IEEE DOT NET PROJECTS

CLOUD COMPUTING PROJECTS
  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
  Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
  Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
  Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
  Dynamic and Public Auditing with Fair Arbitration for Cloud Data
  Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
  Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
  Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
  Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
  KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
  Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud
  MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
  Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm
DATA MINING PROJECTS
  A Mixed Generative-Discriminative Based Hashing Method
  Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
  Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
  Text Mining the Contributors to Rail Accidents
  User-Service Rating Prediction by Exploring Social Users' Rating Behaviors
IMAGE PROCESSING
  Content-Adaptive Steganography by Minimizing Statistical Detectability
  Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation
  Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data
MOBILE COMPUTING
  A Joint Time Synchronization and Localization Design for Mobile Underwater Sensor Networks
  Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
  DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks
  Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs
  WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
NETWORKING PROJECTS
  Efficient Certificateless Access Control for Wireless Body Area Networks
  Finding Nonequivalent Classifiers in Boolean Space to Reduce TCAM Usage
  Geographic and Opportunistic Routing for Underwater Sensor Networks
  Optimizing Cost for Online Social Networks on Geo-Distributed Clouds
  Secure and Efficient data communication protocol for Wireless Body Area Networks
PARALLEL AND DISTRIBUTED SYSTEM
  Authenticated Key Exchange Protocols for Parallel Network File Systems
  Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems
SECURE COMPUTING
  Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
  ID2S Password-Authenticated Key Exchange Protocols

ENQUIRY




1000+

PROJECT DOMAINS

100000+

PROJECTS DELIVERED

20000+

STUDENTS SERVED

6+

YEARS EXPERIENCE