JAVA IEEE PROJECTS

IEEE JAVA Project Titles 2024-2025

Sr. No Name of Project Domain Coading
1 A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain CLOUD COMPUTING JAVA
2 A Verifiable and Fair Attribute-Based Proxy Re Encryption Scheme for Data Sharing in Clouds CLOUD COMPUTING JAVA
3 Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT CLOUD COMPUTING JAVA
4 Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment CLOUD COMPUTING JAVA
5 Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data CLOUD COMPUTING JAVA
6 DSAS: A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System CLOUD COMPUTING JAVA
7 Dual Access Control for Cloud-Based Data Storage and Sharing CLOUD COMPUTING JAVA
8 Dual-Server Public-Key Authenticated Encryption with Keyword Search CLOUD COMPUTING JAVA
9 Enabling Fast Public Auditing and Data Dynamics in Cloud Services CLOUD COMPUTING JAVA
10 Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage CLOUD COMPUTING JAVA
11 Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things CLOUD COMPUTING JAVA
12 Practical Multi-Keyword Ranked Search With Access Control Over Encrypted Cloud Data CLOUD COMPUTING JAVA
13 Publicly Verifiable Shared Dynamic Electronic Health Record Databases With Functional Commitment Supporting Privacy-Preserving Integrity Auditing CLOUD COMPUTING JAVA
14 Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers CLOUD COMPUTING JAVA
15 Secure and Lightweight Fine-Grained Searchable Data Sharing for IoT-Oriented and Cloud-Assisted Smart Healthcare System CLOUD COMPUTING JAVA
16 FADOHS: Framework for Detection and Integration of Unstructured Data of Hate Speech on Facebook Using Sentiment and Emotion Analysis DATA MINING JAVA
17 Racism Detection by Analyzing Differential Opinions Through Sentiment Analysis of Tweets Using Stacked Ensemble GCR-NN Model DATA MINING JAVA
18 A Fast Nearest Neighbor Search Scheme over Outsourced Encrypted Medical Images CLOUD COMPUTING JAVA
19 A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users CLOUD COMPUTING JAVA
20 A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud CLOUD COMPUTING JAVA
21 Accountable Proxy Re-Encryption for Secure Data Sharing CLOUD COMPUTING JAVA
22 Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data CLOUD COMPUTING JAVA
23 Certificateless public integrity checking of group shared data on cloud storage CLOUD COMPUTING JAVA
24 CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage CLOUD COMPUTING JAVA
25 Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud CLOUD COMPUTING JAVA
26 Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments CLOUD COMPUTING JAVA
27 Dual Access Control for Cloud-Based Data Storage and Sharing CLOUD COMPUTING JAVA
28 Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System CLOUD COMPUTING JAVA
29 Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data CLOUD COMPUTING JAVA
30 PP-CSA: A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing CLOUD COMPUTING JAVA
31 Practical Multi-keyword Ranked Search with Access Control over Encrypted Cloud Data CLOUD COMPUTING JAVA
32 Privacy Preserving Searchable Encryption with Fine grained Access Control CLOUD COMPUTING JAVA
33 Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment CLOUD COMPUTING JAVA
34 Publicly Verifiable Shared Dynamic Electronic Health Record Databases with Functional Commitment Supporting Privacy-Preserving Integrity Auditing CLOUD COMPUTING JAVA
35 Secure Fine-Grained Encrypted Keyword Search for E Healthcare Cloud CLOUD COMPUTING JAVA
36 SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage CLOUD COMPUTING JAVA
37 SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud CLOUD COMPUTING JAVA
38 Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification CLOUD COMPUTING JAVA
39 Improvising Personalized Travel Recommendation System with Recency Effects DATA MINING JAVA
40 Leveraging Affective Hashtags for Ranking Music Recommendations DATA MINING JAVA
41 Method for Ranking the Helpfulness of Online Reviews Based on SO-ILES TODIM DATA MINING JAVA
42 Personality-aware Product Recommendation System based on User Interests Mining and Meta-path Discovery DATA MINING JAVA
43 Suicidal Ideation Detection: A Review of Machine Learning Methods and Applications DATA MINING JAVA
44 BullyNet: Unmasking Cyberbullies on Social Networks SECURE COMPUTING JAVA
