Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
C.S.E 2020 PROJECTS
Java Cloud computing titles
S.NO Project title
1 A New Lightweight Symmetric Searchable Encryption Scheme For String
Identification
2 SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the
Cloud
3 SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in
Cloud Storage
4 Semantic-aware Searching over Encrypted Data for Cloud Computing
5 Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in
Cloud
6 An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over
Encrypted Cloud Data
7 Audit-Free Cloud Storage via Deniable Attribute-based Encryption
8 Catch You if You Misbehave: Ranked Keyword Search Results Verification in
Cloud Computing
9 Chaotic Searchable Encryption for Mobile Cloud Storage
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
10 CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
11 Combining Data Owner-side and Cloud-side Access Control for sEncrypted
Cloud Storage
12 CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage
13 DROPS: Division and Replication of Data in Cloud for Optimal Performance
and Security
14 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
15 Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record
Systems with Mobile Devices
16 Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing
17 Efficient Traceable Authorization Search System for Secure Cloud Storage
18 Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud
Storage
19 Identity-Based Private Matching over Outsourced Encrypted Datasets
20 Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access
Control
21 Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data
Dynamics in Cloud Storage
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
22 Privacy Preservation for Outsourced Medical Data With Flexible Access Control
23 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data
Sharing
24 Provably Secure Fine-Grained Data Access Control over Multiple Cloud Servers
in Mobile Cloud Computing Based Healthcare Applications
25 Publicly Verifiable Boolean Query Over Outsourced Encrypted Data
26 Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud
Storage
27 Secure Data Group Sharing and Dissemination with Attribute and Time
Conditions in Public Cloud
28 Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in
Cloud
29 Semantic-aware Searching over Encrypted Data for Cloud Computing
30 SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in
Cloud Storage
31 SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the
Cloud
32 Towards Privacy-preserving Content-based Image Retrieval in Cloud Computing
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
33 Unified Fine-grained Access Control for Personal Health Records in Cloud
Computing
34 A Cross Tenant Access Control ( CTAC) Model for Cloud Computing: Formal
Specification and Verification
35 A Modified Hierarchical Attribute-Based Encryption Access
Control Method for Mobile Cloud Computing
36 A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its
Users
37 A robust reputation management mechanism in the federated cloud
38 Achieving secure, universal, and fine-grained query results verification
for secure search scheme over encrypted cloud data
39 Customer-Satisfaction-Aware Optimal Multiserver Configuration
for Profit Maximization in Cloud Computing
41 Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
42 Identity-Based Encryption with Cloud Revocation Authority and Its Applications
43 Identity-based Remote Data Integrity Checking with Perfect Data
Privacy Preserving for Cloud Storage
44 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
Sharing
45 Privacy Protection based Access Control Scheme in Cloud-based Services
46 Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data
47 Provably Secure Key-Aggregate Cryptosystems with Broadcast
Aggregate Keys for Online Data Sharing on the Cloud
48 RAAC: Robust and Auditable Access Control with Multiple AttributeAuthorities
for Public Cloud Storage
49 Secure Data Sharing in Cloud Computing Using Revocable-Storage
Identity-Based Encryption
50 Securing Cloud Data under Key Exposure
51 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud
52 A Secure and Dynamic Multi-Keyword Ranked search scheme over encrypted
cloud data
53 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
54 An Efficient Privacy-Preserving Ranked Keyword Search Method
55 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud
Computing
56 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
Delegation in Cloud Computing
57 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
58 CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services
59 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to
Cloud Email
60 DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud
61 Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud
Storage
62 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
63 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
64 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing
Services
65 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity
Checking in Public Cloud
66 Secure Data Sharing in Cloud Computing Using Revocable-Storage
Identity-Based Encryption
67 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
68 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
69 SecRBAC: Secure data in the Clouds
70 Secure Data Sharing in Cloud Computing Using Revocable-Storage
Identity-Based Encryption
71 TMACS: A Robust and Verifiable Threshold Multi-Authority Access
Control System in Public Cloud Storage
72 Crowdsourcing Predictors of Behavioral Outcomes
73 cloudqual a quality model for cloud services
74 A Hybrid Cloud Approach for Secure Authorized In Cloud
75 Secure Auditing and Deduplicating Data in Cloud
76 AUDIT-FREE CLOUD STORAGE VIA DENIABLE ATTRIBUTE-BASED
ENCRYPTION
77 A Novel Model for Competition and Cooperation Among Cloud Providers
78 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
79 An Efficient Privacy-Preserving Ranked Keyword Search Method
80 An Efficient File Hierarchy Attribute-Based Encryption Scheme in
Cloud Computing
81 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
Delegation in Cloud Computing
82 A Secure Anti-Collusion Data Sharing Scheme
for Dynamic Groups in the Cloud
83 CloudArmor: Supporting Reputation-Based Trust Management
for Cloud Services
84 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its
Application to Cloud Email
85 DiploCloud: Efficient and Scalable Management of RDF Data in
the Cloud
86 Dual-Server Public-Key Encryption With Keyword Search for
Secure Cloud Storage
87 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
88 Enabling Cloud Storage Auditing With Verifiable Outsourcing of
Key Updates
89 Fine-Grained Two-Factor Access Control for Web-Based Cloud
Computing Services
90 Identity-Based Encryption with Cloud Revocation Authority and
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
Its Applications
91 Identity-Based Proxy-Oriented Data Uploading and Remote Data
Integrity Checking in Public Cloud
92 Secure Data Sharing in Cloud Computing Using Revocable-Storage
Identity-Based Encryption
93 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
94 SecRBAC: Secure data in the Clouds
95 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User
Environments
96 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control
System in Public Cloud
97 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-
Based Encryption
98 Towards optimized fine-grained pricing of Iaas Cloud platform
99 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
100 Secure Auditing and Deduplicating Data in Cloud
101 A Hybrid Cloud Approach for Secure Authorized Deduplication
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
102 Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud
Storage
103 Combining efficiency fidelity,&flexibility in resource information services
104 Enabling Cloud Storage Auditing with Key-Exposure Resistance
105 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted
Cloud Data
106 Identity-Based Encryption with Outsourced Revocation in Cloud Computing
107 Malware propagation in largescalenetwork
108 Performing Initiative Data Prefetching in Distributed File Systems for Cloud
