10
2014 and 2015 Completed IEEE Projects List For Technical Details ::Contact @ K.Manjunath – 9535866270 TMKS Infotech,Bangalore,Karnataka Sl. No Project Title Yea r Cloud Computing 1 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud 2014 2 NCCloud: A Network Coding Based Storage System in a Cloud- of-Clouds 2014 3 Enabling Data Integrity Protection in Regenerating-Coding- Based Cloud Storage: Theory and Implementation 2014 4 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 2014 5 Privacy Preserving Multi keyword Ranked Search over Encrypted Cloud Data 2014 6 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds 2014 7 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation 2014 8 Dynamic Backlight Scaling Optimization: A Cloud-Based Energy-Saving Service for Mobile Streaming Applications 2014 9 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications 2014 10 Low-Emissions Routing for Cloud Computing in IP-over-WDM Networks with Data Centers 2014 11 On the Cost–QoE Tradeoff for Cloud-Based Video Streaming Under Amazon EC2’s Pricing Models 2014 12 Optimal Power Allocation and Load Distribution for Multiple Heterogeneous Multi core Server Processors across Clouds and Data Centers 2014 13 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 2014

Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech

Embed Size (px)

DESCRIPTION

#1510,Sri Gowri Shankara Complex, 2nd Floor,MKK Road, Near Harishchandra Ghat, Mariyappanapalya, Rajajinagar 2nd Stage, Bangalore - 560021. Land Mark Near Harishchandra Ghat, Navrang Theatre to Malleshwaram - Mid Metro Pillar No - 203,204. Contact :: K.Manjunath - 09535866270

Citation preview

Page 1: Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech

2014 and 2015 Completed IEEE Projects ListFor Technical Details ::Contact @ K.Manjunath – 9535866270

TMKS Infotech,Bangalore,Karnataka

Sl.No

Project Title Year

Cloud Computing1 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud 20142 NCCloud: A Network Coding Based Storage System in a Cloud-of-Clouds 20143 Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory

and Implementation2014

4 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 2014

5 Privacy Preserving Multi keyword Ranked Search over Encrypted Cloud Data 20146 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds 20147 Building Confidential and Efficient Query Services in the Cloud with RASP Data

Perturbation2014

8 Dynamic Backlight Scaling Optimization: A Cloud-Based Energy-Saving Service for Mobile Streaming Applications

2014

9 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications

2014

10 Low-Emissions Routing for Cloud Computing in IP-over-WDM Networks with Data Centers

2014

11 On the Cost–QoE Tradeoff for Cloud-Based Video Streaming Under Amazon EC2’s Pricing Models

2014

12 Optimal Power Allocation and Load Distribution for Multiple Heterogeneous Multi core Server Processors across Clouds and Data Centers

2014

13 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 201414 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud

Computing Systems2014

15 Towards Differential Query Services in Cost Efficient Clouds 201416 An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud

Computing2014

17 A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization

2014

18 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 201419 On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in

Multi cloud Storage2014

20 Identity Based Distributed Provable Data Possession in Multi-Cloud Storage 201421 QoS Aware Data Replication for Data-Intensive Applications in Cloud Computing

Systems2014

22 Balancing Performance Accuracy and Precision for Secure Cloud Transactions 2014

Page 2: Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech

23 Cloud Assisted Mobile Access of Health Data With Privacy and Audit ability 201424 Compatibility-Aware Cloud Service Composition under Fuzzy Preferences of Users 201425 Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds. 201426 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud

Storage2014

27 Secure kNN Query Processing in Un trusted Cloud Environments 201428 A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization

Using Map Reduce on Cloud2014

29 Compatibility aware Cloud Service Composition Under Fuzzy Preferences of Users 201430 Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud. 201431 Consistency as a Service Auditing :Cloud Consistency 201432 A Secure Client Side De duplication Scheme in Cloud Storage Environments 201433 Collaborative Scheduling in Dynamic Environments Using Error Inference 201434 201435 201436 201437 201438 201439 201440 201441 --------------------------------PLACE TO ADD MORE TITLES ------------------------------- 201442 201443 201444 201445 2014

