Java Major Title List-2023
Java Major Title List-2023
32. Secure Storage Auditing With Efficient Key Updates Cloud Computing
33. Publicly Verifiable Shared Dynamic Electronic Health Record Databases Cloud Computing
34. Enabling Identity-Based Integrity Auditing And Data Cloud Computing
35. efficient resource allocation for task scheduling in cloud computing Cloud Computing
36. Dynamic Multi-Keyword Ranked Search Based On Bloom Filter Cloud Computing
37. Verifiable And Multi Keyword Searchable Attribute Based Encryption Scheme For Cloud Computing
Cloud
38. A Practical Public Key Encryption Scheme Based On Learning Parity With Noise Cloud Computing
39. Privacy Aware Personal Data Storage PPDS Learning How To Protect User Privacy Cloud Computing
40. A Secure Elliptic Curve Cryptography Based Mutual Authentication Protocol For Cloud Computing
Cloud Assisted Tmis
41. A Secure Searchable Encryption Framework For Privacy-Critical Cloud Storage Cloud Computing
Services
42. Profit Maximization For Cloud Brokers In Cloud Computing Cloud Computing
43. Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption For Cloud Computing
Personal Health Record System
44. Secure Data Group Sharing And Conditional Dissemination With Multi-Owner In Cloud Computing
Cloud Computing
45. Cryptographically Enforced Dynamic Access Control In The Cloud Cloud Computing
46. Adaptive Resource Management For Analyzing Video Streams From Globally Cloud Computing
Distributed Network Cameras
47. An Approach To Balance Maintenance Costs And Electricity Consumption In Cloud Cloud Computing
Data Centers
48. A Power-Of-Two Choices Based Algorithm For Fog Computing Cloud Computing
49. Provably Secure And Lightweight Identity Based Authenticated Data Sharing Cloud Computing
Protocol
50. Efficient Retrieval Over Documents Encrypted By Attributes In Cloud Computing Cloud Computing
51. An Efficient And Secured Framework For Mobile Cloud Computing Cloud Computing
52. A Key-Policy Attribute-Based Temporary Keyword Search Scheme For Secure Cloud Computing
Cloud Storage
53. an efficient and privacy-preserving biometric identification scheme in cloud Cloud Computing
computing
54. An Efficient And Secure Dynamic Auditing Protocol For Data Storage In Cloud Cloud Computing
Computing
55. Chaotic Searchable Encryption For Mobile Cloud Storage Cloud Computing
56. Efficient Traceable Authorization Search System For Secure Cloud Storage Cloud Computing
57. An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems Cloud Computing
58. Secure File storage in Cloud Computing using Hybrid Cryptography Algorithm Cloud Computing
59. Division and Replication of Data in Cloud for Optimal Performance and Security Cloud Computing
60. Emotion Recognition on Twitter Comparative Study and Training a Unison Model Cloud Computing
61. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Computing
Cloud Storage
62. keyD secure key-deduplication with identity-based broadcast encryption Cloud Computing
63. Efficient Privacy-Aware Authentication Scheme For Mobile Cloud Computing
64. SeSPHR A Methodology for Secure Sharing of Personal Health Records Cloud Computing
JAVA MAJOR PROJECTS LIST-2023
65. Provably secure and lightweight identity-based authenticated data sharing protocol Cloud Computing
for cyber-physical cloud environment
66. Development And Examination Of Fog Computing Based Encrypted Control Fog Computing
System
67. On-The-Fly Privacy For Location Histograms Secure Computing
68. Analyzing Product Usage Based On Twitter Users Based On Data Mining Process Data Mining
69. Big Data Analytics Of Geosocial Media For Planning And Real-Time Decisions Data Mining
70. Credit Card Transactions Data Adversarial Augmentation In The Frequency Domain Data Mining
71. Crime Analysis Mapping, Intrusion Detection - Using Data Mining Data Mining
72. Data Mining And Feature Analysis Of College Students' Campus Network Behavior Data Mining
73. Multi View Clustering With The Cooperation Of Visible And Hidden Views Data Mining
74. Fuzzy K-Means Clustering With Discriminative Embedding Data Mining
75. Effective Keyword Search Over Weighted Graphs Data Mining
76. Ant Colony Stream Clustering A Fast Density Clustering Algorithm For Dynamic Data Mining
Data Streams
77. Toward Effective Collaborative Filtering Using Uninteresting Items Data Mining
78. Co-detect Financial Fraud Detection With Anomaly Feature Detection Data Mining
79. A Weighted Frequent Item Set Mining Algorithm Data Mining
80. Privacy Characterization and Quantification in Data Publishing Data Mining
81. Stock Market Analysis And Prediction Data Mining
82. Predictability and Prediction of Human Mobility Based on Application-Collected Data Mining
Location Data
83. Detecting And Characterizing Extremist Reviewer Groups In Online Product Social Network
Reviews
84. Protecting User Data In Profile Matching Social Networks Social Network
85. Trust-Based Video Management Framework For Social Multimedia Networks Social Network
86. User Behavior Prediction Of Social Hotspots Social Network
87. An Efficient Secure Electronic Payment System For E-Commerce Social Network
88. Fake News, Disinformation, And Deep Fakes: Leveraging Distributed Ledger Social Network
Technologies And Blockchain To Combat Digital Deception And Counterfeit
Reality
89. Detecting Malicious Social Bots Based On Click Stream Sequences Social Network
90. Predicting Cyber Bullying On Social Media In The Big Data Era Using Machine Social Network
Learning Algorithms Review Of Literature And Open Challenges
91. Spammer Detection And Fake User Identification On Social Networks Social Network
92. Towards Robust Image Steganography Social Network
93. Online Public Shaming On Twitter Detection, Analysis And Mitigation Social Network
94. Social Network Rumor Diffusion Predication Based On Equal Responsibility Game Social Network
Model
95. Retrieving Hidden Friends A Collusion Privacy Attack Against Online Friend Social Network
Search Engine
96. A Hierarchical Attention Model For Social Contextual Social Network
97. Mining Users Trust From E-Commerce Reviews Based On Sentiment Similarity Social Network
Analysis
98. Risk Assessment In Social Networks Based On User Anomalous Behaviors Social Network
JAVA MAJOR PROJECTS LIST-2023