Computing
109 CLOUD ARMOR: SUPPORTING REPUTATION-BASED TRUST
MANAGEMENT FOR CLOUD SERVICES
110 A Cost effective multi cloud data hosting scheme with high availability
111 AUDIT-FREE CLOUD STORAGE VIA DENIABLE ATTRIBUTE-BASED
ENCRYPTION
112 STEALTHY DENIAL OF SERVICE STRATEGY IN CLOUD COMPUTING
113 Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
114 PROGRESSIVE DUPLICATE DETECTION
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
115 Efficient encrypted data search as a mobile cloud service.
116 A secure anti-collision data sharing scheme for dynamic groups in the cloud.
117 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous
Attribute-Based Encryption
118 CLOUD-BASED MULTIMEDIA CONTENT PROTECTION SYSTEM
119 Lifelong Personal Health Data and Application Software Via virtual Machines in
the Cloud
120 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable
Delegation in Cloud Computing
121 A Scalable Two-Phase Top-Down Specialization Approach for Data
Anonymization Using MapReduce on Cloud
122 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS
Cloud Computing Systems
123 Building Confidential and Efficient Query Services in the Cloud with RASP Data
Perturbation
124 Decentralized Access Control with Anonymous Authentication of Data Stored in
Clouds
125 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
126 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority
Cloud Storage
127 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
128 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
129 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
130 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
131 Scalable Distributed Service Integrity Attestation for Software-as-a-Service
Clouds
132 Towards Differential Query Services in Cost-Efficient Clouds
133 Privacy Preserving Delegated Access Control in Public Clouds
134 An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
135 Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient
Verifiable Fine-Grained Updates
136 Achieving Effective Cloud Search Services:Multi-keyword Ranked Search over
Encrypted Cloud Data Supporting Synonym Query
137 Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions
138 CloudMoV: Cloud-based Mobile Social TV
139 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
Environment
140 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
141 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear
Equations
142 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
143 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
145 Privacy-Preserving Public Auditing for Secure Cloud Storage
146 Scalable and Secure Sharing of Personal Health Records in Cloud Computing
Using
147 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage
Systems
148 Load Rebalancing for Distributed File Systems in Clouds
149 Optimizing Cloud Resources for Delivering IPTV Services Through
Virtualization
150 Privacy Preserving Delegated Access Control in Public Clouds
151 Attribute-Based Encryption With
152 ABACUS: An Auction-Based Approach to Cloud Service Differentiation
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
153 Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing
Networks
154 A Secure Erasure Code-Based Cloud Storage System with Secure Data
Forwarding
155 Cloud Computing Security: From Single to Multi-Clouds
156 Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud
Storage
157 HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable
Access Control in Cloud Computing
158 Outsourced Similarity Search on Metric Data Assets
159 Scalable and Secure Sharing of Personal Health Records in Cloud Computing
using Attribute-based Encryption
160 Toward Secure and Dependable Storage Services in Cloud Computing
161 EduCloud: PaaS versus IaaS Cloud Usage for an Advanced Computer Science
Course
162 A Gossip Protocol for Dynamic Resource Management in Large Cloud
Environments
163 Ensuring Distributed Accountability for Data Sharing in the Cloud
164 Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
Data.
165 Portable Cloud Services Using TOSCA
166 Secure Overlay Cloud Storage with Access Control and Assured Deletion
167 Cloud Data Protection for the Masses
168 Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs.
Public Storage
169 Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
170 Cashing in on the Cache in the Cloud
Java Data mining titles
S.NO Project title
1 Characterizing and Predicting Early Reviewers for Effective Product
Marketing on E-Commerce Websites
2 CoDetect: Financial Fraud Detection With Anomaly Feature Detection
3 Complementary Aspect-based Opinion Mining
4 Emotion Recognition on Twitter: Comparative Study and Training a Unison
Model
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
5 Frequent Itemsets Mining With Differential Privacy Over Large-Scale Data
6 Health Monitoring on Social Media over Time
7 l-Injection: Toward Effective Collaborative Filtering Using Uninteresting
Items
8 On Generalizing Collective Spatial Keyword Queries
9 Online Product Quantization
10 Privacy Characterization and Quantification in Data Publishing
11 Road Traffic Speed Prediction: A Probabilistic Model Fusing Multi-Source
Data
12 Scalable Content-Aware Collaborative Filtering for Location
Recommendation
13 SDE: A Novel Clustering Framework Based on Sparsity-Density Entropy
14 Search Result Diversity Evaluation based on Intent Hierarchies
15 When to Make a Topic Popular Again? A Temporal Model for Topic Re-
hotting Prediction in Online Social Networks
16 Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling
Approach
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
17 Collaborative Filtering-Based Recommendation of Online Social Voting
18 Detecting Stress Based on Social Interactions in Social Networks
19 Dynamic Facet Ordering for Faceted Product Search Engines
20 Efficient Keyword-aware Representative Travel Route
Recommendation
21 SociRank: Identifying and Ranking Prevalent News Topics Using Social
Media Factors
22 RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem
23 User Vitality Ranking and Prediction in Social Networking Services:
a Dynamic Network Perspective
24 An Iterative Classification Scheme for Sanitizing Large scale Datasets
25 Computing Semantic Similarity of Concepts in Knowledge Graphs
26 Influence Maximization in Trajectory Databases
27 Personal web re visitation by context &content keyword with relevance
feedback
28 User Vitality Ranking and Prediction in Social Networking Services
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
29 A Novel Recommendation Model Regularized with User Trust and Item
Ratings
30 Connecting Social Media to E-Commerce: Cold-Start Product
RecommendationUsing Micro blogging Information
31 Crowdsourcing for Top-K Query Processing over Uncertain Data
32 Efficient Cache-Supported Path Planning on Roads
33 Nearest Keyword Set Search in Multi-Dimensional Datasets
34 A Novel Recommendation Model Regularized with User Trust and Item
Ratings
35 Rating Prediction based on Social Sentiment from Textual Reviews
36 Location Aware Keyword Query Suggestion Based on Document Proximity
37 A System to Filter Unwanted Messages from OSN User Walls
38 Security Evaluation of Pattern Classifiers under Attack
39 Towards Differential Query Services in Cost-Efficient Clouds
41 Structured Learning from Heterogeneous Behavior for Social Identity Linkage
42 A Novel Recommendation Model Regularized with User Trust and
Item Ratings
43 Connecting Social Media to E-Commerce: Cold-Start Product
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
Recommendation Using Micro blogging Information
44 Crowdsourcing for Top-K Query Processing over Uncertain Data
45 Efficient Cache-Supported Path
Planning on Roads
46 Nearest Keyword Set Search in Multi-Dimensional Datasets
47 Rating Prediction based on Social Sentiment from Textual
Reviews
48 Location Aware Keyword Query Suggestion Based on Document
Proximity
49 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
50 Subgraph Matching with Set Similarity in a Large Graph Database
51 Sparsity Learning Formulations for Mining Time-Varying Data
52 Best keyword searh
53 CloudKeyBank: Privacy and Owner Authorization Enforced Key