Network Security

1 Behavioral Malware Detection in Delay Tolerant Networks 20142 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation

Analysis2014

3 An Optimal Distributed Malware Defense System for Mobile Networks with Heterogeneous Devices

2014

4 Building a Scalable System for Stealthy P2P-Botnet Detection 20145 An Error Minimizing Framework for Localizing Jammers in Wireless Networks 20146 A Scalable and Modular Architecture for High-Performance Packet Classification 20147 Bandwidth Distributed Denial of Service: Attacks and Defenses 20148 E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels. 20149 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 201410 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems 201411 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing 201412 PROFILR: Toward Preserving Privacy and Functionality in Geo Social Networks Nodes 201413 Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid 201414 Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption 2014

Page 3: Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech

15 201416 201417 201418 201419 201420 201421 201422 201423 201424 201425 201426 201427 201428 201429 201430 2014

Ad hoc Networks & VANET & MANET

1 Optimal Multicast Capacity and Delay Tradeoffs in MANETs 20142 STARS: A Statistical Traffic Pattern Discovery System for MANETs 20143 Trajectory Improves Data Delivery in Urban Vehicular Networks 20144 Energy Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc

Networks2014

5 Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs.

2014

6 Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks 20147 Multicast Capacity in MANET with Infrastructure Support 20149 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs in

Adversarial Environment2014

10 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks 201411 Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A

Cooperative Bait Detection Approach2014

12 The Impact of Rate Adaptation on Capacity-Delay Tradeoffs in Mobile Ad Hoc Networks 201413 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 201414 201415 201416 201417 201418 201419 201420 2014

Page 4: Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech

21 2014

Mobile Computing

1 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing 20142 Large Scale Synthetic Social Mobile Networks with SWIM 20143 Stochastic Bandwidth Estimation in Networks With Random Service 20144 Efficient Authentication for Mobile and Pervasive Computing 20145 Friendbook: A Semantic-based Friend Recommendation System for Social Networks 20146 A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks 20147 Bounds on the Benefit of Network Coding for Wireless Multicast and Unicast 20148 Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period

Mobile Users2014

9 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks 201410111213141516

Wireless Sensor Networks

1 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks 20142 An Error Minimizing Framework for Localizing Jammers in Wireless Networks 20143 A Survey of Intrusion Detection Systems in Wireless Sensor Networks 20144 Impact of UPFC on Power Swing Characteristic and Distance Relay Behavior 20145 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks 20146 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks 20147 Optimization Decomposition for Scheduling and System Configuration in Wireless

Networks2014

8 Secure Continuous Aggregation in Wireless Sensor Networks 20149 Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks. 201410 Top-k Query Result Completeness Verification in Tiered Sensor Networks 201411 Transmission-Efficient Clustering Method for Wireless Sensor Networks Using

Compressive Sensing2014

12 DA-Sync: A Doppler-Assisted Time-Synchronization Scheme for Mobile Underwater Sensor Networks

2014

13 An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless Sensor Networks

2014

14 Joint Routing and Medium Access Control in Fixed Random Access Wireless Multihop Networks

2014

15 Data Density Correlation Degree Clustering Method for Data Aggregation in WSN 2014

Page 5: Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech

16 Distributed Detection in Mobile Access Wireless Sensor Networks Under Byzantine Attacks

2014

17 Link Quality Aware Code Dissemination in Wireless Sensor Networks 201418 Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor

