JAVA M.TECH PROJECT LIST

Sl. No

2022& 2023 Project Title

Year

 

CLOUD COMPUTING

 

 

1

Revocable Attribute-based Data Storage in Mobile Clouds

2022

2

BOEW: A Content-based Image Retrieval Scheme using Bag-of-EncryptedWords in Cloud Computing

2022

3

Cloud Raid: Detecting Distributed Concurrency Bugs via Log Mining and Enhancement

2022

4

Data Integrity Audit Scheme Based on Blockchain Expansion Technology

2022

5

Data Integrity Audit Based on Data Blinding for Cloud and Fog Environment

2022

6

Achieving Efficient Secure Deduplication with User-Defined Access Control in Cloud

2022

7

Efficient CP-ABE Scheme with Shared Decryption in Cloud Storage

2022

8

An Efficient Public-Key Dual-Receiver Encryption Scheme

2022

9

Identity-Based Privacy Preserving Remote Data Integrity Checking with a Designated Verifier

2022

10

Efficient Identity-based Provable Multi-Copy Data Possession in Multi-Cloud Storage

2022

11

Cloud-based Digital Twinning for Structural Health Monitoring Using Deep Learning

2022

12

A Secure Clinical Diagnosis with Privacy-Preserving Multiclass Support Vector Machine in Clouds

2022

13

Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud

2022

14

A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search

2022

15

Distributed Ciphertext-Policy Attribute-Based Encryption with Enhanced Collusion Resilience and Privacy Preservation

2022

16

DSAS: A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System

2022

17

Efficient and Secure Attribute-based Access Control with Identical Sub-Policies Frequently Used in Cloud Storage

2022

18

Adaptively Secure and Fast Processing of Conjunctive Queries over Encrypted Data

2022

19

A Practical and Efficient Bidirectional Access Control Scheme for Cloud-Edge Data Sharing

2022

20

Enabling Efficient, Secure and Privacy-preserving Mobile Cloud Storage

2022

21

Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data

2022

22

Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage

2022

23

Auction based Resource Allocation Mechanism in Federated Cloud Environment: TARA

2022

24

Lightweight and Expressive Fine-grained Access Control for Healthcare Internet-of-Things

2022

25

Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing

2022

26

Multi-Access Filtering for Privacy-preserving Fog Computing

2022

27

Privacy-Preserving Public Auditing for Shared Cloud Data with Secure Group Management

2022

28

Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing

2022

29

Secure and Lightweight Fine-grained Searchable Data Sharing for IoT-oriented and Cloud-assisted Smart Healthcare System

2022

30

Secure Cloud Data Deduplication with Efficient Re-encryption

2022

31

Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing

2022

32

Tag-based Verifiable Delegated Set Intersection over Outsourced Private Datasets

2022

33

Toward Privacy-Preserving Healthcare Monitoring based on Time-Series Activities over Cloud

2022

34

Trapdoor Privacy in Public Key Encryption with Keyword Search: A Review

2022

35

Derided: A Verifiable Cloud Data Deduplication Scheme with Integrity and Duplication Proof

2022

36

Verifiable Searchable Encryption Framework against Insider KeywordGuessing Attack in Cloud Storage

2022

37

Web Cloud: Web-Based Cloud Storage for Secure Data Sharing across Platforms

2022

38

Trust Based Incentive Scheme to Allocate Big Data Tasks with Mobile Social Cloud

2022

39

PMRSS: Privacy-preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare

2022

40

Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data

2022

 

 

 

 

BLOCKCHAIN

 

1

A Secure E-Coupon Service Based on Blockchain Systems

2022

2

A Blockchain Based System for Healthcare Digital Twin

2022

3

Blockchain Traceability in Healthcare: Blood Donation Supply Chain

2022

4

Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform

2022

5

Blockchain-Based Electronic Health Records Management: A Comprehensive Review and Future Research Direction