Management Framework
54 Real-Time Detection of Traffic From Twitter Stream Analysis
55 Making Digital Artifacts on the Web Verifiable and Reliable
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
56 Rule-Based Method for Entity Resolution
57 Towards Effective Bug Triage with Software Data Reduction Techniques
58 MALWARE PROPAGATION IN LARGE-SCALE NETWORKS
59 Agent-based Interactions and Economic Encounters in an Intelligent
InterCloud
60 Context-based diversification for keyword queries over Xml data
61 Geo-social k-cover group quries for collaborative spatial computing
62 REVERSE NEAREST NEIGHBORS IN UNSUPERVISED DISTANCE
BASED OUTLIER DETECTION
63 ON SUMMARIZATION AND TIMELINE GENERATION FOR
EVOLUTIONARY TWEET STREAMS
64 Structured Learning from Heterogeneous Behavior
65 The Impact of View Histories on Edit Recommendations (1)
66 Secure Spatial Top-k Query Processing via Untrusted Location-Based Service
67 t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility
Preservation
68 FOCS Fast Overlapped Community Search
69 A Cocktail Approach for Travel Package Recommendation
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
70 Accuracy-Constrained Privacy-Preserving Access Control
71 Data Mining with Big Data
72 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform
73 Dealing With Concept Drifts in Process Mining
74 Discovering Emerging Topics in Social Streams via
75 Efficient Prediction of Difficult Keyword Queries over Databases
76 Facilitating Document Annotation Using Content and Querying Value
77 Fast Nearest Neighbor Search with Keywords
78 Keyword Query Routing
79 Privacy-Preserving and Content-Protecting Location Based Queries
80 Security Evaluation of Pattern Classifiers under Attack
81 Supporting Privacy Protection in Personalized Web Search
82 Towards Online Shortest Path Computation
83 XSPath: Navigation on XML Schemas Made Easy
84 m-Privacy for Collaborative Data Publishing
85 Dynamic Query Forms for Database Queries
86 K-Anonymity for Crowdsourcing Database
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
87 A Supermodularity-Based Differential Privacy Preserving Algorithm for Data
Anonymization
88 A Supermodularity-Based Differential Privacy Preserving Algorithm for Data
Anonymization
89 LARS*: An Efficient and Scalable Location-Aware Recommender System
90 Approximate Shortest Distance Computing: A Query-Dependent Local
Landmark Scheme
91 A Fast Clustering-Based Feature Subset Selection Algorithm for High-
Dimensional Data
92 A New Algorithm for Inferring User Search Goals with Feedback Sessions
93 Annotating Search Results from Web DatabasesDATA MINING
94 Anomaly Detection via Online Over-Sampling Principal Component Analysis
95 Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor
Networks
96 m-Privacy for Collaborative Data Publishing
97 Protecting Sensitive Labels in Social Network Data
Anonymization
98 Tweet Analysis for Real-Time Event Detection and Earthquake Reporting
System Development
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
99 Document Clustering for Forensic Analysis: An Approach for Improving
Computer Inspection
100 A Method for Mining Infrequent Causal Associations and Its Application in
Finding Adverse Drug Reaction Signal Pairs
101 Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering
Algorithm
102 Crowdsourcing Predictors of Behavioral Outcomes
103 Facilitating Document Annotation using Content and Querying Value
104 A Generalized Flow-Based Method for Analysis of Implicit Relationships on
Wikipedia
105 A System to Filter Unwanted Messages from OSN User Walls
106 Anonymization of Centralized and Distributed Social Networks by Sequential
Clustering
107 Intrusion Detection Technique by using K-means, Fuzzy Neural Network and
SVM classifiers.
108 Spatial Approximate String Search
109 Preventing Private Information Inference Attacks on Social Networks
110 Multiparty Access Control for Online Social Networks Model and
Mechanisms
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
111 Incentive Compatible Privacy-Preserving Data Analysis
112 Facilitating Effective User Navigation through Website Structure
Improvement
113 Classification and Adaptive Novel Class Detection of Feature-Evolving Data
Streams
114 Comparable Entity Mining from
115 Multiparty Access Control for Online Social Networks: Model and
Mechanisms
116 DDD: A New Ensemble Approach for Dealing with Concept Drift
Java Networking titles
S.NO Project title
1 Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks
2 GeTrust: A guarantee-based trust model in Chord-based P2P networks
3 PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
4 Traffic and Energy Aware Routing for Heterogeneous Wireless Sensor
Networks
5 An Overlay Architecture for Throughput Optimal Multipath Routing
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
6 Network Capability in Localizing Node Failures via End-to-End Path
Measurements
7 Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered
Sensor Network
8 STAMP Enabling Privacy- Preserving Location Proofs for Mobile Users
9 iPath Path Inference in Wireless Sensor Networks
10 Building an intrusion detection system using a filter-based feature selection
algorithm
11 Detecting malicious facebook applications
12 Social Friend Recommendation Based on Multiple Network
Correlation
13 Resolving Multi-party Privacy Conflicts in Social Media
14 Dynamic Routing for Data Integrity and Delay Differentiated Services in
Wireless Sensor Networks
15 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in
Wireless Ad Hoc Networks
16 Friendbook: A Semantic-based Friend Recommendation System for Social
Networks
17 STAMP Enabling Privacy- Preserving Location Proofs for Mobile Users
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
18 Building an intrusion detection system using a filter-based feature selection
algorithm
19 iPath Path Inference in Wireless Sensor Networks
20 Detecting malicious facebook applications
21 Social Friend Recommendation Based on Multiple Network Correlation
22 Resolving Multi-party Privacy Conflicts in Social Media
23 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though
Replication for Efficient File Sharing
24 A Proximity-Aware Interest-Clustered P2P File Sharing System.
25 Automatic Test Packet Generation
26 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
27 Boundary Cutting for Packet Classification
28 Secure Data Retrieval for Decentralized Disruption-Tolerant Military
Networks
29 A General Self-Organized Tree-Based Energy-Balance Routing Protocol for
Wireless Sensor Network
30 Congestion Aware Routing in Nonlinear Elastic Optical Networks
31 Adaptive Opportunistic Routing for Wireless Ad Hoc Networks
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
32 Design, Implementation, and Performance of a Load Balancer for SIP Server
Clusters
33 Independent Directed Acyclic Graphs for Resilient Multipath Routing
34 MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
35 Privacy- and Integrity-Preserving Range Queries in Sensor Networks
36 RIHT: A Novel Hybrid IP Traceback Scheme
37 Router Support for Fine-Grained Latency Measurements
38 Packet Loss Control Using Tokens at the Network Edge
39 CORMAN: A Novel Cooperative Opportunistic Routing
Java Parallel & Distributed Titles
S.NO Project title
1 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the
Cloud
2 Exploiting Workload Characteristics and Service Diversity to Improve the
Availability of Cloud Storage Systems
3 Cost-Effective Authentic and Anonymous Data Sharing with Forward
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
Security
4 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social
Networks
5 Exploiting Service Similarity for Privacy in Location-Based Search Queries
6 LocaWard: A Security and Privacy Aware Location-Based Rewarding System
7 On False Data-Injection Attacks against Power System State Estimation:
Modeling and Countermeasures
8 RRE: A Game-Theoretic Intrusion Response and Recovery Engine
9 Securing Broker-Less Publish/Subscribe Systems Using Identity-Based
Encryption
10 SOS: A Distributed Mobile Q&A System Based on Social Networks
11 The Client Assignment Problem for Continuous Distributed Interactive
