1. JAVA IEEE TITLES 2015
S.NO Project Title Domain
1 A Hybrid Cloud Approach for Secure Authorized
Deduplication
Cloud Computing
2 A Profit Maximization Scheme with Guaranteed Quality of
Service in Cloud Computing
Cloud Computing
3 A Scalable and Reliable Matching Service for Content-Based
Publish/Subscribe Systems
Cloud Computing
4 A Secure and Dynamic Multi-keyword Ranked Search
Scheme over Encrypted Cloud Data
Cloud Computing
5 A Secure Anti-Collusion Data Sharing Scheme for Dynamic
Groups in the Cloud
Cloud Computing
6 An Authenticated Trust and Reputation Calculation and
Management System for Cloud and Sensor Networks
Integration
Cloud Computing
7 Audit-Free Cloud Storage via Deniable Attribute-based
Encryption
Cloud Computing
8 Circuit Ciphertext-policy Attribute-based Hybrid Encryption
with Verifiable Delegation in Cloud Computing
Cloud Computing
9 Cloud Armor: Supporting Reputation-based Trust
Management for Cloud Services
Cloud Computing
10 Control Cloud Data Access Privilege and Anonymity with
Fully Anonymous Attribute-Based Encryption
Cloud Computing
11 Enabling Cloud Storage Auditing With Key-Exposure
Resistance
Cloud Computing
12 Enabling Fine-grained Multi-keyword Search Supporting
Classified Sub-dictionaries over Encrypted Cloud Data
Cloud Computing
13 Identity-Based Encryption with Outsourced Revocation in
Cloud Computing
Cloud Computing
14 Key-Aggregate Searchable Encryption (KASE) for Group
Data Sharing via Cloud Storage
Cloud Computing
15 Privacy Preserving Ranked Multi-Keyword Search for
Multiple Data Owners in Cloud Computing
Cloud Computing
16 Privacy-Preserving Public Auditing for Regenerating-Code-
Based Cloud Storage
Cloud Computing
17 Provable Multi copy Dynamic Data Possession in Cloud
Computing Systems
Cloud Computing
18 Public Integrity Auditing for Shared Dynamic Cloud Data
with Group User Revocation
Cloud Computing
19 Secure Auditing and Deduplicating Data in Cloud Cloud Computing
20 Stealthy Denial of Service Strategy in Cloud Computing Cloud Computing
21 Mobi Context: A Context-aware Cloud-Based Venue Cloud Computing
2. Recommendation Framework
22 SAE: Toward Efficient Cloud Data Analysis Service for
Large-Scale Social Networks
Cloud Computing
23 Understanding the Performance and Potential of Cloud
Computing for Scientific Applications
Cloud Computing
24 Towards Optimized Fine-Grained Pricing of IaaS Cloud
Platform
Cloud Computing
25 Service Operator-aware Trust Scheme for Resource
Matchmaking across Multiple Clouds
Cloud Computing
26 Reactive Resource Provisioning Heuristics for Dynamic
Dataflows on Cloud Infrastructure
Cloud Computing
27 A Profit Maximization Scheme with Guaranteed Quality of
Service in Cloud Computing
Cloud Computing
28 OPoR: Enabling Proof of Retrievability in Cloud Computing
with Resource-Constrained Devices
Cloud Computing
29 Best Keyword Cover Search Data Mining
30 Co-Extracting Opinion Targets and Opinion Words from
Online Reviews Based on the Word Alignment Model
Data Mining
31 Context-Based Diversification for Keyword Queries over
XML Data
Data Mining
32 Discovery of Ranking Fraud for Mobile Apps Data Mining
33 Malware Propagation in Large-Scale Networks Data Mining
34 On Summarization and Timeline Generation for Evolutionary
Tweet Streams
Data Mining
35 Privacy Policy Inference of User-Uploaded Images on Content
Sharing Sites
Data Mining
36 Progressive Duplicate Detection Data Mining
37 Reverse Nearest Neighbors in Unsupervised Distance-Based
Outlier Detection
Data Mining
38 Route-Saver: Leveraging Route APIs for Accurate and
Efficient Query Processing at Location-Based Services
Data Mining
39 Scalable Constrained Spectral Clustering Data Mining
40 Towards Effective Bug Triage with Software Data Reduction
Techniques
Data Mining
41 Tweet Segmentation and Its Application to Named Entity
Recognition
Data Mining
42 Subgraph Matching with Set Similarity in a Large Graph
Database
Data Mining
43 Structured Learning from Heterogeneous Behavior for Social
Identity Linkage
Data Mining
44 Making Digital Artifacts on the Web Verifiable and Reliable Data Mining
45 Anonymizing Collections of Tree-Structured Data Data Mining
46 FOCS: Fast Overlapped Community Search Data Mining
3. 47 Sparsity Learning Formulations for Mining Time-Varying
Data
Data Mining
48 K-Nearest Neighbor Classification over Semantically Secure
Encrypted Relational
Data Mining
49 The Impact of View Histories on Edit Recommendations Data Mining
50 Agent-based Interactions and Economic Encounters in an
Intelligent Inter Cloud
Data Mining
51 A Distortion-Resistant Routing Framework for Video Traffic
in Wireless Multihop Networks
Data Mining
52 Detecting Malicious Facebook Applications Data Mining
53 Maximizing P2P File Access Availability in Mobile Ad Hoc
Networks though Replication for Efficient File Sharing
Data Mining
54 A Proximity-Aware Interest-Clustered P2P File Sharing
System
Data Mining
55 Dynamic Routing for Data Integrity and Delay Differentiated
Services in Wireless Sensor Networks
Mobile Computing
56 Friend book: A Semantic-Based Friend Recommendation
System for Social Networks
Mobile Computing
57 Privacy-Preserving and Truthful Detection of Packet Dropping
Attacks in Wireless Ad Hoc Networks
Mobile Computing
