JAVA IEEE PROJECT TITLES 2017-2018:

CLOUD COMPUTING PROJECT TITLES:

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification

A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing

A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage

A robust reputation management mechanism in the federated cloud

Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in Smart Grid

Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data

Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems

Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing

Efficient and Expressive Keyword Search Over Encrypted Data in Cloud

Fast Phrase Search for Encrypted Cloud Storage

Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds

Identity-Based Encryption with Cloud Revocation Authority and Its Applications

Identity-Based Private Matching over Outsourced Encrypted Datasets

Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage

On the Security of Data Access Control for Multi-authority  Cloud Storage Systems

Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing

Privacy Protection based Access Control Scheme in Cloud-based Services

Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data

Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud

RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage

Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

Securing Cloud Data under Key Exposure

TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud

TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud

Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving

DATA MINING PROJECT TITLES

An Iterative Classification Scheme for Sanitizing Large-Scale Datasets

Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach

Collaborative Filtering-Based Recommendation of Online Social Voting

Computing Semantic Similarity of Concepts in Knowledge Graphs

Detecting Stress Based on Social Interactions in Social Networks

Dynamic Facet Ordering for Faceted Product Search Engines

Efficient Clue-based Route Search on Road Networks

Efficient Keyword-aware Representative Travel Route Recommendation

Energy-efficient Query Processing in Web Search Engines

Generating Query Facets using Knowledge Bases

Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach

l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items

Mining Competitors from Large Unstructured Datasets

Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction

Personal Web Revisitation by Context and Content Keywords with Relevance Feedback

PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks

QDA: A Query-Driven Approach to Entity Resolution

Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data

RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem

SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors

Towards Real-Time, Country-Level Location Classification of Worldwide Tweets

Trajectory Community Discovery and Recommendation by Multi-source Diffusion Modeling

Understand Short Texts by Harvesting and Analyzing Semantic Knowledge

User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective

User-Centric Similarity Search

When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks

NETWORKING PROJECT TITLES

An Overlay Architecture for Throughput Optimal Multipath Routing

FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control

Network Capability in Localizing Node Failures via End-to-End Path Measurements

Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Network

Routing in Accumulative Multi-Hop Networks

SWEET: Serving the Web by Exploiting Email Tunnels

MOBILE COMPUTING PROJECT TITLES

A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption

Detecting Mobile Malicious Webpages in Real Time

Quantifying Interdependent Privacy Risks with Location Data

Searching Trajectories by Regions of Interest

SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks

PARALLEL AND DISTRIBUTED SYSTEMS PROJECT TITLES

iASK: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence

SECURE COMPUTING PROJECT TITLES

A Credibility Analysis System for Assessing Information on Twitter

Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

My Privacy My Decision: Control of Photo Sharing on Online Social Networks

Privacy-Preserving Selective Aggregation of Online User Behavior Data

ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions

Search Rank Fraud and Malware Detection in Google Play

Towards Detecting Compromised Accounts on Social Networks

INFORMATION FORENSICS AND SECURITY PROJECT TITLES

NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media

Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers

Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending

IOT Titles

A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT

An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy

Efficient and Privacy-preserving Polygons Spatial Query Framework for Location-based Services

Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems

SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud

BIG DATA

Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

SocialQ&A: An Online Social Network Based Question and Answer System

IMAGE PROCESSING PROJECT TITLES

Automatic Generation of Social Event Storyboard from Image Click-through Data

Image Re-ranking based on Topic Diversity

Tri-Clustered Tensor Completion for Social-Aware Image Tag Refinement

MULTIMEDIA PROJECT TITLES

Two-Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model

SOFTWARE ENGINEERING PROJECT TITLES

A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection

Improving Automated Bug Triaging with Specialized Topic Model

 SERVICE COMPUTING (WEB SERVICES)

Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method

Transactional Behavior Verification in Business Process as a Service Configuration

DOT NET IEEE PROJECT TITLES 2017-2018:

CLOUD COMPUTING PROJECT TITLES:

Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing

Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing

Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage

Enabling Semantic Search based on Conceptual Graphs over Encrypted Outsourced Data

Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud

Keyword Search with Access Control over Encrypted Cloud Data

MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection

Privacy Protection Based Access Control Scheme in Cloud-Based Services

Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data

Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data

SeDaSC: Secure Data Sharing in Clouds

Strong Key-Exposure Resilient Auditing for Secure Cloud Storage

TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud

User Differentiated Verifiable File Search on the Cloud

VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data

DATA MINING PROJECT TITLES

A Multi-Agent Advanced Traveler Information System for Optimal Trip Planning in a Co-Modal Framework

