Upload
others
View
9
Download
0
Embed Size (px)
Citation preview
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
Java Cloud computing titles
S.NO Project title
1 A New Lightweight Symmetric Searchable Encryption Scheme For
String Identification
2 SeSPHR: A Methodology for Secure Sharing of Personal Health
Records in the Cloud
3 SEPDP: Secure and Efficient Privacy Preserving Provable Data
Possession in Cloud Storage
4 Semantic-aware Searching over Encrypted Data for Cloud Computing
5 Secure Fine-Grained Access Control and Data Sharing for Dynamic
Groups in Cloud
6 An Efficient Ranked Multi-Keyword Search for Multiple Data Owners
Over Encrypted Cloud Data
7 Audit-Free Cloud Storage via Deniable Attribute-based Encryption
8 Catch You if You Misbehave: Ranked Keyword Search Results
Verification in Cloud Computing
9 Chaotic Searchable Encryption for Mobile Cloud Storage
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
10 CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for
Cloud Forensics
11 Combining Data Owner-side and Cloud-side Access Control for
sEncrypted Cloud Storage
12 CryptCloud+: Secure and Expressive Data Access Control for Cloud
Storage
13 DROPS: Division and Replication of Data in Cloud for Optimal
Performance and Security
14 Efficient and Expressive Keyword Search Over Encrypted Data in
Cloud
15 Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical
Record Systems with Mobile Devices
16 Efficient Retrieval over Documents Encrypted by Attributes in Cloud
Computing
17 Efficient Traceable Authorization Search System for Secure Cloud
Storage
18 Fine-Grained Two-Factor Protection Mechanism for Data Sharing in
Cloud Storage
19 Identity-Based Private Matching over Outsourced Encrypted Datasets
20 Inference Attack-Resistant E-Healthcare Cloud System with Fine-
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
Grained Access Control
21 Lightweight and Privacy-Preserving Delegatable Proofs of Storage with
Data Dynamics in Cloud Storage
22 Privacy Preservation for Outsourced Medical Data With Flexible
Access Control
23 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical
Data Sharing
24 Provably Secure Fine-Grained Data Access Control over Multiple
Cloud Servers in Mobile Cloud Computing Based Healthcare
Applications
25 Publicly Verifiable Boolean Query Over Outsourced Encrypted Data
26 Secure and Efficient Attribute-Based Access Control for Multiauthority
Cloud Storage
27 Secure Data Group Sharing and Dissemination with Attribute and Time
Conditions in Public Cloud
28 Secure Fine-Grained Access Control and Data Sharing for Dynamic
Groups in Cloud
29 Semantic-aware Searching over Encrypted Data for Cloud Computing
30 SEPDP: Secure and Efficient Privacy Preserving Provable Data
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
Possession in Cloud Storage
31 SeSPHR: A Methodology for Secure Sharing of Personal Health
Records in the Cloud
32 Towards Privacy-preserving Content-based Image Retrieval in Cloud
Computing
33 Unified Fine-grained Access Control for Personal Health Records in
Cloud Computing
34 A Cross Tenant Access Control ( CTAC) Model for Cloud Computing:
Formal Specification and Verification
35 A Modified Hierarchical Attribute-Based Encryption Access
Control Method for Mobile Cloud Computing
36 A New Service Mechanism for Profit Optimizations of a Cloud
Provider and Its Users
37 A robust reputation management mechanism in the federated cloud
38 Achieving secure, universal, and fine-grained query results verification
for secure search scheme over encrypted cloud data
39 Customer-Satisfaction-Aware Optimal Multiserver Configuration
for Profit Maximization in Cloud Computing
41 Identity-Based Data Outsourcing with Comprehensive Auditing in
Clouds
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
42 Identity-Based Encryption with Cloud Revocation Authority and Its
Applications
43 Identity-based Remote Data Integrity Checking with Perfect Data
Privacy Preserving for Cloud Storage
44 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical
Data Sharing
45 Privacy Protection based Access Control Scheme in Cloud-based
Services
46 Privacy-Preserving Multikeyword Similarity Search Over Outsourced
Cloud Data
47 Provably Secure Key-Aggregate Cryptosystems with Broadcast
Aggregate Keys for Online Data Sharing on the Cloud
