You are on page 1of 5

1 JAVA LIST

S.NO PROJECT TITLE VERTICAL

1. A Key-Policy Attribute-Based Temporary Keyword Search scheme


CLOUD COMPUTING
for Secure Cloud Storage
2. A New Lightweight Symmetric Searchable Encryption Scheme for
CLOUD COMPUTING
String Identification
3. A Novel Feature Matching Ranked Search Mechanism Over
CLOUD COMPUTING
Encrypted Cloud Data
4. Achieving Secure and Efficient Dynamic Searchable Symmetric
CLOUD COMPUTING
Encryption over Medical Cloud Data
5. Attribute-Based Cloud Data Integrity Auditing for Secure
CLOUD COMPUTING
Outsourced Storage
6. Efficient Decentralized Attribute Based Access Control for Mobile
CLOUD COMPUTING
Clouds
7. Enabling Efficient User Revocation in Identity-based Cloud Storage
CLOUD COMPUTING
Auditing for Shared Big Data
8. Active Online Learning for Social Media Analysis to Support Crisis
DATA MINING
Management
9. Detecting Group Shilling Attacks in Online Recommender Systems
DATA MINING
Based on Bisecting K-Means Clustering
10.
Dynamic Connection-based Social Group Recommendation DATA MINING

11. Detection of Social Network Spam Based on Improved Extreme SECURE


Learning Machine COMPUTING
12. A Modified Hierarchical Attribute-Based Encryption Access Control
CLOUD COMPUTING
Method for Mobile Cloud Computing
13. A Comprehensive Study on Social Network Mental Disorders MACHINE
Detection via Online Social Media Mining LEARNING
14. An Approach to Balance Maintenance Costs and
CLOUD COMPUTING
Electricity Consumption in Cloud Data Centers
15. An Efficient Method for High Quality and Cohesive Topical Phrase MACHINE
Mining LEARNING
16. Analyzing and Detecting Money-Laundering Accounts in Online MACHINE
Social Networks LEARNING
17. A New Service Mechanism for Profit Optimizations of a Cloud
CLOUD COMPUTING
Provider and Its Users
18.
A Hybrid Approach for Detecting Automated Spammers in Twitter DATA MINING

19.
Detection of suicide-related posts in Twitter data streams DATA MINING

20. MACHINE
Credit Card Fraud Detection Using AdaBoost and Majority Voting
LEARNING
21. A Lightweight Secure Data Sharing Scheme for Mobile Cloud
CLOUD COMPUTING
Computing
22. A proxy-based collaboration system to minimize content downloads MOBILE
time and energy consumption COMPUTING
23. Collaborative Filtering-Based Recommendation
DATA MINING
of Online Social Voting
24. A Novel Efficient Remote Data Possession
CLOUD COMPUTING
Checking Protocol in Cloud Storage
25. A robust reputation management mechanism in
CLOUD COMPUTING
the federated cloud
26. A Cross Tenant Access Control (CTAC) Model for
Cloud Computing: Formal Specification and CLOUD COMPUTING
Verification
27. RAAC: Robust and Auditable Access Control with Multiple
CLOUD COMPUTING
Attribute Authorities for Public Cloud Storage
28. Pro Guard Detecting Malicious Accounts in Social-Network-Based SECURE
Online Promotions COMPUTING
29. Network Capability in Localizing Node Failures via End-to-End Path
NET WORKING
Measurements
30.
Securing Cloud Data under Key Exposure CLOUD COMPUTING

31. Transactional Behavior Verification in Business Process as a SECURE


Service Configuration COMPUTING
32.
Detecting Stress Based on Social Interactions in Social Networks DATA MINING

33.
Dynamic Facet Ordering for Faceted Product Search Engines DATA MINING

34.
A Locality Sensitive Low-Rank Model for Image Tag Completion IMAGE PROCESSING

35. A Modified Hierarchical Attribute-Based Encryption Access Control


CLOUD COMPUTING
Method for Mobile Cloud Computing
36. A Novel Recommendation Model Regularized with User Trust and
DATA MINING
Item Ratings
37. Personal Web Revalidation by Context and Content Keywords
DATA MINING
with Relevance Feedback
38.
Query Driven Approach to Entity Resolution DATA MINING

39. My Privacy My Decision: Control of Photo Sharing on Online


IMAGE PROCESSING
Social Networks
40.
A Hop-by-Hop Routing Mechanism for Green Internet NET WORKING

41. A Scalable Approach for Content-Based Image Retrieval in Peer-to-


IMAGE PROCESSING
Peer Networks
42. A Stable Approach for Routing Queries in Unstructured P2P
NETWORKING
Networks
43. An Efficient File Hierarchy Attribute-Based Encryption Scheme in
CLOUD COMPUTING
Cloud Computing
44.
An Efficient Privacy-Preserving Ranked Keyword Search Method CLOUD COMPUTING

45. FUZZY SYSTEMS


Answering Approximate Queries Over XML Data

46.
Automatically Mining Facets for Queries from Their Search Results DATA MINING

47.
Booster in High Dimensional Data Classification DATA MINING

48. Building an intrusion detection system using a filter-based feature


DATA MINING
selection algorithm
49. CDA Generation and Integration for Health Information Exchange
CLOUD COMPUTING
Based on Cloud Computing System
50. Conditional Identity-Based Broadcast Proxy Re-Encryption and Its
CLOUD COMPUTING
Application to Cloud Email
51. Conjunctive Keyword Search With Designated Tester and Timing
CLOUD COMPUTING
Enabled Proxy Re-Encryption Function for E-Health Clouds
52. Connecting Social Media to E-Commerce: Cold-Start Product
DATA MINING
Recommendation Using Microblogging Information
53. Cross-Domain Sentiment Classification Using Sentiment Sensitive
DATA MINING
Embeddings
54. Cyber bullying Detection based on Semantic-Enhanced
DATA MINING
Marginalized Denoising Auto-Encoder
55. SECURE
Data Lineage in Malicious Environments
COMPUTING
56. Detecting Node Failures in Mobile Wireless Networks: A MOBILE
Probabilistic Approach COMPUTING
57.
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User CLOUD COMPUTING
Environments
58. DiploCloud: Efficient and Scalable Management of RDF Data in the
CLOUD COMPUTING
Cloud
59. Domain-Sensitive Recommendation with User-Item Subgroup
DATA MINING
Analysis
60. Dual-Server Public-Key Encryption With Keyword Search for Secure
CLOUD COMPUTING
Cloud Storage
61.
Dynamic and Public Auditing with Fair Arbitration for Cloud Data CLOUD COMPUTING

62.
Efficient Algorithms for Mining Top-K High Utility Itemsets DATA MINING

You might also like