11
Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446 CLOUD COMPUTING S.No TITLES ID YEAR 1 Cloud Federations in the Sky: Formation Game and Mechanism SS01 March 2015 2 Stealthy Denial of Service Strategy in Cloud Computing SS02 March 2015 3 A Scalable and Reliable Matching Service for Content- Based Publish/Subscribe Systems SS03 March 2015 4 Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud SS04 March 2015 5 A Secure Data Self-Destructing Scheme in Cloud Computing SS05 Dec 2015 6 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation SS06 2015 7 SelCSP: A Framework to Facilitate Selection of Cloud Service Providers SS07 March 2015 8 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud SS08 2015 9 Application-Level Optimization of Big Data Transfers Through Pipelining, Parallelism and Concurrency SS09 2015 10 Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters SS10 2015 11 Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing SS11 2015 12 Audit-Free Cloud Storage via Deniable Attribute-based Encryption SS12 2015 13 Cloud-Based Multimedia Content Protection System SS13 March 2015 14 DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security SS14 Dec 2014

Ieee projects in karur

Embed Size (px)

Citation preview

Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446

CLOUD COMPUTING

S.No TITLES ID YEAR

1 Cloud Federations in the Sky: Formation Game and Mechanism

SS01 March 2015

2 Stealthy Denial of Service Strategy in Cloud Computing SS02 March 2015

3 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems

SS03 March 2015

4 Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud

SS04 March 2015

5 A Secure Data Self-Destructing Scheme in Cloud Computing

SS05 Dec 2015

6 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation

SS06 2015

7 SelCSP: A Framework to Facilitate Selection of Cloud Service Providers

SS07 March 2015

8 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud

SS08 2015

9 Application-Level Optimization of Big Data Transfers Through Pipelining, Parallelism and Concurrency

SS09 2015

10 Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters

SS10 2015

11 Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing

SS11 2015

12 Audit-Free Cloud Storage via Deniable Attribute-based Encryption

SS12 2015

13 Cloud-Based Multimedia Content Protection System SS13 March 2015

14 DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security

SS14 Dec 2014

Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446

15 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing

SS15 2015

16 Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage

SS16 March 2015

17 Identity-Based Encryption with Outsourced Revocation in Cloud Computing

SS17 Feb 2015

18 Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing

SS18 2015

Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446

DATA MINING

S.No TITLES ID YEAR

1 k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data

SS19 May 2015

2 A Unifying Framework of Mining Trajectory Patterns of Various Temporal Tightness

SS20 June 2015

3 TASC:Topic-Adaptive Sentiment Classification on Dynamic Tweets

SS21 June 2015

4 Discovery of Path Nearby Clusters in Spatial Networks SS22 June 2015

5 Best Keyword Cover Search SS23 Jan 2015

6 Discovery of Ranking Fraud for Mobile Apps SS24 Jan 2015

7 Efficient Top-k Retrieval on Massive Data SS25 2015

8 EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval

SS26 Jan 2015

9 GDCluster: A General Decentralized Clustering Algorithm SS27 July 2015

10 Tweet Segmentation and Its Application to Named Entity Recognition

SS28 Feb 2015

11 Improving Web Navigation Usability by Comparing Actual and Anticipated Usage

SS29 Feb 2015

12 Rank-Based Similarity Search: Reducing the Dimensional Dependence

SS30 Jan 2015

Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446

MOBILE COMPUTING

S.No TITLES ID YEAR

1 BRACER: A Distributed Broadcast Protocol in Multi-Hop Cognitive Radio Ad Hoc Networks with Collision Avoidance

SS31 March 2015

2 Friendbook: A Semantic-Based Friend Recommendation System for Social Networks

SS32 March 2015

3 Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization

SS33 May 2015

4 Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis

SS34 May 2015

5 Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless Networks

SS35 April 2015

6 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing

SS36 April 2015

7 Statistical Dissemination Control in Large Machine-to-Machine Communication Networks

SS37 April 2015

8 Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach

SS38 March 2015

9 Mobile-Projected Trajectory Algorithm With Velocity-Change Detection for Predicting Residual Link Lifetime in MANET

SS39 March 2015

10 On-Demand Discovery of Software Service Dependencies in MANETs

SS40 June 2015

11 Nearest Neighbor Search for Location-Dependent Sensor Data in MANETs

SS41 June 2015

Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446

NETWORK/ NETWORK SECURITY

S.No TITLES ID YEAR

1 A Nearly Optimal Packet Scheduling Algorithm for Input Queued Switches with Deadline Guarantees

SS42 JUNE 2015

2 Continuous and Transparent User Identity Verification for Secure Internet Services

SS43 June 2015

3 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks

SS44 April 2015

4 A Hierarchical Account-Aided Reputation Management System for MANETs

SS45 Feb 2015

5 Efficient and Truthful Bandwidth Allocation in Wireless Mesh Community Networks

SS46 Feb 2015

6 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

SS47 2015

7 Data Collection in Multi-Application Sharing Wireless Sensor Networks

SS48 Feb 2015

8 Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds

SS49 2015

9 Authenticated Key Exchange Protocols for Parallel Network File Systems

SS50 2015

10 On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications

SS51 2015

11 Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks

SS52 April 2015

