B.TECH DOT NET PROJECTS
IEEE DOT NET 2016 PROJECTS

SL.NO

Name of The Project

Abstract

Year

CLOUD COMPUTING
1 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Download 2016
2 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Download 2016
3 SeDas: A Self-Destructing Data System Based on Active Storage Framework Download 2016
4 An Ensemble of Replication and Erasure Codes for Cloud File Systems Download 2016
5 A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud. Download 2016
6 Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems. Download 2016
7 Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks Download 2016
8 Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data Download 2016
9 Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data Download 2016
10 An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing. Download 2016
11 Ensuring Distributed Accountability for Data Sharing in the Cloud Download 2016
12 Towards Secure and Dependable Storage Services in Cloud Computing Download 2016
DATA MINING (KNOWLEDGE & DATA ENGG.)
1 Dynamic Personalized Recommendation on Sparse Data Download 2016
2 Supporting Search-As-You-Type Using SQL in Databases Download 2016
3 Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases Download 2016
4 A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model Download 2016
5 Anomaly Detection via Online Oversampling Principal Component Analysis Download 2016
6 Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting. Download 2016
7 Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Download 2016
8 Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption Download 2016
9 Mining Order-Preserving Sub matrices from Data with Repeated Measurements Download 2016
10 m-Privacy for Collaborative Data Publishing Download 2016
11 Publishing Search Logs—A Comparative Study of Privacy Guarantees Download 2016
12 Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems Download 2016
13 Slicing: A New Approach to Privacy Preserving Data Publishing Download 2016
14 Data Mining Techniques for Software Effort Estimation: A Comparative Study Download 2016
15 Personalized mobile search engine Download 2016
16 Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques Download 2016
17 Ranking and Clustering Software Cost Estimation Models through a Multiple Comparisons Algorithm Download 2016
NETWORKING
1 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks Download 2016
2 Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks Download 2016
3 A Survey of XML Tree Patterns. Download 2016
4 EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Network Download 2016
5 Mobi-Sync Efficient Time Synchronization for Mobile Underwater Sensor Networks. Download 2016
6 The Target Tracking in Mobile Sensor Networks Download 2016
7 Redundancy Management of Multipath Routing for Intrusion Tolerance Download 2016
8 A Distributed Control Law for Load Balancing in Content Delivery Download 2016
9 TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks Download 2016
10 Adaptive Opportunistic Routing for Wireless Ad Hoc Networks Local Greedy Approximation for Scheduling in Multihop Wireless Networks Download 2016
11 On the Throughput Capacity of Wireless Sensor Networks with Mobile Relays Download 2016
12 Scalable Learning of Collective Behavior Download 2016
12 VRSVSS Calculator Download 2016
SECURE COMPUTING
1 Identity-Based Secure Distributed Data Storage Schemes Download 2016
2 Privacy Preserving Data Sharing With Anonymous ID Assignment Download 2016
3 Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks Download 2016
4 EAACK—A Secure Intrusion-Detection System for MANETs. Download 2016
5 SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems. Download 2016
6 ROAuth Recommendation Based Open Authorization Download 2016
IMAGE PROCESSING
1 Authentication Using PERSUASIVE CLICK POINTS Download 2016
2 Semi supervised Biased Maximum Margin Download 2016
3 Defenses against large scale online password guessing Download 2016