java cloud computing titles - cegontechnologies.com filepossession in cloud storage 4 semantic-aware...

35
CEGON TECHNOLOGIES CEGON TECHNOLOGIES ( We Rise By Lifting Others) *Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247 www.cegontechnologies.com Java Cloud computing titles S.NO Project title 1 A New Lightweight Symmetric Searchable Encryption Scheme For String Identification 2 SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud 3 SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in Cloud 6 An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data 7 Audit-Free Cloud Storage via Deniable Attribute-based Encryption 8 Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing 9 Chaotic Searchable Encryption for Mobile Cloud Storage

Upload: others

Post on 27-Sep-2019

15 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

Java Cloud computing titles

S.NO Project title

1 A New Lightweight Symmetric Searchable Encryption Scheme For

String Identification

2 SeSPHR: A Methodology for Secure Sharing of Personal Health

Records in the Cloud

3 SEPDP: Secure and Efficient Privacy Preserving Provable Data

Possession in Cloud Storage

4 Semantic-aware Searching over Encrypted Data for Cloud Computing

5 Secure Fine-Grained Access Control and Data Sharing for Dynamic

Groups in Cloud

6 An Efficient Ranked Multi-Keyword Search for Multiple Data Owners

Over Encrypted Cloud Data

7 Audit-Free Cloud Storage via Deniable Attribute-based Encryption

8 Catch You if You Misbehave: Ranked Keyword Search Results

Verification in Cloud Computing

9 Chaotic Searchable Encryption for Mobile Cloud Storage

Page 2: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

10 CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for

Cloud Forensics

11 Combining Data Owner-side and Cloud-side Access Control for

sEncrypted Cloud Storage

12 CryptCloud+: Secure and Expressive Data Access Control for Cloud

Storage

13 DROPS: Division and Replication of Data in Cloud for Optimal

Performance and Security

14 Efficient and Expressive Keyword Search Over Encrypted Data in

Cloud

15 Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical

Record Systems with Mobile Devices

16 Efficient Retrieval over Documents Encrypted by Attributes in Cloud

Computing

17 Efficient Traceable Authorization Search System for Secure Cloud

Storage

18 Fine-Grained Two-Factor Protection Mechanism for Data Sharing in

Cloud Storage

19 Identity-Based Private Matching over Outsourced Encrypted Datasets

20 Inference Attack-Resistant E-Healthcare Cloud System with Fine-

Page 3: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

Grained Access Control

21 Lightweight and Privacy-Preserving Delegatable Proofs of Storage with

Data Dynamics in Cloud Storage

22 Privacy Preservation for Outsourced Medical Data With Flexible

Access Control

23 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical

Data Sharing

24 Provably Secure Fine-Grained Data Access Control over Multiple

Cloud Servers in Mobile Cloud Computing Based Healthcare

Applications

25 Publicly Verifiable Boolean Query Over Outsourced Encrypted Data

26 Secure and Efficient Attribute-Based Access Control for Multiauthority

Cloud Storage

27 Secure Data Group Sharing and Dissemination with Attribute and Time

Conditions in Public Cloud

28 Secure Fine-Grained Access Control and Data Sharing for Dynamic

Groups in Cloud

29 Semantic-aware Searching over Encrypted Data for Cloud Computing

30 SEPDP: Secure and Efficient Privacy Preserving Provable Data

Page 4: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

Possession in Cloud Storage

31 SeSPHR: A Methodology for Secure Sharing of Personal Health

Records in the Cloud

32 Towards Privacy-preserving Content-based Image Retrieval in Cloud

Computing

33 Unified Fine-grained Access Control for Personal Health Records in

Cloud Computing

34 A Cross Tenant Access Control ( CTAC) Model for Cloud Computing:

Formal Specification and Verification

35 A Modified Hierarchical Attribute-Based Encryption Access

Control Method for Mobile Cloud Computing

36 A New Service Mechanism for Profit Optimizations of a Cloud

Provider and Its Users

37 A robust reputation management mechanism in the federated cloud

38 Achieving secure, universal, and fine-grained query results verification

for secure search scheme over encrypted cloud data

39 Customer-Satisfaction-Aware Optimal Multiserver Configuration

for Profit Maximization in Cloud Computing

41 Identity-Based Data Outsourcing with Comprehensive Auditing in

Clouds

Page 5: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

42 Identity-Based Encryption with Cloud Revocation Authority and Its

Applications

43 Identity-based Remote Data Integrity Checking with Perfect Data

Privacy Preserving for Cloud Storage

44 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical

Data Sharing

45 Privacy Protection based Access Control Scheme in Cloud-based

Services

46 Privacy-Preserving Multikeyword Similarity Search Over Outsourced

Cloud Data

47 Provably Secure Key-Aggregate Cryptosystems with Broadcast

Aggregate Keys for Online Data Sharing on the Cloud

48 RAAC: Robust and Auditable Access Control with Multiple Attribute

Authorities for Public Cloud Storage

49 Secure Data Sharing in Cloud Computing Using Revocable-Storage

Identity-Based Encryption

