Ieee Java 2025
Ieee Java 2025
Enhancing Edge Data Deduplication Description: This project proposes a robust optimization-based framework
with Robust Optimization Amidst for efficient data deduplication in Mobile Edge Computing (MEC)
environments. It introduces two algorithms—uEDDE-C and the lightweight
VTJCC03 Uncertainties
uEDDE-A—to handle uncertainties like data demand fluctuations and edge
A Secure Property-Based Token Description: This project introduces PTA-HE, a secure Property-Based Token
Attestation Framework Using Attestation framework that integrates Homomorphic Encryption to protect
sensitive data during processing in mobile cloud environments. It enables
VTJCC04 Homomorphic Encryption for Mobile computations on encrypted data while ensuring only authorized tokens are
Cloud Systems validated through Trusted Third Parties (TTPs). Experimental results confirm
that PTA-HE offers strong privacy with acceptable performance trade-offs,
making it suitable for confidentiality-critical cloud applications
Privacy Preserving Data Description : This scheme introduces a dedicated keyword server to export
Collaborative Searchable Encryption server-derived keywords, thereby withstanding KGA attempts. Based on
for Group Cloud Data Sharing in this, PCSE deploys cryptographic reverse firewalls to thwart subversion
VTJCC05
Cloud Computing attacks. To overcome the single point of failure inherent in a single
keyword server, the export of server-derived keywords is collaboratively
performed by multiple keyword servers
Ripple: A Decentralized Edge-Based Description: This project introduces Ripple, a decentralized data
Data Deduplication Framework deduplication framework for edge computing environments. By enabling
each edge server to maintain a local data index, Ripple efficiently detects
VTJCC06 and eliminates redundant data without centralized coordination,
significantly reducing data retrieval latency and improving storage
utilization.
A Security Analysis of Website- Description : This project conducts the first comprehensive security
Enabled Direct File Uploads to Cloud evaluation of direct file uploads from websites to cloud storage services,
identifying six major vulnerability categories. Through large-scale testing,
VTJCC07 Storage Services it uncovers 79 previously unknown security flaws across popular platforms
like Google and Reddit. The study provides mitigation strategies and offers
critical insights for securing cloud-based file upload mechanisms in web
applications
Secure Keyword Search and Key Description: Key-aggregate, keyword retrieval, privacy, practicability, An
Management Scheme in Cloud SE enables a cloud server to securely perform a keyword retrieval over the
Environments encrypted data without exposing any information of data content and
VTJCC08 search queries
Information-Theoretic Secure User Description: This project proposes a lightweight user authentication and
Authentication via Secret Sharing secure communication system using a (k, n)-threshold secret sharing
Computation scheme to achieve information-theoretic security. It prevents replay attacks
VTJCC11 through dynamic authentication data and eliminates the need for heavy
cryptographic computation. The approach is ideal for IoT environments,
offering strong security with minimal resource usage
A Scalable Key-Splitting Protocol for Description: This project introduces a lightweight, privacy-preserving
Secure Data Sharing in IoT Devices computation system for Gmail-connected devices using threshold
cryptography and efficient encryption techniques like ECC or NTRU. It
Quality of Service-Aware Scheduling Description: The main contribution of this paper is to calculate the
in Cloud Platforms Using a Hybrid maximum cost for each transaction flow which has not been addressed in
Approach previous studies. This new multipurpose function includes flow load
VTJCC13 amount, load amount on makespan, capacity of Virtual Machines (VMs)
and execution speed parameter.
Securing Cloud Systems with Smart Description : The framework exhibited strong resilience against brute
A u t h e n t i c a t i o n a n d A d a p t i v e force, spoofing, phishing, guessing, and impersonation attacks.
Encryption Implementing this framework in a cloud authentication environment
VTJCC14
significantly enhances data confidentiality and protects against
unauthorized access.
