2014 UPDATED LIST

  1. A Framework For Selection Of Best Cloud Service Provider Using Ranked Voting Method
  2. Using Identity and Trust with Key Management for achieving security in Ad hoc Networks
  3. KASR: A Keyword-Aware Service Recommendation Method on MapReduce for Big Data
  4. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
  5. iFarm: Development of Cloud-based System of Cultivation Management for Precision Agriculture
  6. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
  7. Automatic Medical Disease Treatment System Using Datamining
  8. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
  9. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
  10. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing-
  11. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
  12. Fault Node Recovery Algorithm for a Wireless Sensor Network
  13. Load Rebalancing for Distributed File Systems in Clouds
  14. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
  15. E-MACs: Towards More Secure and More E_cient Constructions of Secure Channels
  16. Secure Mining of Association Rules in Horizontally Distributed Databases
  17. A FRAMEWORK FOR SELECTION OF BEST CLOUD SERVICE PROVIDER USING RANKED VOTING METHOD
  18. Using Identity and Trust with Key Management for achieving security in Ad hoc Networks
  19. KASR: A Keyword-Aware Service Recommendation Method on MapReduce for Big Data

CLOUD COMPUTING / BIG DATA

  1. A Load Balancing Model Based on Cloud Partitioning
  2. A Secure Client Side Deduplication Scheme in Cloud Storage Environments
  3. An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments
  4. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
  5. EasySMS: A Protocol for End-to-End Secure Transmission of SMS
  6. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
  7. CloudMoV: Cloud-based Mobile Social TV
  8. A packet marking approach to protect cloud environment against DDoS attacks
  9. C-MART: Benchmarking the Cloud   Parallel and Distributed Systems
  10. Pre-emptive scheduling of on-line real time services with task migration for cloud computing
  11. Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data
  12. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
  13. Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization
  14. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
  15. Secure Logging As a Service—Delegating Log Management to the Cloud
  16. Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing
  17. A cloud computing based telemedicine service
  18. Privacy-Preserving Public Auditing for Secure Cloud Storage
  19. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
  20. A Framework For Selection Of Best Cloud Service Provider Using Ranked Voting Method
  21. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
  22. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
  23. iFarm: Development of Cloud-based System of Cultivation Management for Precision Agriculture
  24. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
  25. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
  26. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing-
  27. Energy-Efficient Link Selection and Transmission Scheduling in Mobile Cloud Computing
  28. Load Rebalancing for Distributed File Systems in Clouds
  29. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
  30. Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications
  31. NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds
  32. Privacy Preserving Cloud-based Computing  Platform (PPCCP) for using Location Based Services
  33. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
  34. An Improved Mutual Authentication Framework for Cloud Computing

BIG DATA

  1. Big Data as an e-Health Service
  2. Enabling Efficient Access Control with Dynamic Policy Updating for Big Data in the Cloud
  3. Load Balancing for Privacy-Preserving Access to Big Data in Cloud
  4. MRPrePost-A parallel algorithm adapted for mining big data
  5. Toward Efficient and Privacy-Preserving Computing in Big Data Era
  6. Towards Knowledge Discovery in Big Data
  7. Privacy Preserving Data Analytics for Smart Homes
  8. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-grained Updates
  9. KASR: A Keyword-Aware Service Recommendation Method on MapReduce for Big Data
  10. Cost Minimization for Big Data Processing in Geo-Distributed Data Centers
  11. Dache: A Data Aware Caching for Big-Data Applications Using the MapReduce Framework
  12. ClubCF: A Clustering-based Collaborative Filtering Approach for Big Data Application

DATA MINING / WEBMINING / CYBER SECURITY

  1. Secure Mining of Association Rules in Horizontally Distributed Databases
  2. Traditional Set Based Approach in Mining Sequential Patterns
  3. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective Privacy Preserving of Intermediate Datasets In cloud
  4. Automatic Medical Disease Treatment System Using Datamining
  5. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
  6. Automatic Itinerary Planning for Traveling Services
  7. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
  8. Keyword Query Routing
  9. The Role of Apriori Algorithm for Finding the Association Rules in Data Mining

CYBER SECURITY

  1. A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges
  2. Anonymous and Distributed Community Cyber Incident Detection
  3. Mission-centricity in cyber security: Architecting cyber attack resilient missions
  4. Efficient Protocols For Secure Broadcast In Controller Area Networks
  5. Efficient Protocols For Secure Broadcast In Controller Area Networks
  6. Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications
  7. Communication security for smart grid distribution networks
  8. Teaching RFID Information Systems Security[2013]

WIRELESS SENSOR NETWORK

  1. Adaptive and Secure Load-Balancing Routing Protocol for Service-Oriented Wireless Sensor Networks
  2. Throughput-Optimal Scheduling in Multihop Wireless Networks Without Per-Flow Information
  3. LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks
  4. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSN
  5. Secure Authentication Scheme in Wireless Networks
  6. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
  7. Fault Node Recovery Algorithm for a Wireless Sensor Network
  8.  “Efficient Sensor Node Authentication in Wireless Integrated Sensor Networks Using Virtual Certificate Authority”
  9. Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning
  10. Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks

INFORMATION SECURITY

  1. Attribute-Based Encryption With Verifiable Outsourced Decryption
  2. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
  3. A Three Party Authentication for Key Distributed Protocol Using Classical and Quantum Cryptography
  4. E-MACs: Towards More Secure and More E_cient Constructions of Secure Channels