48 RAAC: Robust and Auditable Access Control with Multiple Attribute
Authorities for Public Cloud Storage
49 Secure Data Sharing in Cloud Computing Using Revocable-Storage
Identity-Based Encryption
50 Securing Cloud Data under Key Exposure
51 TEES: An Efficient Search Scheme over Encrypted Data on Mobile
Cloud
52 A Secure and Dynamic Multi-Keyword Ranked search scheme over
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
encrypted cloud data
53 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud
Computing
54 An Efficient Privacy-Preserving Ranked Keyword Search Method
55 An Efficient File Hierarchy Attribute-Based Encryption Scheme in
Cloud Computing
56 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with
Verifiable Delegation in Cloud Computing
57 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in
the Cloud
58 CloudArmor: Supporting Reputation-Based Trust Management for
Cloud Services
59 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its
Application to Cloud Email
60 DiploCloud: Efficient and Scalable Management of RDF Data in the
Cloud
61 Dual-Server Public-Key Encryption With Keyword Search for Secure
Cloud Storage
62 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
63 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
Updates
64 Fine-Grained Two-Factor Access Control for Web-Based Cloud
Computing Services
65 Identity-Based Proxy-Oriented Data Uploading and Remote Data
Integrity Checking in Public Cloud
66 Secure Data Sharing in Cloud Computing Using Revocable-Storage
Identity-Based Encryption
67 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
68 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User
Environments
69 SecRBAC: Secure data in the Clouds
70 Secure Data Sharing in Cloud Computing Using Revocable-Storage
Identity-Based Encryption
71 TMACS: A Robust and Verifiable Threshold Multi-Authority Access
Control System in Public Cloud Storage
72 Crowdsourcing Predictors of Behavioral Outcomes
73 cloudqual a quality model for cloud services
74 A Hybrid Cloud Approach for Secure Authorized In Cloud
75 Secure Auditing and Deduplicating Data in Cloud
76 AUDIT-FREE CLOUD STORAGE VIA DENIABLE ATTRIBUTE-
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
BASED ENCRYPTION
77 A Novel Model for Competition and Cooperation Among Cloud
Providers
78 A Lightweight Secure Data Sharing Scheme for Mobile Cloud
Computing
79 An Efficient Privacy-Preserving Ranked Keyword Search Method
80 An Efficient File Hierarchy Attribute-Based Encryption Scheme in
Cloud Computing
81 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with
Verifiable Delegation in Cloud Computing
82 A Secure Anti-Collusion Data Sharing Scheme
for Dynamic Groups in the Cloud
83 CloudArmor: Supporting Reputation-Based Trust Management
for Cloud Services
84 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its
Application to Cloud Email
85 DiploCloud: Efficient and Scalable Management of RDF Data in
the Cloud
86 Dual-Server Public-Key Encryption With Keyword Search for
Secure Cloud Storage
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
87 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
88 Enabling Cloud Storage Auditing With Verifiable Outsourcing of
Key Updates
89 Fine-Grained Two-Factor Access Control for Web-Based Cloud
Computing Services
90 Identity-Based Encryption with Cloud Revocation Authority and
Its Applications
91 Identity-Based Proxy-Oriented Data Uploading and Remote Data
Integrity Checking in Public Cloud
92 Secure Data Sharing in Cloud Computing Using Revocable-Storage
Identity-Based Encryption
93 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
94 SecRBAC: Secure data in the Clouds
95 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User
Environments
96 TMACS: A Robust and Verifiable Threshold Multi-Authority Access
Control System in Public Cloud
97 Secure Data Sharing in Cloud Computing Using Revocable-Storage
Identity-Based Encryption
98 Towards optimized fine-grained pricing of Iaas Cloud platform
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
99 Privacy-Preserving Public Auditing for Regenerating-Code-Based
Cloud Storage
100 Secure Auditing and Deduplicating Data in Cloud
101 A Hybrid Cloud Approach for Secure Authorized Deduplication
102 Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing
via Cloud Storage
103 Combining efficiency fidelity,&flexibility in resource information