Secure Fine-Grained Access Control Description : This project proposes a privacy-preserving access control
with Policy Protection for Smart Grids scheme for smart grid data sharing using cuckoo filters for attribute hiding
and blockchain for secure data revocation, ensuring fine-grained access
VTJCC16 control with low computational overhead
EVDSE: Efficient and Verify Data Description: We propose EVSEB-an efficient and verifiable searchable
Search With Encryption In a Cloud encryption framework for encrypted cloud-hosted logs. EVSEB supports
fine-grained multi-keyword Boolean search, privacy-preserving access
VTJCC17 Logs control, and per-file integrity verification with minimal overhead. At its
core, EVSEB introduces a hybrid indexing model that integrates a
hierarchical log-type classification tree, Bloom filters, and inverted
indexes to reduce search space
Quantum Secret Sharing Protocol Description: To address these gaps, in this article, we introduce a new
Security In Cloud Environment concept of QSS, which leans on a generic distributed quantum network,
based on a threshold scheme, where all the players collaborate also to the
VTJCC18
routing of quantum information among them. The dealer, by exploiting a
custom flexible weighting system, takes advantage of a newly defined
quantum Dijkstra algorithm
Toward a Publicly Verifiable Description: We also provide a technical solution to embed secure multi-
Confidential Cloud Data Security in party computations within smart contracts by using the Promise
Blockchain programming pattern. Finally, a cost analysis is provided to justify the
VTJCC20 feasibility of the framework compared to other solutions
Secure and Private Analytics of Description: Medical services, Blockchains, Data privacy, Engines,
Healthcare Records in Multi-Tenant Privacy, Cryptography, Scalability, Computational efficiency, Transforms,
Cloud Environments Using Computer architecture, This approach is privacy in healthcare analytics,
VTJCC22
providing a scalable and secure solution to a pressing problem
Blockchain
Multiple Attribute Features and Description: Cloud computing, Transformers The performance of the
Mashup Requirement Attention using proposed optimization configuration model in different scenarios is
cloud computing compared and the influence of model parameters on the optimization
VTJCC24 results is analyzed
A Robust Image Encryption with a Description : Deficient cloud security can lead to privacy breaches, data
Dynamic Data for secure Data With a theft, and unauthorized access, making robust security solutions
Cloud indispensable for protecting against cyber-threats and providing data
VTJCC25 privacy
IEEE 2024 - DATA MINING
Secure Keyword Search with Access Description: This project presents a secure keyword search system using
Control Using Secret Sharing for secret sharing with built-in user access control for cloud-based
environments. It ensures that only authorized users can search encrypted
VTJDM01 Cloud Data Outsourcing data, protecting privacy even against semi-honest adversaries. The
enhanced secret sharing technique improves efficiency, making the
solution ideal for scalable, privacy-preserving data outsourcing
Secure and Transparent E-Voting Description: This project aims to develop a secure and transparent e-voting
System Using Blockchain, Smart system using blockchain technology. It integrates smart contracts for
Contracts, Differential Privacy, and reliability and differential privacy for vote anonymity, while utilizing email
VTJDM02 verification for voter authentication instead of complex digital identity
Email-Based Voter Authentication frameworks
Secure and Decentralized Health Data Description: This project presents a blockchain-enabled framework using
Management Using IoMT and Hyperledger Fabric to ensure secure, interoperable, and privacy-
preserving management of IoMT data across healthcare systems. By
VTJDM05 Blockchain integrating edge computing, it enables real-time data processing, reduces
latency, and maintains device-level privacy. The solution supports efficient
remote monitoring and clinical decision-making, promoting a unified and
trustworthy digital healthcare ecosystem
An Advance Data Sharing with Description : We propose procedures to distribute some shares before a
Quantum Secret Sharing Scheme with secret is given in those schemes. The new procedures enhance the
applicability of the secret sharing schemes to wider scenarios as some
VTJDM07 Cloud Data
participants can be unavailable when the dealer obtains the quantum secret.
Enhanced Privacy Preservation in Description: This project develops a servlet-based web application that
Mixed Data Sharing Using enables privacy-preserving data sharing using a correlation-aware
differential privacy approach. It balances and enhances unbalanced
VTJDM08 Correlation-Aware Differential datasets by generating synthetic records and applying noise within
Privacy and Data Balancing correlated attribute groups. The system ensures strong privacy protection
while maintaining data truthfulness and utility, making it suitable for
sensitive domains like healthcare and finance
An Open-source Web application Data Description : This paper introduces 'BeyondLife', a cross-platform, open-
Management source, and privacy-enhancing digital will management solution designed
to securely handle and distribute digital assets after death. At the core of this
VTJDM09
solution is a customized Ciphertext-Policy Attribute-Based Encryption
(CP-ABE) scheme, referred to as PD-CP-ABE
Adaptive Task Scheduling and Load Description: Processor scheduling, Edge computing, Costs,
Optimization in Fog Networks for Computational modeling, Cloud computing, Resource management. The
foundation of this approach is the DRL model, which is designed to
VTJDM10 Healthcare dynamically optimize the partition of computational tasks across fog nodes
to improve both data throughput and operational response times
Privacy Preserving Health Care Data Description: This study examined current perspectives on data sharing,
Sharing With Data Mining investigating the trust level in privacy preserving data sharing tools and
techniques among healthcare professionals and organization's, and their
VTJDM11 openness to adopting technology for secure data sharing. We incorporated
participants from various healthcare professions across Australia. We
aimed to uncover prevalent attitudes toward data sharing in the healthcare
sector by employing a mix of descriptive statistics and knowledge
Cross-Border Data Sharing: A Trust- Description: The paper introduces a general framework called Trans-
Enabled Framework Using TTDS Border Trusted Data Spaces (TTDS) that enables secure, traceable, and
policy-compliant international data exchange. It leverages technologies
VTJDM13 like smart contracts, zero-trust identity models, and IP-layer traffic
monitoring to enforce data governance and accountability across borders.
