This document lists 92 academic projects from 2013-2012 in domains related to cloud computing, data mining, networking, secure computing, mobile computing, and parallel distributed systems. The projects are implemented using technologies like Java/J2EE and .NET and address topics such as secure cloud storage, load balancing, intrusion detection, and privacy-preserving data sharing. MODA Innovations provides complete solutions for these projects.
This document lists 92 academic projects from 2013-2012 in domains related to cloud computing, data mining, networking, secure computing, mobile computing, and parallel distributed systems. The projects are implemented using technologies like Java/J2EE and .NET and address topics such as secure cloud storage, load balancing, intrusion detection, and privacy-preserving data sharing. MODA Innovations provides complete solutions for these projects.
S NO Project Title Domain Technology Year 1 Privacy-Preserving Public Auditing for Secure Cloud Storage Cloud Computing Java/J2ee 2013 2 CloudMoV: Cloud-based Mobile Social TV Cloud Computing Java/J2ee 2013 3 Winds of Change From Vendor Lock-In to the Meta Cloud. Cloud Computing Java/J2ee 2013 4 Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Cloud Computing Java/J2ee 2013 5 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud. Cloud Computing Java/J2ee 2013 6 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems Cloud Computing Java/J2ee 2013 7 Dynamic Resource allocation using virtual machines for cloud computing environment Cloud Computing Java/J2ee 2013 8 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems Cloud Computing Java/J2ee 2013 9 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System Cloud Computing Java/J2ee 2013
10 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute- based Encryption. Cloud Computing Java/J2ee 2013 11 Harnessing the Cloud for Securely Outsourcing Large Cloud Computing Java/J2ee 2013 12 Prediction-Based Cloud Bandwidth and Cost Reduction System Cloud Computing Java/J2ee 2013 13 Privacy-Preserving Public Auditing for Secure Cloud Storage Cloud Computing Java/J2ee 2013 14 Cloud computing for mobile users can offloading compution save energy. Cloud Computing Java/J2ee 2013 15 A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data Data Mining Java/J2ee 2013 16 Access Policy Consolidation for Event Processing Systems Data Mining Java/J2ee 2013 17 Facilitating Document Annotation Using Content And Querying Value Data Mining Java/J2ee 2013 18 m-Privacy for Collaborative Data Publishing Data Mining Java/J2ee 2013 19 Protecting Sensitive Labels in Social Network Data Anonymization Data Mining Java/J2ee 2013 20 Tweet Analysis for Real-Time Event Detection and Earthquake Data Mining Java/J2ee 2013 21 Robust Module-based Data Management Data Mining Java/J2ee 2013 22 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems Data Mining Java/J2ee 2013 23 Spatial Approximate String Search Data Mining Java/J2ee 2013 24 Crowdsourcing Predictors of Behavioral Outcomes Data Mining Java/J2ee 2013 25 Optimizing Cloud Resources for Delivering IPTV Services through Virtualization. Networking Java/J2ee 2013 26 Participatory Privacy Enabling Privacy in Participatory Sensing. Networking Java/J2ee 2013
27 Dynamic Control of Coding for Progressive Packet Arrivals in DTNs Networking Java/J2ee 2013 28 Delay-Based Network Utility Maximization Networking Java/J2ee 2013 29 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks Networking Java/J2ee 2013 30 WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream Secure Computing Java/J2ee 2013 31 Super-Resolution-based Inpainting Secure Computing Java/J2ee 2013 32 Spatial Approximate String Search Secure Computing Java/J2ee 2013 33 Securing Class Initialization in Java-like Languages Secure Computing Java/J2ee 2013 34 Privacy Preserving Data Sharing With Anonymous ID Assignment Secure Computing Java/J2ee 2013 35 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems Secure Computing Java/J2ee 2013 36 Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links Secure Computing Java/J2ee 2013 37 Identity-Based Secure Distributed Data Storage Schemes Secure Computing Java/J2ee 2013 38 EAACKA Secure Intrusion-Detection System for MANETs Secure Computing Java/J2ee 2013 39 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring Secure Computing Java/J2ee 2013 40 Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs Secure Computing Java/J2ee 2013 41 Two tales of privacy in online social networks Secure Computing Java/J2ee 2013 42 Mobile Relay Configuration in Data-intensive Wireless Sensor Networks Mobile Computing Java/J2ee 2013 43 Vampire attacks:Draining life from wireless ad- hoc sensor networks. Mobile Computing Java/J2ee 2013 44 Content Sharing over Smartphone-Based Delay-Tolerant Networks Mobile Computing Java/J2ee 2013
