PROFESSIONAL COMMUNICATION

67.The Impact of Review Environment on Review Credibility – June 2016

Comments

Popular posts from this blog

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD report

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD ABSTRACT More and more clients would like to store their data to PCS (public cloud servers) along with the rapid development of cloud computing. New security problems have to be solved in order to help more clients process their data in public cloud. When the client is restricted to access PCS, he will delegate its proxy to process his data and upload them. On the other hand, remote data integrity checking is also an important security problem in public cloud storage. It makes the clients check whether their outsourced data is kept intact without downloading the whole data. From the security problems, we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). We give the formal definition, system model and se...

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM ABSTRACT Authentication based on passwords is used largely in applications for computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as”the weakest link” in the authentication chain. Rather than arbitrary alphanumeric strings, users tend to choose passwords either short or meaningful for easy memorization. With web applications and mobile apps piling up, people can access these applications anytime and anywhere with various devices. This evolution brings great convenience but also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, we proposed a novel authentication system PassMatrix, based on graphical passwords to resist shoulder surfing attacks. With a one-time valid login indicator and ...

garbage monitoring using arduino code with gsm

#include <SoftwareSerial.h> #include <LiquidCrystal.h> //LiquidCrystal lcd(7, 6, 5, 4, 3, 2); LiquidCrystal lcd(13, 12, 11, 10, 9, 8); SoftwareSerial mySerial(0,1); #define trigPin 2 #define echoPin 3 #define PIR_sensor 4 #define m11 5 #define m12 6 void setup() {    lcd.begin(16, 2);    lcd.print("    Garbage    ");    Serial.println("garbage ");   lcd.setCursor(0,1);   lcd.print("   Open Close    ");   Serial.println(" open close");   delay(3000);   lcd.clear();   //lcd.print(" ");   delay(2000); mySerial.begin(9600); // Setting the baud rate of GSM Module Serial.begin (9600); pinMode(trigPin, OUTPUT); pinMode(echoPin, INPUT);  pinMode(m11, OUTPUT);   pinMode(m12, OUTPUT);   } void loop() {  readPIR();  pingDist();  SendMessage(); } void pingDist ()   {     long duration, distance;...