IEEE Dotnet Projects
IEEE DOTNET PROJECT 2016-2017

CLOUD COMPUTING

1.A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

2.Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing

3.Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing

4.Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds

5.Dynamic and Public Auditing with Fair Arbitration for Cloud Data

6.Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage

7.Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

8.Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services

9.Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

10.KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage

11.Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud

12.MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection

13.Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm

DATA MINING

1.A Mixed Generative-Discriminative Based Hashing Method

2.Personalized Travel Sequence Recommendation on Multi-Source Big Social Media

3.Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy

4.Text Mining the Contributors to Rail Accidents

5.User-Service Rating Prediction by Exploring Social Users' Rating Behaviors

IMAGE PROCESSING

1.Content-Adaptive Steganography by Minimizing Statistical Detectability

2.Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation

3.Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data

INFORMATION FORENSICS AND SECURITY

1.Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases

INTERNET OF THINGS

1.EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data

MOBILE COMPUTING

1.A Joint Time Synchronization and Localization Design for Mobile Underwater Sensor Networks

2.Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps

3.DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks

4.Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs

5.WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices

NETWORKING

1.Efficient Certificateless Access Control for Wireless Body Area Networks

2.Finding Nonequivalent Classifiers in Boolean Space to Reduce TCAM Usage

3.Geographic and Opportunistic Routing for Underwater Sensor Networks

4.Optimizing Cost for Online Social Networks on Geo-Distributed Clouds

5.Secure and Efficient data communication protocol for Wireless Body Area Networks

PARALLEL AND DISTRIBUTED SYSTEM

1.Authenticated Key Exchange Protocols for Parallel Network File Systems

2.Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems

SECURE COMPUTING

1.Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining

2.ID2S Password-Authenticated Key Exchange Protocols

SERVICE COMPUTING

1.Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys

Contact Us



Call Us

+91-9751800789
+91-7708150152

Submit Query

Your Name: *

Email Address: *

Contact No: *

Department: *

College Name: *

Domain: *

Message: *




Get A Free Quote / Need a Help ? Contact Us