services
104 Enabling Cloud Storage Auditing with Key-Exposure Resistance
105 A Secure and Dynamic Multi-keyword Ranked Search Scheme over
Encrypted Cloud Data
106 Identity-Based Encryption with Outsourced Revocation in Cloud
Computing
107 Malware propagation in large scale network
108 Performing Initiative Data Prefetching in Distributed File Systems for
Cloud Computing
109 CLOUD ARMOR: SUPPORTING REPUTATION-BASED TRUST
MANAGEMENT FOR CLOUD SERVICES
110 A Cost effective multi cloud data hosting scheme with high availability
111 AUDIT-FREE CLOUD STORAGE VIA DENIABLE ATTRIBUTE-
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
BASED ENCRYPTION
112 STEALTHY DENIAL OF SERVICE STRATEGY IN CLOUD
COMPUTING
113 Space-efficient Verifiable Secret Sharing Using Polynomial
Interpolation
114 PROGRESSIVE DUPLICATE DETECTION
115 Efficient encrypted data search as a mobile cloud service.
116 A secure anti-collision data sharing scheme for dynamic groups in the
cloud.
117 Control Cloud Data Access Privilege and Anonymity With Fully
Anonymous Attribute-Based Encryption
118 CLOUD-BASED MULTIMEDIA CONTENT PROTECTION
SYSTEM
119 Lifelong Personal Health Data and Application Software Via virtual
Machines in the Cloud
120 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with
Verifiable Delegation in Cloud Computing
121 A Scalable Two-Phase Top-Down Specialization Approach for Data
Anonymization Using MapReduce on Cloud
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
122 A Stochastic Model to Investigate Data Center Performance and QoS in
IaaS Cloud Computing Systems
123 Building Confidential and Efficient Query Services in the Cloud with
RASP Data Perturbation
124 Decentralized Access Control with Anonymous Authentication of Data
Stored in Clouds
125 Distributed, Concurrent, and Independent Access to Encrypted Cloud
Databases
126 Expressive, Efficient, and Revocable Data Access Control for Multi-
Authority Cloud Storage
127 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud
Storage
128 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
129 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
130 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted
Cloud Data
131 Scalable Distributed Service Integrity Attestation for Software-as-a-
Service Clouds
132 Towards Differential Query Services in Cost-Efficient Clouds
133 Privacy Preserving Delegated Access Control in Public Clouds
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
134 An Efficient Certificateless Encryption for Secure Data Sharing in
Public Clouds
135 Authorized Public Auditing of Dynamic Big Data Storage on Cloud
with Efficient Verifiable Fine-Grained Updates
136 Achieving Effective Cloud Search Services:Multi-keyword Ranked
Search over Encrypted Cloud Data Supporting Synonym Query
137 Balancing Performance, Accuracy, and Precision for Secure Cloud
Transactions
138 CloudMoV: Cloud-based Mobile Social TV
139 Dynamic Resource Allocation Using Virtual Machines for Cloud
Computing Environment
140 Error-Tolerant Resource Allocation and Payment Minimization for
Cloud System
141 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of
Linear Equations
142 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the
Cloud
143 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
145 Privacy-Preserving Public Auditing for Secure Cloud Storage
146 Scalable and Secure Sharing of Personal Health Records in Cloud
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
Computing Using
147 Enabling Dynamic Data and Indirect Mutual Trust for Cloud
Computing Storage Systems
148 Load Rebalancing for Distributed File Systems in Clouds
149 Optimizing Cloud Resources for Delivering IPTV Services Through
Virtualization
150 Privacy Preserving Delegated Access Control in Public Clouds
151 Attribute-Based Encryption With
152 ABACUS: An Auction-Based Approach to Cloud Service
Differentiation
153 Attribute-Based Access to Scalable Media in Cloud-Assisted Content
Sharing Networks
154 A Secure Erasure Code-Based Cloud Storage System with Secure Data
Forwarding
155 Cloud Computing Security: From Single to Multi-Clouds
156 Cooperative Provable Data Possession for Integrity Verification in
Multi-Cloud Storage
157 HASBE: A Hierarchical Attribute-Based Solution for Flexible and
Scalable Access Control in Cloud Computing