Applications: Analysis, Algorithms, and Evaluation
12 The Design and Evaluation of An Information Sharing System for Human
Networks
13 Traffic Pattern-Based Content Leakage Detection for Trusted Content
Delivery Networks
14 Secure Outsourced Attribute-based Signatures
15 Multi-Path Routing and Forwarding in Non-Cooperative Wireless Networks
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
16 SocialTube: P2P-Assisted Video Sharing in Online
Social Networks
17 A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc
Networks
18 Asymmetric Social Proximity Based Private Matching Protocols for Online
Social Networks
19 A System for Denial-of-Service Attack Detection Based on Multivariate
Correlation Analysis
20 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
21 Security Analysis of a Privacy-Preserving Decentralized Key-Policy
Attribute-Based Encryption Scheme
22 IP-Geolocation Mapping for Moderately Connected Internet Regions
23 Optimal Client-Server Assignment for Internet Distributed Systems
24 A Framework for Mining Signatures from Event Sequences and Its
Applications in Healthcare Data
25 SocialTube P2P-assisted Video Sharing in Online Social Networks
26 A System for Denial-of-Service Attack Detection Based on Multivariate
Correlation Analysis
27 Detection and Localization of Multiple Spoofing Attackers in Wireless
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
Networks
28 Fully Anonymous Profile Matching in Mobile Social Networks
29 Cluster-Based Certificate Revocation with Vindication Capability for Mobile
Ad Hoc Networks
30 BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P
Networks
31 Payments for Outsourced Computations
32 Cut Detection in Wireless Sensor Networks
33 A Framework for Routing Performance Analysis in Delay Tolerant Networks
with Application to Non-cooperative Networks
34 Footprint: Detecting Sybil Attacks in Urban Vehicular Networks
35 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile
Sinks
36 Capacity of Data Collection in Arbitrary Wireless Sensor Networks
Secure Computing titles
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
S.NO Project title
1 A Hybrid Approach for Detecting Automated Spammers in Twitter
2 A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-
Matching for Mobile Healthcare Social Network
3 Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness
4 Collective Data-Sanitization for Preventing Sensitive Information Inference
Attacks in Social Networks
5 Exploiting Social Network to Enhance Human-to-Human Infection Analysis
Without Privacy Leakage
6 My Privacy My Decision: Control of Photo Sharing on Online Social
Networks
7 Efficient and Privacy-preserving Min and k-th Min Computations in Mobile
Sensing Systems
8 Privacy-Preserving Selective Aggregation of Online User Behavior Data
9 ProGuard: Detecting Malicious Accounts in Social-Network-Based Online
Promotions
10 Towards Detecting Compromised Accounts on Social Networks
11 A Multilevel Access Control Scheme for Data Security in Transparent
Computing
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
12 Data Lineage in Malicious Environments
13 FRoDO Fraud Resilient Device
14 SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web
SmartCrawler:
A Two-stage Crawler for Efficiently Harvesting Deep-Web
15 Captcha As Graphical Password
16 Data Lineage in Malicious Environments
17 FRoDO Fraud Resilient Device
18 A LIGHTWEIGHT SECURE SCHEME FOR DETECTING PROVENANCE
FORGERY AND PACKET DROP ATTACKS IN WIRELESS SENSOR
NETWORK
19 LOCATION-AWARE AND PERSONALIZED COLLABORATIVE
FILTERING FOR WEB SERVICE RECOMMENDATION
20 CONTRIBUTORY BROADCAST ENCRYPTION WITH EFFICIENT
ENCRYPTION AND SHORT CIPHERTEXTS
21 SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web
22 Captcha as Graphical Passwords—A New Security Primitive Based on Hard
AI Problems
23 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
24 PROFILR: Toward Preserving Privacy and Functionality in Geosocial
Networks
25 Top-k Query Result Completeness Verification in Tiered Sensor Networks
26 Abductive Analysis of Administrative Policies in Rule-Based Access Control
27 Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor
Networks
28 Evaluation of Web Security Mechanisms Using Vulnerability & Attack
Injection
29 Malware Propagation in Large-Scale Networks
30 Hiding in the Mobile Crowd: Location Privacy through Collaboration
31 EAACK—A Secure Intrusion-Detection System for MANETs
32 Identity-Based Secure Distributed Data Storage Schemes
33 Modeling the Pairwise Key Predistribution Scheme in the Presence of
Unreliable Links
34 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual
Network Systems
35 Privacy Preserving Data Sharing With Anonymous ID Assignment
36 Securing Class Initialization in Java-like Languages
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
37 Security Analysis of a Single Sign-On Mechanism for Distributed Computer
Networks
38 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
39 WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs
in Twitter Stream
41 Two tales of privacy in online social networks
42 Secure Encounter-based Mobile Social Networks: Requirements, Designs, and
Tradeoffs
43 Twitsper: Tweeting Privately
44 Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless
Networks
45 Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
46 A Stochastic Model of Multi-virus Dynamics
47 Design and Implementation of TARF: A Trust-Aware Routing Framework for
WSNs
48 Detecting and Resolving Firewall Policy Anomalies
49 Detecting Spam Zombies by Monitoring Outgoing Messages
50 On the Security of a Ticket-Based Anonymity System with Traceability
Property in Wireless Mesh Networks
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
51 Online Modeling of Proactive Moderation System for Auction Fraud
Detection
52 Packet-Hiding Methods for Preventing Selective Jamming Attacks
53 Risk-Aware Mitigation for MANET Routing Attacks
54 Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
55 On the Security and Efficiency of Content Distribution via Network Coding
Dear Sir/Madam,
This is to inform that VISION SOLUTIONS is providing
IEEE/LIVE/APPLICATION/CUSTOMIZED PROJECTS in Guntur.
Trained More than a 4000 students successfully , of various colleges.
More than 3years experience in Academic Projects Development for All
Departments (M.Tech, B.Tech, MCA,& Diploma).
Why Only VISIOn SOlUTIOnS........!!!!
MOre Than 7 yearS IndUSTrIal experIenced FacUlTy.
yOU WIll be geT real TIMe experIence WITh 100 % OUT pUT
reSUlTS.
yOU WIll be prOVIded WITh ValUable cerTIFIcaTIOn FOr cOUrSe.
pracTIcal expOSUre TO adVanced TechnOlOgIeS.
Vision Solutions
# 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad,
Call: +91 9603150547 | www.visionsolutions.tech
V
i
s
i
o
n
S
o
l
u
t
i
o
n
s
plaTFOrM TO apply TheOreTIcal cOncepTS.
back and FrOnT end prOgraMMIng SUppOrT
hIgh applIcaTIOn OrIenTed TraInIng.
PROJECT SUPPORT TO REGISTERED STUDENTS
1) IEEE Base paper.
2) Abstract Document.
3) Future Enhancement (based on Requirement).
4) Modified Title / Modified Abstract (based on Requirement).
5) Complete Source Code.
6) Final Report / Document
7) Review PPTS and Documents.
8) How to Run execution help file(Video File).
9) International Journal Publication based on your project.
10)Complete Documentation According To College Format
11) Plagiarism Report

More Related Content

DOCX
Java ieee 2020 21 projects list
PDF
Ieee cse software 2018 project list
PDF
2014 list
DOC
2021- 22 IEEE JAVA Projects
PDF
Hb services java ieee 2015 - 16
DOCX
2014 and 2015 ieee final list
PDF
ieee 2016 Java project list
DOCX
IEEE 2014 Title's list for CSC
Java ieee 2020 21 projects list
Ieee cse software 2018 project list
2014 list
2021- 22 IEEE JAVA Projects
Hb services java ieee 2015 - 16
2014 and 2015 ieee final list
ieee 2016 Java project list
IEEE 2014 Title's list for CSC

What's hot (14)

DOC
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
PPTX
Tokenization vs encryption vs masking
PDF
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
DOC
Java projects 2013 14
PDF
Java 2015 project list
DOCX
2019 and 2020 java and android ieee projects list
PDF
COIRS: Cost Optimized Identity based Ring Signature with Forward Secrecy in ...
