Java Major - Ieee - 2023-24
Java Major - Ieee - 2023-24
Java Major - Ieee - 2023-24
8977464142
JAVA AVAILABLE PROJECTS LIST -2022
S.NO P.CODE PROJECT TITLE NAME
J2201 Towards Blockchain Based Secure Storage and Trusted Data Sharing Scheme
1 for IoT Environment
J2202 VeriDedup: A Verifiable Cloud Data Deduplication Scheme with Integrity and
2 Duplication Proof
J2203 Automatic Generation of Ethereum-Based Smart Contracts for Agri-Food
3 Traceability System
4 J2204 A Blockchain Based System for Healthcare Digital Twin
5 J2205 Privacy Preserving Public Auditing for Shared Cloud
6 J2206 Feature Selection Algorithms For Predicting Students Academic Performance
7 J2207 Secure Cloud Data Deduplication with Efficient Re-encryption
8 J2208 HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based
on Heterogeneous Information Network
J2209 Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement
9
Scheme with Enhanced Security Provision
J2210 Cloud Raid -Defecting Distrobutes Concurrency Bugs Via Loong Mining And
10 Enhancement
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation
J2211
11 Attacks
12 J2212 WebCloud: Web-Based Cloud Storage for Secure Data Sharing Across Platforms
13 J2213 Enabling Trust And Privacy Preserving E-Kyc System Unsing Block Chain
Block-Chain -Protecting Vaccine Safety And Improved Block Chain Based
J2214 Storage
14 Efficient Scheme
Achieving Efficient Secure Deduplication With User-Defined Access Control in
J2215
15 Cloud
Predicting Hot Events in the Early Period through Bayesian Model for Social
J2216
16 Networks
17 J2217 BloodChain: A Blood Donation Network Managed by Blockchain Technologies
18 J2218 Quantum-Safe Round-Optimal Password Authentication for Mobile Devices
J2219 Detecting Sybil Attacks Using Proofs of Work and Location in VANETs
19
20 J2220 Block Chain Based Management for Organ Donation and Transplantation
21 J2221 Trust but verify: a framework for the trustworthiness of distributed systems
22 J2222 SCA: Sybil-based Collusion Attacks of IIoT Data Poisoning in Federated Learning
J2101 RACE Resource Aware Cost-Efficient Scheduler for Cloud Fog Environment
J2111 Certificateless public integrity checking of group shared data on cloud storage
J2118 Efficient Auditing Scheme for Secure Data Storage in Fog-to-Cloud Computing
J2125 Dual Access Control for Cloud-Based Data Storage and Sharing
J2128
503, ANNAPURNA BLOCK, ADITYA ENCLAVE BUILDING , BESIDE AMEERPET METRO STATION, NEAR
MAITRIVANAM, HYDERABAD
MSR PROJECTS 9581464142
8977464142
An Efficient Ciphertext Index Retrieval Scheme based on Edge Computing Framework
J2129 Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage
J2131 Pocket Diagnosis: Secure Federated Learning against Poisoning Attack in the Cloud
BLOCKCHAIN TECHNOLOGY
J2132 Blockchain Assisted Collaborative Service Recommendation Scheme With Data Sharing
J2134 Data Trust Framework Using Blockchain Technology and Adaptive Transaction Validation
J2138
J21 Design of Secure Authenticated Key Management Protocol for Cloud Computing Environment
A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on
J2140
INTERNET OF THINGS(IOT)
J2141 Fast Containment of Infectious Diseases with E-healthcare Mobile Social Internet of Things
DATA MINING
503, ANNAPURNA BLOCK, ADITYA ENCLAVE BUILDING , BESIDE AMEERPET METRO STATION, NEAR
MAITRIVANAM, HYDERABAD
MSR PROJECTS 9581464142
8977464142
Personality aware Product Recommendation System based on User Interests Mining and
J2154
J2157 Discovering Hidden Topical Hubs and Authorities Across Multiple Online Social Networks
J2161 Query Expansion with Local Conceptual Word Embeddings in Microblog Retrieval
BIG DATA
Hybrid Recommender System for Tourism Based on Big Data and AI A Conceptual
J2165
Detecting Mental Disorders in Social Media Through Emotional Patterns The case of Anorexia
J2168
MOBILE COMPUTING
Privacy Preserving Media Sharing with Scalable Access Control and Secure Deduplication in
J2179
23 J2076
Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside
and Inside Keyword Guessing Attacks
24 J2004 Efficiently Processing Spatial and Keyword Queries in Indoor Venues
25 J2038 Efficient Decentralized Attribute Based Access Control for Mobile Clouds
26 J2072 Crisis-Critical Intellectual Property Findings From the COVID-19 Pandemic
27 J2073 Block chain based Data Storage with Privacy and Authentication in Internet of Things
28 J2077 Detecting and Characterizing Extremist Reviewer Groups in Online Product Reviews
29 J2045
Characterizing the Propagation of Situational Information in Social Media During
COVID-19 Epidemic A Case Study on Weibo
30 J2082 Fake News, Disinformation,and Deepfakes: Leveraging Distributed Ledger
Technologies and Blockchain to Combat Digital
Deception and Counterfeit Reality
31 J2008 Feature-Level Rating System Using Customer Reviews and Review Votes
32 J2067 Detection of Social Network Spam Based on Improved Extreme Learning Machine
33 J2027 Scalable and Secure Big Data IoT System Based on Multifactor Authentication and
Lightweight Cryptography
34 J1906 A Practical attribute based document collection Hierarchical Encryption Scheme in
Cloud Computing
503, ANNAPURNA BLOCK, ADITYA ENCLAVE BUILDING , BESIDE AMEERPET METRO STATION, NEAR
MAITRIVANAM, HYDERABAD
MSR PROJECTS 9581464142
8977464142
35 J1907 Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
36 J1914 CHARON: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data
37 J1920 An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud
Storage
38 J1924 Hidden Cipher text Policy Attribute-Based Encryption with Fast Decryption for
Personal Health Record System
39 J1927 Privacy-aware Personal Data Storage (P-PDS) Learning how to Protect User Privacy
from External Applications
40 J1930 Clustering-Based Collaborative Filtering Using an Incentivized/Penalized User
Model
41 J1934 A Hierarchical Attention Model for Social Contextual Image Recommendation
42 J1935 DCCR: Deep Collaborative Conjunctive Recommender for Rating Prediction
43 J1939 Privacy Preserving Searchable Encryption with Fine-grained Access Control
44 J1944 Filtering Instagram hashtags through crowd tagging and the HITS algorithm
45 J1945 A Hybrid E-learning Recommendation Approach Based on Learners’ Influence
Propagation
46 J1946 Detecting Pickpocket Suspects from Large-Scale Public Transit Records
47 J1949 Coverless Information Hiding Method Based on Web Text
48 J1953 SEPTIC Detecting Injection Attacks and Vulnerabilities
49 J1954 Detecting Malicious Social Bots Based on Click stream Sequences
50 J1961 Authentication by Encrypted Negative Password
51 J1962 Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search
Engine
52 J1965 Enabling Efficient and Geometric Range Query With Access Control Over Encrypted
Spatial Data
53 J1966 Social Network Rumor Diffusion Predication Based on Equal Responsibility Game
Model
503, ANNAPURNA BLOCK, ADITYA ENCLAVE BUILDING , BESIDE AMEERPET METRO STATION, NEAR
MAITRIVANAM, HYDERABAD