IEEE Projects

Software Application Projects

Non IEEE Project Domains

IEEE 2014 JAVA PROJECTS


Title Domain Video
A Hybrid Cloud Approach for Secure Authorized Deduplication Cloud Computing
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud Cloud Computing
A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems Cloud Computing
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation Cloud Computing
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds Cloud Computing
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases Cloud Computing
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Cloud Computing
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage Cloud Computing
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud Cloud Computing
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System Cloud Computing
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Cloud Computing
Scalable Distributed Service Integrity Attestation for Software-as a-Service Clouds Cloud Computing
Towards Differential Query Services in Cost-Efficient Clouds Cloud Computing
A Cocktail Approach for Travel Package Recommendation Data Mining
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data Data Mining
BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform Data Mining
Data Mining with Big Data Data Mining
Dealing With Concept Drifts in Process Mining Data Mining
Discovering Emerging Topics in Social Streams via Link-Anomaly Detection Data Mining
Efficient Prediction of Difficult Keyword Queries over Databases Data Mining
Facilitating Document Annotation Using Content and Querying Value Data Mining
Fast Nearest Neighbor Search with Keywords Data Mining
Keyword Query Routing Data Mining
Privacy-Preserving and Content-Protecting Location Based Queries Data Mining
Security Evaluation of Pattern Classifiers under Attack Data Mining
Supporting Privacy Protection in Personalized Web Search Data Mining
Towards Online Shortest Path Computation Data Mining
An Incentive Framework for Cellular Traffic Offloading Mobile Computing
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks Mobile Computing
Efficient Authentication for Mobile and Pervasive Computing Mobile Computing
Friendbook: A Semantic-based Friend Recommendation System for Social Networks Mobile Computing
Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices Mobile Computing
Automatic Test Packet Generation Networking
Cost-Effective Resource Allocation of Overlay Routing Relay Nodes Networking
Boundary Cutting for Packet Classification Networking
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Networking
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks Parallel & Dist Systems
Exploiting Service Similarity for Privacy in Location-Based Search Queries Parallel & Dist Systems
LocaWard: A Security and Privacy Aware Location-Based Rewarding System Parallel & Dist Systems
On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures Parallel & Dist Systems
RRE: A Game-Theoretic Intrusion Response and Recovery Engine Parallel & Dist Systems
Securing Broker Less Publish/Subscribe System Using Identity Based Encryption Parallel & Dist Systems
SOS: A Distributed Mobile Q&A System Based on Social Networks Parallel & Dist Systems
The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluation Parallel & Dist Systems
The Design and Evaluation of An Information Sharing System for Human Networks Parallel & Dist Systems
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks Parallel & Dist Systems
Secure Outsourced Attribute-based Signatures Parallel & Dist Systems
Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems Secure Computing
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing Secure Computing
PROFILR: Toward Preserving Privacy and Functionality in Geosocial Networks Secure Computing
Top-k Query Result Completeness Verification in Tiered Sensor Networks Secure Computing
Privacy-Enhanced Web Service Composition Service Computing
Web Service Recommendation via Exploiting Location and QoS Information Service Computing