0% found this document useful (0 votes)
69 views8 pages

S.No Java (IEEE-2016) : Data Mining Over Encrypted Data On Cloud

Vee Xplore Provides Training and project guidance in the following IT domains...,. JAVA,Network SImulator,PhP,DOTNET
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views8 pages

S.No Java (IEEE-2016) : Data Mining Over Encrypted Data On Cloud

Vee Xplore Provides Training and project guidance in the following IT domains...,. JAVA,Network SImulator,PhP,DOTNET
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

www.veexplore.

com

JAVA [ IEEE-2016]

S.NO
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32

Email Id: veexplore.enquiry@gmail.com

Attribute-based encryption with efficient user revocation


Job service provider
Knowledge sharing & user behavior in the online social network
Rare side effect discovery
Attribute based methods for securing personal health records
Key-aggregate cryptosystem for scalable data sharing in cloud storage
SMS based policy intimation system for insurance agency
A model for predicting patient acuity on imbalanced dataset
Cross cloud service composition for big data processing
Efficient security in decentralized cipher-text-Policy attribute-based encryption
Fake profile detection in online social networks
High utility itemset mining from large database
Hostel management system
Improving privacy in cloud storage using regenerating code based approach
Investigation on ranking of active web forum users
Data mining over encrypted data on cloud
Mining fraud detection in mobile apps by analyzing user ratings and ranking
Mining high utility itemsets from large database using apriori algorithm
Multi keyword search with effective key aggregation in cloud computing
Multi replication with secure public auditing for dynamic big data storage in cloud
Online Training Portal
Efficient public auditing and user revocation in cloud
Personalized search with user privacy protection
Privacy-preserving algorithm for preventing data disclosure
Replicating dynamic data and multi keyword search in cloud computing
Secure de-duplication with effective key management in cloud
Secure proxy re-encryption scheme for big data storage
Securing patient records in distributed healthcare cloud computing system
A framework to facilitate multi cloud service providers based on QOS
Enabling public auditability using shared authority based privacy-preserving
authentication protocol
Retrieval of bug reports using software data reduction techniques
User behavior prediction using web usage mining

1st Floor, 77/119, Gokule Street, (Opp. to SenthilKumaran Theatre), Ram Nagar, Coimbatore -641009
Tel: 0422-4274041

Mobile : 90 430 340 51 / 41

33
34
35
36
37

Virtual class room


Web based customer usage review analysis
Web service composition framework using genetic algorithm
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained
Owner-Enforced Search Authorization in the Cloud
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable
Delegation in Cloud Computing

38

SecRBAC: Secure data in the Clouds

39

Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based


Encryption

40

Dynamic and Public Auditing with Fair Arbitration for Cloud Data

41

Identity-Based Encryption with Cloud Revocation Authority and Its Applications

42

Distributed storage design for encrypted personal health record data

43

Toward a cloud-based security intelligence with big data processing

44

An Efficient and Fine-grained Big Data Access Control Scheme with Privacypreserving Policy

45

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud
Data

46

Efficient Cloud-Based Framework for Big Data Classification

47

An Efficient Privacy-Preserving Ranked Keyword Search Method

S.NO

NS2 PHP PROJECT TITLES

Website creation for furniture based company

Online Voting system

Online College management systems

Jewelery Shop stock management System

Student information system

Coffee Shop Store Website

www.veexplore.com

Email Id: veexplore.enquiry@gmail.com

Complain management system

Family financial budget Planning

Leave management system

10

Employee management system

11

Home renting system

12

Work order Management system

13

Insurance Management system

14

Water supply management

15

Fund Raising management in Trust

S.NO
DOT NET TITLES
1.
Data anonymization technique for securing personal health record
2.
Bug tracking system
3.
Credit card fraud detection
4.
Mail client for blind people
5.
Online building consultancy
6.
Online bus pass registration and renewal

1st Floor, 77/119, Gokule Street, (Opp. to SenthilKumaran Theatre), Ram Nagar, Coimbatore -641009
Tel: 0422-4274041

