M.tech java 2014 15 list

8
SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected] www.sakinformatics.com M.TECH JAVA 2014-15 List S.No Project Code Project Title Domain Year 1 J1401 A Hybrid Cloud Approach for Secure Authorized Deduplication Cloud Computing 2014 2 J1402 A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud Cloud Computing 2014 3 J1403 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems Cloud Computing 2014 4 J1404 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation Cloud Computing 2014 5 J1405 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds Cloud Computing 2014 6 J1406 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases Cloud Computing 2014 7 J1407 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Cloud Computing 2014 8 J1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage Cloud Computing 2014 9 J1409 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud Cloud Computing 2014 10 J1410 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System Cloud Computing 2014 11 J1411 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Cloud Computing 2014

Transcript of M.tech java 2014 15 list

Page 1: M.tech java 2014 15 list

SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]

www.sakinformatics.com

M.TECH JAVA 2014-15 List

S.NoProject

CodeProject Title Domain Year

1 J1401A Hybrid Cloud Approach for Secure

Authorized DeduplicationCloud

Computing2014

2 J1402A Scalable Two-Phase Top-Down

Specialization Approach forData Anonymization Using MapReduce on

Cloud

CloudComputing 2014

3 J1403A Stochastic Model to Investigate Data

Center Performance and QoS in IaaS CloudComputing Systems

CloudComputing

2014

4J1404

Building Confidential and Efficient QueryServices in the Cloud with RASP Data

Perturbation

CloudComputing 2014

5J1405

Decentralized Access Control withAnonymous Authentication of Data

Stored in Clouds

CloudComputing 2014

6J1406

Distributed, Concurrent, and IndependentAccess to Encrypted Cloud Databases

CloudComputing 2014

7J1407

Expressive, Efficient, and Revocable DataAccess Control for Multi-Authority Cloud

Storage

CloudComputing 2014

8J1408

Key-Aggregate Cryptosystem for ScalableData Sharing in Cloud Storage

CloudComputing

2014

9 J1409 Oruta: Privacy-Preserving Public Auditingfor Shared Data in the Cloud

CloudComputing

2014

10 J1410 PACK: Prediction-Based Cloud Bandwidthand Cost Reduction System

CloudComputing

2014

11J1411

Privacy-Preserving Multi-Keyword RankedSearch over Encrypted Cloud Data

CloudComputing

2014

Page 2: M.tech java 2014 15 list

SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]

www.sakinformatics.com

12 J1412 Scalable Distributed Service IntegrityAttestation for Software-as-Service Clouds

CloudComputing

2014

13J1413

Towards Differential Query Services inCost-Efficient Clouds

CloudComputing

2014

14 J1414On the Knowledge Soundness of a

Cooperative Provable Data PossessionScheme in Multicloud Storage - Parallel

Distributed Systems

CloudComputing

2014

15 J1415Privacy Preserving Back-Propagation

Neural Network Learning Made Practicalwith Cloud Computing

CloudComputing

2014

16 J1416 CLOUDQUAL A Quality Model for CloudServices

CloudComputing

2014

17 J1417Enabling Smart Cloud Services Through

Remote Sensing An Internet of EverythingEnabler

CloudComputing

2014

18 J1418 Quality of Service Provision in Cloud-basedStorage System for Multimedia Delivery

CloudComputing

2014

19J1419

A Cocktail Approach for Travel PackageRecommendation

DATA MINING 2014

20 J1420Accuracy-Constrained Privacy-PreservingAccess Control Mechanism for Relational

Data

DATA MINING 2014

21 J1421BestPeer++: A Peer-to-Peer Based Large-

Scale Data Processing PlatformDATA MINING 2014

22 J1422 Data Mining with Big Data DATA MINING 2014

23J1423

Dealing With Concept Drifts in ProcessMining

DATAMINING 2014

Page 3: M.tech java 2014 15 list

SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]

