0% found this document useful (0 votes)
31 views12 pages

Ieee Java 2025

The document outlines various projects focused on enhancing security and efficiency in cloud computing and IoT environments through innovative cryptographic techniques. Key projects include secure data sharing frameworks, privacy-preserving encryption methods, and decentralized authentication systems. Each project addresses specific challenges such as data integrity, user authentication, and secure communication, aiming to improve overall system resilience and performance.

Uploaded by

smartswag1991
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views12 pages

Ieee Java 2025

The document outlines various projects focused on enhancing security and efficiency in cloud computing and IoT environments through innovative cryptographic techniques. Key projects include secure data sharing frameworks, privacy-preserving encryption methods, and decentralized authentication systems. Each project addresses specific challenges such as data integrity, user authentication, and secure communication, aiming to improve overall system resilience and performance.

Uploaded by

smartswag1991
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

JAVA

CODE TITLE APPLICATION / DESCRIPTION


Enhanced Key Exchange and Description: We propose an end-to-end secured IoT system that ensures the
Lightweight Encryption for IoT system's integrity is never compromised using lightweight cryptographic
Security Using Timestamp-Based algorithms. We propose a three-module system, where the first module
VTJCC01
OTP and SIT handles user authentication using a time-based one-time password, the
second secures communication using lightweight enhanced RSA

Ve r i f i a b l e A n d S e c u r e D a t a Description: VERDUP, a verifiable and secure deduplication scheme with


Deduplication With A Real-Time Data the support of real-time data integrity checking and fine-grained access
Integrity Checking With a Cloud control specifically designed for IIoT environments. VERDUP utilizes a
VTJCC02 two-stage deduplication approach based on a dynamic tree model in a fog-
assisted cloud architecture, integrated with blockchain technology to
enhance deduplication efficiency and data integrity verification

Enhancing Edge Data Deduplication Description: This project proposes a robust optimization-based framework
with Robust Optimization Amidst for efficient data deduplication in Mobile Edge Computing (MEC)
environments. It introduces two algorithms—uEDDE-C and the lightweight
VTJCC03 Uncertainties
uEDDE-A—to handle uncertainties like data demand fluctuations and edge

IEEE 2025 - CLOUD COMPUTING


server failures. The solution effectively reduces storage costs and retrieval
latency, ensuring reliable performance in dynamic edge networks

A Secure Property-Based Token Description: This project introduces PTA-HE, a secure Property-Based Token
Attestation Framework Using Attestation framework that integrates Homomorphic Encryption to protect
sensitive data during processing in mobile cloud environments. It enables
VTJCC04 Homomorphic Encryption for Mobile computations on encrypted data while ensuring only authorized tokens are
Cloud Systems validated through Trusted Third Parties (TTPs). Experimental results confirm
that PTA-HE offers strong privacy with acceptable performance trade-offs,
making it suitable for confidentiality-critical cloud applications

Privacy Preserving Data Description : This scheme introduces a dedicated keyword server to export
Collaborative Searchable Encryption server-derived keywords, thereby withstanding KGA attempts. Based on
for Group Cloud Data Sharing in this, PCSE deploys cryptographic reverse firewalls to thwart subversion
VTJCC05
Cloud Computing attacks. To overcome the single point of failure inherent in a single
keyword server, the export of server-derived keywords is collaboratively
performed by multiple keyword servers
Ripple: A Decentralized Edge-Based Description: This project introduces Ripple, a decentralized data
Data Deduplication Framework deduplication framework for edge computing environments. By enabling
each edge server to maintain a local data index, Ripple efficiently detects
VTJCC06 and eliminates redundant data without centralized coordination,
significantly reducing data retrieval latency and improving storage
utilization.

A Security Analysis of Website- Description : This project conducts the first comprehensive security
Enabled Direct File Uploads to Cloud evaluation of direct file uploads from websites to cloud storage services,
identifying six major vulnerability categories. Through large-scale testing,
VTJCC07 Storage Services it uncovers 79 previously unknown security flaws across popular platforms
like Google and Reddit. The study provides mitigation strategies and offers
critical insights for securing cloud-based file upload mechanisms in web
applications
Secure Keyword Search and Key Description: Key-aggregate, keyword retrieval, privacy, practicability, An
Management Scheme in Cloud SE enables a cloud server to securely perform a keyword retrieval over the
Environments encrypted data without exposing any information of data content and
VTJCC08 search queries

A n M e d i c a l D a t a A U s e r Description: The proposed protocol utilizes a post-quantum fuzzy


Authentication Of A Cloud Data commitment (PQFC) scheme to enhance security and is rigorously
analyzed under the random oracle model and ProVerif tool. Its
VTJCC09 functionality and security are thoroughly assessed, demonstrating
adherence to key requirements such as memoryless operation

Contact: +91 95810 22022, +91 95810 12012


Email: [email protected], www.raminnovativeinfotech.com
1
JAVA

CODE TITLE APPLICATION / DESCRIPTION


Secure Multi-Authority Key-Policy Description: This project proposes a secure and efficient data protection
Attribute-Based Encryption with ECC framework for IoT systems by combining Key-Policy Attribute-Based
Integration Encryption (KP-ABE) with Elliptic Curve Cryptography (ECC). The
VTJCC10
approach aims to reduce encryption overhead while ensuring fine-grained
access control and strong data security

