FINAL YEAR PROJECTS FOR CSE 2013-2014

3
1POINTER TECHNOLOGY No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017. Ph 044 342323407; Mobile 9043350456, 9500139248 Email: [email protected] website: www.1pointer.com DOT NET IEEE TITLES 2013-2014 1) Privacy-Preserving Public Auditing for Secure Cloud Storage 2) Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption 3) Privacy Preserving Data Sharing With Anonymous ID Assignment 4) Identity-Based Secure Distributed Data Storage Schemes 5) A Cloud-based Approach for Interoperable EHRs 6) Secure Logging As a ServiceDelegating Log Management to the Cloud 7) Network Performance Aware MPI Collective Communication Operations in the Cloud 8) Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems 9) Modeling of Distributed File Systems for Practical Performance Analysis 10) Privacy Preserving Delegated Access Control in Public Clouds 11) Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 12) An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing 13) QoS Ranking Prediction for Cloud Services 14) Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 15) Protecting Sensitive Labels in Social Network Data Anonymization 16) Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates 17) Efficient Evaluation of SUM Queries over Probabilistic Data 18) Supporting Search-As-You-Type Using SQL in Databases 19) Mining User Queries with Markov Chains: Application to Online Image Retrieval 20) A System to Filter Unwanted Messages from OSN User Walls 21) Reinforced Similarity Integration in Image-Rich Information Networks 22) Co-Occurrence-Based Diffusion for Expert Search on the Web 23) A New Algorithm for Inferring User Search Goals with Feedback Sessions 24) A Machine Learning Approach to Software Requirements Prioritization 25) Semi-Supervised Heterogeneous Fusion for Multimedia Data Co-clustering 26) Structural Diversity for Resisting Community Identification in Published Social Networks 27) Reversible Data Hiding With Optimal Value Transfer 28) A Formal Usability Constraints Model for Watermarking of Outsourced Datasets 29) Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development [With Hardware] 30) A Survival Modeling Approach to Biomedical Search Result Diversification Using Wikipedia 31) PMSE: A Personalized Mobile Search Engine [With Hardware]

Transcript of FINAL YEAR PROJECTS FOR CSE 2013-2014

Page 1: FINAL YEAR PROJECTS  FOR CSE 2013-2014

1POINTER TECHNOLOGY

No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017. Ph – 044 342323407; Mobile –9043350456, 9500139248

Email: [email protected] website: www.1pointer.com

DOT NET IEEE TITLES 2013-2014

1) Privacy-Preserving Public Auditing for Secure Cloud Storage

2) Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using

Attribute-Based Encryption

3) Privacy Preserving Data Sharing With Anonymous ID Assignment

4) Identity-Based Secure Distributed Data Storage Schemes

5) A Cloud-based Approach for Interoperable EHRs

6) Secure Logging As a Service—Delegating Log Management to the Cloud

7) Network Performance Aware MPI Collective Communication Operations in the Cloud

8) Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems

9) Modeling of Distributed File Systems for Practical Performance Analysis

10) Privacy Preserving Delegated Access Control in Public Clouds

11) Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

12) An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud

Computing

13) QoS Ranking Prediction for Cloud Services

14) Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

15) Protecting Sensitive Labels in Social Network Data Anonymization

16) Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates

17) Efficient Evaluation of SUM Queries over Probabilistic Data

18) Supporting Search-As-You-Type Using SQL in Databases

19) Mining User Queries with Markov Chains: Application to Online Image Retrieval

20) A System to Filter Unwanted Messages from OSN User Walls

21) Reinforced Similarity Integration in Image-Rich Information Networks

22) Co-Occurrence-Based Diffusion for Expert Search on the Web

23) A New Algorithm for Inferring User Search Goals with Feedback Sessions

24) A Machine Learning Approach to Software Requirements Prioritization

25) Semi-Supervised Heterogeneous Fusion for Multimedia Data Co-clustering

26) Structural Diversity for Resisting Community Identification in Published Social

Networks

27) Reversible Data Hiding With Optimal Value Transfer

28) A Formal Usability Constraints Model for Watermarking of Outsourced Datasets

29) Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System

Development [With Hardware]

30) A Survival Modeling Approach to Biomedical Search Result Diversification Using

Wikipedia

31) PMSE: A Personalized Mobile Search Engine [With Hardware]

Page 2: FINAL YEAR PROJECTS  FOR CSE 2013-2014

1POINTER TECHNOLOGY

No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017. Ph – 044 342323407; Mobile –9043350456, 9500139248

Email: [email protected] website: www.1pointer.com

32) A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy

Preserving of Intermediate Data Sets in Cloud

33) Multiparty Access Control for Online Social Networks: Model and Mechanisms

34) Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information

35) Patch-Based Image Warping for Content-Aware Retargeting

36) MSIDX: Multi-Sort Indexing for Efficient Content-based Image Search and Retrieval

37) SORT: Self-Organizing Trust Modelfor Peer-to-Peer Systems

38) A System for Timely and Controlled Information Sharing in Emergency Situations [With

Hardware]

39) A MAC Sensing Protocol Design for Data Transmission with More Protection to Primary

Users

40) Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data

41) Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

42) Sybil Defender: A Defense Mechanism for Sybil Attacks in Large Social Networks

43) Anonymous and Distributed Community Cyber Incident Detection

44) Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior

45) Optimal Client-Server Assignment for Internet Distributed Systems

46) A Novel Message Scheduling Framework for Delay Tolerant Networks Routing

47) A Secure Payment Scheme with Low Communication and Processing Overhead

for Multichip Wireless Networks 48) Scaling up publish/subscribe overlays using interest correlation for link sharing

49) A Highly Practical Approach towards Achieving Minimum Datasets Storage Cost in the

Cloud1

50) Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds

51) Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in

Delay-tolerant Networks

52) Buffer Management for Aggregated Streaming Data with Packet Dependencies

53) Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks

54) SOS: A Distributed Mobile Q&A System Based on Social Networks

55) Behavioral Malware Detection in Delay Tolerant Networks

56) A System for Denial-of-Service Attack Detection Based on Multivariate Correlation

Analysis

57) Load Rebalancing for Distributed File Systems in Clouds

58) Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption

59) ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs

60) An Adaptive Cloud Downloading Service

61) A Quantitative Model and Analysis of Information Confusion in Social Networks

62) Resource Management for Complex, Dynamic Environments

Page 3: FINAL YEAR PROJECTS  FOR CSE 2013-2014

1POINTER TECHNOLOGY

No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017. Ph – 044 342323407; Mobile –9043350456, 9500139248

Email: [email protected] website: www.1pointer.com

63) Ant Colony Optimization for Software Project Scheduling and Staffing with an

Event-Based Scheduler

………YOUR OWN PAPER CONCEPTS CAN BE ACCEPTED