ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
2015-2016 Academic Projects @ TMKS Infotech
#1510,Sri Gowri Shankara Complex,2nd Floor,
MKK Road,Near Harishchandra Ghat,
Mariyappanapalya,Rajajinagar 2nd Stage,
Bangalore - 560021.
1.Stealthy Denial of Service Strategy in Cloud Computing
2.SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
3.A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
4.Cloud Federations in the Sky: Formation Game and Mechanism
5.Enabling Fine grained Multi keyword Search Supporting Classified Sub dictionaries over Encrypted Clo
6.Enabling Efficient Multi Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storag
7.Distributed denial of service attacks in software defined networking with cloud computing
8.Cost Effective Authentic and Anonymous Data Sharing with Forward Security
9.Content Based Image Retrieval Using Error Diffusion Block Truncation Coding Features
10.A Distributed Fault Tolerant Topology Control Algorithm for Heterogeneous Wireless Sensor Networks
11.Energy Efficient Virtual Network Embedding for Cloud Networks
12.Diversifying Web Service Recommendation Results via Exploring Service Usage History
13.Audit-Free Cloud Storage via Deniable Attribute-based Encryption
14.A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
15.Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
16.Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
17.Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
18.Secure Auditing and Deduplicating Data in Cloud
19.A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
20.Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
21.A Dynamic Secure Group Sharing Framework in Public Cloud Computing
22.CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
23.Demystifying the Clouds: Harnessing Resource Utilization Models for Cost Effective Infrastructure Alternatives
24.Identity-based Encryption with Outsourced Revocation in Cloud Computing
25.Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud
26.Space-efficient Verifiable Secret Sharing Using Polinamial Interpolation
27.Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
28.Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
29.Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
30.Key Aggregate Searchable Encryption KASE for Group Data Sharing via Cloud Storage
31.Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
32.Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
33.Cloud-Trust a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds
34.A secure data self-destructing scheme in cloud computing
35.CPU Provisioning Algorithms for Service Differentiation in Cloud-based Environments
36.Efficient Data Query in Intermittently Connected Mobile Ad Hoc Social Networks
37.SWIMMING: Seamless and Efficient WiFi-Based Internet Access from Moving Vehicles
38.Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers
39.Cooperative Positioning and Tracking in Disruption Tolerant Networks
40.Friendbook: A Semantic-based Friend Recommendation System for Social Networks
41.Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications
42.Android College Campus
43.Towards Effective Bug Triage with Software Data Reduction Techniques
44.Discovery of Ranking Fraud for Mobile Apps
45.PAGE: A Partition Aware Engine for Parallel Graph Computation
46.Detecting Malicious Face book Applications
47.Active Learning for Ranking through Expected Loss Optimization
48.Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks
Contact :: K.Manjunath - 9535866270

More Related Content

2015 and 2016 IEEE Projects for Mobile Computing

  • 1. 2015-2016 Academic Projects @ TMKS Infotech #1510,Sri Gowri Shankara Complex,2nd Floor, MKK Road,Near Harishchandra Ghat, Mariyappanapalya,Rajajinagar 2nd Stage, Bangalore - 560021. 1.Stealthy Denial of Service Strategy in Cloud Computing 2.SelCSP: A Framework to Facilitate Selection of Cloud Service Providers 3.A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems 4.Cloud Federations in the Sky: Formation Game and Mechanism 5.Enabling Fine grained Multi keyword Search Supporting Classified Sub dictionaries over Encrypted Clo 6.Enabling Efficient Multi Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storag 7.Distributed denial of service attacks in software defined networking with cloud computing 8.Cost Effective Authentic and Anonymous Data Sharing with Forward Security 9.Content Based Image Retrieval Using Error Diffusion Block Truncation Coding Features 10.A Distributed Fault Tolerant Topology Control Algorithm for Heterogeneous Wireless Sensor Networks 11.Energy Efficient Virtual Network Embedding for Cloud Networks 12.Diversifying Web Service Recommendation Results via Exploring Service Usage History 13.Audit-Free Cloud Storage via Deniable Attribute-based Encryption 14.A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing 15.Provable Multicopy Dynamic Data Possession in Cloud Computing Systems 16.Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation 17.Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage 18.Secure Auditing and Deduplicating Data in Cloud 19.A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 20.Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds 21.A Dynamic Secure Group Sharing Framework in Public Cloud Computing 22.CloudArmor: Supporting Reputation-based Trust Management for Cloud Services 23.Demystifying the Clouds: Harnessing Resource Utilization Models for Cost Effective Infrastructure Alternatives 24.Identity-based Encryption with Outsourced Revocation in Cloud Computing 25.Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud 26.Space-efficient Verifiable Secret Sharing Using Polinamial Interpolation 27.Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud 28.Provable Multicopy Dynamic Data Possession in Cloud Computing Systems 29.Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation 30.Key Aggregate Searchable Encryption KASE for Group Data Sharing via Cloud Storage 31.Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing 32.Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage 33.Cloud-Trust a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds 34.A secure data self-destructing scheme in cloud computing 35.CPU Provisioning Algorithms for Service Differentiation in Cloud-based Environments 36.Efficient Data Query in Intermittently Connected Mobile Ad Hoc Social Networks 37.SWIMMING: Seamless and Efficient WiFi-Based Internet Access from Moving Vehicles 38.Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers 39.Cooperative Positioning and Tracking in Disruption Tolerant Networks 40.Friendbook: A Semantic-based Friend Recommendation System for Social Networks 41.Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications 42.Android College Campus 43.Towards Effective Bug Triage with Software Data Reduction Techniques 44.Discovery of Ranking Fraud for Mobile Apps 45.PAGE: A Partition Aware Engine for Parallel Graph Computation 46.Detecting Malicious Face book Applications 47.Active Learning for Ranking through Expected Loss Optimization 48.Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks Contact :: K.Manjunath - 9535866270