The framework ensures interoperability with global standards and
addresses legal, technical, and trust challenges in cross-border data
circulation.
Public Key Authenticated Encryption Description: The complexity of all algorithms in PEWS increases linearly
with Searched in Encrypted Data in with the keyword length, while remaining almost constant or even
decreasing linearly with the number of wildcards. To resist against (insider)
VTJDM14 Data Mining KGA, we further extend PEWS into the first Public-key Authenticated
Encryption with Wildcard Search (PAEWS) scheme. Our PEWS and
Secure and Real-Time 1-to-N Face Description: This system enhances user authentication by integrating live
Recognition System for Web-Based face capture and identification through OpenCV, replacing static image
VTJDM18 User Authentication storage with real-time facial recognition, ensuring secure access to
sensitive data with dynamic user information retrieval
Secure Key Agreement and Description: Servers, Security, Authentication, Passwords, Computational
Authentication Mechanism with IDS modeling, Cloud computing, Neural networks, Edge computing,
Protocols. The proposed lightweight authentication protocol to enhance
VTJDM22 for Fog Computing the overall security framework in the fog environment
A Network Security Protocols For The Description: we present our novel solution for integrating three different
Quantum key and Cryptography Data cryptographic assumptions (two of them quantum resistant) into hybrid
network security protocols, ensuring that three different cryptographic
VTJNS01 Distribution assumptions must be broken before the protocol becomes vulnerable. Our
solution allows for a seamless integration of classical and post-quantum
(PQ) cryptography, and quantum key distribution (QKD) into existing
network security protocols (e.g., TLS, IPsec).
Optimization of RSA-Based Description: Firstly, optimize the encryption performance by optimizing
Encryption Performance and the parameter selection of the RSA algorithm, selecting appropriate public
and private key lengths, and reducing unnecessary computational
VTJNS02 Resource Allocation in Networks overhead. At the same time, introducing fast power algorithm optimization
accelerates the encryption and decryption. At the same time, a load-aware
A Decision-Making Model for Description : Blockchains, Reliability, Decision making, Supply chains.
Uncertainty-Aware Evaluation of Moreover, to verify the validity and reliability of the proposed approach, a
Blockchain Traceability Systems comparison analysis was performed to show the efficacy of the proposed
VTJNS05
model. Finally, concluding remarks are discussed
Unrestricted File Upload Description: This project presents an in-depth analysis of Unrestricted File
Vulnerabilities: Security Challenges Upload (UFU) vulnerabilities in applications used across IoT, smart
homes, and smart city systems. It highlights how easily exploitable UFUs
VTJNS07 and Future Directions in Modern can compromise system confidentiality, integrity, and availability. The
Communication Systems study emphasizes the need for stronger security mechanisms and outlines
future directions to enhance file upload safety in modern communication
systems
NETWORK SECURITY
Strategies for Robust and Scalable presents a hybrid synchronization model combining a hierarchical design
VTJNS08 SDN Networks with established resilient cluster mechanisms
IEEE 2024 -
E n e rg y - E ff i c i e n t C l o u d Ta s k Description: EMO-TS dynamically adjusts task scheduling based on real-
Management Using a Multi-Objective time workloads and operational conditions, effectively minimizing power
Optimization Model consumption without sacrificing system performance
VTJNS09
Efficient Blockchain Mechanisms for Description: This project integrates a lightweight blockchain module into a
Ensuring Data Integrity in IoT LoRa network, where data is encrypted and stored in blocks. The system
Systems uses a cyclic process to encrypt, transmit, and decrypt the blockchain every
VTJBC01
20 seconds, ensuring secure data exchange between devices and servers
Blockchain-Enabled Healthcare: Description: The project presents a robust and secure architecture for