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
158 Outsourced Similarity Search on Metric Data Assets
159 Scalable and Secure Sharing of Personal Health Records in Cloud
Computing using Attribute-based Encryption
160 Toward Secure and Dependable Storage Services in Cloud Computing
161 EduCloud: PaaS versus IaaS Cloud Usage for an Advanced Computer
Science Course
162 A Gossip Protocol for Dynamic Resource Management in Large Cloud
Environments
163 Ensuring Distributed Accountability for Data Sharing in the Cloud
164 Enabling Secure and Efficient Ranked Keyword Search over
Outsourced Cloud Data.
165 Portable Cloud Services Using TOSCA
166 Secure Overlay Cloud Storage with Access Control and Assured
Deletion
167 Cloud Data Protection for the Masses
168 Impact of Storage Acquisition Intervals on the Cost-Efficiency of the
Private vs. Public Storage
169 Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
170 Cashing in on the Cache in the Cloud
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
Java Data mining titles
S.NO Project title
1 Characterizing and Predicting Early Reviewers for Effective Product
Marketing on E-Commerce Websites
2 CoDetect: Financial Fraud Detection With Anomaly Feature Detection
3 Complementary Aspect-based Opinion Mining
4 Emotion Recognition on Twitter: Comparative Study and Training a
Unison Model
5 Frequent Itemsets Mining With Differential Privacy Over Large-Scale
Data
6 Health Monitoring on Social Media over Time
7 l-Injection: Toward Effective Collaborative Filtering Using
Uninteresting Items
8 On Generalizing Collective Spatial Keyword Queries
9 Online Product Quantization
10 Privacy Characterization and Quantification in Data Publishing
11 Road Traffic Speed Prediction: A Probabilistic Model Fusing Multi-
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
Source Data
12 Scalable Content-Aware Collaborative Filtering for Location
Recommendation
13 SDE: A Novel Clustering Framework Based on Sparsity-Density
Entropy
14 Search Result Diversity Evaluation based on Intent Hierarchies
15 When to Make a Topic Popular Again? A Temporal Model for Topic
Re-hotting Prediction in Online Social Networks
16 Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling
Approach
17 Collaborative Filtering-Based Recommendation of Online Social
Voting
18 Detecting Stress Based on Social Interactions in Social Networks
19 Dynamic Facet Ordering for Faceted Product Search Engines
20 Efficient Keyword-aware Representative Travel Route
Recommendation
21 SociRank: Identifying and Ranking Prevalent News Topics Using
Social Media Factors
22 RAPARE: A Generic Strategy for Cold-Start Rating Prediction
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
Problem
23 User Vitality Ranking and Prediction in Social Networking Services:
a Dynamic Network Perspective
24 An Iterative Classification Scheme for Sanitizing Large scale Datasets
25 Computing Semantic Similarity of Concepts in Knowledge Graphs
26 Influence Maximization in Trajectory Databases
27 Personal web re visitation by context &content keyword with relevance
feedback
28 User Vitality Ranking and Prediction in Social Networking Services
29 A Novel Recommendation Model Regularized with User Trust and
Item Ratings
30 Connecting Social Media to E-Commerce: Cold-Start Product
Recommendation Using Micro blogging Information
31 Crowdsourcing for Top-K Query Processing over Uncertain Data
32 Efficient Cache-Supported Path Planning on Roads
33 Nearest Keyword Set Search in Multi-Dimensional Datasets
34 A Novel Recommendation Model Regularized with User Trust and
Item Ratings
35 Rating Prediction based on Social Sentiment from Textual Reviews
36 Location Aware Keyword Query Suggestion Based on Document
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
Proximity
37 A System to Filter Unwanted Messages from OSN User Walls
38 Security Evaluation of Pattern Classifiers under Attack
39 Towards Differential Query Services in Cost-Efficient Clouds
41 Structured Learning from Heterogeneous Behavior for Social Identity
Linkage
42 A Novel Recommendation Model Regularized with User Trust and
Item Ratings
43 Connecting Social Media to E-Commerce: Cold-Start Product
Recommendation Using Micro blogging Information
44 Crowdsourcing for Top-K Query Processing over Uncertain Data
45 Efficient Cache-Supported Path
Planning on Roads