www.sakinformatics.com

24 J1424Discovering Emerging Topics in Social

Streams via Link-AnomalyDATA

MINING2014

25J1425

Efficient Prediction of Difficult KeywordQueries over Databases

DATAMINING

2014

26J1426

Facilitating Document Annotation UsingContent and Querying Value

DATAMINING

2014

27 J1427Fast Nearest Neighbor Search with

KeywordsDATA

MINING2014

28 J1428 Keyword Query RoutingDATA

MINING 2014

29 J1429 Privacy-Preserving and Content-ProtectingLocation Based Queries

DATAMINING 2014

30 J1430 Security Evaluation of Pattern Classifiersunder Attack

DATAMINING 2014

31 J1431 Supporting Privacy Protection inPersonalized Web Search

DATAMINING 2014

32 J1432 Towards Online Shortest Path ComputationDATA

MINING 2014

33 J1433Approximate Shortest Distance Computing:

A Query-Dependent Local LandmarkScheme

DATAMINING 2014

34 J1434 LARS: An Efficient and Scalable Location-Aware Recommender System

DATAMINING 2014

35 J1435 Dynamic Query Forms for DatabaseQueries

DATAMINING 2014

Page 4: M.tech java 2014 15 list

SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]

www.sakinformatics.com

36 J1436 Privacy Preserving Delegated AccessControl in Public Clouds

DATAMINING 2014

37 J1437 m-Privacy for Collaborative DataPublishing

DATAMINING 2014

38 J1438 Scalable Keyword Search on Large RDFData

DATAMINING 2014

39 J1439 Decision Trees for Mining Data StreamsBased on the Gaussian Approximation

DATAMINING 2014

40 J1440Captcha as Graphical Passwords—A New

Security Primitive Based on Hard AIProblems

SECURECOMPUTING 2014

41 J1441 Efficient and Privacy-Aware DataAggregation in Mobile Sensing

SECURECOMPUTING 2014

42 J1442 PROFILR: Toward Preserving Privacy andFunctionality in Geosocial Networks

SECURECOMPUTING 2014

43 J1443 Top-k Query Result CompletenessVerification in Tiered Sensor Networks

SECURECOMPUTING

2014

44 J1444 Bandwidth Distributed Denial of Service:Attacks and Defenses

SECURECOMPUTING

2014

45 J1445 Automatic Test Packet Generation NETWORKING 2014

46 J1446 Cost-Effective Resource Allocation ofOverlay Routing Relay Nodes

NETWORKING 2014

47 J1447 Boundary Cutting for Packet Classification NETWORKING 2014

Page 5: M.tech java 2014 15 list

SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]

www.sakinformatics.com

48 J1448 Secure Data Retrieval for DecentralizedDisruption-Tolerant Military Networks

NETWORKING 2014

49 J1449 Hiding in the Mobile Crowd: LocationPrivacy through Collaboration

NETWORKING 2014

50 J1450A General Self-Organized Tree-BasedEnergy-Balance Routing Protocol for

Wireless Sensor Network

NETWORKING 2014

51 J1451 Behavioral Malware Detection in DelayTolerant Networks

NETWORKING 2014

52 J1452Secure Data Aggregation in Wireless

Sensor Networks Filtering out theAttacker’s Impact

NETWORKING 2014

53 J1453Joint Routing and Medium Access Control

in Fixed Random Access Wireless MultihopNetworks

NETWORKING

2014

54 J1454Joint Routing and Resource Allocation for

Delay Minimization in Cognitive RadioBased Mesh Networks

NETWORKING 2014

55 J1455 Joint Topology-Transparent Scheduling andQoS Routing in Ad Hoc Networks

NETWORKING 2014

56 J1456Tradeoff Between Reliability and Securityin Multiple Access Relay Networks Under

Falsified Data Injection AttackNETWORKING 2014

57 J1457 Enabling Trustworthy Service Evaluation inService-Oriented Mobile Social Networks

PARALLEL &DISTRIBUTED

SYSTEMS2014

58 J1458Exploiting Service Similarity forPrivacy in Location-Based Search

Queries

PARALLEL &DISTRIBUTED

SYSTEMS2014

59 J1459LocaWard: A Security and PrivacyAware Location-Based Rewarding

System

PARALLEL &DISTRIBUTED

SYSTEMS2014

Page 6: M.tech java 2014 15 list

SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]

