Java IEEE Project Titles 2020 - 21

IEEE JAVA PROJECTS 2020 - 2021

S.NO

IEEE 2020-21 JAVA Project Titles

Domain

Lang

1

A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud

CLOUD COMPUTING

JAVA

2

Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage

CLOUD COMPUTING

JAVA

3

Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data

CLOUD COMPUTING

JAVA

4

Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud

CLOUD COMPUTING

JAVA

5

Efficient Decentralized Attribute Based Access Control for Mobile Clouds

CLOUD COMPUTING

JAVA

6

Designing Secure and Efficient Biometric-Based Secure Access Mechanism for Cloud Services

CLOUD COMPUTING

JAVA

7

Efficient Regular Language Search for Secure Cloud Storage

CLOUD COMPUTING

JAVA

8

Efficient Traceable Authorization Search System for Secure Cloud Storage

CLOUD COMPUTING

JAVA

9

Privacy-Preserving Outsourced Support Vector Machine Design for Secure Drug Discovery

CLOUD COMPUTING

JAVA

10

Enabling Efficient User Revocation in Identity-based Cloud Storage Auditing for Shared Big Data

CLOUD COMPUTING

JAVA

11

Lightweight Cloud Storage Auditing With De duplication Supporting Strong Privacy Protection

CLOUD COMPUTING

JAVA

12

Multi-user Verifiable Searchable Symmetric Encryption for Cloud Storage

CLOUD COMPUTING

JAVA

13

Optimizing Information Leakage in Multi cloud Storage Services

CLOUD COMPUTING

JAVA

14

Secure Keyword Search and Data Sharing Mechanism for Cloud Computing

CLOUD COMPUTING

JAVA

15

Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data

CLOUD COMPUTING

JAVA

16

Privacy-Preserving Data Processing with Flexible Access Control

CLOUD COMPUTING

JAVA

17

TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud

CLOUD COMPUTING

JAVA

18

You Can Access But You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center

CLOUD COMPUTING

JAVA

19

Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing

CLOUD COMPUTING

JAVA

20

Privacy Aware Data De duplication for Side Channel in Cloud Storage

CLOUD COMPUTING

JAVA

21

Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data

CLOUD COMPUTING

JAVA

22

A New Lightweight Symmetric Searchable Encryption Scheme for String Identification

CLOUD COMPUTING

JAVA

23

A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage

CLOUD COMPUTING

JAVA

24

A Secure Enhanced Key-Policy Attribute-Based Temporary Keyword Search Scheme in the Cloud

CLOUD COMPUTING

JAVA

25

Development and Examination of Fog Computing-Based Encrypted Control System.

CLOUD COMPUTING

JAVA

26

A Novel Feature Matching Ranked Search Mechanism Over Encrypted Cloud Data

CLOUD COMPUTING

JAVA

27

A Secure and Efficient Cloud-Centric Internet of Medical Things-Enabled Smart Healthcare System with Public Verifiability

CLOUD COMPUTING

JAVA

28

Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography

CLOUD COMPUTING

JAVA

29

Key Policy Attribute-Based Encryption with Keyword Search in Virtualized Environments

CLOUD COMPUTING

JAVA

30

Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud.

CLOUD COMPUTING

JAVA

31

Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud Computing.

CLOUD COMPUTING

JAVA

32

Key-Escrow Free Attribute-Based Multi-Keyword Search with Dynamic Policy Update in Cloud Computing

CLOUD COMPUTING

JAVA

33

Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing

CLOUD COMPUTING

JAVA

34

Achieving Practical Symmetric Searchable Encryption with Search Pattern Privacy over Cloud

CLOUD COMPUTING

JAVA

35

Achieving Secure and Dynamic Range Queries Over Encrypted Cloud Data

CLOUD COMPUTING

JAVA

36

Secure Cloud Storage with Data Dynamics Using Secure Network Coding Techniques

CLOUD COMPUTING

JAVA

37

SecDedup Secure Encrypted Data De duplication with Dynamic Ownership Updating

CLOUD COMPUTING

JAVA

38

LEVER Secure Deduplicated Cloud Storage with Encrypted Two-Party Interactions in Cyber-Physical Systems