Information-Theoretic Secure User Description: This project proposes a lightweight user authentication and
Authentication via Secret Sharing secure communication system using a (k, n)-threshold secret sharing
Computation scheme to achieve information-theoretic security. It prevents replay attacks
VTJCC11 through dynamic authentication data and eliminates the need for heavy
cryptographic computation. The approach is ideal for IoT environments,
offering strong security with minimal resource usage

A Scalable Key-Splitting Protocol for Description: This project introduces a lightweight, privacy-preserving
Secure Data Sharing in IoT Devices computation system for Gmail-connected devices using threshold
cryptography and efficient encryption techniques like ECC or NTRU. It

IEEE 2025 - CLOUD COMPUTING


VTJCC12 avoids the overhead of multi-share or FHE-based methods, enabling secure
and scalable data sharing through encrypted communication linked to
Gmail accounts

Quality of Service-Aware Scheduling Description: The main contribution of this paper is to calculate the
in Cloud Platforms Using a Hybrid maximum cost for each transaction flow which has not been addressed in
Approach previous studies. This new multipurpose function includes flow load
VTJCC13 amount, load amount on makespan, capacity of Virtual Machines (VMs)
and execution speed parameter.

Securing Cloud Systems with Smart Description : The framework exhibited strong resilience against brute
A u t h e n t i c a t i o n a n d A d a p t i v e force, spoofing, phishing, guessing, and impersonation attacks.
Encryption Implementing this framework in a cloud authentication environment
VTJCC14
significantly enhances data confidentiality and protects against
unauthorized access.

Homomorphic Encryption-Based Description: Computational modeling, Security, Computational


Privacy Preservation Using Data efficiency, Biological system modeling, Protection, Data models,
Sharing in cloud Environments Cryptography, Data privacy, the proposed method is more efficient in
VTJCC15 communication and computational overheads than other PPFL-HE
methods

Secure Fine-Grained Access Control Description : This project proposes a privacy-preserving access control
with Policy Protection for Smart Grids scheme for smart grid data sharing using cuckoo filters for attribute hiding
and blockchain for secure data revocation, ensuring fine-grained access
VTJCC16 control with low computational overhead

EVDSE: Efficient and Verify Data Description: We propose EVSEB-an efficient and verifiable searchable
Search With Encryption In a Cloud encryption framework for encrypted cloud-hosted logs. EVSEB supports
fine-grained multi-keyword Boolean search, privacy-preserving access
VTJCC17 Logs control, and per-file integrity verification with minimal overhead. At its
core, EVSEB introduces a hybrid indexing model that integrates a
hierarchical log-type classification tree, Bloom filters, and inverted
indexes to reduce search space
Quantum Secret Sharing Protocol Description: To address these gaps, in this article, we introduce a new
Security In Cloud Environment concept of QSS, which leans on a generic distributed quantum network,
based on a threshold scheme, where all the players collaborate also to the
VTJCC18
routing of quantum information among them. The dealer, by exploiting a
custom flexible weighting system, takes advantage of a newly defined
quantum Dijkstra algorithm

Contact: +91 95810 22022, +91 95810 12012


Email: [email protected], www.raminnovativeinfotech.com
2
JAVA

CODE TITLE APPLICATION / DESCRIPTION


EBMD: Efficient Based Medical Data Description: However, this shift introduces critical security and privacy
Share In Database risks, as sensitive patient information is stored on untrusted third-party
servers To address these limitations in medical data outsourcing, we
VTJCC19
present ECMO, a novel protocol that combines an ordered additive secret
sharing algorithm with a unique index permutation method

Toward a Publicly Verifiable Description: We also provide a technical solution to embed secure multi-
Confidential Cloud Data Security in party computations within smart contracts by using the Promise
Blockchain programming pattern. Finally, a cost analysis is provided to justify the
VTJCC20 feasibility of the framework compared to other solutions

IEEE 2025 - CLOUD COMPUTING


Multi-key Homomorphic Encryption Description: Multi-key homomorphic encryption (MKHE) allows
With an secure in a Cloud Data in computations to be performed on ciphertexts encrypted with different keys,
Automorphism Data thus expanding the application scenarios of homomorphic encryption to
VTJCC21
more fields. We improved the automorphism-based blind rotation by using
the hybrid product, making it suitable for the multi-key schemes

Secure and Private Analytics of Description: Medical services, Blockchains, Data privacy, Engines,
Healthcare Records in Multi-Tenant Privacy, Cryptography, Scalability, Computational efficiency, Transforms,
Cloud Environments Using Computer architecture, This approach is privacy in healthcare analytics,
VTJCC22
providing a scalable and secure solution to a pressing problem
Blockchain

A Lightweight Hashing-Based Description : Data privacy, Privacy, Accuracy, Aggregates, Distributed


Approach for Privacy-Preserving IoT databases, Internet of Things, Recommender systems, our proposal
Service Recommendation surpasses other approaches in terms of recommendation accuracy and
VTJCC23
efficiency while protecting user privacy

Multiple Attribute Features and Description: Cloud computing, Transformers The performance of the
Mashup Requirement Attention using proposed optimization configuration model in different scenarios is
cloud computing compared and the influence of model parameters on the optimization
VTJCC24 results is analyzed