12 Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing

SS53 Jan 2015

13 A Hybrid Cloud Approach for Secure Authorized Deduplication

SS54 May 2015

14 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

SS55 2015

Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446

INFORMATION FORENSICS

S.No TITLES ID YEAR

1 A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption

SS57 May 2015

2 Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption

SS58 July 2015

3 An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration

SS59 Jan 2015

4 An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems

SS60 May 2015

5 Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext

SS61 Mar 2015

6 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous

Attribute-Based Encryption

SS62 Jan 2015

7 Correlated Differential Privacy: Hiding Information in Non-IID Data Set

SS63 Feb 2015

8 A Privacy-Preserving Framework for Large-Scale Content-Based Information Retrieval

SS64 Jan 2015

9 Implementation of a New Lightweight Encryption Design for Embedded Security

SS65 Jan 2015

10 Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption

SS66 Mar 2015

11 Enabling Cloud Storage Auditing With Key-Exposure Resistance

SS67 June 2015

15 Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design

SS56 April 2015

Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446

12 Effective Key Management in Dynamic Wireless Sensor Networks

SS68 Feb 2015

13 Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers

SS69 Jan 2015

14 Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization

SS70 Mar 2015

15 LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking

SS71 Feb 2015

16 Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter

SS72 Mar 2015

17 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems

SS73 Mar 2015

18 White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes

SS74 June 2015

19 Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs

SS75 Mar 2015

20 Secrecy Transmission With a Helper: To Relay or to Jam SS76 Feb 2015

21 Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks

SS77 July 2015

22 Continuous and Transparent User Identity Verification for Secure Internet Services

SS78 June 2015

23 Privacy-Preserving Detection of Sensitive Data Exposure SS79 May 2015

24 Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming

SS80 2015

Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446

IMAGE PROCESSING

S.No TITLES ID YEAR

1 A Methodology for Extracting Standing HumanBodies From Single Images

SS81 JUNE 2015

2 Detection and Rectificationof Distorted Fingerprints SS82 March 2015

3 Eye Gaze Tracking With a Web Camera in a Desktop Environment

SS83 Aug 2015

4 An Attribute-Assisted Reranking Model for Web Image Search

SS84 JAN 2015

5 Fiducial Facial Point Extraction Using a Novel Projective Invariant

SS85 March 2015

6 Face Recognition Across Non-Uniform Motion Blur, Illumination, and Pose

SS86 July 2015

7 Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images

SS87 2015

8 Steganography Using Reversible Texture Synthesis SS88 2015

9 An Image Recapture Detection Algorithm Based on Learning Dictionaries of Edge Profiles

SS89 May 2015

10 Face Spoof Detection With Image Distortion Analysis SS90 April 2015

11 Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution

SS91 May 2015

12 Content-Based Image Retrieval Using Error Diffusion Block Truncation Coding Features

SS92 Mar 2015

13 Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study

SS93 Mar 2015

Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446

APPLICATION PROJECTS

S.No Titles Code

1 Drug Management System SAD01

2 Community Forum SAD02

3 Evaluation of Employee Performance SAD03

4 Global Loan System. SAD04

5 Healthcare Security System SAD05

6 Hierarchical Organization Information SAD06

7 IT Documentation SAD07

8 Referendum Crusader Scrutiny System SAD08

9 Sales & Inventory Management System SAD09

10 Software Project Management SAD10

11 Travel Management System SAD11

12 Communication-Intensive Workloads SAD12

13 Micro-Blogging in Classroom Students Relevant and Irrelevant Questions

SAD13

14 Blocking IP Address of Misbehaving User In Anonymous Network SAD14

15 Online E-Payments For Government Taxes SAD15

16 Cloud Computing SAD16

17 Virtual Class Room SAD17

18 Cyber Eye SAD18

19 Online Training And Exam SAD19

20 GSM Medical Report SAD20

Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446

21 Online Tourism SAD21

22 Rail Way Route SAD22

23 RFID Smart Card Verification SAD23

24 Mobile Sync SAD24

25 Analyzing and Opinion In For Mobile Products SAD25

26 Antiphishing Banking System SAD26

27 Construction Plus SAD27

28 Sending Resume Through SMS Gateway SAD28

29 RTO Management System SAD29

30 Graphical Password Authentication System Using Sound Signature SAD30

31 Attance Verification SAD31

32 Bio-Matrix And RFID Remote Voting System SAD32

33 Resume Send Using Mobile Application SAD33

34 Communication-Aware Load Balancing on clusters SAD34

35 Relevant and Irrelevant Questions in a Micro Blogging Supported Classroom

SAD35

36 Authenticated Nearest Neighbor Search SAD36

37 Spatial Ranking SAD37

38 Slicing the Privacy Data Publishing SAD38

39 Revisiting Password Guessing Attacks in the Network SAD39

40 Flexible Robust Group Agreement SAD40

41 Passport Verification Based On RFID SAD41

42 Finger Print based Attendance Verification SAD42

Website : www.shreesiddhisoftsolutions.com Phone : 0431-4040672 E-mail : [email protected] Mobile : 90032 33336 / 90032 44446

43 Finger Print Based Authentication For ATM Using Mobile Service SAD43

44 Steganography SAD44

45 Defect Tracking System SAD45

46 Copyright Protection Using Multimedia Documents Authentication SAD46

47 Automatic Composition of Semantic Web Services SAD47

48 Mage Fusion & Steganography SAD48

49 Path Selection Under Budget Constraints SAD49

50 AMES-Cloud An Adaptive Mobile Video Streaming SAD50