45 DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks Mobile Computing Java/J2ee 2013 46 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks Mobile Computing Java/J2ee 2013 47 IP-Geolocation Mapping for Moderately Connected Internet Regions Parallel & Distributor Sys Java/J2ee 2013 48 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation Parallel & Distributor Sys Java/J2ee 2013 49 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems Parallel & Distributor Sys Java/J2ee 2013 50 Optimal Client-Server Assignment for Internet Distributed Systems Parallel & Distributor Sys Java/J2ee 2013 51 Harnessing the Cloud for Securely Outsourcing Large Parallel & Distributor Sys Java/J2ee 2013 52 Mining Contracts for Business Events and Temporal Constraints in Service Engagements Parallel & Distributor Sys Java/J2ee 2013 53 Non-Cooperative Location Privacy Parallel & Distributor Sys Java/J2ee 2013 54 Collaboration in Multicloud Computing Environments Framework and Security Issues Cloud Computing Java/J2ee 2013 55 AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds Cloud Computing Java/J2ee 2013 36 Privacy Preserving Delegated Access Control in Public Clouds Cloud Computing DotNet 2013 57 Privacy-Preserving Public Auditing for Secure Cloud Storage Cloud Computing DotNet 2013 58 Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks Cloud Computing DotNet 2013 59 Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data Cloud Computing DotNet 2013 60 Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems Cloud Computing DotNet 2013
61 QoS Ranking Prediction for Cloud Services Cloud Computing DotNet 2013 62 Optimal Multiserver Configuration for Profit Maximization in Cloud Computing Cloud Computing DotNet 2013 63 A New Algorithm for Inferring User Search Goals with Feedback Sessions Data Mining DotNet 2013 64 A Survey of XML Patterns Data Mining DotNet 2013 65 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency Data Mining DotNet 2013 66 Query-Adaptive Image Search With Hash CodesMining Image processing DotNet 2013 67 Reversible Data Hiding with Optimal value Transfer Image processing DotNet 2013 68 Secure Mining of Association Rules in Horizontally Distributed Databases Image processing DotNet 2013 69 Scalable Learning of Collective Behavior Data Mining DOT Net 2012 70 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis Data Mining DOT Net 2012 71 Outsourced Similarity Search on Metric Data Assets Data Mining Java/J2ee 2012 72 Publishing Search LogsA Comparative Study of Privacy Guarantees Data Mining Java/j2ee 2012 73 Independent Directed Acyclic Graphs for Resilient Multipath Routing Networking Java 2012 74 MeasuRouting: A Framework for Routing Assisted Traffic Monitoring Networking Java 2012 75 Opportunistic Flow-level Latency Estimation using NetFlow Networking Java 2012 76 Router Support for Fine-Grained Latency Measurements Networking Java 2012 77 Design, Implementation, and Performance of A Load Balancer for SIP Server Clusters Networking Java 2012
78 Privacy- and Integrity-Preserving Range Queries in Sensor Networks Networking Java 2012 79 An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks Networking Java 2012 80 Zone Trust: Fast Zone-Based Node Compromise Detection and Revocation in wireless Sensor Networks Using Sequential Hypothesis Testing Dependable Secure Comp Java 2012 81 Design and Implementation of TARF: A Trust- Aware Routing Framework for WSNs Dependable Secure Comp Java 2012 82 P Cloud: A Distributed System for Practical PIR Dependable Secure Comp Java/J2ee 83 Packet-Hiding Methods for Preventing Selective Jamming Attacks Dependable Secure Comp Java 2012 84 Detecting and Resolving Firewall Policy Anomalies Dependable Secure Comp Java 2012 83 Risk-Aware Mitigation for MANET Routing Attacks Dependable Secure Comp Java 2012 86 Multiple exposure fusion for high dynamic range image acquisition Image Processing DOT NET 2012 87 Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks Mobile Computing Java 2012 88 Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper Mobile Computing Java 2012 89 Revisiting Dynamic Query Protocols in Unstructured Peer-to-Peer Networks Parallel Distributed Sys Java 2012 90 Exploiting Jamming-Caused Neighbor Changes for Jammer Localization Parallel Distributed Sys Java 2012 91 Bounding the Impact of Unbounded Attacks in Stabilization Parallel Distributed Sys DOT NET 2012 92 Cut Detection in Wireless Sensor Networks Parallel Distributed Sys Java 2012