A Robust Image Encryption with a Description : Deficient cloud security can lead to privacy breaches, data
Dynamic Data for secure Data With a theft, and unauthorized access, making robust security solutions
Cloud indispensable for protecting against cyber-threats and providing data
VTJCC25 privacy
IEEE 2024 - DATA MINING

Secure Keyword Search with Access Description: This project presents a secure keyword search system using
Control Using Secret Sharing for secret sharing with built-in user access control for cloud-based
environments. It ensures that only authorized users can search encrypted
VTJDM01 Cloud Data Outsourcing data, protecting privacy even against semi-honest adversaries. The
enhanced secret sharing technique improves efficiency, making the
solution ideal for scalable, privacy-preserving data outsourcing

Secure and Transparent E-Voting Description: This project aims to develop a secure and transparent e-voting
System Using Blockchain, Smart system using blockchain technology. It integrates smart contracts for
Contracts, Differential Privacy, and reliability and differential privacy for vote anonymity, while utilizing email
VTJDM02 verification for voter authentication instead of complex digital identity
Email-Based Voter Authentication frameworks

Contact: +91 95810 22022, +91 95810 12012


Email: [email protected], www.raminnovativeinfotech.com
3
JAVA

CODE TITLE APPLICATION / DESCRIPTION


An Efficient Data with a Generic Description: The proposed method leverages only fundamental
Construction in a Public Key with a cryptographic building blocks, relying exclusively on a standard public
key encryption (PKE) scheme along with cryptographic hash functions,
VTJDM03 Random Data in a SQL
without requiring additional complex primitives. More concretely, the
proposed construction leverages a PKE scheme that ensures one-wayness
against chosen plaintext attacks (OW-CPA)
Blockchain-Enabled Comprehensive Description: This project introduces a blockchain-based end-to-end
Security Framework for Industrial IoT security model for IIoT systems, ensuring decentralized authentication,
data integrity, and access control. It combines smart contracts and SHA-
VTJDM04 256 encryption to dynamically enforce security without relying on central
authorities. The hybrid blockchain approach offers scalability,
performance, and confidentiality for secure industrial operations

Secure and Decentralized Health Data Description: This project presents a blockchain-enabled framework using
Management Using IoMT and Hyperledger Fabric to ensure secure, interoperable, and privacy-
preserving management of IoMT data across healthcare systems. By
VTJDM05 Blockchain integrating edge computing, it enables real-time data processing, reduces
latency, and maintains device-level privacy. The solution supports efficient
remote monitoring and clinical decision-making, promoting a unified and
trustworthy digital healthcare ecosystem

IEEE 2025 - DATA MINING


A Verifiable Data With Symmetric Description: We present two novel approaches, Hexie and Jianding. Hexie
Searchable Encryption With Dynamic implements secret sharing to conceal index entries, enabling dynamic
Data Store With Database In Security updates, non-interactive interactions, and lightweight clients. To enhance
VTJDM06 the reliability of search results and address the problem of empty,
incomplete, or inaccurate outcomes, we introduce the Jianding scheme as
an extension of Hexie.

An Advance Data Sharing with Description : We propose procedures to distribute some shares before a
Quantum Secret Sharing Scheme with secret is given in those schemes. The new procedures enhance the
applicability of the secret sharing schemes to wider scenarios as some
VTJDM07 Cloud Data
participants can be unavailable when the dealer obtains the quantum secret.

Enhanced Privacy Preservation in Description: This project develops a servlet-based web application that
Mixed Data Sharing Using enables privacy-preserving data sharing using a correlation-aware
differential privacy approach. It balances and enhances unbalanced
VTJDM08 Correlation-Aware Differential datasets by generating synthetic records and applying noise within
Privacy and Data Balancing correlated attribute groups. The system ensures strong privacy protection
while maintaining data truthfulness and utility, making it suitable for
sensitive domains like healthcare and finance
An Open-source Web application Data Description : This paper introduces 'BeyondLife', a cross-platform, open-
Management source, and privacy-enhancing digital will management solution designed
to securely handle and distribute digital assets after death. At the core of this
VTJDM09
solution is a customized Ciphertext-Policy Attribute-Based Encryption
(CP-ABE) scheme, referred to as PD-CP-ABE

Adaptive Task Scheduling and Load Description: Processor scheduling, Edge computing, Costs,
Optimization in Fog Networks for Computational modeling, Cloud computing, Resource management. The
foundation of this approach is the DRL model, which is designed to
VTJDM10 Healthcare dynamically optimize the partition of computational tasks across fog nodes
to improve both data throughput and operational response times

Privacy Preserving Health Care Data Description: This study examined current perspectives on data sharing,
Sharing With Data Mining investigating the trust level in privacy preserving data sharing tools and
techniques among healthcare professionals and organization's, and their
VTJDM11 openness to adopting technology for secure data sharing. We incorporated
participants from various healthcare professions across Australia. We
aimed to uncover prevalent attitudes toward data sharing in the healthcare
sector by employing a mix of descriptive statistics and knowledge

Contact: +91 95810 22022, +91 95810 12012


Email: [email protected], www.raminnovativeinfotech.com
4
JAVA

CODE TITLE APPLICATION / DESCRIPTION


Decentralized Authentication and Description: This project presents ISIF, a decentralized identity and data-
Secure Data Sharing Using IOTA- sharing framework for IoT devices using IOTA, enabling secure, scalable,
and trustless authentication without centralized authorities
VTJDM12 Based Self-Sovereign Identity