58 User-Defined Privacy Grid System for Continuous Location-
Based Services
Mobile Computing
59 Maximizing Energy Efficiency in Multiple Access Channels
by Exploiting Packet Dropping and Transmitter Buffering
Mobile Computing
60 Tracking Temporal Community Strength in Dynamic
Networks
Mobile Computing
61 Modeling and Analysis of Communication Traffic
Heterogeneity in Opportunistic Networks
Mobile Computing
62 Towards Information Diffusion in Mobile Social Networks Mobile Computing
63 User-Defined Privacy Grid System for Continuous Location-
Based Services
Mobile Computing
64 A Computational Dynamic Trust Model for User
Authorization
Secure Computing
65 A Lightweight Secure Scheme for Detecting Provenance
Forgery and Packet Drop Attacks in Wireless Sensor
Networks
Secure Computing
66 Continuous and Transparent User Identity Verification for
Secure Internet Services
Secure Computing
67 Contributory Broadcast Encryption with Efficient Encryption
and Short Cipher texts
Secure Computing
68 DDSGA: A Data-Driven Semi-Global Alignment Approach
for Detecting Masquerade Attacks
Secure Computing
69 Improved Privacy-Preserving P2P Multimedia Distribution Secure Computing
4. Based on Recombined Fingerprints
70 Secure Data Aggregation Technique for Wireless Sensor
Networks in the Presence of Collusion Attacks
Secure Computing
71 Secure Spatial Top-k Query Processing via Untrusted
Location- Based Service Providers
Secure Computing
72 Smart Crawler: A Two-stage Crawler for Efficiently
Harvesting Deep-Web Interfaces
Secure Computing
73 Collusion-Tolerable Privacy-Preserving Sum and Product
Calculation without Secure Channel
Secure Computing
74 Formalization and Verification of Group Behavior Interactions Secure Computing
75 Group Key Agreement with Local Connectivity Secure Computing
76 Data Lineage in Malicious Environments Secure Computing
77 Privacy-Preserving Public Auditing for Regenerating-Code-
Based Cloud Storage
Secure Computing
78 Improving Privacy and Security in Decentralized Ciphertext-
Policy Attribute-Based Encryption
Secure Computing
79 Formalization and Verification of Group Behavior Interactions Secure Computing
80 Enabling Cloud Storage Auditing with Key-Exposure
Resistance
Secure Computing
81 Control Cloud Data Access Privilege and Anonymity With
Fully Anonymous Attribute-Based Encryption
Secure Computing
82 nonymity-based Privacy-preserving Data Reporting for
Participatory Sensing
Secure Computing
83 Asymmetric Social Proximity Based Private Matching
Protocols for Online Social Networks
Parallel & Distributed
Systems
84 Cost-Effective Authentic and Anonymous Data Sharing with
Forward Security
Parallel & Distributed
Systems
85 Secure Distributed Deduplication Systems with Improved
Reliability
Parallel & Distributed
Systems
86 Service Operator-aware Trust Scheme for Resource
Matchmaking across Multiple Clouds
Parallel & Distributed
Systems
87 A Secure Anti-Collusion Data Sharing Scheme for Dynamic
Groups in the Cloud
Parallel & Distributed
Systems
88 A Computational Dynamic Trust Model for User
Authorization
Parallel & Distributed
Systems
89 Secure Distributed Deduplication Systems with Improved
Reliability
Parallel & Distributed
Systems
90 Collusion-Tolerable Privacy-Preserving Sum and Product
Calculation without Secure Channel
Parallel & Distributed
Systems
91 Control Cloud Data Access Privilege and Anonymity With
Fully Anonymous Attribute-Based Encryption
Parallel & Distributed
Systems
92 A Framework for Secure Computations with Two Non-
Colluding Servers and Multiple Clients, Applied to
Information Forensics
And Security
5. Recommendations
93 Effective Key Management in Dynamic Wireless Sensor
Networks
Information Forensics
And Security
94
Key Updating for Leakage Resiliency with Application to
AES Modes of Operation
Information
Forensics And
Security
95
Passive IP Trace back: Disclosing the Locations of IP
Spoofers from Path Backscatter
Information
Forensics And
Security
96
Software Puzzle: A Countermeasure to Resource-Inflated
Denial of- Service Attacks
Information
Forensics And
Security
97 An Attribute-Assisted Reranking Model for Web Image
Search
Image Processing
98 EMR: A Scalable Graph-based Ranking Model for Content-
based Image Retrieval
Image Processing
99 Learning to Rank Image Tags With Limited Training
Examples
Image Processing
100 Multiview Alignment Hashing for Efficient Image Search Image Processing
101 YouTube Video Promotion by Cross-network Image Processing
102 Semantic-Improved Color Imaging Applications: It Is All
About Context
Image Processing
103 Geolocalized Modeling for Dish Recognition Image Processing
104 Automatic Face Naming by Learning Discriminative Affnity
Matrices From Weakly Labeled Image
Image Processing
105 Multiview Alignment Hashing for Efficient Image Image Processing
106 The Impact of View Histories on Edit Recommendations Software Engineering
107 Designing High Performance Web-Based Computing Services
to Promote Telemedicine Database Management System
Service Computing
(Web Service)
108 Location-Aware and Personalized Collaborative Filtering for
Web Service Recommendation
Service Computing
(Web Service)
109 A Fuzzy Preference Tree-Based Recommender System for
Personalized Business-to-Business E-Services
Fuzzy Systems