Ensuring Secure and Scalable Data healthcare data management by integrating MySQL with blockchain
with MySQL Integration technology, forming the MySQL-Blockchain Healthcare Architecture
VTJBC02 (MBHA). This system combines the structured querying and efficiency of
traditional relational databases with the tamper-proof, decentralized nature
of blockchain
A Blockchain-Enabled Secure Data Description: The Blockchain-based Secure Data Sharing Framework
Sharing Framework for Edge (BSDSF) enhances security and efficiency in edge-cloud computing by
integrating blockchain with Byzantine Fault Tolerant (BFT) consensus and
VTJBC04 Computing Networks smart contracts. It ensures low-latency, tamper-resistant data sharing
through a two-tier consensus system and real-time node validation. The
framework significantly reduces transaction delays and improves
throughput, making edge data exchange more reliable and secure
TM-Chain: Trusted Computing Base Description : TM-Chain is a blockchain-based architecture designed to
Measurement and Management for securely and efficiently manage Trusted Computing Base (TCB)
measurements in large-scale IoT environments. It addresses the limitations
VTJBC05 IoT Using Blockchain and Cloud of traditional remote attestation systems—such as scalability issues and
centralized vulnerabilities—by using distributed, tamper-resistant storage.
TM-Chain introduces custom protocols for encrypted TCB data transfer,
identity-linked storage, and verifier access, enabling secure and traceable
A Secure Blockchain Technique For Description: Blockchain integration is one of the suggested applications of
Integration Knowledge Discovery in technology that could help secure the data during transmission, storage,
Cloud and knowledge discovery. Moreover, by integrating smart contracts, a
VTJBC06 secure architecture could also assimilate accountability during data
exchange
Optimized Data Exchange and Description: This project proposes a blockchain-based data relay and
Storage in Blockchain-Enabled Edge trading model for edge devices, enabling secure and transparent data
Computing Environments sharing. It introduces a novel Proof-of-Data-Trading (PoDT) consensus to
VTJBC07
balance trust and efficiency. The system ensures tamper-proof transactions
and optimizes storage and resource use in edge computing
NETWORK SECURITY
CODE TITLE APPLICATION / DESCRIPTION
IEEE 2024 -
Leveraging Blockchain to Transition Description: Blockchain, Blockchain-Based Social Media, Consensus
Social Media from Centralized to Mechanisms, Cryptography, Decentralization, Distributed Ledger,
VTJBC08 Decentralized Models Monetization, Non-Fungible Tokens, Peer-to-Peer, Social Media
End-to-End Security in Smart Homes Description: This project proposes a blockchain-based security framework
Using a Consortium Blockchain for IoT smart homes, using a consortium blockchain to enhance data
Approach confidentiality, integrity, and access control while minimizing the burden
VTJBC10
on resource-constrained devices. It integrates with fog computing to ensure
secure and efficient data transmission to the cloud
Enhancing Data Security with Description: This project presents a secure end-to-end IoT communication
Attribute-Based Encryption and architecture by combining blockchain with Attribute-Based Encryption
(ABE) for decentralized key management and fine-grained access control.
VTJBC11 Blockchain Integration It ensures lightweight, tamper-proof, and flexible data sharing in resource-
Application of Blockchain for Description : This project proposes a blockchain-based system to secure
Securing Confidential Data in Digital sensitive customer data in financial institutions, using SHA-256
Information Infrastructures encryption and smart contracts for encrypted data sharing, access control,
VTJBC14 and real-time auditability. It enhances data confidentiality, integrity, and
security against unauthorized access and tampering
A Secure and Scalable Blockchain Description: Blockchains, Security, Hash functions, Data privacy.
Model for Data Management Using Experimental results indicate that our blockchain infrastructure achieves
Attribute-Based Cryptography enhanced security while maintaining high efficiency.