2022

6

Blockchain-Based Management for Organ Donation and Transplantation

2022

7

Blockchain-based Management of Blood Donation

2022

8

A Blockchain-Based Application System for Product Anti-Counterfeiting

2022

9

Enabling Trust and Privacy-Preserving e-KYC System Using Blockchain

2022

10

Fighting Fake News Propagation With Blockchains

2022

11

Protecting Vaccine Safety: An Improved, Blockchain-Based, Storage-Efficient Scheme

2022

12

Protecting Vaccine Safety: An Improved, Blockchain-Based, Storage-Efficient Scheme

2022

13

Automatic Generation of Ethereum-Based Smart Contracts for Agri-Food Traceability System

2022

14

Protecting Personal Healthcare Record Using Blockchain & Federated Learning Technologies

2022

15

Integrating Healthcare Services Using Blockchain-Based Telehealth Framework

2022

16

Anti-Counterfeit Product System Using Blockchain Technology

2022

17

Use Chains to Block DNS Attacks: A Trusty Blockchain-based Domain Name System

2022

18

A Blockchain Approach to Ensuring Provenance to Outsourced Cloud Data in a Sharing Ecosystem

2022

19

VF Chain: Enabling Verifiable and Auditable Federated Learning via Blockchain Systems

2022

20

Blockchain Bridges Critical National Infrastructures: E-Healthcare Data Migration Perspective

2022

21

Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks

2022

22

Blockchain as a Cyber Defence: Opportunities, Applications, and Challenges

2022

23

Blockchain-Based Event Detection and Trust Verification Using Natural Language Processing and Machine Learning

2022

24

Blockchain-Based Electronic Health Records Management: A Comprehensive Review and Future Research Direction

2022

25

Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things

2022

26

Leveraging Blockchain for Scaffolding Work Management in Construction

2022

27

Towards Blockchain-Based Secure Storage and Trusted Data Sharing Scheme for IoT Environment

2022

28

Blockchain and IoT based Food Traceability for Smart Agriculture

2022

29

Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks

2022

 

 

 

 

DATA MINING

 

 

 

 

1

A Unified Framework for User Identification across Online and Offline Data

2022

2

Activity Organization for Friend-Making Optimization in Online Social Networks

2022

3

Adaptively Secure and Fast Processing of Conjunctive Queries over Encrypted Data

2022

4

Discovering Temporal Patterns for Event Sequence Clustering via Policy Mixture Model

2022

5

Efficient Processing of Group Planning Queries Over Spatial-Social Networks

2022

6

Evaluating Public Anxiety for Topic-based Communities in Social Networks

2022

7

Feature Selection Algorithms for Predicting Students Academic Performance Using Data Mining Techniques

2022

8

Hint CTI: A Cyber Threat Intelligence Modelling and Identification System Based on Heterogeneous Information Network

2022

9

Incorporating Multi-Source Urban Data for Personalized and Context-Aware Multi-Modal Transportation Recommendation

2022

10

Item Recommendation for Word-of-Mouth Scenario in Social E-Commerce

2022

11

Modelling Health Stage Development of Patients with Dynamic Attributed Graphs in Online Health Communities

2022

12

Modelling Product’s Visual and Functional Characteristics for Recommender Systems

2022

13

Multi-Behaviour Sequential Recommendation with Temporal Graph Transformer

2022

14

P Geo Topic: A Distributed Solution for Mining Geographical Topic Models

2022

15

Predicting Hot Events in the Early Period through Bayesian Model for Social Networks

2022

16

Principle-Based Approach for the De-Identification of Code-Mixed Electronic Health Records

2022

17

Social Media Driven Big Data Analysis for Disaster Situation Awareness: A Tutorial

2022

18

Social Recommendation with Characterized Regularization

2022

19

The Dynamic Privacy-preserving Mechanisms for Online Dynamic Social Networks

2022

20

Toward Predicting Active Participants in Tweet Streams: A case study on Two Civil Rights Events

2022

21

User Identity Linkage via Co-Attentive Neural Network from Heterogeneous Mobility Data

2022

22

User Identity Linkage via Co-Attentive Neural Network from Heterogeneous Mobility Data

2022

 

 

 

 

