Network security is the one of the best feilds of the research which deals with securing the privacy . Here i have selected some papers from IEEE Transactions 2014 for implementing .may be helpful for the scholars looking for their final year projects . These papers can be implemented using ns2 or other network simulators .Internet of Things and Cloud storage is two emerging technologies .I have mentioned some topics on the security of these technologies too .
1.A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection
2.Adaptively Splitted GMM With Feedback Improvement for the Task of Background Subtraction
3.A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs
4.A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
5.DDoS Detection Method Based on Chaos Analysis of Network Traffic Entropy
6.Dynamic Multiservice Load Balancing in Cloud-Based Multimedia System
7.Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
8.Enabling P2P One-View Multiparty Video Conferencing
9.Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
10.Meeting Deadlines of Scientific Workflows in Public Clouds with Tasks Replication
11.Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
12.Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
13.Preventing Private Information Inference Attacks on Social Networks
14.Privacy-Preserving Authenticated Key-Exchange Over Internet
15.Privacy-Preserving Public Auditing for Secure Cloud Storage
16.Private Searching on Streaming Data Based on Keyword Frequency
17.Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
18.Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data
19.SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
20.Temporal Load Balancing with Service Delay Guarantees for Data Center Energy Cost Optimization
21.Topic-Sensitive Influencer Mining in Interest-Based Social Media Networks via Hypergraph Learning
22.Toward Optimal Fusion Algorithms With Security Against Wolves and Lambs in Biometrics
23.Trustworthiness Management in the Social Internet of Things
24.User Authentication Through Mouse Dynamics
If you feel difficulty in implementing any of these just ping me
CONTACT ME : MAIL ME
PROJECT ENQIRY FORM
No comments:
Post a Comment