Continuous Top-k Monitoring on Document Streams

Detecting Stress Based on Social Interactions in Social Networks

Dynamic Facet Ordering for Faceted Product Search Engines

Efficient Keyword-aware Representative Travel Route Recommendation

Filtering out Infrequent Behavior from Business Process Event Logs

GALLOP: GlobAL feature fused Location Prediction for Different Check-in Scenarios

Generating Query Facets using Knowledge Bases

Influence Maximization in Trajectory Databases

Query Reorganisation Algorithms for Efficient Boolean Information Filtering

NETWORKING PROJECT TITLES

E2HRC: An Energy-Efficient Heterogeneous Ring Clustering Routing Protocol for Wireless Sensor Networks

Energy Efficient Clustering Algorithm for Multi-Hop Wireless Sensor Network Using Type-2 Fuzzy Logic

Energy Efficient Multipath Routing Protocol for Mobile ad-hoc Network Using the Fitness Function

Lightweight Three-factor Authentication and Key Agreement Protocol for Internet-integrated Wireless Sensor Networks

Research on Trust Sensing based Secure Routing Mechanism for Wireless Sensor Network

Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs

SECURE COMPUTING PROJECT TITLES

Cooperative Query Answer Authentication Scheme over Anonymous Sensing Data

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media

Privacy-Preserving Selective Aggregation of Online User Behavior Data

Search Rank Fraud and Malware Detection in Google Play

IOT Titles

Leveraging Crowdsourcing for Efficient Malicious Users Detection in Large-Scale Social Networks

SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud

IMAGE PROCESSING PROJECT TITLES

A Novel Data Hiding Algorithm for High Dynamic Range Images

Image Re-ranking based on Topic Diversity

SERVICE COMPUTING (WEB SERVICES)

Flexible Wildcard Searchable Encryption System

Transactional Behavior Verification in Business Process as a Service Configuration

 

 

Android IEEE Projects 2017-2018

Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location

An Android-based Mechanism for Energy Efficient Localization depending on Indoor / Outdoor Context

DELTA++: Reducing the Size of Android Application Updates

Detecting Driver’s Smartphone Usage via Non-intrusively Sensing Driving Dynamics

Drive Now, Text Later: Nonintrusive Texting-while-Driving Detection using Smartphones

DrivingStyles: A Mobile Platform for Driving Styles and Fuel Consumption Characterization

EnergyPatch: Repairing Resource Leaks to Improve Energy-efficiency of Android Apps

Fine-grained Abnormal Driving Behaviors Detection and Identification with Smartphones

Identifying User-Input Privacy in Mobile Applications at a Large Scale

Iterative Classifier Fusion System for the Detection of Android Malware

MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention

Monet: A User-oriented Behavior-based Malware Variants Detection System for Android

Privacy-Preserving Location-Proximity for Mobile Apps

RoadSense: Smartphone Application to Estimate Road Conditions using Accelerometer and Gyroscope

ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes

ShuffleDog: Characterizing and Adapting User-Perceived Latency of Android Apps

TeamPhone: Networking Smartphones for Disaster Recovery

Towards Automatically Generating Privacy Policy for Android Apps

Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions

ZapDroid: Managing Infrequently Used Applications on Smartphones

2017 – 2018 NETWORK SIMULATOR – NS2 IEEE FINAL YEAR Projects

MANET (Mobile Ad-hoc Networks)

A Delay-Sensitive Multicast Protocol for Network Capacity Enhancement in Multirate MANETs

A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks

Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks

Delay Analytical Models for Opportunistic Routing in Wireless Ad Hoc Networks

Energy Efficient Multipath Routing Protocol for Mobile ad-hoc Network Using the Fitness Function

Fine-Grained Analysis of Packet Loss in MANETs

SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks

WSN – Wireless Sensor Networks (Routing)

A Distributed Delay-Efficient Data Aggregation Scheduling for Duty-cycled WSNs

A Joint Routing and MAC Protocol for Transmission Delay Reduction in Many-to-One Communication Paradigm for Wireless Sensor Networks

A Self-Adaptive Sleep/Wake-Up Scheduling Approach for Wireless Sensor Networks

E2HRC: An Energy-Efficient Heterogeneous Ring Clustering Routing Protocol for Wireless Sensor Networks

Energy Efficient Clustering Algorithm for Multi-Hop Wireless Sensor Network Using Type-2 Fuzzy Logic

