You are on page 1of 3

360digrii

IEEE 2015 PROJECT LIST

SNO CODE PROJECT TITLE DOMAIN


A Distortion-Resistant Routing Framework for Video Traffic in
1 360J1501 Networking
Wireless Multihop Networks
2 360J1502 A Proximity-Aware Interest-Clustered P2P File Sharing System Networking
3 360J1503 Detecting Malicious Facebook Applications Networking
Maximizing P2P File Access Availability in Mobile Ad Hoc
4 360J1504 Networking
Networks though Replication for Efficient File Sharing
5 360J1505 Best Keyword Cover Search Data Mining
Co-Extracting Opinion Targets and Opinion Words from Online
Reviews Based on
6 360J1506 Data Mining
the Word Alignment Model
7 360J1507 Context-Based Diversification for Keyword Queries over XML DATA Data Mining
8 360J1508 Discovery of Ranking Fraud for Mobile Apps Data Mining
9 360J1509 Malware Propagation in Large-Scale Networks Data Mining
On Summarization and Timeline Generation for Evolutionary Tweet
10 360J1510 Streams Data Mining
Privacy Policy Inference of User Uploaded Images on Content Sharing
11 360J1511 Sites Data Mining
12 360J1512 Progressive Duplicate Detection Data Mining
Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier
13 360J1513 Detection Data Mining
Route-Saver: Leveraging Route APIs for Accurate and Efficient Query
Processing
14 360J1514 Data Mining
at Location-Based Services
15 360J1515 Scalable Constrained Spectral Clustering Data Mining
Towards Effective Bug Triage with Software Data Reduction
16 360J1516 Data Mining
Techniques
Tweet Segmentation and Its Application to Named Entity
17 360J1517 Data Mining
Recognition
18 360J1518 Real-Time Detection of Traffic From Twitter Stream Analysis Data Mining
t-Closeness through Micro Aggregation: Strict Privacy with Enhanced
Utility
19 360J1519 Data Mining
Preservation
1|Page

#202, TIRUMALA MANAS,ABOVE DBC BANK,OPP:HIMALAYABOOK WORLD,S.R.NAGAR


360digrii
IEEE 2015 PROJECT LIST
20 360J1520 Stealthy Denial of Service Strategy in Cloud Computing Cloud Computing
21 360J1521 Secure Auditing and Deduplicating Data in Cloud Cloud Computing
Public Integrity Auditing for Shared Dynamic Cloud Data with Group
User
22 360J1522 Cloud Computing
Revocation
Provable Multicopy Dynamic Data Possession in Cloud Computing
23 360J1523 Systems Cloud Computing
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud
24 360J1524 Storage Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data


Owners in
25 360J1525 Cloud Computing
Cloud Computing
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing Cloud
via Cloud
26 360J1526 Computing
Storage
Identity-Based Encryption with Outsourced Revocation in Cloud Cloud
27 360J1527 Computing Computing
Enabling Fine-grained Multi-keyword Search Supporting Classified
Cloud
Sub-
28 360J1528 Computing
dictionaries over Encrypted Cloud Data

Cloud
29 360J1529 Enabling Cloud Storage Auditing With Key-Exposure Resistance Computing

Control Cloud Data Access Privilege and Anonymity with Fully Cloud
Anonymous
30 360J1530 Computing
Attribute-Based Encryption
Cloud Armor: Supporting Reputation-based Trust Management for Cloud
Cloud
31 360J1531 Computing
Services
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Cloud
Verifiable
32 360J1532 Computing
Delegation in Cloud Computing
Cloud
33 360J1533 Audit-Free Cloud Storage via Deniable Attribute-based Encryption Computing

An Authenticated Trust and Reputation Calculation and Management Cloud


System for
34 360J1534 Computing
Cloud and Sensor Networks Integration
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
35 360J1535 the Cloud Computing
2|Page

#202, TIRUMALA MANAS,ABOVE DBC BANK,OPP:HIMALAYABOOK WORLD,S.R.NAGAR


360digrii
IEEE 2015 PROJECT LIST
A Secure and Dynamic Multi-keyword Ranked Search Scheme over
Encrypted Cloud
36 360J1536 Computing
Cloud Data
A Scalable and Reliable Matching Service for Content-Based
Publish/Subscribe Cloud
37 360J1537 Computing
Systems
A Profit Maximization Scheme with Guaranteed Quality of Service in
Cloud Cloud
38 360J1538 Computing
Computing
Cloud
39 360J1539 A Hybrid Cloud Approach for Secure Authorized Deduplication Computing

3|Page

#202, TIRUMALA MANAS,ABOVE DBC BANK,OPP:HIMALAYABOOK WORLD,S.R.NAGAR

You might also like