50 Securing Cloud Data under Key Exposure

51 TEES: An Efficient Search Scheme over Encrypted Data on Mobile

Cloud

52 A Secure and Dynamic Multi-Keyword Ranked search scheme over

Page 6: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

encrypted cloud data

53 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud

Computing

54 An Efficient Privacy-Preserving Ranked Keyword Search Method

55 An Efficient File Hierarchy Attribute-Based Encryption Scheme in

Cloud Computing

56 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with

Verifiable Delegation in Cloud Computing

57 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in

the Cloud

58 CloudArmor: Supporting Reputation-Based Trust Management for

Cloud Services

59 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its

Application to Cloud Email

60 DiploCloud: Efficient and Scalable Management of RDF Data in the

Cloud

61 Dual-Server Public-Key Encryption With Keyword Search for Secure

Cloud Storage

62 Dynamic and Public Auditing with Fair Arbitration for Cloud Data

63 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key

Page 7: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

Updates

64 Fine-Grained Two-Factor Access Control for Web-Based Cloud

Computing Services

65 Identity-Based Proxy-Oriented Data Uploading and Remote Data

Integrity Checking in Public Cloud

66 Secure Data Sharing in Cloud Computing Using Revocable-Storage

Identity-Based Encryption

67 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing

68 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User

Environments

69 SecRBAC: Secure data in the Clouds

70 Secure Data Sharing in Cloud Computing Using Revocable-Storage

Identity-Based Encryption

71 TMACS: A Robust and Verifiable Threshold Multi-Authority Access

Control System in Public Cloud Storage

72 Crowdsourcing Predictors of Behavioral Outcomes

73 cloudqual a quality model for cloud services

74 A Hybrid Cloud Approach for Secure Authorized In Cloud

75 Secure Auditing and Deduplicating Data in Cloud

76 AUDIT-FREE CLOUD STORAGE VIA DENIABLE ATTRIBUTE-

Page 8: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

BASED ENCRYPTION

77 A Novel Model for Competition and Cooperation Among Cloud

Providers

78 A Lightweight Secure Data Sharing Scheme for Mobile Cloud

Computing

79 An Efficient Privacy-Preserving Ranked Keyword Search Method

80 An Efficient File Hierarchy Attribute-Based Encryption Scheme in

Cloud Computing

81 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with

Verifiable Delegation in Cloud Computing

82 A Secure Anti-Collusion Data Sharing Scheme

for Dynamic Groups in the Cloud

83 CloudArmor: Supporting Reputation-Based Trust Management

for Cloud Services

84 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its

Application to Cloud Email

85 DiploCloud: Efficient and Scalable Management of RDF Data in

the Cloud

86 Dual-Server Public-Key Encryption With Keyword Search for

Secure Cloud Storage

Page 9: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

87 Dynamic and Public Auditing with Fair Arbitration for Cloud Data

88 Enabling Cloud Storage Auditing With Verifiable Outsourcing of

Key Updates

89 Fine-Grained Two-Factor Access Control for Web-Based Cloud

Computing Services

90 Identity-Based Encryption with Cloud Revocation Authority and

Its Applications

91 Identity-Based Proxy-Oriented Data Uploading and Remote Data

Integrity Checking in Public Cloud

92 Secure Data Sharing in Cloud Computing Using Revocable-Storage

Identity-Based Encryption

93 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing

94 SecRBAC: Secure data in the Clouds

95 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User

Environments

96 TMACS: A Robust and Verifiable Threshold Multi-Authority Access

Control System in Public Cloud

97 Secure Data Sharing in Cloud Computing Using Revocable-Storage

Identity-Based Encryption

98 Towards optimized fine-grained pricing of Iaas Cloud platform

Page 10: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

99 Privacy-Preserving Public Auditing for Regenerating-Code-Based

Cloud Storage

100 Secure Auditing and Deduplicating Data in Cloud

101 A Hybrid Cloud Approach for Secure Authorized Deduplication

102 Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing

via Cloud Storage

103 Combining efficiency fidelity,&flexibility in resource information

services

104 Enabling Cloud Storage Auditing with Key-Exposure Resistance

105 A Secure and Dynamic Multi-keyword Ranked Search Scheme over

Encrypted Cloud Data

106 Identity-Based Encryption with Outsourced Revocation in Cloud

Computing

107 Malware propagation in large scale network

108 Performing Initiative Data Prefetching in Distributed File Systems for

Cloud Computing

109 CLOUD ARMOR: SUPPORTING REPUTATION-BASED TRUST

MANAGEMENT FOR CLOUD SERVICES

110 A Cost effective multi cloud data hosting scheme with high availability

111 AUDIT-FREE CLOUD STORAGE VIA DENIABLE ATTRIBUTE-

Page 11: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

BASED ENCRYPTION

112 STEALTHY DENIAL OF SERVICE STRATEGY IN CLOUD

COMPUTING

113 Space-efficient Verifiable Secret Sharing Using Polynomial

Interpolation

114 PROGRESSIVE DUPLICATE DETECTION

115 Efficient encrypted data search as a mobile cloud service.

116 A secure anti-collision data sharing scheme for dynamic groups in the

cloud.