46 Nearest Keyword Set Search in Multi-Dimensional Datasets
47 Rating Prediction based on Social Sentiment from Textual
Reviews
48 Location Aware Keyword Query Suggestion Based on Document
Proximity
49 Privacy Policy Inference of User-Uploaded Images on Content Sharing
Sites
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
50 Subgraph Matching with Set Similarity in a Large Graph Database
51 Sparsity Learning Formulations for Mining Time-Varying Data
52 Best keyword searh
53 CloudKeyBank: Privacy and Owner Authorization Enforced Key
Management Framework
54 Real-Time Detection of Traffic From Twitter Stream Analysis
55 Making Digital Artifacts on the Web Verifiable and Reliable
56 Rule-Based Method for Entity Resolution
57 Towards Effective Bug Triage with Software Data Reduction
Techniques
58 MALWARE PROPAGATION IN LARGE-SCALE NETWORKS
59 Agent-based Interactions and Economic Encounters in an Intelligent
Inter Cloud
60 Context-based diversification for keyword queries over Xml data
61 Geo-social k-cover group quries for collaborative spatial computing
62 REVERSE NEAREST NEIGHBORS IN UNSUPERVISED
DISTANCE BASED OUTLIER DETECTION
63 ON SUMMARIZATION AND TIMELINE GENERATION FOR
EVOLUTIONARY TWEET STREAMS
64 Structured Learning from Heterogeneous Behavior
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
65 The Impact of View Histories on Edit Recommendations (1)
66 Secure Spatial Top-k Query Processing via Untrusted Location-Based
Service
67 t-Closeness through Microaggregation: Strict Privacy with Enhanced
Utility Preservation
68 FOCS Fast Overlapped Community Search
69 A Cocktail Approach for Travel Package Recommendation
70 Accuracy-Constrained Privacy-Preserving Access Control
71 Data Mining with Big Data
72 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing
Platform
73 Dealing With Concept Drifts in Process Mining
74 Discovering Emerging Topics in Social Streams via
75 Efficient Prediction of Difficult Keyword Queries over Databases
76 Facilitating Document Annotation Using Content and Querying Value
77 Fast Nearest Neighbor Search with Keywords
78 Keyword Query Routing
79 Privacy-Preserving and Content-Protecting Location Based Queries
80 Security Evaluation of Pattern Classifiers under Attack
81 Supporting Privacy Protection in Personalized Web Search
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
82 Towards Online Shortest Path Computation
83 XSPath: Navigation on XML Schemas Made Easy
84 m-Privacy for Collaborative Data Publishing
85 Dynamic Query Forms for Database Queries
86 K-Anonymity for Crowdsourcing Database
87 A Supermodularity-Based Differential Privacy Preserving Algorithm
for Data Anonymization
88 A Supermodularity-Based Differential Privacy Preserving Algorithm
for Data Anonymization
89 LARS*: An Efficient and Scalable Location-Aware Recommender
System
90 Approximate Shortest Distance Computing: A Query-Dependent Local
Landmark Scheme
91 A Fast Clustering-Based Feature Subset Selection Algorithm for High-
Dimensional Data
92 A New Algorithm for Inferring User Search Goals with Feedback
Sessions
93 Annotating Search Results from Web Databases DATA MINING
94 Anomaly Detection via Online Over-Sampling Principal Component
Analysis
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
95 Distributed Processing of Probabilistic Top-k Queries in Wireless
Sensor Networks
96 m-Privacy for Collaborative Data Publishing
97 Protecting Sensitive Labels in Social Network Data
Anonymization
98 Tweet Analysis for Real-Time Event Detection and Earthquake
Reporting System Development
99 Document Clustering for Forensic Analysis: An Approach for
Improving Computer Inspection
100 A Method for Mining Infrequent Causal Associations and Its
Application in Finding Adverse Drug Reaction Signal Pairs
101 Clustering Sentence-Level Text Using a Novel Fuzzy Relational
Clustering Algorithm
102 Crowdsourcing Predictors of Behavioral Outcomes
103 Facilitating Document Annotation using Content and Querying Value
104 A Generalized Flow-Based Method for Analysis of Implicit
Relationships on Wikipedia
105 A System to Filter Unwanted Messages from OSN User Walls
106 Anonymization of Centralized and Distributed Social Networks by
Sequential Clustering
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
107 Intrusion Detection Technique by using K-means, Fuzzy Neural
Network and SVM classifiers.