PDF
Blockchain for CyberSecurity | Blockchain and CyberSecurity
PDF
Ieee projects list java 2015
PDF
Fool Proof: Protecting Digital Identity in the Age of the Data Breach
DOCX
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
PDF
M.tech java 2014 15 list
PDF
QOMPLX Cyber Identity Access Management
PDF
Cost effective authentic and anonymous data sharing with forward security
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
Tokenization vs encryption vs masking
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
Java projects 2013 14
Java 2015 project list
2019 and 2020 java and android ieee projects list
COIRS: Cost Optimized Identity based Ring Signature with Forward Secrecy in ...
Blockchain for CyberSecurity | Blockchain and CyberSecurity
Ieee projects list java 2015
Fool Proof: Protecting Digital Identity in the Age of the Data Breach
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
M.tech java 2014 15 list
QOMPLX Cyber Identity Access Management
Cost effective authentic and anonymous data sharing with forward security
Ad

Similar to Cse titles 2020 (20)

PDF
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
DOCX
Java ieee 2020 21 projects list
PDF
Java titles 2017 2018
PDF
Java Project titles adrit solutions
PDF
2015 and 2016 IEEE Projects for Data Mining
PDF
2015 and 2016 IEEE Projects for Network Security
PDF
2015 and 2016 IEEE Projects for Ad Hoc Networks
PDF
2015 and 2016 IEEE projects for Parallel and Distributed Applications
PDF
2015 and 2016 IEEE Projects for Cloud Computing
PDF
2015 and 2016 IEEE Projects for Mobile Computing
PDF
2015 and 2016 IEEE Projects for Android
PDF
2015 and 2016 ieee projects
PDF
2015 IEEE Projects for CSE
PDF
JAVA PROJECTS TITLES 2022-23.pdf
DOCX
2014 java ieee
DOCX
Cloud computing titles list dream web techno solutions
DOCX
Cloud computing titles list dream web techno solutions
DOCX
Cloud computing titles list dream web techno solutions
DOCX
Cloud computing titles list dream web techno solutions
DOCX
Cloud computing titles list dream web techno solutions
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
Java ieee 2020 21 projects list
Java titles 2017 2018
Java Project titles adrit solutions
2015 and 2016 IEEE Projects for Data Mining
2015 and 2016 IEEE Projects for Network Security
2015 and 2016 IEEE Projects for Ad Hoc Networks
2015 and 2016 IEEE projects for Parallel and Distributed Applications
2015 and 2016 IEEE Projects for Cloud Computing
2015 and 2016 IEEE Projects for Mobile Computing
2015 and 2016 IEEE Projects for Android
2015 and 2016 ieee projects
2015 IEEE Projects for CSE
JAVA PROJECTS TITLES 2022-23.pdf
2014 java ieee
Cloud computing titles list dream web techno solutions
Cloud computing titles list dream web techno solutions
Cloud computing titles list dream web techno solutions
Cloud computing titles list dream web techno solutions
Cloud computing titles list dream web techno solutions
Ad

More from Vision Solutions (20)

PDF
Cse python titles 2020
PDF
Civil project tittles 2020
PDF
Civil project tittles 2019
PDF
Mechnical project list 2020
PDF
Ieee 2020 matlab project list
PDF
Eee hardware list
PDF
Ieee m.tech embedded 2018 project list
PDF
Ieee eee embedded 2018 project list
PDF
Ieee ece embedded 2018 project list
PDF
Ieee m.tech 2018 power systems & power electronics & drives list
PDF
IEEE 2017 EEE matlab projects
PDF
IEEE VLSI ECE PROJECT LIST
PDF
IEEE VLSI ECE PROJECT LIST
PDF
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
PDF
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
PDF
IEEE 2015 MATLAB EEE PROJECT LIST
PDF
IEEE 2014 MATLAB EEE PROJECT LIST
PDF
IEEE 2013 MATLAB EEE PROJECT LIST
PDF
IEEE EMBDDED EEE PROJECT LIST
PDF
IEEE EMBEDDED ECE PROJECT LIST
Cse python titles 2020
Civil project tittles 2020
Civil project tittles 2019
Mechnical project list 2020
Ieee 2020 matlab project list
Eee hardware list
Ieee m.tech embedded 2018 project list
Ieee eee embedded 2018 project list
Ieee ece embedded 2018 project list
Ieee m.tech 2018 power systems & power electronics & drives list
IEEE 2017 EEE matlab projects
IEEE VLSI ECE PROJECT LIST
IEEE VLSI ECE PROJECT LIST
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
MECHANICAL PROJECT LIST (UNIGRAPHICS & HEPERMESH & CATIA)
IEEE 2015 MATLAB EEE PROJECT LIST
IEEE 2014 MATLAB EEE PROJECT LIST
IEEE 2013 MATLAB EEE PROJECT LIST
IEEE EMBDDED EEE PROJECT LIST
IEEE EMBEDDED ECE PROJECT LIST

Recently uploaded (20)

PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PPTX
Software Engineering and software moduleing
PPTX
Measurement Uncertainty and Measurement System analysis
PPTX
Principal presentation for NAAC (1).pptx
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PDF
20250617 - IR - Global Guide for HR - 51 pages.pdf
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PPTX
Amdahl’s law is explained in the above power point presentations
PPTX
Module 8- Technological and Communication Skills.pptx
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PPTX
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
PPTX
PRASUNET_20240614003_231416_0000[1].pptx
PDF
August -2025_Top10 Read_Articles_ijait.pdf
PDF
Cryptography and Network Security-Module-I.pdf
PPTX
CyberSecurity Mobile and Wireless Devices
PDF
Unit1 - AIML Chapter 1 concept and ethics
PPTX
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
PPTX
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
PPTX
mechattonicsand iotwith sensor and actuator
PPTX
ai_satellite_crop_management_20250815030350.pptx
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Software Engineering and software moduleing
Measurement Uncertainty and Measurement System analysis
Principal presentation for NAAC (1).pptx
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
20250617 - IR - Global Guide for HR - 51 pages.pdf
August 2025 - Top 10 Read Articles in Network Security & Its Applications
Amdahl’s law is explained in the above power point presentations
Module 8- Technological and Communication Skills.pptx
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
PRASUNET_20240614003_231416_0000[1].pptx
August -2025_Top10 Read_Articles_ijait.pdf
Cryptography and Network Security-Module-I.pdf
CyberSecurity Mobile and Wireless Devices
Unit1 - AIML Chapter 1 concept and ethics
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
mechattonicsand iotwith sensor and actuator
ai_satellite_crop_management_20250815030350.pptx

Cse titles 2020

  • 1. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s C.S.E 2020 PROJECTS Java Cloud computing titles S.NO Project title 1 A New Lightweight Symmetric Searchable Encryption Scheme For String Identification 2 SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud 3 SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage 4 Semantic-aware Searching over Encrypted Data for Cloud Computing 5 Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in Cloud 6 An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data 7 Audit-Free Cloud Storage via Deniable Attribute-based Encryption 8 Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing 9 Chaotic Searchable Encryption for Mobile Cloud Storage
  • 2. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 10 CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics 11 Combining Data Owner-side and Cloud-side Access Control for sEncrypted Cloud Storage 12 CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage 13 DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security 14 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud 15 Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices 16 Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing 17 Efficient Traceable Authorization Search System for Secure Cloud Storage 18 Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage 19 Identity-Based Private Matching over Outsourced Encrypted Datasets 20 Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control 21 Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage
  • 3. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 22 Privacy Preservation for Outsourced Medical Data With Flexible Access Control 23 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing 24 Provably Secure Fine-Grained Data Access Control over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications 25 Publicly Verifiable Boolean Query Over Outsourced Encrypted Data 26 Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage 27 Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud 28 Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in Cloud 29 Semantic-aware Searching over Encrypted Data for Cloud Computing 30 SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage 31 SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud 32 Towards Privacy-preserving Content-based Image Retrieval in Cloud Computing
