IEEE JAVA Project Titles 2024-2025
Sr. No | Name of Project | Domain | Coading |
---|---|---|---|
1 | A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain | CLOUD COMPUTING | JAVA |
2 | A Verifiable and Fair Attribute-Based Proxy Re Encryption Scheme for Data Sharing in Clouds | CLOUD COMPUTING | JAVA |
3 | Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT | CLOUD COMPUTING | JAVA |
4 | Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment | CLOUD COMPUTING | JAVA |
5 | Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data | CLOUD COMPUTING | JAVA |
6 | DSAS: A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System | CLOUD COMPUTING | JAVA |
7 | Dual Access Control for Cloud-Based Data Storage and Sharing | CLOUD COMPUTING | JAVA |
8 | Dual-Server Public-Key Authenticated Encryption with Keyword Search | CLOUD COMPUTING | JAVA |
9 | Enabling Fast Public Auditing and Data Dynamics in Cloud Services | CLOUD COMPUTING | JAVA |
10 | Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage | CLOUD COMPUTING | JAVA |
11 | Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things | CLOUD COMPUTING | JAVA |
12 | Practical Multi-Keyword Ranked Search With Access Control Over Encrypted Cloud Data | CLOUD COMPUTING | JAVA |
13 | Publicly Verifiable Shared Dynamic Electronic Health Record Databases With Functional Commitment Supporting Privacy-Preserving Integrity Auditing | CLOUD COMPUTING | JAVA |
14 | Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers | CLOUD COMPUTING | JAVA |
15 | Secure and Lightweight Fine-Grained Searchable Data Sharing for IoT-Oriented and Cloud-Assisted Smart Healthcare System | CLOUD COMPUTING | JAVA |
16 | FADOHS: Framework for Detection and Integration of Unstructured Data of Hate Speech on Facebook Using Sentiment and Emotion Analysis | DATA MINING | JAVA |
17 | Racism Detection by Analyzing Differential Opinions Through Sentiment Analysis of Tweets Using Stacked Ensemble GCR-NN Model | DATA MINING | JAVA |
18 | A Fast Nearest Neighbor Search Scheme over Outsourced Encrypted Medical Images | CLOUD COMPUTING | JAVA |
19 | A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users | CLOUD COMPUTING | JAVA |
20 | A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud | CLOUD COMPUTING | JAVA |
21 | Accountable Proxy Re-Encryption for Secure Data Sharing | CLOUD COMPUTING | JAVA |
22 | Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data | CLOUD COMPUTING | JAVA |
23 | Certificateless public integrity checking of group shared data on cloud storage | CLOUD COMPUTING | JAVA |
24 | CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage | CLOUD COMPUTING | JAVA |
25 | Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud | CLOUD COMPUTING | JAVA |
26 | Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments | CLOUD COMPUTING | JAVA |
27 | Dual Access Control for Cloud-Based Data Storage and Sharing | CLOUD COMPUTING | JAVA |
28 | Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System | CLOUD COMPUTING | JAVA |
29 | Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data | CLOUD COMPUTING | JAVA |
30 | PP-CSA: A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing | CLOUD COMPUTING | JAVA |
31 | Practical Multi-keyword Ranked Search with Access Control over Encrypted Cloud Data | CLOUD COMPUTING | JAVA |
32 | Privacy Preserving Searchable Encryption with Fine grained Access Control | CLOUD COMPUTING | JAVA |
33 | Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment | CLOUD COMPUTING | JAVA |
34 | Publicly Verifiable Shared Dynamic Electronic Health Record Databases with Functional Commitment Supporting Privacy-Preserving Integrity Auditing | CLOUD COMPUTING | JAVA |
35 | Secure Fine-Grained Encrypted Keyword Search for E Healthcare Cloud | CLOUD COMPUTING | JAVA |
36 | SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage | CLOUD COMPUTING | JAVA |
37 | SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud | CLOUD COMPUTING | JAVA |
38 | Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification | CLOUD COMPUTING | JAVA |
39 | Improvising Personalized Travel Recommendation System with Recency Effects | DATA MINING | JAVA |
40 | Leveraging Affective Hashtags for Ranking Music Recommendations | DATA MINING | JAVA |
41 | Method for Ranking the Helpfulness of Online Reviews Based on SO-ILES TODIM | DATA MINING | JAVA |
42 | Personality-aware Product Recommendation System based on User Interests Mining and Meta-path Discovery | DATA MINING | JAVA |
43 | Suicidal Ideation Detection: A Review of Machine Learning Methods and Applications | DATA MINING | JAVA |