www.sakinformatics.com

60 J1460On False Data-Injection Attacks against

Power System State Estimation:Modeling and Countermeasures

PARALLEL &DISTRIBUTED

SYSTEMS2014

61 J1461RRE: A Game-Theoretic Intrusion

Response and Recovery Engine

PARALLEL &DISTRIBUTED

SYSTEMS2014

62 J1462Securing Broker-Less

Publish/Subscribe Systems UsingIdentity- Based Encryption

PARALLEL &DISTRIBUTED

SYSTEMS2014

63 J1463SOS: A Distributed Mobile Q&A System

Based on Social Networks

PARALLEL &DISTRIBUTED

SYSTEMS2014

64 J1464

The Client Assignment Problem forContinuous Distributed Interactive

Applications: Analysis, Algorithms, andEvaluation

PARALLEL &DISTRIBUTED

SYSTEMS

2014

65 J1465The Design and Evaluation of AnInformation Sharing System for

Human Networks

PARALLEL &DISTRIBUTED

SYSTEMS2014

66 J1466Traffic Pattern-Based Content LeakageDetection for Trusted Content Delivery

Networks

PARALLEL &DISTRIBUTED

SYSTEMS2014

67 J1467Secure Outsourced Attribute-based

Signatures

PARALLEL &DISTRIBUTED

SYSTEMS2014

68 J1468A System for Denial-of-Service Attack

Detection Based on MultivariateCorrelation Analysis

PARALLEL &DISTRIBUTED

SYSTEMS

2014

69 J1469Multi-Core Embedded Wireless Sensor

Networks Architecture and ApplicationsPARALLEL &DISTRIBUTED

SYSTEMS

2014

70 J1470Cross-Layer Approach for Minimizing

Routing Disruption in IP NetworksPARALLEL &DISTRIBUTED

SYSTEMS2014

71 J1471Multicast Capacity in MANET with

Infrastructure SupportPARALLEL &DISTRIBUTED

SYSTEMS2014

Page 7: M.tech java 2014 15 list

SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]

www.sakinformatics.com

72 J1472Efficient Data Collection for Large-

Scale Mobile Monitoring ApplicationsPARALLEL &DISTRIBUTED

SYSTEMS2014

73 J1473Hop-by-Hop Message

Authenticationand Source Privacy inWirelessSensor Networks

PARALLEL &DISTRIBUTED

SYSTEMS2014

74 J1474Optimized multicast routing algorithm

based on tree structure in MANETsPARALLEL &DISTRIBUTED

SYSTEMS2014

75 J1475 An Incentive Framework for CellularTraffic Offloading

MOBILECOMPUTING

2014

76 J1476 Cooperative Caching for Efficient DataAccess in Disruption Tolerant Networks

MOBILECOMPUTING

2014

77 J1477 Efficient Authentication for Mobile andPervasive Computing

MOBILECOMPUTING

2014

78 J1478Friendbook: A Semantic-based FriendRecommendation System for Social

Networks

MOBILECOMPUTING

2014

79 J1479Optimal Distributed Malware Defense in

Mobile Networks with HeterogeneousDevices

MOBILECOMPUTING

2014

80 J1480Energy-Efficient Reliable Routing

Considering Residual Energy in WirelessAd Hoc Networks

MOBILECOMPUTING

2014

81 J1481Energy-optimum Throughput and CarrierSensing Rate in CSMA-based Wireless

Networks

MOBILECOMPUTING

2014

82 J1482Privacy-Preserving and Truthful Detectionof Packet Dropping Attacks in Wireless Ad

Hoc Networks

MOBILECOMPUTING

2014

83 J1483 Fairness Analysis of Routing inOpportunistic Mobile Networks

MOBILECOMPUTING

2014

84 J1484 Video Dissemination over Hybrid Cellularand Ad Hoc Networks

MOBILECOMPUTING

2014

85 J1485 Privacy-Enhanced Web ServiceComposition

SERVICECOMPUTING(Web Service)

2014

Page 8: M.tech java 2014 15 list

SAK INFORMATICS (0)9603999243, 8333034195#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected]

www.sakinformatics.com

86 J1486 Web Service Recommendation viaExploiting Location and QoS Information

SERVICECOMPUTING(Web Service)

2014

87 J1487Designing an Efficient Image Encryption-Then-Compression System via PredictionError Clustering and Random Permutation

- Information Forensics and Security

IMAGEPROCESSING

2014

88 J1488 Fingerprint Compression Based on SparseRepresentation

IMAGEPROCESSING

2014

89 J1489Hierarchical Prediction and Context

Adaptive Coding for Lossless Color ImageCompression

IMAGEPROCESSING

2014

90 J1490 Congestion Aware Routing in NonlinearElastic Optical Networks

NETWORKINGSecurity

2014

91 J1491 Security Analysis of Handover KeyManagement in 4G LTESAE Networks

NETWORKING2014

92 J1492 Distributed Mobile Sink Routing forWireless Sensor Networks A Survey

NETWORKING2014