  • 4. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 33 Unified Fine-grained Access Control for Personal Health Records in Cloud Computing 34 A Cross Tenant Access Control ( CTAC) Model for Cloud Computing: Formal Specification and Verification 35 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing 36 A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users 37 A robust reputation management mechanism in the federated cloud 38 Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data 39 Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing 41 Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds 42 Identity-Based Encryption with Cloud Revocation Authority and Its Applications 43 Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage 44 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data
  • 5. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s Sharing 45 Privacy Protection based Access Control Scheme in Cloud-based Services 46 Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data 47 Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud 48 RAAC: Robust and Auditable Access Control with Multiple AttributeAuthorities for Public Cloud Storage 49 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption 50 Securing Cloud Data under Key Exposure 51 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud 52 A Secure and Dynamic Multi-Keyword Ranked search scheme over encrypted cloud data 53 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing 54 An Efficient Privacy-Preserving Ranked Keyword Search Method 55 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing 56 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable
  • 6. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s Delegation in Cloud Computing 57 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 58 CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services 59 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email 60 DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud 61 Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage 62 Dynamic and Public Auditing with Fair Arbitration for Cloud Data 63 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates 64 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services 65 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud 66 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption 67 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing 68 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
  • 7. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 69 SecRBAC: Secure data in the Clouds 70 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption 71 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage 72 Crowdsourcing Predictors of Behavioral Outcomes 73 cloudqual a quality model for cloud services 74 A Hybrid Cloud Approach for Secure Authorized In Cloud 75 Secure Auditing and Deduplicating Data in Cloud 76 AUDIT-FREE CLOUD STORAGE VIA DENIABLE ATTRIBUTE-BASED ENCRYPTION 77 A Novel Model for Competition and Cooperation Among Cloud Providers 78 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 79 An Efficient Privacy-Preserving Ranked Keyword Search Method 80 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing 81 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable
  • 8. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s Delegation in Cloud Computing 82 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 83 CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services 84 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email 85 DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud 86 Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage 87 Dynamic and Public Auditing with Fair Arbitration for Cloud Data 88 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates 89 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services 90 Identity-Based Encryption with Cloud Revocation Authority and
  • 9. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s Its Applications 91 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud 92 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption 93 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing 94 SecRBAC: Secure data in the Clouds 95 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments 96 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud 97 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity- Based Encryption 98 Towards optimized fine-grained pricing of Iaas Cloud platform 99 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage 100 Secure Auditing and Deduplicating Data in Cloud 101 A Hybrid Cloud Approach for Secure Authorized Deduplication
  • 10. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 102 Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage 103 Combining efficiency fidelity,&flexibility in resource information services 104 Enabling Cloud Storage Auditing with Key-Exposure Resistance 105 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 106 Identity-Based Encryption with Outsourced Revocation in Cloud Computing 107 Malware propagation in largescalenetwork 108 Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing 109 CLOUD ARMOR: SUPPORTING REPUTATION-BASED TRUST MANAGEMENT FOR CLOUD SERVICES 110 A Cost effective multi cloud data hosting scheme with high availability 111 AUDIT-FREE CLOUD STORAGE VIA DENIABLE ATTRIBUTE-BASED ENCRYPTION 112 STEALTHY DENIAL OF SERVICE STRATEGY IN CLOUD COMPUTING 113 Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation 114 PROGRESSIVE DUPLICATE DETECTION
  • 11. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 115 Efficient encrypted data search as a mobile cloud service. 116 A secure anti-collision data sharing scheme for dynamic groups in the cloud. 117 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption 118 CLOUD-BASED MULTIMEDIA CONTENT PROTECTION SYSTEM 119 Lifelong Personal Health Data and Application Software Via virtual Machines in the Cloud 120 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing 121 A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud 122 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems 123 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation 124 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds 125 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
  • 12. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 126 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage 127 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 128 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud 129 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 130 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data 131 Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds 132 Towards Differential Query Services in Cost-Efficient Clouds 133 Privacy Preserving Delegated Access Control in Public Clouds 134 An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds 135 Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates 136 Achieving Effective Cloud Search Services:Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query 137 Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions 138 CloudMoV: Cloud-based Mobile Social TV 139 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing
  • 13. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s Environment 140 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System 141 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations 142 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 143 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 145 Privacy-Preserving Public Auditing for Secure Cloud Storage 146 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using 147 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems 148 Load Rebalancing for Distributed File Systems in Clouds 149 Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization 150 Privacy Preserving Delegated Access Control in Public Clouds 151 Attribute-Based Encryption With 152 ABACUS: An Auction-Based Approach to Cloud Service Differentiation
  • 14. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 153 Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks 154 A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding 155 Cloud Computing Security: From Single to Multi-Clouds 156 Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage 157 HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing 158 Outsourced Similarity Search on Metric Data Assets 159 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption 160 Toward Secure and Dependable Storage Services in Cloud Computing 161 EduCloud: PaaS versus IaaS Cloud Usage for an Advanced Computer Science Course 162 A Gossip Protocol for Dynamic Resource Management in Large Cloud Environments 163 Ensuring Distributed Accountability for Data Sharing in the Cloud 164 Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud
  • 15. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s Data. 165 Portable Cloud Services Using TOSCA 166 Secure Overlay Cloud Storage with Access Control and Assured Deletion 167 Cloud Data Protection for the Masses 168 Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage 169 Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud 170 Cashing in on the Cache in the Cloud Java Data mining titles S.NO Project title 1 Characterizing and Predicting Early Reviewers for Effective Product Marketing on E-Commerce Websites 2 CoDetect: Financial Fraud Detection With Anomaly Feature Detection 3 Complementary Aspect-based Opinion Mining 4 Emotion Recognition on Twitter: Comparative Study and Training a Unison Model