Cross-Border Data Sharing: A Trust- Description: The paper introduces a general framework called Trans-
Enabled Framework Using TTDS Border Trusted Data Spaces (TTDS) that enables secure, traceable, and
policy-compliant international data exchange. It leverages technologies
VTJDM13 like smart contracts, zero-trust identity models, and IP-layer traffic
monitoring to enforce data governance and accountability across borders.
The framework ensures interoperability with global standards and
addresses legal, technical, and trust challenges in cross-border data
circulation.
Public Key Authenticated Encryption Description: The complexity of all algorithms in PEWS increases linearly
with Searched in Encrypted Data in with the keyword length, while remaining almost constant or even
decreasing linearly with the number of wildcards. To resist against (insider)
VTJDM14 Data Mining KGA, we further extend PEWS into the first Public-key Authenticated
Encryption with Wildcard Search (PAEWS) scheme. Our PEWS and

IEEE 2025 - DATA MINING


PAEWS schemes are highly flexible, supporting searches for any number
of wildcards positioned anywhere within the keyword
Secure Data Exchange Techniques for Description: This project introduces an enhanced SALT-based security
Industrial Environments: A New framework for Industrial Control Systems, using analog related data to
Approach securely exchange symmetric keys. It enables real-time encryption and key
VTJDM15 rotation without major system changes, ensuring cost-effective and robust
protection.

Privacy-Focused Certificateless Description : This project proposes a pairing-free, revocable certificateless


Encryption with User Revocation for encryption scheme with ciphertext evolution for secure healthcare data
Healthcare Systems sharing. It enables efficient revocation of unauthorized users while
VTJDM16
preserving data privacy and reducing computational overhead. The scheme
is proven secure against adaptive chosen ciphertext attacks, making it
practical for real-world healthcare systems
A Hybrid Recommendation Model Description: Reviews, Feature extraction, Recommender systems,
Using Multi-Level Sentiment and Sentiment analysis, Data mining, Representation learning, Transformers,
Rating Interactions Sentiment dictionaries and attention mechanisms are then applied to assign
VTJDM17 appropriate weights to the review features of users and items, respectively

Secure and Real-Time 1-to-N Face Description: This system enhances user authentication by integrating live
Recognition System for Web-Based face capture and identification through OpenCV, replacing static image
VTJDM18 User Authentication storage with real-time facial recognition, ensuring secure access to
sensitive data with dynamic user information retrieval

Secure Multi-Keyword Encrypted Description: Cloud computing, Privacy, Simulation, Scalability,


Search with Access Control for IoT Collaboration, Public key cryptography, User experience, Encryption.
Systems Model is constructed, seamlessly embedding entity private keys and public
VTJDM19 keys into encryption, search, decryption, and other steps, ensuring high
privacy and security of this scheme.

Privacy-Preserving Autonomous Description: Routing, Privacy, Peer-to-peer computing, Decision trees,


System Routing via Intelligent Graph Costs, Scalability, Routing protocols, Computer architecture,
Computational complexity. These protocols are based on Multi-Party
VTJDM20 Filtering
Computation (MPC) schemes, which guarantee privacy at the cost of high
computational

Contact: +91 95810 22022, +91 95810 12012


Email: [email protected], www.raminnovativeinfotech.com
5
JAVA

CODE TITLE APPLICATION / DESCRIPTION

IEEE 2025 - DATA MINING


Controlled Service Scheduling Description: Resource management, Processor scheduling, Computational
Strategy for Intelligent IoT Resource modeling, Dynamic scheduling, Quality of service, Software defined
VTJDM21 Management networking. the scheme can enhance performance in ever-changing
Internet of Things settings by optimizing the allocation of resources.

Secure Key Agreement and Description: Servers, Security, Authentication, Passwords, Computational
Authentication Mechanism with IDS modeling, Cloud computing, Neural networks, Edge computing,
Protocols. The proposed lightweight authentication protocol to enhance
VTJDM22 for Fog Computing the overall security framework in the fog environment

A Network Security Protocols For The Description: we present our novel solution for integrating three different
Quantum key and Cryptography Data cryptographic assumptions (two of them quantum resistant) into hybrid
network security protocols, ensuring that three different cryptographic
VTJNS01 Distribution assumptions must be broken before the protocol becomes vulnerable. Our
solution allows for a seamless integration of classical and post-quantum
(PQ) cryptography, and quantum key distribution (QKD) into existing
network security protocols (e.g., TLS, IPsec).
Optimization of RSA-Based Description: Firstly, optimize the encryption performance by optimizing
Encryption Performance and the parameter selection of the RSA algorithm, selecting appropriate public
and private key lengths, and reducing unnecessary computational
VTJNS02 Resource Allocation in Networks overhead. At the same time, introducing fast power algorithm optimization
accelerates the encryption and decryption. At the same time, a load-aware