MOBILE COMPUTING

  1. Energy Efficient Cluster Based Routing Protocol for Wireless Sensor Networks
  2. SDSM: A Secure Data Service Mechanism in Mobile Cloud Computing
  3. DSS: Distributed SINR-Based Scheduling Algorithm for Multihop Wireless Networks
  4. Channel-Aware Routing in MANETs With Route Handoff (AOMDV)
  5. A Node-Disjoint Multipath Routing Method Based on AODV Protocol for MANETs
  6. An energy-efficient data storage scheme in wireless sensor networks
  7. The Black-hole node attack in MANET
  8. Fast Data Collection in Tree-Based Wireless Sensor Networks
  9. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
  10. Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing
  11. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
  12. On demand Temporary Route Recovery for Frequent Link Failures in Adhoc Networks
  13. Secure Distance-Based Localization In The Presence Of Cheating Beacon Nodes

DISTRIBUTED AND PARELLEL

  1. Distributed Private Key Generation for Identity Based Cryptosystems in Ad Hoc Networks
  2. DRINA: A Lightweight and Reliable Routing Approach for in-Network Aggregation in Wireless Sensor Networks
  3. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
  4. A 3N Approach to Network Control and Management
  5. Towards Practical Communication in Byzantine-Resistant DHTs
  6. An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems
  7. Rumor Riding: Anonym zing Unstructured Peer-to-Peer Systems
  8. FDAC: Toward Fine-grained Distributed Data Access Control in Wireless Sensor Networks
  9. Consistent Monitoring System for Parallel and Distributed Systems
  10. Privacy Preserving Data Sharing with Anonymous ID Assignment
  11. Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems
  12. SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
  13. FireCol: a collaborative protection network for the detection of flooding DDoS attacks
  14. Timely and continuous machine-learning-based classification for interactive IP traffic
  15. Privacy- and integrity-preserving range queries in sensor networks
  16. Anomaly extraction in backbone networks using association rules
  17. Signature Neural Networks: Definition and Application to Multidimensional Sorting Problems
  18. Blind Image Quality Assessment Using a General RegressionNeural
  19. Modeling of Complex-Valued Wiener Systems Using B-Spline Neural Network.

NETWORKING / NETWORK + SECURITY

  1. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
  2. Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks
  3. An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks
  4. Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm
  5. Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
  6. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
  7. Computing localized power efficient data aggregation in Trees for sensor network
  8. Using Identity and Trust with Key Management for achieving security in Ad hoc Networks
  9. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
  10. Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using uncertain Reasoning
  11. A Temporal Packet Marking Detection scheme against MIRA Attack in MANET
  12. EAACK—A Secure Intrusion-Detection System for MANETs
  13. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks

NETWORK+ SECURITY

  1. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSN
  2. Secure Authentication Scheme in Wireless Networks
  3. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
  4. A Three Party Authentication for Key Distributed Protocol Using Classical and Quantum Cryptography
  5. Nymble: Blocking Misbehaving Users in Anonym zing Networks
  6. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
  7. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network
  8. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
  9. A group key agreement protocol based on stability & power using a Elliptical curve cryptography
  10. An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature
  11. Providing Witness Anonymity Under Peer-to-Peer Settings
  12. MABS Multicast Authentication Based on Batch Signature

KNOWLEDGE / DATA ENTRY / ARTIFICIAL INTELLIGENCE

  1. A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
  2. Anomaly Detection via Online Oversampling principal Component Analysis
  3. Lineage Encoding: An Efficient Wireless XML Streaming Supporting Twig Pattern Queries
  4. MKBoost: A Framework of Multiple Kernel Boosting
  5. TACI: Taxonomy-Aware Catalog Integration
  6. Mining Order-Preserving Submatrices from Data with Repeated Measurements

ARTIFICIAL INTELLIGENCE

  1. Distributed management system
  2. Cyber credit card system
  3. Advanced secured system
  4. Secure Multi signature generation for group communication
  5. Mobile payment service system
  6. Helthcare service system
.projects for phd,projects for phd in computer science,ieee projects for phd,phd projects,phd projects in bangalore,phd projects in electrical engineering,phd projects in computer science,ieee phd project,electronics projects for phd,phd ieee,ieee phd follwship,ieee phd thesis,phd projects in electronics,CITL Tech varsity, bangalore,India offers projects on IEEE 2013, 2014 - 2015 for BE computer science engineering students ( CSE / CS ), Information science engineering students ( ISE / IS ) on technologies like Java, dotnet, android, matlab and ns2. students can opt for different domain like networking, network security, cloud computing, wireless sensor network, mobile adhoc network. CITL Tech varsity, bangalore,India also offers IEEE 2014 - 2015, 2013 projects for M.Tech in compuetr science ( CSE / CS) , information science (ISE / IS), Computer networking ( CNE ), computer network engineering,CITL Tech varsity, bangalore,India also offers research work for Phd students in IEEE, phd in computer science, phd in wireless sensor network (WSN) phd in mobile computing,phd in adhoc network, phd in datamining,CITL Tech varsity, bangalore,India offers research work for Phd students in electronics, phd in image processing, phd in communication, phd in wireless communication, phd in wireless sensor network, phd in ieee.