108 Spatial Approximate String Search
109 Preventing Private Information Inference Attacks on Social Networks
110 Multiparty Access Control for Online Social Networks Model and
Mechanisms
111 Incentive Compatible Privacy-Preserving Data Analysis
112 Facilitating Effective User Navigation through Website Structure
Improvement
113 Classification and Adaptive Novel Class Detection of Feature-Evolving
Data Streams
114 Comparable Entity Mining from
115 Multiparty Access Control for Online Social Networks: Model and
Mechanisms
116 DDD: A New Ensemble Approach for Dealing with Concept Drift
Java Networking titles
S.NO Project title
1 Energy Efficient Link-Delay Aware Routing in Wireless Sensor
Networks
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
2 GeTrust: A guarantee-based trust model in Chord-based P2P networks
3 PROVEST: Provenance-based Trust Model for Delay Tolerant
Networks
4 Traffic and Energy Aware Routing for Heterogeneous Wireless Sensor
Networks
5 An Overlay Architecture for Throughput Optimal Multipath Routing
6 Network Capability in Localizing Node Failures via End-to-End Path
Measurements
7 Privacy and Integrity Preserving Top-k Query Processing for Two-
Tiered Sensor Network
8 STAMP Enabling Privacy- Preserving Location Proofs for Mobile
Users
9 iPath Path Inference in Wireless Sensor Networks
10 Building an intrusion detection system using a filter-based feature
selection algorithm
11 Detecting malicious facebook applications
12 Social Friend Recommendation Based on Multiple Network
Correlation
13 Resolving Multi-party Privacy Conflicts in Social Media
14 Dynamic Routing for Data Integrity and Delay Differentiated Services
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
in Wireless Sensor Networks
15 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks
in Wireless Ad Hoc Networks
16 Friendbook: A Semantic-based Friend Recommendation System for
Social Networks
17 STAMP Enabling Privacy- Preserving Location Proofs for Mobile
Users
18 Building an intrusion detection system using a filter-based feature
selection algorithm
19 iPath Path Inference in Wireless Sensor Networks
20 Detecting malicious facebook applications
21 Social Friend Recommendation Based on Multiple Network Correlation
22 Resolving Multi-party Privacy Conflicts in Social Media
23 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks
though Replication for Efficient File Sharing
24 A Proximity-Aware Interest-Clustered P2P File Sharing System.
25 Automatic Test Packet Generation
26 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
27 Boundary Cutting for Packet Classification
28 Secure Data Retrieval for Decentralized Disruption-Tolerant Military
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
Networks
29 A General Self-Organized Tree-Based Energy-Balance Routing
Protocol for Wireless Sensor Network
30 Congestion Aware Routing in Nonlinear Elastic Optical Networks
31 Adaptive Opportunistic Routing for Wireless Ad Hoc Networks
32 Design, Implementation, and Performance of a Load Balancer for SIP
Server Clusters
33 Independent Directed Acyclic Graphs for Resilient Multipath Routing
34 MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
35 Privacy- and Integrity-Preserving Range Queries in Sensor Networks
36 RIHT: A Novel Hybrid IP Traceback Scheme
37 Router Support for Fine-Grained Latency Measurements
38 Packet Loss Control Using Tokens at the Network Edge
39 CORMAN: A Novel Cooperative Opportunistic Routing
Java Parallel & Distributed Titles
S.NO Project title
1 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in
the Cloud