Load Balanced Coverage with Graded Node Deployment in Wireless Sensor Networks

Load-Balanced Opportunistic Routing for Duty-Cycled Wireless Sensor Networks

Low-Cost Collaborative Mobile Charging for Large-Scale Wireless Sensor Networks

Near Optimal Data Gathering in Rechargeable Sensor Networks with a Mobile Sink

Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks

Optimization of Watchdog Selection in Wireless Sensor Networks

QoS-Aware and Heterogeneously Clustered Routing Protocol for Wireless Sensor Networks

Routing Protocol for Wireless sensor networks Using Swarm intelligence-ACO with ECPSOA

SEND: A Situation-Aware Emergency Navigation Algorithm with Sensor Networks

Speed Up-Greedy Perimeter Stateless Routing Protocol for Wireless Sensor Networks (SU-GPSR)

WSN – Wireless Sensor Networks (Security)

A Key Distribution Scheme for Mobile Wireless Sensor Networks: q-s-composite

A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment

A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks

Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks

Lightweight Three-factor Authentication and Key Agreement Protocol for Internet-integrated Wireless Sensor Networks

Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks

Research on Trust Sensing based Secure Routing Mechanism for Wireless Sensor Network

Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks

ROSE: Robustness Strategy for Scale-Free Wireless Sensor Networks

Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSNs

TruFiX: A Configurable Trust-based Cross-Layer Protocol for Wireless Sensor Networks

VANET – Vehicular Ad-hoc Networks (Routing)

Adaptive Quality of Service based Routing for Vehicular Ad hoc Networks with Ant Colony Optimization

CBS: Community-based Bus System as Routing Backbone for Vehicular Ad Hoc Networks

DIVERT: A Distributed Vehicular Traffic Re-routing System for Congestion Avoidance

EcoTrec—A Novel VANET-Based Approach to Reducing Vehicle Emissions

Enhancing Quality of Service Conditions Using a Cross-Layer Paradigm for Ad-hoc Vehicular Communication

MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs

Trustworthiness Evaluation-based Routing Protocol for Incompletely Predictable Vehicular Ad hoc Networks

VANET – Vehicular Ad-hoc Networks (Security)

Distributed Aggregate Privacy-Preserving Authentication in VANETs

EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks

Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm

Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET

GDVAN: A New Greedy Behavior Attack Detection Algorithm For VANETs

REPLACE: A Reliable Trust-based Platoon Service Recommendation Scheme in VANET

WIRELESS COMMUNICATIONS & OTHERS

Congestion Control Scheme Performance Analysis Based on Nonlinear RED

Distributed Learning for Energy-Efficient Resource Management in Self-Organizing Heterogeneous Networks

End-to-end Throughput Maximization for Underlay Multi-hop Cognitive Radio Networks with RF Energy Harvesting

Robotic Message Ferrying for Wireless Networks using Coarse-Grained Backpressure Control

Spectrum-Availability based Routing for Cognitive Sensor Networks

Towards Effective Trust-based Packet Filtering in Collaborative Network Environments

Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks

HADOOP BIG DATA IEEE PROJECTS 2017-2018

A Scalable Data Chunk Similarity based Compression Approach for Efficient Big Sensing Data Processing on Cloud

A Systematic Approach Toward Description and Classification of Cybercrime Incidents

Achieving Efficient and Privacy-Preserving Cross-Domain Big Data Deduplication in Cloud

aHDFS: An Erasure-Coded Data Archival System for Hadoop Clusters

Big Data Privacy in Biomedical Research

Cost-Aware Big Data Processing across Geo-distributed Datacenters

Disease Prediction by Machine Learning over Big Data from Healthcare Communities

DyScale: a MapReduce Job Scheduler for Heterogeneous Multicore Processors

Efficient Processing of Skyline Queries Using MapReduce

FiDoop-DP: Data Partitioning in Frequent Itemset Mining on Hadoop Clusters

Hadoop MapReduce for Mobile Clouds

Mining Human Activity Patterns from Smart Home Big Data for Healthcare Applications

PPHOPCM: Privacy-preserving High-order Possibilistic  c-Means Algorithm for Big Data Clustering with Cloud Computing

Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset

Public Interest Analysis Based on Implicit Feedback of IPTV Users

Ring: Real-Time Emerging Anomaly Monitoring System over Text Streams

Robust Big Data Analytics for Electricity Price Forecasting in the Smart Grid

Scalable Uncertainty-Aware Truth Discovery in Big Data Social Sensing Applications for Cyber-Physical Systems

Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters

Service Rating Prediction by Exploring Social Mobile Users’ Geographical Locations