93 Catching Packet Droppers and Modifiers in Wireless Sensor Networks Parallel Distributed Sys Java 2012 94 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Parallel Distributed Sys Java 2012 93 Capacity of Data Collection in Arbitrary Wireless Sensor Networks Parallel Distributed Sys Java 2012 96 BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks Parallel Distributed Sys Java 2012 97 Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage Parallel Distributed Sys Java/J2ee 2012 98 Balancing the Tradeoffs between Query Delay and Data Availability in MANETs Parallel Distributed Sys Java 2012 99 Capacity of Data Collection in Arbitrary Wireless Sensor Networks Parallel Distributed Systems Java 2012 100 Towards Secure and Dependable Storage Services in Cloud Computing Cloud and Services Comp Java/J2ee 2012 101 Automatic Protocol Blocker for Privacy Preserving Public Auditing in Cloud Computing Cloud and Services Comp Java 2012 102 Efficient audit service outsourcing for data integrity in clouds Cloud and Services Comp Java 2012 103 Ensuring Distributed Accountability for Data Sharing in the Cloud Cloud and Services Comp Java 2012 104 Secure Overlay Cloud Storage with Access Control and Assured Deletion Cloud and Services Comp Java 2012 103 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute- based Encryption
Cloud and Services Comp Java/J2ee 2012 106 Cloud Computing Security From Single to Multi-Clouds Cloud and Services Comp Java 2012
107 Managing Data Access in Cloud Computing Cloud and Services Comp Java 2012 108 AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies Communications Magazine, Java 2012 109 Efficient Extended Boolean Retrieval Knowledge and Data Engg Java 2012 110 Online Modeling of Proactive Moderation System for Auction Fraud Detection Java 2012 Reliable Re-encryption in Unreliable Clouds Java 2012 111 Cloud Computing Security: From Single to Multi-Clouds Java 2012 112 Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences Java 2012 113 Packet-Hiding Methods for Preventing Selective Jamming Attacks Dependable and Secure Comp Java 2012 114 Learn to Personalized Image Search from the Photo Sharing Websites Multimedia, Java 2012 113 Risk-Aware Mitigation for MANET Routing Attacks Dependable and Secure Comp Java 2012 116 Slicing: A New Approach to Privacy Preserving Data Publishing Knowledge and Data Engg Java 2012 117 A New Cell-Counting-Based Attack Against Tor Networking, Java 2012 118 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks Mobile Computing, Java 2012 119 Cooperative download in vehicular environments Java 2012 120 Design and Implementation of TARF: A Trust- Aware Routing Framework for WSNs Java 2012 121 Efficient audit service outsourcing for data integrity in clouds Java 2012 122 Exploring The Design Space Of Social Network-Based Sybil Defenses Communication Systems and Net Java 2012
123 Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing Knowledge and Data Engg Java 2012 124 Identifying Content for Planned Events Across Social Media Sites Java 2012 125 Load-Balancing Multipath Switching System with Flow Slice Java 2012 126 Mining Web Graphs for Recommendations Knowledge and Data Engf DOT NET 2012 127 Network Assisted Mobile Computing with Optimal Uplink Query Processing Mobile Computing, DOT NET 2012 128 Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms Mobile Computing, DOT NET 2012 129 Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper Mobile Computing DOT NET 2012 130 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption Parallel and Distributed Sys DOT NET 2012 131 Bridging Social and Data Networks
, Signal Processing DOT NET 2012 132 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency Parallel and Distributed Sys DOT NET 2012 133 Topology control in mobile ad hoc networks with cooperative communications Wireless Communications, DOT NET 2012 134 View-invariant action recognition based on Artificial Neural Networks and Learning DOT NET 2012 135 A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network DOT NET 2012 136 Robust Face-Name Graph Matching for Movie Character Identify Multimedia DOT NET 2012 137 Defenses against large scale online password guessing attacks by using persuasive click Points DOT NET 2012 138 Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks DOT NET 2012
139 Extracting Knowledge Using Market Basket Analysis DOT NET 2012 140 Automatic Reconfiguration for Large-Scale Reliable Storage Systems Dependable and Secure Comp DOT NET 2012 141 Automatic Protocol Blocker for Privacy- Preserving Public Auditing in Cloud Computing Dependable and Secure Comp Java 2012 142 Cloud Computing Security From Single to multi clouds Dependable and Secure Comp Java 2012 143 Energy Efficient Routing Mechanism in Wireless Sensor Network Networking Java 2012 144 Outsourced Similarity Search on Metric Data Assets Networking Java 2012 145 Packet-Hiding Methods for Preventing Selective jamming attacks Networking Java 2012 146 The Three-Tier Security Scheme in Wireless Sensor network with mobile sinks Networking Java 2012 147 Ranking Model Adaptation for Domain- Specific Search Networking Java 2012 148 EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS Dependable and Secure Comp Java 2012 149 Secure Overlay Cloud Storage with Access Control and Assured Deletion Dependable and Secure Comp Java 2012 150 An Efficient Adaptive Deadlock-Free Routing Algorithm for Torus Networks Networking Java 2012