IEEE JAVA PROJECTS TITLES YEAR--2014
PROJECT TITLE DOMAIN
1. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability Secure Computing
2. Fast Nearest Neighbor Search with Keywords Data Mining
3. Personalized web search using Browsing history and domain Knowledge Data Mining
4. Secure Outsourced Attribute-Based Signatures Parallel and
Distributed Systems
5. Secure-Mining-of-Association-Rules-in-Horizontally-Distributed-Databases Data Mining
6. Supporting Privacy Protection in Personalized Web Search Data Mining
7. XSPath Navigation on XML Schemas Made Easy Data Mining
8. A Hybrid Cloud Approach for Secure Authorized Deduplication Parallel and
Distributed Systems
9. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust
Establishment in Delay-Tolerant Networks
Parallel and
Distributed Systems
10. A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks MOBILE
COMPUTING
11. A Scalable Two-Phase Top-Down Specialization Approach for Data
Anonymization Using MapReduce on Cloud
Parallel and
Distributed Systems
12. A System for Denial-of-Service Attack Detection Based on Multivariate
Correlation Analysis
Parallel and
Distributed Systems
13. A Tag Encoding Scheme against Pollution Attack to Linear Network Coding Parallel and
Distributed Systems
14. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Data Mining
Relational Data
15. Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions Parallel and
Distributed Systems
16. Bandwidth Distributed Denial of Service: Attacks and Defenses Flooding Attacks
17. Behavioral Malware Detection in Delay Tolerant Networks Parallel and
Distributed Systems
18. Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks Mobile Computing
19. Cooperative Spectrum Sharing: A Contract-Based Approach Mobile Computing
20. Decentralized Access Control with Anonymous Authentication of Data Stored in
Clouds
Parallel and
Distributed Systems
21. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social
Networks
Parallel and
Distributed Systems
22. Facilitating Document Annotation Using Content and Querying Value Data Mining
23. Interpreting the Public Sentiment Variations on Twitter Data Mining
24. Keyword Query Routing Data Mining
25. k-Zero Day Safety: A Network Security Metric for Measuring the Risk of
Unknown Vulnerabilities
Secure Computing
26. Modeling of Distributed File Systems for Practical Performance Analysis Parallel and
Distributed Systems
27. Network Coding Aware Cooperative MAC Protocol for Wireless Ad Hoc
Networks
Parallel and
Distributed Systems
28. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System Networking
29. Preserving Location Privacy in Geo-Social Applications Mobile Computing
30. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud Cloud Computing
31. Product Aspect Ranking and Its Applications Data Mining
32. Two Provably Secure Password Hashing Algorithms Networking
33. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Networking
34. Set Predicates in SQL: Enabling Set-Level Comparisons for Dynamically
Formed Groups
Data Mining
35. Hiding in the Mobile Crowd Location Privacy through Collaboration Networking
36. Scalable Distributed Service Integrity Attestation for Software-as-a-Service
Clouds
Parallel and
Distributed Systems
37. Automatic Test Packet Generation Networking
38. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage Parallel and
Distributed Systems
39. A Cocktail Approach for Travel Package Recommendation Data Mining
40. Efficient Prediction of Difficult Keyword Queries over Databases Data Mining
41. Multicast Capacity in MANET with Infrastructure Support Parallel and
Distributed Systems
42. PROFILR: Toward Preserving Privacy and Functionality in Geosocial Networks
43. Efficient Authentication for Mobile and Pervasive Computing Mobile Computing
44. Friendbook: A Semantic-based Friend Recommendation System for Social Mobile Computing
Networks
45. Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous
Devices
Android
46. Towards Differential Query Services in Cost-Efficient Clouds Parallel and
Distributed Systems
47. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority
Cloud Storage
Parallel and
Distributed Systems
48. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes Networking
49. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud
Computing
Cloud Computing
50. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Parallel and
Distributed Systems
51. Secure Data Aggregation in Wireless Sensor Networks Filtering out the
Attacker’s Impact
Information Forensics
and Security
52. The Design and Evaluation of An Information Sharing System for Human
Networks
Parallel and
Distributed Systems
53. Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery
Networks
Parallel and
Distributed Systems
54. Distributed, concurrent, and independent access to encrypted cloud databases Parallel and
Distributed Systems
55. Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI
Problems
Security
56. Building Confidential and Efficient Query Services in the Cloud with RASP Data Mining
Data Perturbation
57. Boundary Cutting for Packet Classification Networking
58. Leveraging Social Networks for P2P Content based File Sharing in Disconnected
MANETs
Networking
59. Data Mining with Big Data Data Mining
60. secure information sharing using ABE
Ieee 2014 java projects list

Ieee 2014 java projects list

  • 1.