117 Control Cloud Data Access Privilege and Anonymity With Fully

Anonymous Attribute-Based Encryption

118 CLOUD-BASED MULTIMEDIA CONTENT PROTECTION

SYSTEM

119 Lifelong Personal Health Data and Application Software Via virtual

Machines in the Cloud

120 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with

Verifiable Delegation in Cloud Computing

121 A Scalable Two-Phase Top-Down Specialization Approach for Data

Anonymization Using MapReduce on Cloud

Page 12: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

122 A Stochastic Model to Investigate Data Center Performance and QoS in

IaaS Cloud Computing Systems

123 Building Confidential and Efficient Query Services in the Cloud with

RASP Data Perturbation

124 Decentralized Access Control with Anonymous Authentication of Data

Stored in Clouds

125 Distributed, Concurrent, and Independent Access to Encrypted Cloud

Databases

126 Expressive, Efficient, and Revocable Data Access Control for Multi-

Authority Cloud Storage

127 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud

Storage

128 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

129 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System

130 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted

Cloud Data

131 Scalable Distributed Service Integrity Attestation for Software-as-a-

Service Clouds

132 Towards Differential Query Services in Cost-Efficient Clouds

133 Privacy Preserving Delegated Access Control in Public Clouds

Page 13: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

134 An Efficient Certificateless Encryption for Secure Data Sharing in

Public Clouds

135 Authorized Public Auditing of Dynamic Big Data Storage on Cloud

with Efficient Verifiable Fine-Grained Updates

136 Achieving Effective Cloud Search Services:Multi-keyword Ranked

Search over Encrypted Cloud Data Supporting Synonym Query

137 Balancing Performance, Accuracy, and Precision for Secure Cloud

Transactions

138 CloudMoV: Cloud-based Mobile Social TV

139 Dynamic Resource Allocation Using Virtual Machines for Cloud

Computing Environment

140 Error-Tolerant Resource Allocation and Payment Minimization for

Cloud System

141 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of

Linear Equations

142 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the

Cloud

143 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System

145 Privacy-Preserving Public Auditing for Secure Cloud Storage

146 Scalable and Secure Sharing of Personal Health Records in Cloud

Page 14: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

Computing Using

147 Enabling Dynamic Data and Indirect Mutual Trust for Cloud

Computing Storage Systems

148 Load Rebalancing for Distributed File Systems in Clouds

149 Optimizing Cloud Resources for Delivering IPTV Services Through

Virtualization

150 Privacy Preserving Delegated Access Control in Public Clouds

151 Attribute-Based Encryption With

152 ABACUS: An Auction-Based Approach to Cloud Service

Differentiation

153 Attribute-Based Access to Scalable Media in Cloud-Assisted Content

Sharing Networks

154 A Secure Erasure Code-Based Cloud Storage System with Secure Data

Forwarding

155 Cloud Computing Security: From Single to Multi-Clouds

156 Cooperative Provable Data Possession for Integrity Verification in

Multi-Cloud Storage

157 HASBE: A Hierarchical Attribute-Based Solution for Flexible and

Scalable Access Control in Cloud Computing

Page 15: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

158 Outsourced Similarity Search on Metric Data Assets

159 Scalable and Secure Sharing of Personal Health Records in Cloud

Computing using Attribute-based Encryption

160 Toward Secure and Dependable Storage Services in Cloud Computing

161 EduCloud: PaaS versus IaaS Cloud Usage for an Advanced Computer

Science Course

162 A Gossip Protocol for Dynamic Resource Management in Large Cloud

Environments

163 Ensuring Distributed Accountability for Data Sharing in the Cloud

164 Enabling Secure and Efficient Ranked Keyword Search over

Outsourced Cloud Data.