Mobile : 90 430 340 51 / 41

7.
Online campus interview
8.
Online question bank system
9.
Online voting
10.
Replicating dynamic data and multi keyword search in cloud computing
11.
Packet hiding method for preventive selective jamming attacks
12.
Online School Management
13.
Security using colors and Armstrong number
14.
Robust Face-Name Graph Matching for Movie Character Identification
15.
SMS based online insurance
16.
Staff profile management system
17.
Vehicle management system
18.
Inter-college Event Management System
19.
Integrated Material Management System
20.
Online Staff Leave Management System
21.
Online Interior Design Management System
CODE
NS-2 [ IEEE-2016]
001

www.veexplore.com

Email Id: veexplore.enquiry@gmail.com

Recharging node based on the critical cluster head using in WSN


002
A Historical-Beacon-Aided Localization Algorithm for Mobile Sensor Networks
003
Target detection collaborative networks using Magnetic sensors in WSN

004
An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor
Networks
005
Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks
006
Efficient Coverage and Connectivity Preservation With Load Balance for Wireless Sensor
Networks
007
Effective Key Management in Dynamic Wireless Sensor Networks
008
Detect faults in sensor and communication in active state of sensor in WSN
009
Robot detection for automatically Hole Detection and Healing in WSN
010

1st Floor, 77/119, Gokule Street, (Opp. to SenthilKumaran Theatre), Ram Nagar, Coimbatore -641009
Tel: 0422-4274041

Mobile : 90 430 340 51 / 41

Joint Cooperative Routing and Power Allocation for Collision Minimization in Wireless Sensor
Networks with Multiple Flows
011
Cost Minimization in Shortest Path communication for dual data uploading in wireless sensor
Network
012
Mobile Robots to sense the Obstacles for transmission in Wireless sensor Network
013
Sleep and awake scheduling for Packet Replication in Wireless sensor Network
014
PWDGR: Pair-Wise Directional Geographical Routing Based on Wireless Sensor Network
015
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion
Attacks
016
Interference removing broadcasting message to selected path
017
Toward Energy-Efficient Trust System through Watchdog Optimization for WSNs
018
A Secure Scheme against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks
019
User Privacy and Data Trustworthiness in Mobile Crowd Sensing

020

MANET
Cooperative communication in Mobile Ad Hoc Networks to enhance transmission with lower

energy consumption
021
Optimal Configuration of Network Coding in Ad Hoc Networks
022

www.veexplore.com

Email Id: veexplore.enquiry@gmail.com

Mobile-Projected Trajectory Algorithm with Velocity-Change Detection for Predicting Residual Link
Lifetime in MANET
VANET
023
ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and NonRepudiation for VANETs
024
BUS-VANET: A BUS Vehicular Network Integrated with Traffic Infrastructure
025
Clustering the vehicular nodes to control traffic based on channel allocation and node mobility
in VANET
026
Improved transportation system for updated vehicle movements in network
CRN
027
Cognitive Machine-to-Machine Communications for Internet-of-Things: a protocol stack
perspective
028
Moving object trajectory Prediction to avoid packet drop
029
Swarm optimization for load balancing in optimal path to Control Active Noise in searching
time
030
Array antenna feed wave for directional network
031
A Predictive Cross-Layered Interference Management in a Multichannel MAC with Reactive Routing
in VANET

1st Floor, 77/119, Gokule Street, (Opp. to SenthilKumaran Theatre), Ram Nagar, Coimbatore -641009
Tel: 0422-4274041

Mobile : 90 430 340 51 / 41

032
Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad
Hoc Networks
033
Dynamic Address allocation algorithm in MANET using
Cooperative communication
034
Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes
035
Multi touch Data authentication using wireless Networks
036
Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs
037
Understanding Spurious Message Forwarding in VANET Beaconless Dissemination Protocols: An
Analytical Approach
038
Secure and Reliable Routing Protocols For Heterogeneous Multihop Wireless Networks
039
Detection and prevention of collusion attacks in WSN
040
Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

You might also like