    IEEE JAVA PROJECTSTITLES YEAR--2014 PROJECT TITLE DOMAIN 1. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability Secure Computing 2. Fast Nearest Neighbor Search with Keywords Data Mining 3. Personalized web search using Browsing history and domain Knowledge Data Mining
  • 2.
    4. Secure OutsourcedAttribute-Based Signatures Parallel and Distributed Systems 5. Secure-Mining-of-Association-Rules-in-Horizontally-Distributed-Databases Data Mining 6. Supporting Privacy Protection in Personalized Web Search Data Mining 7. XSPath Navigation on XML Schemas Made Easy Data Mining 8. A Hybrid Cloud Approach for Secure Authorized Deduplication Parallel and
  • 3.
    Distributed Systems 9. AProbabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks Parallel and Distributed Systems 10. A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks MOBILE COMPUTING
  • 4.
    11. A ScalableTwo-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud Parallel and Distributed Systems 12. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis Parallel and Distributed Systems 13. A Tag Encoding Scheme against Pollution Attack to Linear Network Coding Parallel and Distributed Systems 14. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Data Mining
  • 5.
    Relational Data 15. BalancingPerformance, Accuracy, and Precision for Secure Cloud Transactions Parallel and Distributed Systems 16. Bandwidth Distributed Denial of Service: Attacks and Defenses Flooding Attacks 17. Behavioral Malware Detection in Delay Tolerant Networks Parallel and Distributed Systems
  • 6.
    18. Cooperative Cachingfor Efficient Data Access in Disruption Tolerant Networks Mobile Computing 19. Cooperative Spectrum Sharing: A Contract-Based Approach Mobile Computing 20. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds Parallel and Distributed Systems 21. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks Parallel and Distributed Systems
  • 7.
    22. Facilitating DocumentAnnotation Using Content and Querying Value Data Mining 23. Interpreting the Public Sentiment Variations on Twitter Data Mining 24. Keyword Query Routing Data Mining 25. k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities Secure Computing 26. Modeling of Distributed File Systems for Practical Performance Analysis Parallel and
  • 8.
    Distributed Systems 27. NetworkCoding Aware Cooperative MAC Protocol for Wireless Ad Hoc Networks Parallel and Distributed Systems 28. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System Networking 29. Preserving Location Privacy in Geo-Social Applications Mobile Computing 30. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud Cloud Computing
  • 9.
    31. Product AspectRanking and Its Applications Data Mining 32. Two Provably Secure Password Hashing Algorithms Networking 33. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Networking 34. Set Predicates in SQL: Enabling Set-Level Comparisons for Dynamically Formed Groups Data Mining 35. Hiding in the Mobile Crowd Location Privacy through Collaboration Networking
  • 10.
    36. Scalable DistributedService Integrity Attestation for Software-as-a-Service Clouds Parallel and Distributed Systems 37. Automatic Test Packet Generation Networking 38. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage Parallel and Distributed Systems 39. A Cocktail Approach for Travel Package Recommendation Data Mining
  • 11.
    40. Efficient Predictionof Difficult Keyword Queries over Databases Data Mining 41. Multicast Capacity in MANET with Infrastructure Support Parallel and Distributed Systems 42. PROFILR: Toward Preserving Privacy and Functionality in Geosocial Networks 43. Efficient Authentication for Mobile and Pervasive Computing Mobile Computing 44. Friendbook: A Semantic-based Friend Recommendation System for Social Mobile Computing
  • 12.
    Networks 45. Optimal DistributedMalware Defense in Mobile Networks with Heterogeneous Devices Android 46. Towards Differential Query Services in Cost-Efficient Clouds Parallel and Distributed Systems
  • 13.
    47. Expressive, Efficient,and Revocable Data Access Control for Multi-Authority Cloud Storage Parallel and Distributed Systems 48. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes Networking 49. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing Cloud Computing 50. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Parallel and
  • 14.
    Distributed Systems 51. SecureData Aggregation in Wireless Sensor Networks Filtering out the Attacker’s Impact Information Forensics and Security 52. The Design and Evaluation of An Information Sharing System for Human Networks Parallel and Distributed Systems
  • 15.
    53. Traffic Pattern-BasedContent Leakage Detection for Trusted Content Delivery Networks Parallel and Distributed Systems 54. Distributed, concurrent, and independent access to encrypted cloud databases Parallel and Distributed Systems 55. Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems Security 56. Building Confidential and Efficient Query Services in the Cloud with RASP Data Mining
  • 16.
    Data Perturbation 57. BoundaryCutting for Packet Classification Networking 58. Leveraging Social Networks for P2P Content based File Sharing in Disconnected MANETs Networking 59. Data Mining with Big Data Data Mining 60. secure information sharing using ABE