165 Portable Cloud Services Using TOSCA

166 Secure Overlay Cloud Storage with Access Control and Assured

Deletion

167 Cloud Data Protection for the Masses

168 Impact of Storage Acquisition Intervals on the Cost-Efficiency of the

Private vs. Public Storage

169 Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud

170 Cashing in on the Cache in the Cloud

Page 16: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

Java Data mining titles

S.NO Project title

1 Characterizing and Predicting Early Reviewers for Effective Product

Marketing on E-Commerce Websites

2 CoDetect: Financial Fraud Detection With Anomaly Feature Detection

3 Complementary Aspect-based Opinion Mining

4 Emotion Recognition on Twitter: Comparative Study and Training a

Unison Model

5 Frequent Itemsets Mining With Differential Privacy Over Large-Scale

Data

6 Health Monitoring on Social Media over Time

7 l-Injection: Toward Effective Collaborative Filtering Using

Uninteresting Items

8 On Generalizing Collective Spatial Keyword Queries

9 Online Product Quantization

10 Privacy Characterization and Quantification in Data Publishing

11 Road Traffic Speed Prediction: A Probabilistic Model Fusing Multi-

Page 17: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

Source Data

12 Scalable Content-Aware Collaborative Filtering for Location

Recommendation

13 SDE: A Novel Clustering Framework Based on Sparsity-Density

Entropy

14 Search Result Diversity Evaluation based on Intent Hierarchies

15 When to Make a Topic Popular Again? A Temporal Model for Topic

Re-hotting Prediction in Online Social Networks

16 Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling

Approach

17 Collaborative Filtering-Based Recommendation of Online Social

Voting

18 Detecting Stress Based on Social Interactions in Social Networks

19 Dynamic Facet Ordering for Faceted Product Search Engines

20 Efficient Keyword-aware Representative Travel Route

Recommendation

21 SociRank: Identifying and Ranking Prevalent News Topics Using

Social Media Factors

22 RAPARE: A Generic Strategy for Cold-Start Rating Prediction

Page 18: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

Problem

23 User Vitality Ranking and Prediction in Social Networking Services:

a Dynamic Network Perspective

24 An Iterative Classification Scheme for Sanitizing Large scale Datasets

25 Computing Semantic Similarity of Concepts in Knowledge Graphs

26 Influence Maximization in Trajectory Databases

27 Personal web re visitation by context &content keyword with relevance

feedback

28 User Vitality Ranking and Prediction in Social Networking Services

29 A Novel Recommendation Model Regularized with User Trust and

Item Ratings

30 Connecting Social Media to E-Commerce: Cold-Start Product

Recommendation Using Micro blogging Information

31 Crowdsourcing for Top-K Query Processing over Uncertain Data

32 Efficient Cache-Supported Path Planning on Roads

33 Nearest Keyword Set Search in Multi-Dimensional Datasets

34 A Novel Recommendation Model Regularized with User Trust and

Item Ratings

35 Rating Prediction based on Social Sentiment from Textual Reviews

36 Location Aware Keyword Query Suggestion Based on Document

Page 19: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

Proximity

37 A System to Filter Unwanted Messages from OSN User Walls

38 Security Evaluation of Pattern Classifiers under Attack

39 Towards Differential Query Services in Cost-Efficient Clouds

41 Structured Learning from Heterogeneous Behavior for Social Identity

Linkage

42 A Novel Recommendation Model Regularized with User Trust and

Item Ratings

43 Connecting Social Media to E-Commerce: Cold-Start Product

Recommendation Using Micro blogging Information

44 Crowdsourcing for Top-K Query Processing over Uncertain Data

45 Efficient Cache-Supported Path

Planning on Roads

46 Nearest Keyword Set Search in Multi-Dimensional Datasets

47 Rating Prediction based on Social Sentiment from Textual

Reviews

48 Location Aware Keyword Query Suggestion Based on Document

Proximity

49 Privacy Policy Inference of User-Uploaded Images on Content Sharing

Sites

Page 20: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