44 | BullyNet: Unmasking Cyberbullies on Social Networks | SECURE COMPUTING | JAVA |
45 | oGBAC—A Group Based Access Control Framework for Information Sharing in Online Social Networks | SECURE COMPUTING | JAVA |
46 | Sentiment Analysis of Lockdown in India During COVID-19: A Case Study on Twitter | Computational Social Systems | JAVA |
47 | Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials | SECURE COMPUTING | JAVA |
48 | Protecting Your Shopping Preference with Differential Privacy | SECURE COMPUTING | JAVA |
49 | Sensitive Label Privacy Preservation with Anatomization for Data Publishing | SECURE COMPUTING | JAVA |
50 | Detecting Mental Disorders in Social Media Through Emotional Patterns – The case of Anorexia and Depression | Computational Social Systems. | JAVA |
51 | Public Opinion Analysis on Novel Coronavirus Pneumonia and Interaction With Event Evolution in Real World | Computational Social Systems. | JAVA |
52 | Hybrid Recommender System for Tourism Based on Big Data and AI: A Conceptual Framework | Artificial Intelligence (AI) | JAVA |
53 | A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage | CLOUD COMPUTING | JAVA |
54 | A New Lightweight Symmetric Searchable Encryption Scheme for String Identification | CLOUD COMPUTING | JAVA |
55 | A Novel Feature Matching Ranked Search Mechanism Over Encrypted Cloud Data | CLOUD COMPUTING | JAVA |
56 | A Scalable Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of Access Privileges for Cloud Storage | CLOUD COMPUTING | JAVA |
57 | Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage | CLOUD COMPUTING | JAVA |
58 | Efficient Regular Language Search for Secure Cloud Storage | CLOUD COMPUTING | JAVA |
59 | Enabling Efficient User Revocation in Identity-based Cloud Storage Auditing for Shared Big Data | CLOUD COMPUTING | JAVA |
60 | Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing | CLOUD COMPUTING | JAVA |
61 | Optimizing Information Leakage in Multicloud Storage Services | CLOUD COMPUTING | JAVA |
62 | Secure Keyword Search and Data Sharing Mechanism for Cloud Computing | CLOUD COMPUTING | JAVA |
63 | Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data | CLOUD COMPUTING | JAVA |
64 | Detecting Group Shilling Attacks in Online Recommender Systems Based on Bisecting K-Means Clustering | DATA MINING | JAVA |
65 | Emotion Detection in Online Social Networks: A Multi label Learning Approach | DATA MINING | JAVA |
66 | Movie Recommendation System Using Sentiment Analysis From Microblogging Data | DATA MINING | JAVA |
67 | Personalized Recommendation System based on Collaborative Filtering for IoT Scenarios | DATA MINING | JAVA |
68 | TAQE: Tweet Retrieval Based Infrastructure Damage Assessment During Disasters | DATA MINING | JAVA |
69 | What and With Whom? Identifying Topics in Twitter Through Both Interactions and Text | DATA MINING | JAVA |
70 | Detection of Malicious Social Bots Using Learning Automata With URL Features in Twitter Network | SECURE COMPUTING | JAVA |
71 | Detecting and Characterizing Extremist Reviewer Groups in Online Product Reviews | MACHINE LEARNING | JAVA |
72 | Suicidal Ideation Detection: A Review of Machine Learning Methods and Applications | MACHINE LEARNING | JAVA |
73 | A Sentiment Polarity Categorization Technique for Online Product Reviews | NLP (Natural Language Processing) | JAVA |
74 | Characterizing the Propagation of Situational Information in Social Media During COVID-19 Epidemic: A Case Study on Weibo | NLP (Natural Language Processing) | JAVA |
75 | Feature-Level Rating System Using Customer Reviews and Review Votes | NLP (Natural Language Processing) | JAVA |
76 | PASPORT: A Secure and Private Location Proof Generation and Verification Framework | MOBILE COMPUTING | JAVA |
PROJECT SUPPORT TO REGISTERED STUDENTS:
- IEEE Base paper.
- Abstract Document.
- Future Enhancement (based on Requirement).
- Modified Title / Modified Abstract (based on Requirement).
- Complete Source Code.
- Final Report / Document (Document consists of basic contents of about Abstract, Bibilography, Conclusion, Implementation, I/P & O/P Design, Introduction, Literature Survey, Organisation Profile, Screen Shots,Software Environment, System Analysis, System Design, System Specification, System Study, System Testing) (The chapter System Design consists of 5 diagrams: Data Flow, Use Case, Sequence, Class, Activity Diagram).
- Review PPTs and Documents.
- How to Run execution help file.
- JAVA/MYSQL Software Package (JDK/Netbeans IDE/Eclipse IDE, MYSQL, How to install help file).
- International Conference/International Journal Publication/ Impact Factor Journal/ UGC Journal / Scopus Journal (Based on Requirement).