Final Year Projects


ENGINEERING PROJECT TOPICS LIST :

Location Based Application :

A Location- and Diversity-aware News Feed System for Mobile Users.


ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware


Context-Based Access Control Systems for Mobile Devices.


Cooperative Positioning and Tracking in Disruption Tolerant Networks.


CWC: A Distributed Computing Infrastructure Using Smartphones.

Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud.


Extend Your Journey: Considering Signal Strength and Fluctuation in Location-Based Applications.

Privacy-Preserving Relative Location Based Services for Mobile Users.


Smartphone-Based Wound Assessment System for Patients with Diabetes.


The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps.


Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds.

User Privacy and Data Trustworthiness in Mobile Crowd Sensing.


User-Defined Privacy Grid System for Continuous Location-Based Services.

VULHUNTER: Toward Discovering Vulnerabilities in Android Applications.

Cloud Computing :

A Hybrid Cloud Approach for Secure Authorized Deduplication

A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing

A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud

An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration

Audit-Free Cloud Storage via Deniable Attribute-based Encryption

Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing


CloudArmor: Supporting Reputation-based Trust Management for Cloud Services


Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption

Enabling Cloud Storage Auditing With Key-Exposure Resistance


Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data

Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage


Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing


Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

Provable Multicopy Dynamic Data Possession in Cloud Computing Systems


Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation

Secure Auditing and Deduplicating Data in Cloud

Stealthy Denial of Service Strategy in Cloud Computing











No comments:

Post a Comment