50 Subgraph Matching with Set Similarity in a Large Graph Database

51 Sparsity Learning Formulations for Mining Time-Varying Data

52 Best keyword searh

53 CloudKeyBank: Privacy and Owner Authorization Enforced Key

Management Framework

54 Real-Time Detection of Traffic From Twitter Stream Analysis

55 Making Digital Artifacts on the Web Verifiable and Reliable

56 Rule-Based Method for Entity Resolution

57 Towards Effective Bug Triage with Software Data Reduction

Techniques

58 MALWARE PROPAGATION IN LARGE-SCALE NETWORKS

59 Agent-based Interactions and Economic Encounters in an Intelligent

Inter Cloud

60 Context-based diversification for keyword queries over Xml data

61 Geo-social k-cover group quries for collaborative spatial computing

62 REVERSE NEAREST NEIGHBORS IN UNSUPERVISED

DISTANCE BASED OUTLIER DETECTION

63 ON SUMMARIZATION AND TIMELINE GENERATION FOR

EVOLUTIONARY TWEET STREAMS

64 Structured Learning from Heterogeneous Behavior

Page 21: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

65 The Impact of View Histories on Edit Recommendations (1)

66 Secure Spatial Top-k Query Processing via Untrusted Location-Based

Service

67 t-Closeness through Microaggregation: Strict Privacy with Enhanced

Utility Preservation

68 FOCS Fast Overlapped Community Search

69 A Cocktail Approach for Travel Package Recommendation

70 Accuracy-Constrained Privacy-Preserving Access Control

71 Data Mining with Big Data

72 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing

Platform

73 Dealing With Concept Drifts in Process Mining

74 Discovering Emerging Topics in Social Streams via

75 Efficient Prediction of Difficult Keyword Queries over Databases

76 Facilitating Document Annotation Using Content and Querying Value

77 Fast Nearest Neighbor Search with Keywords

78 Keyword Query Routing

79 Privacy-Preserving and Content-Protecting Location Based Queries

80 Security Evaluation of Pattern Classifiers under Attack

81 Supporting Privacy Protection in Personalized Web Search

Page 22: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

82 Towards Online Shortest Path Computation

83 XSPath: Navigation on XML Schemas Made Easy

84 m-Privacy for Collaborative Data Publishing

85 Dynamic Query Forms for Database Queries

86 K-Anonymity for Crowdsourcing Database

87 A Supermodularity-Based Differential Privacy Preserving Algorithm

for Data Anonymization

88 A Supermodularity-Based Differential Privacy Preserving Algorithm

for Data Anonymization

89 LARS*: An Efficient and Scalable Location-Aware Recommender

System

90 Approximate Shortest Distance Computing: A Query-Dependent Local

Landmark Scheme

91 A Fast Clustering-Based Feature Subset Selection Algorithm for High-

Dimensional Data

92 A New Algorithm for Inferring User Search Goals with Feedback

Sessions

93 Annotating Search Results from Web Databases DATA MINING

94 Anomaly Detection via Online Over-Sampling Principal Component

Analysis

Page 23: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

95 Distributed Processing of Probabilistic Top-k Queries in Wireless

Sensor Networks

96 m-Privacy for Collaborative Data Publishing

97 Protecting Sensitive Labels in Social Network Data

Anonymization

98 Tweet Analysis for Real-Time Event Detection and Earthquake

Reporting System Development

99 Document Clustering for Forensic Analysis: An Approach for

Improving Computer Inspection

100 A Method for Mining Infrequent Causal Associations and Its

Application in Finding Adverse Drug Reaction Signal Pairs

101 Clustering Sentence-Level Text Using a Novel Fuzzy Relational

Clustering Algorithm

102 Crowdsourcing Predictors of Behavioral Outcomes

103 Facilitating Document Annotation using Content and Querying Value

104 A Generalized Flow-Based Method for Analysis of Implicit

Relationships on Wikipedia

105 A System to Filter Unwanted Messages from OSN User Walls

106 Anonymization of Centralized and Distributed Social Networks by

Sequential Clustering

Page 24: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

107 Intrusion Detection Technique by using K-means, Fuzzy Neural

Network and SVM classifiers.

