Java Projects
S No IEEE Project Title Price Base Papers Screen Shorts Buy Project
1 2017 Securing Cloud Data under Key Exposure 2000
2 2017 Detecting Stress Based on Social Interactions 2000
3 2017 Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems 2000
4 2017 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud 2000
5 2017 SocialQ&A An Online Social Network Based Question and Answer System 2000
6 2017 A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection 2000
7 2017 Collaborative Filtering-Based Recommendation of Online Social Voting 2000
8 2017 Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach 2000
9 2017 An Iterative Classification Scheme for Sanitizing Large-Scale Datasets 2000
10 2017 Securing Cloud Data under Key Exposure 2000
11 2017 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption 2000
12 2017 RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage 2000
13 2017 Privacy Protection based Access Control Scheme in Cloud-based Services 2000
14 2017 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing 2000
15 2017 Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage 2000
16 2017 Fast Phrase Search for Encrypted Cloud Storage 2000
17 2017 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud 2000
18 2017 Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing 2000
19 2017 Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data 2000
20 2017 Achieving Efficient and Secure Data Acquisition for Cloudsupported Internet of Things in Smart Grid 2000
21 2017 A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage 2000
22 2017 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing 2000
23 2017 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 2000
24 2017 A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2000
25 2016 Resolving Multi-party Privacy Conflicts in Social Media 2000
26 2016 Two-Factor Data Security Protection Mechanism for Cloud Storage System 2000
27 2016 TopicSketch: Real-time Bursty Topic Detection from Twitter 2000
28 2016 Nearest Keyword Set Search in Multi-Dimensional Datasets 2000
29 2016 TMACS: a robust and verifiable threshold multiauthority access control system in public cloud Storage 2000
30 2016 Resolving Multi-party Privacy Conflicts in Social Media 2000
31 2016 Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata 2000
32 2016 Data Lineage in Malicious Environments 2000
33 2016 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks 2000
34 2016 SecRBAC: Secure data in the Clouds 2000
35 2016 Diplo Cloud: Efficient and Scalable Management of RDF Data in the Cloud 2000
36 2016 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud 2000
37 2016 Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage 2000
38 2016 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email 2000
39 2016 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services 2000
40 2016 Cloud Armor: Supporting Reputation-Based Trust Management for Cloud Services 2000
41 2016 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2000
42 2016 CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System 2000
43 2016 Nearest Keyword Set Search in Multi-Dimensional Datasets 2000
44 2016 TopicSketch: Real-time Bursty Topic Detection from Twitter 2000
45 2016 Top-k Dominating Queries on Incomplete Data 2000
46 2016 Efficient Algorithms for Mining Top-K High Utility Itemsets 2000
47 2016 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder 2000
48 2016 Booster in High Dimensional Data Classification 2000
49 2016 Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information 2000
50 2016 Automatically Mining Facets for Queries from Their Search Results 2000
51 2015 understanding the performance and potential of cloud computing for scientific applications 1500
52 2015 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing 1500
53 2015 Tweet Segmentation and Its Application to Named Entity Recognition 1500
54 2015 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing 1500
55 2015 Progressive Duplicate Detection 1500
56 2015 A Computational Dynamic Trust Model for User Authorization 1500
57 2015 Friendbook: A Semantic-Based Friend Recommendation System for Social Networks 1500
58 2015 FRAppE: Detecting Malicious Facebook Applications 1500
59 2015 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks 1500
60 2015 k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data 1500
61 2015 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services 1500
62 2015 Stealthy Denial of Service Strategy in Cloud Computing 1500
63 2015 Secure Auditing and Deduplicating Data in Cloud 1500
64 2015 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage 1500
65 2015 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems 1500
66 2015 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing 1500
67 2015 A Hybrid Cloud Approach for Secure Authorized Deduplication 1500
68 2015 Detecting Malicious Facebook Applications 1500
69 2014 SOS: A Distributed Mobile Q&A System Based on Social Networks 1000
70 2014 Fast Nearest Neighbor Search with Keywords 1000
71 2014 Dealing With Concept Drifts in Process Mining 1000
72 2014 Data Mining with Big Data 1000
73 2014 Efficient Authentication for Mobile and Pervasive Computing 1000
74 2014 Hiding in the Mobile Crowd: Location Privacy through Collaboration 1000
75 2014 Towards Differential Query Services in Cost-Efficient Clouds 1000

Note:we dont support for online purchase and we are not responsible for that code.before buying the projects please verify the screen shorts.