  • 16. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 5 Frequent Itemsets Mining With Differential Privacy Over Large-Scale Data 6 Health Monitoring on Social Media over Time 7 l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items 8 On Generalizing Collective Spatial Keyword Queries 9 Online Product Quantization 10 Privacy Characterization and Quantification in Data Publishing 11 Road Traffic Speed Prediction: A Probabilistic Model Fusing Multi-Source Data 12 Scalable Content-Aware Collaborative Filtering for Location Recommendation 13 SDE: A Novel Clustering Framework Based on Sparsity-Density Entropy 14 Search Result Diversity Evaluation based on Intent Hierarchies 15 When to Make a Topic Popular Again? A Temporal Model for Topic Re- hotting Prediction in Online Social Networks 16 Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
  • 17. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 17 Collaborative Filtering-Based Recommendation of Online Social Voting 18 Detecting Stress Based on Social Interactions in Social Networks 19 Dynamic Facet Ordering for Faceted Product Search Engines 20 Efficient Keyword-aware Representative Travel Route Recommendation 21 SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors 22 RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem 23 User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective 24 An Iterative Classification Scheme for Sanitizing Large scale Datasets 25 Computing Semantic Similarity of Concepts in Knowledge Graphs 26 Influence Maximization in Trajectory Databases 27 Personal web re visitation by context &content keyword with relevance feedback 28 User Vitality Ranking and Prediction in Social Networking Services
  • 18. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 29 A Novel Recommendation Model Regularized with User Trust and Item Ratings 30 Connecting Social Media to E-Commerce: Cold-Start Product RecommendationUsing Micro blogging Information 31 Crowdsourcing for Top-K Query Processing over Uncertain Data 32 Efficient Cache-Supported Path Planning on Roads 33 Nearest Keyword Set Search in Multi-Dimensional Datasets 34 A Novel Recommendation Model Regularized with User Trust and Item Ratings 35 Rating Prediction based on Social Sentiment from Textual Reviews 36 Location Aware Keyword Query Suggestion Based on Document Proximity 37 A System to Filter Unwanted Messages from OSN User Walls 38 Security Evaluation of Pattern Classifiers under Attack 39 Towards Differential Query Services in Cost-Efficient Clouds 41 Structured Learning from Heterogeneous Behavior for Social Identity Linkage 42 A Novel Recommendation Model Regularized with User Trust and Item Ratings 43 Connecting Social Media to E-Commerce: Cold-Start Product
  • 19. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s Recommendation Using Micro blogging Information 44 Crowdsourcing for Top-K Query Processing over Uncertain Data 45 Efficient Cache-Supported Path Planning on Roads 46 Nearest Keyword Set Search in Multi-Dimensional Datasets 47 Rating Prediction based on Social Sentiment from Textual Reviews 48 Location Aware Keyword Query Suggestion Based on Document Proximity 49 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites 50 Subgraph Matching with Set Similarity in a Large Graph Database 51 Sparsity Learning Formulations for Mining Time-Varying Data 52 Best keyword searh 53 CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework 54 Real-Time Detection of Traffic From Twitter Stream Analysis 55 Making Digital Artifacts on the Web Verifiable and Reliable
  • 20. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 56 Rule-Based Method for Entity Resolution 57 Towards Effective Bug Triage with Software Data Reduction Techniques 58 MALWARE PROPAGATION IN LARGE-SCALE NETWORKS 59 Agent-based Interactions and Economic Encounters in an Intelligent InterCloud 60 Context-based diversification for keyword queries over Xml data 61 Geo-social k-cover group quries for collaborative spatial computing 62 REVERSE NEAREST NEIGHBORS IN UNSUPERVISED DISTANCE BASED OUTLIER DETECTION 63 ON SUMMARIZATION AND TIMELINE GENERATION FOR EVOLUTIONARY TWEET STREAMS 64 Structured Learning from Heterogeneous Behavior 65 The Impact of View Histories on Edit Recommendations (1) 66 Secure Spatial Top-k Query Processing via Untrusted Location-Based Service 67 t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation 68 FOCS Fast Overlapped Community Search 69 A Cocktail Approach for Travel Package Recommendation
  • 21. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 70 Accuracy-Constrained Privacy-Preserving Access Control 71 Data Mining with Big Data 72 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform 73 Dealing With Concept Drifts in Process Mining 74 Discovering Emerging Topics in Social Streams via 75 Efficient Prediction of Difficult Keyword Queries over Databases 76 Facilitating Document Annotation Using Content and Querying Value 77 Fast Nearest Neighbor Search with Keywords 78 Keyword Query Routing 79 Privacy-Preserving and Content-Protecting Location Based Queries 80 Security Evaluation of Pattern Classifiers under Attack 81 Supporting Privacy Protection in Personalized Web Search 82 Towards Online Shortest Path Computation 83 XSPath: Navigation on XML Schemas Made Easy 84 m-Privacy for Collaborative Data Publishing 85 Dynamic Query Forms for Database Queries 86 K-Anonymity for Crowdsourcing Database
  • 22. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 87 A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization 88 A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization 89 LARS*: An Efficient and Scalable Location-Aware Recommender System 90 Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme 91 A Fast Clustering-Based Feature Subset Selection Algorithm for High- Dimensional Data 92 A New Algorithm for Inferring User Search Goals with Feedback Sessions 93 Annotating Search Results from Web DatabasesDATA MINING 94 Anomaly Detection via Online Over-Sampling Principal Component Analysis 95 Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks 96 m-Privacy for Collaborative Data Publishing 97 Protecting Sensitive Labels in Social Network Data Anonymization 98 Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
  • 23. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 99 Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection 100 A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs 101 Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm 102 Crowdsourcing Predictors of Behavioral Outcomes 103 Facilitating Document Annotation using Content and Querying Value 104 A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia 105 A System to Filter Unwanted Messages from OSN User Walls 106 Anonymization of Centralized and Distributed Social Networks by Sequential Clustering 107 Intrusion Detection Technique by using K-means, Fuzzy Neural Network and SVM classifiers. 108 Spatial Approximate String Search 109 Preventing Private Information Inference Attacks on Social Networks 110 Multiparty Access Control for Online Social Networks Model and Mechanisms
  • 24. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 111 Incentive Compatible Privacy-Preserving Data Analysis 112 Facilitating Effective User Navigation through Website Structure Improvement 113 Classification and Adaptive Novel Class Detection of Feature-Evolving Data Streams 114 Comparable Entity Mining from 115 Multiparty Access Control for Online Social Networks: Model and Mechanisms 116 DDD: A New Ensemble Approach for Dealing with Concept Drift Java Networking titles S.NO Project title 1 Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks 2 GeTrust: A guarantee-based trust model in Chord-based P2P networks 3 PROVEST: Provenance-based Trust Model for Delay Tolerant Networks 4 Traffic and Energy Aware Routing for Heterogeneous Wireless Sensor Networks 5 An Overlay Architecture for Throughput Optimal Multipath Routing
  • 25. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 6 Network Capability in Localizing Node Failures via End-to-End Path Measurements 7 Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Network 8 STAMP Enabling Privacy- Preserving Location Proofs for Mobile Users 9 iPath Path Inference in Wireless Sensor Networks 10 Building an intrusion detection system using a filter-based feature selection algorithm 11 Detecting malicious facebook applications 12 Social Friend Recommendation Based on Multiple Network Correlation 13 Resolving Multi-party Privacy Conflicts in Social Media 14 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks 15 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks 16 Friendbook: A Semantic-based Friend Recommendation System for Social Networks 17 STAMP Enabling Privacy- Preserving Location Proofs for Mobile Users