IEEE 2025 - NETWORK SECURITY


resource allocation algorithm is designed to monitor the real-time load
situation of network nodes
A Blockchain-Based Zero Trust Description : This research presents the "Unified Quantum-Resilient
Model for Privacy-Centric IoT Blockchain-Zero Knowledge Proofs Privacy Authentication Framework
Cybersecurity (QBC-ZKPAF)," a novel approach to enhance IoT security by integrating
VTJNS03
blockchain, Zero Trust Architecture, and post-quantum cryptography for
privacy-preserving authentication, access control, and secure
communication
An Efficient Bi-Encoder-Based Skill Description: This research proposes a lightweight, scalable AI-driven Job
Classification and Employer Portal System that integrates skill extraction and employer-employee
Notification Model for Smart Job interaction modules, providing real-time updates via Gmail notifications to
VTJNS04
enhance the recruitment process and improve job matching efficiency
Market Analysis

A Decision-Making Model for Description : Blockchains, Reliability, Decision making, Supply chains.
Uncertainty-Aware Evaluation of Moreover, to verify the validity and reliability of the proposed approach, a
Blockchain Traceability Systems comparison analysis was performed to show the efficacy of the proposed
VTJNS05
model. Finally, concluding remarks are discussed

A Secure and Optimized Framework Description: By establishing a blockchain-centric secure resource


for Controller Selection and Resource allocation with controller selection, the proposed technique addresses
Management in SDN challenges in SDN. Here, user registration, load balancing, attack
VTJNS06 detection, controller selection, and resource allocation phases are included

Unrestricted File Upload Description: This project presents an in-depth analysis of Unrestricted File
Vulnerabilities: Security Challenges Upload (UFU) vulnerabilities in applications used across IoT, smart
homes, and smart city systems. It highlights how easily exploitable UFUs
VTJNS07 and Future Directions in Modern can compromise system confidentiality, integrity, and availability. The
Communication Systems study emphasizes the need for stronger security mechanisms and outlines
future directions to enhance file upload safety in modern communication
systems

Contact: +91 95810 22022, +91 95810 12012


Email: [email protected], www.raminnovativeinfotech.com
6
JAVA

CODE TITLE APPLICATION / DESCRIPTION


H i e r a r c h i c a l S y n c h r o n i z a t i o n Description:Software defined networking, Servers, Scalability. This paper

NETWORK SECURITY
Strategies for Robust and Scalable presents a hybrid synchronization model combining a hierarchical design
VTJNS08 SDN Networks with established resilient cluster mechanisms

IEEE 2024 -
E n e rg y - E ff i c i e n t C l o u d Ta s k Description: EMO-TS dynamically adjusts task scheduling based on real-
Management Using a Multi-Objective time workloads and operational conditions, effectively minimizing power
Optimization Model consumption without sacrificing system performance
VTJNS09

Efficient Blockchain Mechanisms for Description: This project integrates a lightweight blockchain module into a
Ensuring Data Integrity in IoT LoRa network, where data is encrypted and stored in blocks. The system
Systems uses a cyclic process to encrypt, transmit, and decrypt the blockchain every
VTJBC01
20 seconds, ensuring secure data exchange between devices and servers

Blockchain-Enabled Healthcare: Description: The project presents a robust and secure architecture for
Ensuring Secure and Scalable Data healthcare data management by integrating MySQL with blockchain
with MySQL Integration technology, forming the MySQL-Blockchain Healthcare Architecture
VTJBC02 (MBHA). This system combines the structured querying and efficiency of
traditional relational databases with the tamper-proof, decentralized nature
of blockchain

IEEE 2025 - BLOCK CHAIN


A Cryptographic Reputation System Description : This project presents ARSPA, a secure and anonymous
for Fair and Private Performance performance appraisal system using blockchain and cryptographic
Evaluation techniques. It ensures honest feedback by protecting reviewer identity,
VTJBC03
preventing multiple submissions, and storing reviews transparently and
immutably on a public blockchain

A Blockchain-Enabled Secure Data Description: The Blockchain-based Secure Data Sharing Framework
Sharing Framework for Edge (BSDSF) enhances security and efficiency in edge-cloud computing by
integrating blockchain with Byzantine Fault Tolerant (BFT) consensus and
VTJBC04 Computing Networks smart contracts. It ensures low-latency, tamper-resistant data sharing
through a two-tier consensus system and real-time node validation. The
framework significantly reduces transaction delays and improves
throughput, making edge data exchange more reliable and secure
TM-Chain: Trusted Computing Base Description : TM-Chain is a blockchain-based architecture designed to
Measurement and Management for securely and efficiently manage Trusted Computing Base (TCB)
measurements in large-scale IoT environments. It addresses the limitations
VTJBC05 IoT Using Blockchain and Cloud of traditional remote attestation systems—such as scalability issues and
centralized vulnerabilities—by using distributed, tamper-resistant storage.
TM-Chain introduces custom protocols for encrypted TCB data transfer,
identity-linked storage, and verifier access, enabling secure and traceable
A Secure Blockchain Technique For Description: Blockchain integration is one of the suggested applications of
Integration Knowledge Discovery in technology that could help secure the data during transmission, storage,
Cloud and knowledge discovery. Moreover, by integrating smart contracts, a
VTJBC06 secure architecture could also assimilate accountability during data
exchange

Optimized Data Exchange and Description: This project proposes a blockchain-based data relay and
Storage in Blockchain-Enabled Edge trading model for edge devices, enabling secure and transparent data
Computing Environments sharing. It introduces a novel Proof-of-Data-Trading (PoDT) consensus to
VTJBC07
balance trust and efficiency. The system ensures tamper-proof transactions
and optimizes storage and resource use in edge computing