45 oGBAC—A Group Based Access Control Framework for Information Sharing in Online Social Networks SECURE COMPUTING JAVA
46 Sentiment Analysis of Lockdown in India During COVID-19: A Case Study on Twitter Computational Social Systems JAVA
47 Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials SECURE COMPUTING JAVA
48 Protecting Your Shopping Preference with Differential Privacy SECURE COMPUTING JAVA
49 Sensitive Label Privacy Preservation with Anatomization for Data Publishing SECURE COMPUTING JAVA
50 Detecting Mental Disorders in Social Media Through Emotional Patterns – The case of Anorexia and Depression Computational Social Systems. JAVA
51 Public Opinion Analysis on Novel Coronavirus Pneumonia and Interaction With Event Evolution in Real World Computational Social Systems. JAVA
52 Hybrid Recommender System for Tourism Based on Big Data and AI: A Conceptual Framework Artificial Intelligence (AI) JAVA
53 A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage CLOUD COMPUTING JAVA
54 A New Lightweight Symmetric Searchable Encryption Scheme for String Identification CLOUD COMPUTING JAVA
55 A Novel Feature Matching Ranked Search Mechanism Over Encrypted Cloud Data CLOUD COMPUTING JAVA
56 A Scalable Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of Access Privileges for Cloud Storage CLOUD COMPUTING JAVA
57 Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage CLOUD COMPUTING JAVA
58 Efficient Regular Language Search for Secure Cloud Storage CLOUD COMPUTING JAVA
59 Enabling Efficient User Revocation in Identity-based Cloud Storage Auditing for Shared Big Data CLOUD COMPUTING JAVA
60 Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing CLOUD COMPUTING JAVA
61 Optimizing Information Leakage in Multicloud Storage Services CLOUD COMPUTING JAVA
62 Secure Keyword Search and Data Sharing Mechanism for Cloud Computing CLOUD COMPUTING JAVA
63 Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data CLOUD COMPUTING JAVA
64 Detecting Group Shilling Attacks in Online Recommender Systems Based on Bisecting K-Means Clustering DATA MINING JAVA
65 Emotion Detection in Online Social Networks: A Multi label Learning Approach DATA MINING JAVA
66 Movie Recommendation System Using Sentiment Analysis From Microblogging Data DATA MINING JAVA
67 Personalized Recommendation System based on Collaborative Filtering for IoT Scenarios DATA MINING JAVA
68 TAQE: Tweet Retrieval Based Infrastructure Damage Assessment During Disasters DATA MINING JAVA
69 What and With Whom? Identifying Topics in Twitter Through Both Interactions and Text DATA MINING JAVA
70 Detection of Malicious Social Bots Using Learning Automata With URL Features in Twitter Network SECURE COMPUTING JAVA
71 Detecting and Characterizing Extremist Reviewer Groups in Online Product Reviews MACHINE LEARNING JAVA
72 Suicidal Ideation Detection: A Review of Machine Learning Methods and Applications MACHINE LEARNING JAVA
73 A Sentiment Polarity Categorization Technique for Online Product Reviews NLP (Natural Language Processing) JAVA
74 Characterizing the Propagation of Situational Information in Social Media During COVID-19 Epidemic: A Case Study on Weibo NLP (Natural Language Processing) JAVA
75 Feature-Level Rating System Using Customer Reviews and Review Votes NLP (Natural Language Processing) JAVA
76 PASPORT: A Secure and Private Location Proof Generation and Verification Framework MOBILE COMPUTING JAVA

PROJECT SUPPORT TO REGISTERED STUDENTS:

  1. IEEE Base paper.
  2. Abstract Document.
  3. Future Enhancement (based on Requirement).
  4. Modified Title / Modified Abstract (based on Requirement).
  5. Complete Source Code.
  6. Final Report / Document (Document consists of basic contents of about Abstract, Bibilography, Conclusion, Implementation, I/P & O/P Design, Introduction, Literature Survey, Organisation Profile, Screen Shots,Software Environment, System Analysis, System Design, System Specification, System Study, System Testing) (The chapter System Design consists of 5 diagrams: Data Flow, Use Case, Sequence, Class, Activity Diagram).
  7. Review PPTs and Documents.
  8. How to Run execution help file.
  9. JAVA/MYSQL Software Package (JDK/Netbeans IDE/Eclipse IDE, MYSQL, How to install help file).
  10. International Conference/International Journal Publication/ Impact Factor Journal/ UGC Journal / Scopus Journal (Based on Requirement).