  • 26. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 18 Building an intrusion detection system using a filter-based feature selection algorithm 19 iPath Path Inference in Wireless Sensor Networks 20 Detecting malicious facebook applications 21 Social Friend Recommendation Based on Multiple Network Correlation 22 Resolving Multi-party Privacy Conflicts in Social Media 23 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing 24 A Proximity-Aware Interest-Clustered P2P File Sharing System. 25 Automatic Test Packet Generation 26 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes 27 Boundary Cutting for Packet Classification 28 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 29 A General Self-Organized Tree-Based Energy-Balance Routing Protocol for Wireless Sensor Network 30 Congestion Aware Routing in Nonlinear Elastic Optical Networks 31 Adaptive Opportunistic Routing for Wireless Ad Hoc Networks
  • 27. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 32 Design, Implementation, and Performance of a Load Balancer for SIP Server Clusters 33 Independent Directed Acyclic Graphs for Resilient Multipath Routing 34 MeasuRouting: A Framework for Routing Assisted Traffic Monitoring 35 Privacy- and Integrity-Preserving Range Queries in Sensor Networks 36 RIHT: A Novel Hybrid IP Traceback Scheme 37 Router Support for Fine-Grained Latency Measurements 38 Packet Loss Control Using Tokens at the Network Edge 39 CORMAN: A Novel Cooperative Opportunistic Routing Java Parallel & Distributed Titles S.NO Project title 1 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2 Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems 3 Cost-Effective Authentic and Anonymous Data Sharing with Forward
  • 28. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s Security 4 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 5 Exploiting Service Similarity for Privacy in Location-Based Search Queries 6 LocaWard: A Security and Privacy Aware Location-Based Rewarding System 7 On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures 8 RRE: A Game-Theoretic Intrusion Response and Recovery Engine 9 Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption 10 SOS: A Distributed Mobile Q&A System Based on Social Networks 11 The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluation 12 The Design and Evaluation of An Information Sharing System for Human Networks 13 Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks 14 Secure Outsourced Attribute-based Signatures 15 Multi-Path Routing and Forwarding in Non-Cooperative Wireless Networks
  • 29. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 16 SocialTube: P2P-Assisted Video Sharing in Online Social Networks 17 A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks 18 Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks 19 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 20 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation 21 Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme 22 IP-Geolocation Mapping for Moderately Connected Internet Regions 23 Optimal Client-Server Assignment for Internet Distributed Systems 24 A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data 25 SocialTube P2P-assisted Video Sharing in Online Social Networks 26 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 27 Detection and Localization of Multiple Spoofing Attackers in Wireless
  • 30. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s Networks 28 Fully Anonymous Profile Matching in Mobile Social Networks 29 Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks 30 BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks 31 Payments for Outsourced Computations 32 Cut Detection in Wireless Sensor Networks 33 A Framework for Routing Performance Analysis in Delay Tolerant Networks with Application to Non-cooperative Networks 34 Footprint: Detecting Sybil Attacks in Urban Vehicular Networks 35 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 36 Capacity of Data Collection in Arbitrary Wireless Sensor Networks Secure Computing titles
  • 31. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s S.NO Project title 1 A Hybrid Approach for Detecting Automated Spammers in Twitter 2 A Provably-Secure Cross-Domain Handshake Scheme with Symptoms- Matching for Mobile Healthcare Social Network 3 Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness 4 Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks 5 Exploiting Social Network to Enhance Human-to-Human Infection Analysis Without Privacy Leakage 6 My Privacy My Decision: Control of Photo Sharing on Online Social Networks 7 Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems 8 Privacy-Preserving Selective Aggregation of Online User Behavior Data 9 ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions 10 Towards Detecting Compromised Accounts on Social Networks 11 A Multilevel Access Control Scheme for Data Security in Transparent Computing
  • 32. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 12 Data Lineage in Malicious Environments 13 FRoDO Fraud Resilient Device 14 SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web 15 Captcha As Graphical Password 16 Data Lineage in Malicious Environments 17 FRoDO Fraud Resilient Device 18 A LIGHTWEIGHT SECURE SCHEME FOR DETECTING PROVENANCE FORGERY AND PACKET DROP ATTACKS IN WIRELESS SENSOR NETWORK 19 LOCATION-AWARE AND PERSONALIZED COLLABORATIVE FILTERING FOR WEB SERVICE RECOMMENDATION 20 CONTRIBUTORY BROADCAST ENCRYPTION WITH EFFICIENT ENCRYPTION AND SHORT CIPHERTEXTS 21 SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web 22 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems 23 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
  • 33. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 24 PROFILR: Toward Preserving Privacy and Functionality in Geosocial Networks 25 Top-k Query Result Completeness Verification in Tiered Sensor Networks 26 Abductive Analysis of Administrative Policies in Rule-Based Access Control 27 Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks 28 Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection 29 Malware Propagation in Large-Scale Networks 30 Hiding in the Mobile Crowd: Location Privacy through Collaboration 31 EAACK—A Secure Intrusion-Detection System for MANETs 32 Identity-Based Secure Distributed Data Storage Schemes 33 Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links 34 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems 35 Privacy Preserving Data Sharing With Anonymous ID Assignment 36 Securing Class Initialization in Java-like Languages
  • 34. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 37 Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks 38 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems 39 WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream 41 Two tales of privacy in online social networks 42 Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs 43 Twitsper: Tweeting Privately 44 Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks 45 Cross-Domain Privacy-Preserving Cooperative Firewall Optimization 46 A Stochastic Model of Multi-virus Dynamics 47 Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs 48 Detecting and Resolving Firewall Policy Anomalies 49 Detecting Spam Zombies by Monitoring Outgoing Messages 50 On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks
  • 35. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s 51 Online Modeling of Proactive Moderation System for Auction Fraud Detection 52 Packet-Hiding Methods for Preventing Selective Jamming Attacks 53 Risk-Aware Mitigation for MANET Routing Attacks 54 Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure 55 On the Security and Efficiency of Content Distribution via Network Coding Dear Sir/Madam, This is to inform that VISION SOLUTIONS is providing IEEE/LIVE/APPLICATION/CUSTOMIZED PROJECTS in Guntur. Trained More than a 4000 students successfully , of various colleges. More than 3years experience in Academic Projects Development for All Departments (M.Tech, B.Tech, MCA,& Diploma). Why Only VISIOn SOlUTIOnS........!!!! MOre Than 7 yearS IndUSTrIal experIenced FacUlTy. yOU WIll be geT real TIMe experIence WITh 100 % OUT pUT reSUlTS. yOU WIll be prOVIded WITh ValUable cerTIFIcaTIOn FOr cOUrSe. pracTIcal expOSUre TO adVanced TechnOlOgIeS.
  • 36. Vision Solutions # 2-38/4, Haabia House, Sreerama Colony, Hitech City, Madhapur, Hyderabad, Call: +91 9603150547 | www.visionsolutions.tech V i s i o n S o l u t i o n s plaTFOrM TO apply TheOreTIcal cOncepTS. back and FrOnT end prOgraMMIng SUppOrT hIgh applIcaTIOn OrIenTed TraInIng. PROJECT SUPPORT TO REGISTERED STUDENTS 1) IEEE Base paper. 2) Abstract Document. 3) Future Enhancement (based on Requirement). 4) Modified Title / Modified Abstract (based on Requirement). 5) Complete Source Code. 6) Final Report / Document 7) Review PPTS and Documents. 8) How to Run execution help file(Video File). 9) International Journal Publication based on your project. 10)Complete Documentation According To College Format 11) Plagiarism Report