Contact: +91 95810 22022, +91 95810 12012


Email: [email protected], www.raminnovativeinfotech.com
7
JAVA

NETWORK SECURITY
CODE TITLE APPLICATION / DESCRIPTION

IEEE 2024 -
Leveraging Blockchain to Transition Description: Blockchain, Blockchain-Based Social Media, Consensus
Social Media from Centralized to Mechanisms, Cryptography, Decentralization, Distributed Ledger,
VTJBC08 Decentralized Models Monetization, Non-Fungible Tokens, Peer-to-Peer, Social Media

A Decentralized Approach to Description: This project proposes a blockchain-based system for


Certificate Authentication and Issuer educational certificate verification, ensuring tamper-proof storage and fast,
Trust Using Blockchain secure validation through Ethereum. It improves efficiency, reduces costs,
VTJBC09
and provides a decentralized solution for verifying the authenticity of
certificates

End-to-End Security in Smart Homes Description: This project proposes a blockchain-based security framework
Using a Consortium Blockchain for IoT smart homes, using a consortium blockchain to enhance data
Approach confidentiality, integrity, and access control while minimizing the burden
VTJBC10
on resource-constrained devices. It integrates with fog computing to ensure
secure and efficient data transmission to the cloud

Enhancing Data Security with Description: This project presents a secure end-to-end IoT communication
Attribute-Based Encryption and architecture by combining blockchain with Attribute-Based Encryption
(ABE) for decentralized key management and fine-grained access control.
VTJBC11 Blockchain Integration It ensures lightweight, tamper-proof, and flexible data sharing in resource-

IEEE 2025 - BLOCK CHAIN


constrained environments. Simulation results show the system achieves
fast consensus and reliable performance, making it ideal for scalable IoT
deployments
Blockchain-Enabled Audit Trail Description : This project introduces BEATS, a blockchain-based efficient
System (BEATS) for Tamper-Proof audit trail system that ensures secure, tamper-proof, and real-time activity
Data Logging tracking. By using an RSA-based Cryptographic Accumulator, BEATS
VTJBC12
enables instant transaction verification with constant time and space
complexity. It significantly enhances the scalability and practicality of
audit systems for large-scale, security-critical applications
A Blockchain-Based Secure Data Description: Technological innovation, Data privacy, Accuracy,
Sharing Architecture for IoT-Fog Computational modeling, Smart contracts, Throughput, Consensus
Environments protocol , Internet of Things, Resource management, Edge computing
VTJBC13

Application of Blockchain for Description : This project proposes a blockchain-based system to secure
Securing Confidential Data in Digital sensitive customer data in financial institutions, using SHA-256
Information Infrastructures encryption and smart contracts for encrypted data sharing, access control,
VTJBC14 and real-time auditability. It enhances data confidentiality, integrity, and
security against unauthorized access and tampering

P r i v a c y - E n h a n c e d R e d a c t a b l e Description: This project introduces PriChain, a privacy-preserving


Blockchain with Controlled Access in redactable blockchain framework that enables fine-grained, authorized
Decentralized Environments data modification while maintaining data confidentiality. It uses multi-
VTJBC15 authority attribute-based encryption to enforce strict access control and
prevent unauthorized redactions

A Secure and Scalable Blockchain Description: Blockchains, Security, Hash functions, Data privacy.
Model for Data Management Using Experimental results indicate that our blockchain infrastructure achieves
Attribute-Based Cryptography enhanced security while maintaining high efficiency.
VTJBC16

Contact: +91 95810 22022, +91 95810 12012


Email: [email protected], www.raminnovativeinfotech.com
8
JAVA

CODE TITLE APPLICATION / DESCRIPTION


Privacy-Preserving and Secure Description: Security, Servers, Routing, Protocols, Authentication, Access
Content Sharing in Decentralized control. The security analysis and performance evaluation shows that the
Security Systems proposed integration scheme is a viable solution to realize our content
VTJBC17
dissemination model

A Methodology for Replicating Data Description: This paper introduces a methodology for replicating exploit
in EVM compatible in a Blockchain transactions across EVM-compatible blockchains, enabling testing of new
security measures. By addressing key challenges in address mapping,
VTJBC18
contract deployment and storage configuration

Fort2BCK: Hybrid Cryptographic Description: Fort2BCK is a secure blockchain framework designed for
Validation for Robust Healthcare Data healthcare systems, addressing data tampering, unauthorized access, and
consensus vulnerabilities. It employs dual-layer verification with RSA,
VTJBC19 Protection ECDSA, and Zero-Knowledge Proofs to enhance authentication and block
integrity. The framework improves resistance to attacks, ensures
regulatory compliance, and supports secure, scalable clinical data
management

IEEE 2025 - BLOCK CHAIN


A Novel Data for Authority Access Description: SSI focuses predominantly on direct interactions between
Data Delegation by Utilizing Self Data two independent entities. It enables direct identification, authentication,
authorization, and access to resources and services where the identity
VTJBC20 sovereign in a identity and verifiable holders are the authenticated bearers of their credentials. On the other hand,
credentials it does not address primarily indirect identity control, such as delegation,
which is an essential part of life situations and natural human relationships.