DEPENDABLE & SECURE COMPUTING

 

1

Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack

2022

2

One Parameter Defence - Defending against Data Inference Attacks via Differential Privacy

2022

3

An Explainable Multi-Modal Hierarchical Attention Model for Developing Phishing Threat Intelligence

2022

4

Blockchain-based Certificate Transparency and Revocation Transparency

2022

5

Crypto Maze: Privacy-Preserving Splitting of Off-Chain Payments

2022

6

Cyber security Awareness in Online Education: A Case Study Analysis

2022

7

Detecting Sybil Attacks using Proofs of Work and Location in VANETs

2022

9

Representing Fine-Grained Co-Occurrences for Behaviour-Based Fraud Detection in Online Payment Services

2022

10

Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics

2022

11

Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme with Enhanced Security Provision

2022

12

Entrapment: a Blockchain-Based Verification Protocol for Trust less Computing

2022

13

Harnessing Policy Authenticity for Hidden Cipher text Policy Attribute Based Encryption

2022

14

Harnessing Policy Authenticity for Hidden Cipher text Policy Attribute Based Encryption

2022

15

Achieve Efficient and Privacy-preserving Disease Risk Assessment over Multioutsourced Vertical D

2022

16

A Traceable and Revocable Cipher text-policy Attribute-based Encryption Scheme Based on Privacy Protection

2022

17

PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles

2022

18

Privacy Preservation in Multi-Cloud Secure Data Fusion for InfectiousDisease Analysis

2022

19

Distributed Ciphertext-Policy Attribute-Based Encryption with Enhanced Collusion Resilience and Privacy Preservation

2022

20

SC-TRUST: A Dynamic Model for Trustworthy Service Composition in the Internet of Things

2022

21

SPECBOX: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks

2022

22

SSHC: A Secure and Scalable Hybrid Consensus Protocol for Shading Blockchains with a Formal Security Framework

2022

23

Stick: An End-to-End Encryption Protocol Tailored for Social Network Platforms

2022

24

Trust But Verify: a framework for the trustworthiness of distributed systems

2022

25

Who Are the Phishers? Phishing Scam Detection on Ethereum via Network Embedding

2022

26

On-the-Fly Privacy for Location Histograms

2022

27

Quantum-Safe Round-Optimal Password Authentication for Mobile Devices

2022

28

SAFE A General Secure and Fair Auction Framework for Wireless Markets with Privacy Preservation

2022

29

SCA: Sybil-based Collusion Attacks of IIoT Data Poisoning in Federated Learning

2022

30

A Real Time Firewall Policy Rule Set Anomaly Free Mechanism

2022

 

 

 

 

SOCIAL COMPUTING & NETWORKS

 

1

The Effect of Social Media User Behaviours on Security and Privacy Threats

2022

2

A Taxonomy of Fake News Classification Techniques: Survey and Implementation Aspects

2022

3

The Social Media Break-Up: Psycho-Behavioural Measures and Implications

2022

4

Composite Behavioural Modelling for Identity Theft Detection in Online Social Networks

2022

5

Social Spammer Detection via Convex Nonnegative Matrix Factorization

2022

6

Social Engineering Attacks Prevention: A Systematic Literature Review

2022

7

Cross-Platform Reputation Generation System Based on Aspect-Based Sentiment Analysis

2022

8

Predictor: Predicting Mobility Patterns of Tourists Based on Social Media User's Profiles

2022

9

DEA-RNN: A Hybrid Deep Learning Approach for Cyberbullying Detection in Twitter Social Media Platform

2022

10

FADOHS: Framework for Detection and Integration of Unstructured Data of Hate Speech on Facebook Using Sentiment and Emotion Analysis

2022

11

Fusing User Reviews into Heterogeneous Information Network Recommendation Model

2022

12

Leveraging Multiple Relations for Fashion Trend Forecasting Based on social media

2022

13

Modelling Influencer Marketing Campaigns in Social Networks

 

14

Positive and Negative Behaviours of Oppositional Loyalty in Online Communities

2022

15

Data-Driven Diffusion Recommendation in Online Social Networks for the Internet of People