108 Spatial Approximate String Search

109 Preventing Private Information Inference Attacks on Social Networks

110 Multiparty Access Control for Online Social Networks Model and

Mechanisms

111 Incentive Compatible Privacy-Preserving Data Analysis

112 Facilitating Effective User Navigation through Website Structure

Improvement

113 Classification and Adaptive Novel Class Detection of Feature-Evolving

Data Streams

114 Comparable Entity Mining from

115 Multiparty Access Control for Online Social Networks: Model and

Mechanisms

116 DDD: A New Ensemble Approach for Dealing with Concept Drift

Java Networking titles

S.NO Project title

1 Energy Efficient Link-Delay Aware Routing in Wireless Sensor

Networks

Page 25: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

2 GeTrust: A guarantee-based trust model in Chord-based P2P networks

3 PROVEST: Provenance-based Trust Model for Delay Tolerant

Networks

4 Traffic and Energy Aware Routing for Heterogeneous Wireless Sensor

Networks

5 An Overlay Architecture for Throughput Optimal Multipath Routing

6 Network Capability in Localizing Node Failures via End-to-End Path

Measurements

7 Privacy and Integrity Preserving Top-k Query Processing for Two-

Tiered Sensor Network

8 STAMP Enabling Privacy- Preserving Location Proofs for Mobile

Users

9 iPath Path Inference in Wireless Sensor Networks

10 Building an intrusion detection system using a filter-based feature

selection algorithm

11 Detecting malicious facebook applications

12 Social Friend Recommendation Based on Multiple Network

Correlation

13 Resolving Multi-party Privacy Conflicts in Social Media

14 Dynamic Routing for Data Integrity and Delay Differentiated Services

Page 26: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

in Wireless Sensor Networks

15 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks

in Wireless Ad Hoc Networks

16 Friendbook: A Semantic-based Friend Recommendation System for

Social Networks

17 STAMP Enabling Privacy- Preserving Location Proofs for Mobile

Users

18 Building an intrusion detection system using a filter-based feature

selection algorithm

19 iPath Path Inference in Wireless Sensor Networks

20 Detecting malicious facebook applications

21 Social Friend Recommendation Based on Multiple Network Correlation

22 Resolving Multi-party Privacy Conflicts in Social Media

23 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks

though Replication for Efficient File Sharing

24 A Proximity-Aware Interest-Clustered P2P File Sharing System.

25 Automatic Test Packet Generation

26 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes

27 Boundary Cutting for Packet Classification

28 Secure Data Retrieval for Decentralized Disruption-Tolerant Military

Page 27: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

Networks

29 A General Self-Organized Tree-Based Energy-Balance Routing

Protocol for Wireless Sensor Network

30 Congestion Aware Routing in Nonlinear Elastic Optical Networks

31 Adaptive Opportunistic Routing for Wireless Ad Hoc Networks

32 Design, Implementation, and Performance of a Load Balancer for SIP

Server Clusters

33 Independent Directed Acyclic Graphs for Resilient Multipath Routing

34 MeasuRouting: A Framework for Routing Assisted Traffic Monitoring

35 Privacy- and Integrity-Preserving Range Queries in Sensor Networks

36 RIHT: A Novel Hybrid IP Traceback Scheme

37 Router Support for Fine-Grained Latency Measurements

38 Packet Loss Control Using Tokens at the Network Edge

39 CORMAN: A Novel Cooperative Opportunistic Routing

Java Parallel & Distributed Titles

S.NO Project title

1 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in

the Cloud

Page 28: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

2 Exploiting Workload Characteristics and Service Diversity to Improve

the Availability of Cloud Storage Systems

3 Cost-Effective Authentic and Anonymous Data Sharing with Forward

Security