CLOUD COMPUTING

JAVA

39

Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing

CLOUD COMPUTING

JAVA

40

A Scalable Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of Access Privileges for Cloud Storage

CLOUD COMPUTING

JAVA

41

A Secure Privacy Preserving Cloud-based Framework for Sharing Electronic Health Data

CLOUD COMPUTING

JAVA

 

A Survey on Health Care facilities by Cloud Computing

CLOUD COMPUTING

JAVA

42

Dynamic Connection-based Social Group Recommendation

DATA MINING

JAVA

43

Adaptive Diffusion of Sensitive Information In Online Social Networks

DATA MINING

JAVA

44

Detecting Group Shilling Attacks in Online Recommender Systems Based on Bisecting K-Means Clustering

DATA MINING

JAVA

45

Active Online Learning for Social Media Analysis to Support Crisis Management

DATA MINING

JAVA

46

Location-Aware Service Recommendations With Privacy- Preservation in the Internet of Things

DATA MINING

JAVA

47

Cashless Society Managing Privacy and Security in the Technological Age

DATA MINING

JAVA

48

DGDFS Dependence Guided Discriminative Feature Selection for Predicting Adverse Drug-Drug Interaction

DATA MINING

JAVA

49

Movie Recommendation System Using Sentiment Analysis From Micro blogging Data

DATA MINING

JAVA

50

What and With Whom? Identifying Topics in Twitter Through Both Interactions and Text

DATA MINING

JAVA

51

Personalized Recommendation System based on Collaborative  Filtering for IoT Scenarios

DATA MINING

JAVA

52

Efficiently Processing Spatial and Keyword Queries in Indoor Venues

DATA MINING

JAVA

53

Evaluating Public Anxiety for Topic-based Communities in Social Networks

DATA MINING

JAVA

54

Multi-Party High-Dimensional Data Publishing under Differential Privacy

DATA MINING

JAVA

55

TAQE: Tweet Retrieval Based Infrastructure Damage Assessment During Disasters

DATA MINING

JAVA

56

A Sentiment Polarity Categorization Technique for Online Product Reviews

DATA MINING

JAVA

57

Characterizing the Propagation of Situational Information in Social Media During COVID-19 Epidemic: A Case Study on Weibo

DATA MINING

JAVA

58

Land Use Classification with Point of Interests and Structural Patterns

DATA MINING

JAVA

59

Feature Level Rating System Using Customer Reviews and Review Votes

DATA MINING

JAVA

60

Online Pricing with Reserve Price Constraint for Personal Data Markets

DATA MINING

JAVA

61

Predicting Hot Events in the Early Period through Bayesian Model for Social Networks

DATA MINING

JAVA

62

Predicting Student Performance in an Educational Game Using a Hidden Markov Model

DATA MINING

JAVA

63

Privacy Preserving Location Data Publishing A Machine Learning Approach

DATA MINING

JAVA

64

Product Quantized Collaborative Filtering

DATA MINING

JAVA

65

Social Boosted Recommendation with Folded Bipartite Network Embedding

DATA MINING

JAVA

66

Emotion Correlation Mining Through Deep Learning Models on Natural Language Text

DATA MINING

JAVA

67

Emotion Detection in Online Social Networks: A Multi-label Learning Approach

DATA MINING

JAVA

68

Analyzing Product Usage Based on Twitter Users Based on Data mining Process

DATA MINING

JAVA

69

Review of Apriori based Frequent Itemset Mining Solutions on Big Data

DATA MINING

JAVA

70

Data Mining and Feature Analysis of College Students’ Campus Network Behavior

DATA MINING

JAVA

71

Crime Analysis Mapping, Intrusion Detection - Using Data Mining

DATA MINING

JAVA

72

AdSherlock Efficient and Deployable Click Fraud Detection for Mobile Applications