2022

16

Rating Prediction with Review Network Feedback: A New Direction in Recommendation

2022

17

Sentiment Analysis of Customers' Reviews Using a Hybrid Evolutionary SVM-Based Approach in an Imbalanced Data

2022

18

Service-Aware Personalized Item Recommendation

2022

19

Social Media Popularity Prediction based on Multi-modal Self-Attention Mechanisms

2022

20

Continuous Influence-based Community Partition for Social Networks

2022

21

Consent Receipts for a Usable and Auditable Web of Personal Data

2022

22

Template Aging in Multi-Modal Social Behavioural Biometrics

2022

23

A Trust Risk Dynamic Management Mechanism Based on Third-Party Monitoring for the Conflict-Eliminating Process

2022

24

An Influence Maximization Algorithm Based on Community-Topic Features for Dynamic Social Networks

2022

25

Toward Data Justice Understanding Police Shooting Data Systems and Narratives

2022

26

Vulnerability Detection in SIoT Applications A Fuzzing Method on their Binaries

2022

27

Intelligent Distribution of Fresh Agricultural Products in Smart City

2022

28

Influence Based Defence Against Data Poisoning Attacks in Online Learning

2022

29

Detect DUI: An In-Car Detection System for Drink Driving and BACs

2022

30

An Accurate and Efficient Large-scale Regression Method through Best Friend Clustering

2022

 

 

 

 

                                                              CYBERNETICS

 

1

Trustworthiness Assessment of Users in Social Reviewing Systems

2022

2

A Learning-Based POI Recommendation with Spatiotemporal Context Awareness

2022

3

False-Data-Injection Attacks on Remote Distributed Consensus Estimation

2022

 

 

 

 

MOBILE COMPUTING

 

1

Trust Based Incentive Scheme to Allocate Big Data Tasks with Mobile Social Cloud

2022

2

User Community Identification Through Fine-Grained Mobility Records for Smart City Applications

2022

3

Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Mobile Crowd sensing Systems

2022

4

Share On: Shared Resource Dynamic Container Migration Framework for Real-Time Support in Mobile Edge Clouds

2022

5

Secure Mobile Edge Computing Networks in the Presence of Multiple Eavesdroppers

2022

6

Profit and Satisfaction Aware Order Assignment for Online Food Delivery Systems Exploiting Water Wave Optimization

2022

7

Privacy-Preserving Data Integrity Verification for Secure Mobile Edge Storage

2022

8

Normalized Attraction Travel Personality Representation for Improving Travel Recommender Systems

2022

9

Membership Inference Attack and Defence for Wireless Signal Classifiers with Deep Learning

2022

10

Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks

2022

11

Anonymous authenticated key agreement and group proof protocol for wearable computing

2022

12

Identity-Based Attack Detection and Classification Utilizing Reciprocal RSS Variations in Mobile Wireless Networks

2022

 

 

 

 

                                   IMAGE PROCESSING & MULTIMEDIA

 

1

Show, Price and Negotiate a Negotiator with Online Value Look-Ahead

2022

2

Multi-modal Meta Multi-Task Learning for Social Media Rumour Detection

2022

3

A Novel Adaptive Hybrid Fusion Network for Multiresolution Remote Sensing Images Classification

2022

4

Asymmetric Hash Code Learning for Remote Sensing Image Retrieval

2022

5

Content-Based Remote Sensing Image Retrieval Based on Fuzzy Rules and a Fuzzy Distance

2022

6

Similarity Search for Encrypted Images in Secure Cloud Computing

2022

7

Global-Aware Ranking Deep Metric Learning for Remote Sensing Image Retrieval

2022

8

Global-Aware Ranking Deep Metric Learning for Remote Sensing Image Retrieval

2022

9

Learning a Model-Driven Variational Network for Deformable Image Registration

2022

10

SAC: Semantic Attention Composition for Text-Conditioned Image Retrieval

2022

11

Scalable Distributed Hashing for Approximate Nearest Neighbour Search

2022