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
2 Exploiting Workload Characteristics and Service Diversity to Improve
the Availability of Cloud Storage Systems
3 Cost-Effective Authentic and Anonymous Data Sharing with Forward
Security
4 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile
Social Networks
5 Exploiting Service Similarity for Privacy in Location-Based Search
Queries
6 LocaWard: A Security and Privacy Aware Location-Based Rewarding
System
7 On False Data-Injection Attacks against Power System State
Estimation: Modeling and Countermeasures
8 RRE: A Game-Theoretic Intrusion Response and Recovery Engine
9 Securing Broker-Less Publish/Subscribe Systems Using Identity-Based
Encryption
10 SOS: A Distributed Mobile Q&A System Based on Social Networks
11 The Client Assignment Problem for Continuous Distributed Interactive
Applications: Analysis, Algorithms, and Evaluation
12 The Design and Evaluation of An Information Sharing System for
Human Networks
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
13 Traffic Pattern-Based Content Leakage Detection for Trusted Content
Delivery Networks
14 Secure Outsourced Attribute-based Signatures
15 Multi-Path Routing and Forwarding in Non-Cooperative Wireless
Networks
16 SocialTube: P2P-Assisted Video Sharing in Online
Social Networks
17 A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc
Networks
18 Asymmetric Social Proximity Based Private Matching Protocols for
Online Social Networks
19 A System for Denial-of-Service Attack Detection Based on
Multivariate Correlation Analysis
20 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks
Creation
21 Security Analysis of a Privacy-Preserving Decentralized Key-Policy
Attribute-Based Encryption Scheme
22 IP-Geolocation Mapping for Moderately Connected Internet Regions
23 Optimal Client-Server Assignment for Internet Distributed Systems
24 A Framework for Mining Signatures from Event Sequences and Its
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
Applications in Healthcare Data
25 SocialTube P2P-assisted Video Sharing in Online Social Networks
26 A System for Denial-of-Service Attack Detection Based on
Multivariate Correlation Analysis
27 Detection and Localization of Multiple Spoofing Attackers in Wireless
Networks
28 Fully Anonymous Profile Matching in Mobile Social Networks
29 Cluster-Based Certificate Revocation with Vindication Capability for
Mobile Ad Hoc Networks
30 BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured
P2P Networks
31 Payments for Outsourced Computations
32 Cut Detection in Wireless Sensor Networks
33 A Framework for Routing Performance Analysis in Delay Tolerant
Networks with Application to Non-cooperative Networks
34 Footprint: Detecting Sybil Attacks in Urban Vehicular Networks
35 The Three-Tier Security Scheme in Wireless Sensor Networks with
Mobile Sinks
36 Capacity of Data Collection in Arbitrary Wireless Sensor Networks
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
Secure Computing titles
S.NO Project title
1 A Hybrid Approach for Detecting Automated Spammers in Twitter
2 A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-
Matching for Mobile Healthcare Social Network
3 Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-
Closeness
4 Collective Data-Sanitization for Preventing Sensitive Information
Inference Attacks in Social Networks
5 Exploiting Social Network to Enhance Human-to-Human Infection
Analysis Without Privacy Leakage
6 My Privacy My Decision: Control of Photo Sharing on Online Social
Networks
7 Efficient and Privacy-preserving Min and k-th Min Computations in