Towards Scalable and Trustworthy Description : This project introduces FlexIM, an efficient and verifiable
Indexing in Blockchain: The FlexIM index management system for dynamic blockchain queries. Using
Approach reinforcement learning and data distribution insights, FlexIM significantly
VTJBC21
speeds up queries while reducing storage requirements compared to
existing systems like vChain+.

Blockchain-Enabled Framework for Description: This project proposes a blockchain-based framework for
P r i v a c y - P r e s e r v i n g M o b i l e secure and scalable mobile healthcare (mHealth) data management,
Healthcare Systems addressing privacy and centralization issues in existing systems. It
VTJBC22
integrates mobile computing with IPFS and Ethereum blockchain for
decentralized, tamper-proof storage and access

Process Modeling Techniques for Description : Blockchains, Decentralized applications, Business, Smart
Developing Blockchain Applications contracts, Authorization, Stakeholders, Software, Finance, Supply chains,
Process mining
VTJBC23

Secure Cross-Domain Authentication Description: This project presents a blockchain-assisted cross-domain


in IIoT Using Blockchain Technology authentication and key negotiation scheme for IIoT systems, addressing the
limitations of traditional centralized methods. By introducing a session
VTJBC24
token mechanism and leveraging blockchain for secure key updates, it
reduces authentication overhead and enhances security.

PhishDetectPro: A Servlet-Based Description: This project explores approval phishing, a deceptive


Smart Wallet Simulation and blockchain scam where users unknowingly grant token access to malicious
smart contracts. These contracts, controlled by attackers, are later triggered
VTJBC25 Approval Phishing Detection to steal funds. The attack is made worse by weak wallet UIs that fail to warn
Framework Using Intent Validation users properly. The scam setup includes a sophisticated backend hidden
behind CDN layers, managing fake investment sites, fund tracking, and
dynamic content

Contact: +91 95810 22022, +91 95810 12012


Email: [email protected], www.raminnovativeinfotech.com
9
JAVA

CODE TITLE APPLICATION / DESCRIPTION


Adaptive Clustering for Improved Description: This project enhances the PBFT-based hybrid blockchain by
Byzantine Fault Tolerance in adding a dynamic clustering layer that monitors node behavior, classifies
VTJNW01 Blockchain Systems them into trustworthy, neutral, or suspicious clusters, and adjusts
consensus accordingly. This improves resilience against Byzantine faults,
even when malicious nodes approach the one-third limit

Decentralized Genomic Data Sharing Description: This project proposes a blockchain and NFT-based solution
and Monetization Using Blockchain for genomic data management, allowing individuals to control, secure, and
monetize their Raw and Sequenced Genomic Data (RGD and SGD). Using
VTJNW02 and NFTs NFTs and smart contracts, the system ensures traceability, secure sharing,
and user-controlled access, addressing ownership and privacy challenges
in genomic data handling

Resilient Edge Data Caching: Description: This project introduces the Uncertainty-aware Edge Data
Balancing Popularity Awareness and Caching (uEDC) framework, which adapts caching strategies to dynamic
environments and server reliability issues. It incorporates robust
VTJNW03 Server Failures optimization, lightweight encryption, and integrity validation to improve
data retrieval latency, reduce costs, and enhance security in Mobile Edge
Computing (MEC) systems

IEEE 2025 - NETWORKING


Cross-Chain Ethereum Architecture Description: This paper presents an access control architecture that
for Secure and Dynamic Access separates access management from data storage, enhancing security and
scalability. Using smart contracts and Hyperledger YUI, the system
VTJNW04 Management enables dynamic permission verification and secure inter-chain
communication, offering a flexible solution for applications requiring
strong data governance and compliance

Asymmetric Updatable Encryption Description : This article presents an ElGamal-based asymmetric


Using ElGamal for Infinite Ciphertext updatable encryption scheme designed to address secure key rotation
Revisions challenges in cryptographic systems. The scheme allows efficient, secure
VTJNW05 key updates without decryption, ensuring data confidentiality and integrity.

Fault-Tolerant Data Distribution in Description: EdgeHydra is a fault-tolerant data distribution scheme for
Edge Computing via Erasure Coding: edge computing that uses erasure coding to improve file delivery
The EdgeHydra Approach efficiency. By encoding data into both data and parity blocks, it allows edge
VTJNW06
servers to reconstruct files even with missing blocks, enhancing robustness
against delays and failures while reducing distribution times by up to
50.54%.
A Homomorphic Encryption Method Description : This method leverages fully homomorphic encryption
Based on Crowd Networks technology, thereby eliminating the use of plaintext throughout the sensing
process and enhancing security compared to traditional encryption
VTJNW07
methods. Initially, a sensing model is constructed based on the classic
crowd sensing architecture. Subsequently, fully homomorphic encryption
technology is employed for plaintext-free data transmission

C l o u d - N e t w o r k - E n d S e c u r i t y Description: Security, Collaboration, Information services, Cloud


Integration for Smart Wireless computing, Semantics, Data communication. Wireless networks review
the current research on end system security, network connection security,
VTJNW08 Environments
and cloud services security, respectively.