MOBILE COMPUTING

JAVA

73

PASPORT: A Secure and Private Location Proof Generation and Verification Framework

MOBILE COMPUTING

JAVA

74

KOLLECTOR Detecting Fraudulent Activities on Mobile Devices Using Deep Learning

MOBILE COMPUTING

JAVA

75

Detection of Malicious Social Bots Using Learning Automata With URL Features in Twitter Network

SECURE COMPUTING

JAVA

76

Automatically Dismantling Online Dating Fraud

SECURE COMPUTING

JAVA

77

DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Block chain

SECURE COMPUTING

JAVA

78

Detection of Social Network Spam Based on Improved Extreme Learning Machine

SECURE COMPUTING

JAVA

79

Identification of Malicious Injection Attacks in Dense Rating and Co visitation Behaviors

SECURE COMPUTING

JAVA

80

 Privacy-Preserving User Profile Matching in Social Networks

SECURE COMPUTING

JAVA

81

Identification of Malicious Injection Attacks in Dense Rating and Co-visitation Behaviors

SECURE COMPUTING

JAVA

82

SPCSS: Social Network Based Privacy-Preserving Criminal Suspects Sensing

SECURE COMPUTING

JAVA

83

Using Improved Conditional Generative Adversarial Networks to Detect Social Bots on Twitter

SECURE COMPUTING

JAVA

84

Modeling Behavioral Dynamics for Asymmetric Application Layer DDoS Detection

SECURE COMPUTING

JAVA

85

Privacy-Preserving User Profile Matching in Social Networks

SECURE COMPUTING

JAVA

86

Detecting and Characterizing Extremist Reviewer Groups in Online Product Reviews

MACHINE LEARNING

JAVA

87

Suicidal Ideation Detection: A Review of Machine Learning Methods and Applications

MACHINE LEARNING

JAVA

88

Human-in-the-Loop-Aided Privacy-Preserving Scheme for Smart Healthcare

EMERGING TOPICS IN COMPUTING

JAVA

89

Recommending Activities for Mental Health and Well-being Insights from Two User Studies

EMERGING TOPICS IN COMPUTING

JAVA

90

Credit Card Transactions Data Adversarial Augmentation in the Frequency Domain

BIG DATA

JAVA

91

Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks

BIG DATA

JAVA

92

Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography

BIG DATA

JAVA

93

Feature-Level Rating System Using Customer Reviews and Review Votes

NLP (Natural Language Processing)

JAVA

94

A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems

INTERNET OF THINGS (IOT)

JAVA

95

An Efficient IoT-Based Platform for Remote Real Time Cardiac Activity Monitoring

INTERNET OF THINGS (IOT)

JAVA

96

An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things

INTERNET OF THINGS (IOT)

JAVA

97

An Efficient Spam Detection Technique for IoT Devices using Machine Learning

INTERNET OF THINGS (IOT)

JAVA

98

Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments

INTERNET OF THINGS (IOT)

JAVA

99

Secure IoT Data Outsourcing With Aggregate Statistics and Fine- Grained Access Control

INTERNET OF THINGS (IOT)

JAVA

100

An efficient framework for privacy-preserving computations on encrypted IoT data

INTERNET OF THINGS (IOT)

JAVA

101

Benchmarking Image Retrieval Diversification Techniques for Social Media

IMAGE PROCESSING AND MULTIMEDIA

JAVA

102

Online Hashing with Bit Selection for Image Retrieval

IMAGE PROCESSING AND MULTIMEDIA

JAVA

103

Trust-Based Video Management Framework for Social Multimedia Networks

IMAGE PROCESSING AND MULTIMEDIA

JAVA

104

Crisis-Critical Intellectual Property Findings From the COVID-19 Pandemic

SOFTWARE ENGINEERING

JAVA

105

Block chain based Data Storage with Privacy and Authentication in Internet of Things

BLOCK CHAIN

JAVA

106

Block chain-Based Secure Computation Offloading in Vehicular Networks

BLOCK CHAIN

JAVA

 


Post a Comment

0 Comments