Mobile Sensing Systems
8 Privacy-Preserving Selective Aggregation of Online User Behavior
Data
9 ProGuard: Detecting Malicious Accounts in Social-Network-Based
Online Promotions
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
10 Towards Detecting Compromised Accounts on Social Networks
11 A Multilevel Access Control Scheme for Data Security in Transparent
Computing
12 Data Lineage in Malicious Environments
13 FRoDO Fraud Resilient Device
14 SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-
Web SmartCrawler:
A Two-stage Crawler for Efficiently Harvesting Deep-Web
15 Captcha As Graphical Password
16 Data Lineage in Malicious Environments
17 FRoDO Fraud Resilient Device
18 A LIGHTWEIGHT SECURE SCHEME FOR DETECTING
PROVENANCE FORGERY AND PACKET DROP ATTACKS IN
WIRELESS SENSOR NETWORK
19 LOCATION-AWARE AND PERSONALIZED COLLABORATIVE
FILTERING FOR WEB SERVICE RECOMMENDATION
20 CONTRIBUTORY BROADCAST ENCRYPTION WITH EFFICIENT
ENCRYPTION AND SHORT CIPHERTEXTS
21 SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-
Web
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
22 Captcha as Graphical Passwords—A New Security Primitive Based on
Hard AI Problems
23 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
24 PROFILR: Toward Preserving Privacy and Functionality in Geosocial
Networks
25 Top-k Query Result Completeness Verification in Tiered Sensor
Networks
26 Abductive Analysis of Administrative Policies in Rule-Based Access
Control
27 Low-Priced and Energy-Efficient Detection of Replicas for Wireless
Sensor Networks
28 Evaluation of Web Security Mechanisms Using Vulnerability & Attack
Injection
29 Malware Propagation in Large-Scale Networks
30 Hiding in the Mobile Crowd: Location Privacy through Collaboration
31 EAACK—A Secure Intrusion-Detection System for MANETs
32 Identity-Based Secure Distributed Data Storage Schemes
33 Modeling the Pairwise Key Predistribution Scheme in the Presence of
Unreliable Links
34 NICE: Network Intrusion Detection and Countermeasure Selection in
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
Virtual Network Systems
35 Privacy Preserving Data Sharing With Anonymous ID Assignment
36 Securing Class Initialization in Java-like Languages
37 Security Analysis of a Single Sign-On Mechanism for Distributed
Computer Networks
38 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
39 WARNINGBIRD: A Near Real-time Detection System for Suspicious
URLs in Twitter Stream
41 Two tales of privacy in online social networks
42 Secure Encounter-based Mobile Social Networks: Requirements,
Designs, and Tradeoffs
43 Twitsper: Tweeting Privately
44 Combining Cryptographic Primitives to Prevent Jamming Attacks in
Wireless Networks
45 Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
46 A Stochastic Model of Multi-virus Dynamics
47 Design and Implementation of TARF: A Trust-Aware Routing
Framework for WSNs
48 Detecting and Resolving Firewall Policy Anomalies
49 Detecting Spam Zombies by Monitoring Outgoing Messages
CEGON TECHNOLOGIES
CEGON TECHNOLOGIES ( We Rise By Lifting Others)
*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247
www.cegontechnologies.com
50 On the Security of a Ticket-Based Anonymity System with Traceability
Property in Wireless Mesh Networks
51 Online Modeling of Proactive Moderation System for Auction Fraud
Detection
52 Packet-Hiding Methods for Preventing Selective Jamming Attacks
53 Risk-Aware Mitigation for MANET Routing Attacks
54 Monitoring and Detecting Abnormal Behavior in Mobile Cloud
Infrastructure
55 On the Security and Efficiency of Content Distribution via Network
Coding