Analysis and Optimization of Robust Description: Autocorrelation, Receivers, Decoding, Benchmark testing,
Packet Detection Mechanisms in Wireless sensor networks, Optimization. This study holds considerable
implications for the design and deployment of packet-detection schemes
VTJNW09 Random Access Networks
networks

Contact: +91 95810 22022, +91 95810 12012


Email: [email protected], www.raminnovativeinfotech.com
10
JAVA

CODE TITLE APPLICATION / DESCRIPTION


Blockchain-Assisted Privacy and Description: To effectively address such privacy and security attack issues,
Security Enhancement in Federated this work proposes a Blockchain-based Privacy-preserving and Secure
VTJNW10 Learning Federated Learning (BPS-FL) scheme, which employs the threshold
homomorphic encryption to protect the local gradients of clients

IEEE 2025 - NETWORKING


Improved Quantum Cryptography: Description: This project enhances BB84 and E91 quantum key
Multi-Qubit BB84 and Entanglement- distribution protocols by increasing qubit counts, adding measurement
bases, and integrating error mitigation, enabling secure and reliable
VTJNW11 Based E91 Protocols for Reliable Key
Distribution and Data Security communication even in noisy quantum environments

Blockchain-Powered Platform for Description: This project introduces ElimuChain, a blockchain-based


Secure Management and Verification framework for unified academic certificate issuance and verification
across all educational levels and institutions. Built on Binance Smart Chain
VTJNW12 of Educational Credentials with IPFS integration, it ensures secure, tamper-proof, and decentralized
credential management. The system offers a scalable, transparent, and
efficient solution to combat certificate fraud and streamline verification for
stakeholders
Securing IIoT Environments with Description: The main aim of this research is to propose a blockchain-
Blockchain-Enabled End-to-End based security framework for the Industrial Internet of Things (IIoT),
addressing the challenges of scalability, data integrity, and security. The
VTJNW13 Protection framework eliminates the need for a centralized authority by utilizing
smart contracts for authentication, authorization, and data management,
while incorporating lightweight cryptographic schemes and hybrid
blockchain implementation for enhanced efficiency and adaptability
Secure Multi-Signature Protocol to Description : This project introduces a robust multi-signature scheme
Counter Transaction Malleability in (MSS) designed to protect blockchain-based DeFi protocols from
transaction malleability attacks. By enabling joint signatures between
VTJNW14 DeFi users and block producers, and incorporating unmalleable transaction
techniques using cryptographic hash functions, the scheme ensures
enhanced security and transaction integrity.

Smart Reversible Data Hiding for Description: Secret sharing, high embedding, capacity reversible data

IEEE 2025 - IMAGE PROCESSING


Encrypted Images with Secret Sharing hiding in encrypted images. This paper innovatively proposes a high
capacity RDH-EI scheme that combines adaptive most significant bit
VTJIM01
(MSB) prediction with secret sharing technology

Secure Medical Image Sharing With Description : This study analyzes various methods for safe medical data
Watermarking In Image Processing sharing, highlighting their advantages and limitations We categorize these
approaches into centralized techniques, such as encryption and
VTJIM02
watermarking, and distributed methods, such as blockchain and federated
learning. Additionally, this research examines the evolution of medical
image watermarking techniques

Enhanced Image Security via Two- Description: This research introduces a two-layer image encryption
Layer Encryption with Switched scheme combining control theory and dynamic system modeling to
System Dynamics enhance security, addressing vulnerabilities in traditional methods by
VTJIM03
increasing resistance to cryptanalytic attacks while maintaining
computational efficiency

Secure And Efficient Encrypted Image Description: We propose SEEIR, a secure and efficient encrypted image
Retrieval With Private Share Data retrieval scheme based on ASS. First, SEEIR enhances retrieval security
through secure kNN-ASS, a novel method that encrypts index shares
VTJIM04
across twin clouds to enforce access control. Only users with keys
authorized by the data owner can generate valid query vectors

Contact: +91 95810 22022, +91 95810 12012


Email: [email protected], www.raminnovativeinfotech.com
11
JAVA

CODE TITLE APPLICATION / DESCRIPTION

IEEE 2025 - IMAGE PROCESSING


A Grayscale-Guided Approach for Description: Steganography is utilized in a wide range of practical
RGB Reconstruction from Near- applications, such as secure communication between individuals or
Infrared Images organizations, copyright protection of digital content, and embedding
VTJIM05
personal details into photographs for smart identity cards. It also plays a
role in areas like video-audio synchronization, secure internal data
exchange within companies, and improving the reliability of image
Comprehensive Review and Analysis Description: This paper provides a comprehensive review of advanced
of a Image processing encryption image encryption techniques aimed at preserving the confidentiality and
integrity of visual information. The analysis includes traditional
VTJIM06 Techniques cryptographic methods, such as AES, RSA, and Blowfish, as well as
quantum encryption, chaos-based encryption, DNA encryption, frequency
domain techniques, neural network-based methods, and compressive
sensing
Secure and Reversible Data Hiding Description: Reversible Data Hiding (RDH) allows extra data like
Using Edge-Aware and Multi-MSB timestamps to be embedded into encrypted images without revealing the
Self-Prediction original image. Traditional methods struggle with encrypted images due to
VTJIM07 reduced redundancy. This new approach solves that issue, ensuring both
data privacy and full image recovery

Contact: +91 95810 22022, +91 95810 12012


Email: [email protected], www.raminnovativeinfotech.com
12

You might also like