Networks2014

19 Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks 201420 201421 2014

Android Projects

1 Improving Fairness, Efficiency, and Stability in HTTP-Based Adaptive Video Streaming With Festive

2014

2 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications

2014

3 Mobility Prediction-based Smartphone Energy Optimization for Everyday Location Monitoring

2014

4 A Scalable and Mobility-Resilient Data Search System for Large-Scale Mobile Wireless Networks

2014

5 Smart DC Mobility Prediction-based Adaptive Duty Cycling for Everyday Location Monitoring

2014

6 20147 20148 20149 201410 201411 2014

Data Mining

1 Fast Nearest Neighbor Search with Keywords 20142 An Empirical Performance Evaluation of Relational Keyword Search Systems 20143 Facilitating Document Annotation using Content and Querying Value 20144 Supporting Privacy Protection in Personalized Web Search 20145 Secure Mining of Association Rules in Horizontally Distributed Databases 20146 Efficient Ranking on Entity Graphs with Personalized Relationships 2014

7 SOS: A Distributed Mobile Q&A System Based on Social Networks 2014

8 Privacy-Preserving and Content-Protecting Location Based Queries 2014

9 Active Learning of Constraints for Semi-Supervised Clustering. 2014

10 An Empirical Performance Evaluation of Relational Keyword Search Techniques. 2014

11 Approximate Shortest Distance Computing: A Query-Dependent Local Landmark 2014

Page 6: Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech

Scheme.12 Privacy-Preserving Authenticated Key-Exchange Over Internet. 201413 Accuracy Constrained Privacy-Preserving Access Control Mechanism for Relational Data 201414 A generic framework for top k pairs and top k objects queries over sliding windows 201415 Efficient Prediction of Difficult Keyword Queries over Databases 201416 Discovering Emerging Topics in Social Streams via Link-Anomaly 2014

17 Best Peer++: A Peer-to-Peer Based Large-Scale Data Processing Platform 201418 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data 201419 Trusted DB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality 201420 Efficient Instant-Fuzzy Search with Proximity Ranking 201421 Efficient Prediction of Difficult Keyword Queries over Databases 201422 Security Evaluation of Pattern Classifiers under Attack 201423 Temporal Workload-Aware Replicated Partitioning for Social Networks 201424 A Cocktail Approach for Travel Package Recommendation 2014

Networking and Wireless Communication1 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in

Delay-Tolerant Networks2014

2 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 20143 Data Retrieval Scheduling for Multi-Item Requests in Multi-Channel Wireless Broadcast

Environments2014

4 Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing

2014

5 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes 20146 Optimization Decomposition for Scheduling and System Configuration in Wireless

Networks2014

7 Adaptive Transmission for Delay-Constrained Wireless Video. 20148 Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks 20149 Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay

Networks2014

Image Processing and Multimedia

1 Web Image Re-Ranking Using Query-Specific Semantic Signatures 20142 Click Prediction for Web Image Reranking Using Multimodal Sparse Coding 2014

1 3D Face Recognition Under Expressions, Occlusions and Pose Variations 20132 Iris Recognition Using Possibilistic Fuzzy Matching on Local Features 20133 Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval 2013

Page 7: Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech

4 Scalable Face Image Retrieval using Attribute-Enhanced Sparse Code words. 20135 A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks 20136 An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs 20137 Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over

Wireless Networks2013

8 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks

2013

J2ME Mobile Based Projects

1 Adaptation of a virtual campus for mobile learning devices 20142 Bluetooth Mobile Based College Campus 20143 ECops via Handheld Mobile Devices 20144 Privacy-Conscious Location-Based Queries in Mobile Environments 20145 Ranking Model Adaptation for Domain-Specific Search 20146 SPOC A Secure and Privacy-preserving Opportunistic Computing Framework For

Mobile-Healthcare Emergency2014

7 The Word in a nut shell : CONCISE RANGE QUERIES 2014

Parallel and Distributed System

1 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 2014

2 Exploiting Service Similarity for Privacy in Location-Based Search Queries 2014

3 LocaWard: A Security and Privacy Aware Location-Based Rewarding System 2014

4 On False Data-Injection Attacks against Power System State Estimation: Modeling and

Countermeasures

2014

5 Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks 2014

6 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks 2014

7 SOS: A Distributed Mobile Q&A System Based on Social Networks 2014

8 Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area

Networks

9