4 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile

Social Networks

5 Exploiting Service Similarity for Privacy in Location-Based Search

Queries

6 LocaWard: A Security and Privacy Aware Location-Based Rewarding

System

7 On False Data-Injection Attacks against Power System State

Estimation: Modeling and Countermeasures

8 RRE: A Game-Theoretic Intrusion Response and Recovery Engine

9 Securing Broker-Less Publish/Subscribe Systems Using Identity-Based

Encryption

10 SOS: A Distributed Mobile Q&A System Based on Social Networks

11 The Client Assignment Problem for Continuous Distributed Interactive

Applications: Analysis, Algorithms, and Evaluation

12 The Design and Evaluation of An Information Sharing System for

Human Networks

Page 29: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

13 Traffic Pattern-Based Content Leakage Detection for Trusted Content

Delivery Networks

14 Secure Outsourced Attribute-based Signatures

15 Multi-Path Routing and Forwarding in Non-Cooperative Wireless

Networks

16 SocialTube: P2P-Assisted Video Sharing in Online

Social Networks

17 A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc

Networks

18 Asymmetric Social Proximity Based Private Matching Protocols for

Online Social Networks

19 A System for Denial-of-Service Attack Detection Based on

Multivariate Correlation Analysis

20 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks

Creation

21 Security Analysis of a Privacy-Preserving Decentralized Key-Policy

Attribute-Based Encryption Scheme

22 IP-Geolocation Mapping for Moderately Connected Internet Regions

23 Optimal Client-Server Assignment for Internet Distributed Systems

24 A Framework for Mining Signatures from Event Sequences and Its

Page 30: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

Applications in Healthcare Data

25 SocialTube P2P-assisted Video Sharing in Online Social Networks

26 A System for Denial-of-Service Attack Detection Based on

Multivariate Correlation Analysis

27 Detection and Localization of Multiple Spoofing Attackers in Wireless

Networks

28 Fully Anonymous Profile Matching in Mobile Social Networks

29 Cluster-Based Certificate Revocation with Vindication Capability for

Mobile Ad Hoc Networks

30 BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured

P2P Networks

31 Payments for Outsourced Computations

32 Cut Detection in Wireless Sensor Networks

33 A Framework for Routing Performance Analysis in Delay Tolerant

Networks with Application to Non-cooperative Networks

34 Footprint: Detecting Sybil Attacks in Urban Vehicular Networks

35 The Three-Tier Security Scheme in Wireless Sensor Networks with

Mobile Sinks

36 Capacity of Data Collection in Arbitrary Wireless Sensor Networks

Page 31: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

Secure Computing titles

S.NO Project title

1 A Hybrid Approach for Detecting Automated Spammers in Twitter

2 A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-

Matching for Mobile Healthcare Social Network

3 Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-

Closeness

4 Collective Data-Sanitization for Preventing Sensitive Information

Inference Attacks in Social Networks

5 Exploiting Social Network to Enhance Human-to-Human Infection

Analysis Without Privacy Leakage

6 My Privacy My Decision: Control of Photo Sharing on Online Social

Networks

7 Efficient and Privacy-preserving Min and k-th Min Computations in

Mobile Sensing Systems

8 Privacy-Preserving Selective Aggregation of Online User Behavior

Data

9 ProGuard: Detecting Malicious Accounts in Social-Network-Based

Online Promotions

Page 32: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

10 Towards Detecting Compromised Accounts on Social Networks

11 A Multilevel Access Control Scheme for Data Security in Transparent

Computing

12 Data Lineage in Malicious Environments

13 FRoDO Fraud Resilient Device

14 SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-

Web SmartCrawler:

A Two-stage Crawler for Efficiently Harvesting Deep-Web

15 Captcha As Graphical Password

16 Data Lineage in Malicious Environments

17 FRoDO Fraud Resilient Device

18 A LIGHTWEIGHT SECURE SCHEME FOR DETECTING

PROVENANCE FORGERY AND PACKET DROP ATTACKS IN

WIRELESS SENSOR NETWORK

19 LOCATION-AWARE AND PERSONALIZED COLLABORATIVE

FILTERING FOR WEB SERVICE RECOMMENDATION

20 CONTRIBUTORY BROADCAST ENCRYPTION WITH EFFICIENT

ENCRYPTION AND SHORT CIPHERTEXTS

21 SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-

Web

Page 33: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

22 Captcha as Graphical Passwords—A New Security Primitive Based on

Hard AI Problems

23 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing

24 PROFILR: Toward Preserving Privacy and Functionality in Geosocial

Networks

25 Top-k Query Result Completeness Verification in Tiered Sensor

Networks

26 Abductive Analysis of Administrative Policies in Rule-Based Access

Control

27 Low-Priced and Energy-Efficient Detection of Replicas for Wireless

Sensor Networks

28 Evaluation of Web Security Mechanisms Using Vulnerability & Attack

Injection

29 Malware Propagation in Large-Scale Networks

30 Hiding in the Mobile Crowd: Location Privacy through Collaboration

31 EAACK—A Secure Intrusion-Detection System for MANETs

32 Identity-Based Secure Distributed Data Storage Schemes

33 Modeling the Pairwise Key Predistribution Scheme in the Presence of

Unreliable Links

34 NICE: Network Intrusion Detection and Countermeasure Selection in

Page 34: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

Virtual Network Systems

35 Privacy Preserving Data Sharing With Anonymous ID Assignment

36 Securing Class Initialization in Java-like Languages

37 Security Analysis of a Single Sign-On Mechanism for Distributed

Computer Networks

38 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems

39 WARNINGBIRD: A Near Real-time Detection System for Suspicious

URLs in Twitter Stream

41 Two tales of privacy in online social networks

42 Secure Encounter-based Mobile Social Networks: Requirements,

Designs, and Tradeoffs

43 Twitsper: Tweeting Privately

44 Combining Cryptographic Primitives to Prevent Jamming Attacks in

Wireless Networks

45 Cross-Domain Privacy-Preserving Cooperative Firewall Optimization

46 A Stochastic Model of Multi-virus Dynamics

47 Design and Implementation of TARF: A Trust-Aware Routing

Framework for WSNs

48 Detecting and Resolving Firewall Policy Anomalies

49 Detecting Spam Zombies by Monitoring Outgoing Messages

Page 35: Java Cloud computing titles - cegontechnologies.com filePossession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access

CEGON TECHNOLOGIES

CEGON TECHNOLOGIES ( We Rise By Lifting Others)

*Rupai Midde Upstair , Trunk Road , Kavali.* *Ph**: 7396555247

www.cegontechnologies.com

50 On the Security of a Ticket-Based Anonymity System with Traceability

Property in Wireless Mesh Networks

51 Online Modeling of Proactive Moderation System for Auction Fraud

Detection

52 Packet-Hiding Methods for Preventing Selective Jamming Attacks

53 Risk-Aware Mitigation for MANET Routing Attacks

54 Monitoring and Detecting Abnormal Behavior in Mobile Cloud

Infrastructure

55 On the Security and Efficiency of Content Distribution via Network

Coding