VTJBC16
A Methodology for Replicating Data Description: This paper introduces a methodology for replicating exploit
in EVM compatible in a Blockchain transactions across EVM-compatible blockchains, enabling testing of new
security measures. By addressing key challenges in address mapping,
VTJBC18
contract deployment and storage configuration
Fort2BCK: Hybrid Cryptographic Description: Fort2BCK is a secure blockchain framework designed for
Validation for Robust Healthcare Data healthcare systems, addressing data tampering, unauthorized access, and
consensus vulnerabilities. It employs dual-layer verification with RSA,
VTJBC19 Protection ECDSA, and Zero-Knowledge Proofs to enhance authentication and block
integrity. The framework improves resistance to attacks, ensures
regulatory compliance, and supports secure, scalable clinical data
management
Towards Scalable and Trustworthy Description : This project introduces FlexIM, an efficient and verifiable
Indexing in Blockchain: The FlexIM index management system for dynamic blockchain queries. Using
Approach reinforcement learning and data distribution insights, FlexIM significantly
VTJBC21
speeds up queries while reducing storage requirements compared to
existing systems like vChain+.
Blockchain-Enabled Framework for Description: This project proposes a blockchain-based framework for
P r i v a c y - P r e s e r v i n g M o b i l e secure and scalable mobile healthcare (mHealth) data management,
Healthcare Systems addressing privacy and centralization issues in existing systems. It
VTJBC22
integrates mobile computing with IPFS and Ethereum blockchain for
decentralized, tamper-proof storage and access
Process Modeling Techniques for Description : Blockchains, Decentralized applications, Business, Smart
Developing Blockchain Applications contracts, Authorization, Stakeholders, Software, Finance, Supply chains,
Process mining
VTJBC23
Decentralized Genomic Data Sharing Description: This project proposes a blockchain and NFT-based solution
and Monetization Using Blockchain for genomic data management, allowing individuals to control, secure, and
monetize their Raw and Sequenced Genomic Data (RGD and SGD). Using
VTJNW02 and NFTs NFTs and smart contracts, the system ensures traceability, secure sharing,
and user-controlled access, addressing ownership and privacy challenges
in genomic data handling
Resilient Edge Data Caching: Description: This project introduces the Uncertainty-aware Edge Data
Balancing Popularity Awareness and Caching (uEDC) framework, which adapts caching strategies to dynamic
environments and server reliability issues. It incorporates robust
VTJNW03 Server Failures optimization, lightweight encryption, and integrity validation to improve
data retrieval latency, reduce costs, and enhance security in Mobile Edge
Computing (MEC) systems
Fault-Tolerant Data Distribution in Description: EdgeHydra is a fault-tolerant data distribution scheme for
Edge Computing via Erasure Coding: edge computing that uses erasure coding to improve file delivery
The EdgeHydra Approach efficiency. By encoding data into both data and parity blocks, it allows edge
VTJNW06
servers to reconstruct files even with missing blocks, enhancing robustness
against delays and failures while reducing distribution times by up to
50.54%.
A Homomorphic Encryption Method Description : This method leverages fully homomorphic encryption
Based on Crowd Networks technology, thereby eliminating the use of plaintext throughout the sensing
process and enhancing security compared to traditional encryption
VTJNW07
methods. Initially, a sensing model is constructed based on the classic
crowd sensing architecture. Subsequently, fully homomorphic encryption
technology is employed for plaintext-free data transmission
Analysis and Optimization of Robust Description: Autocorrelation, Receivers, Decoding, Benchmark testing,
Packet Detection Mechanisms in Wireless sensor networks, Optimization. This study holds considerable
implications for the design and deployment of packet-detection schemes
VTJNW09 Random Access Networks
networks
Smart Reversible Data Hiding for Description: Secret sharing, high embedding, capacity reversible data
Secure Medical Image Sharing With Description : This study analyzes various methods for safe medical data
Watermarking In Image Processing sharing, highlighting their advantages and limitations We categorize these
approaches into centralized techniques, such as encryption and
VTJIM02
watermarking, and distributed methods, such as blockchain and federated
learning. Additionally, this research examines the evolution of medical
image watermarking techniques
Enhanced Image Security via Two- Description: This research introduces a two-layer image encryption
Layer Encryption with Switched scheme combining control theory and dynamic system modeling to
System Dynamics enhance security, addressing vulnerabilities in traditional methods by
VTJIM03
increasing resistance to cryptanalytic attacks while maintaining
computational efficiency
Secure And Efficient Encrypted Image Description: We propose SEEIR, a secure and efficient encrypted image
Retrieval With Private Share Data retrieval scheme based on ASS. First, SEEIR enhances retrieval security
through secure kNN-ASS, a novel method that encrypts index shares
VTJIM04
across twin clouds to enforce access control. Only users with keys
authorized by the data owner can generate valid query vectors