S.No | Project Code | Project Title | Abstract | |
---|---|---|---|---|
CLOUD COMPUTING |
||||
1 | VTJCCO1 | An Effective Privacy-Preserving Blockchain-Assisted Security Protocol for Cloud-Based Digital Twin Environment | ||
2 | VTJCC02 | Accelerating Finite Field Arithmetic for Homomorphic Encryption on GPUs | ||
3 | VTJCC03 | Achieving Decentralized and Dynamic SSO-Identity Access Management System for Multi- Application Outsourced in Cloud | ||
4 | VTJCC04 | Defense Against Software-Defined Network Topology Poisoning Attacks | ||
5 | VTJCC05 | Attribute-Based Approaches for Secure Data Sharing in Industrial Contexts | ||
6 | VTJCC06 | Authenticated Distributed Group Key Agreement Protocol Using Elliptic Curve Secret Sharing Scheme | ||
7 | VTJCC07 | Resource Scheduling in Edge Computing: Architecture, Taxonomy, Open Issues and Future Research Directions | ||
8 | VTJCC08 | A Secure Cloud-Edge Collaborative Fault-Tolerant Storage Scheme and Its Data Writing Optimization | ||
9 | VTJCC09 | A Pairing-Free Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things | ||
10 | VTJCC10 | Key Reduction in Multi-Key and Threshold Multi-Key Homomorphic Encryptions by Reusing ErrorKey Reduction in Multi-Key and Threshold Multi-Key Homomorphic | ||
11 | VTJCC11 | CACPA: Credible Alliance-Chain- Based Public Auditing Scheme for Cloud Storage | ||
12 | VTJCC12 | An Efficient Post-Quantum Attribute- Based Encryption Scheme Based on Rank Metric Codes for Cloud Computing | ||
13 | VTJCC13 | A User-Priorities-Based Strategy for Three - Phase Intelligent Recommendation and Negotiating Agents for Cloud Services | ||
14 | VTJCC14 | Secure Cloud-Aided Approximate Nearest Neighbor Search on High- Dimensional Data | ||
15 | VTJCC15 | Enabling Balanced Data Deduplication in Mobile Edge Computing | ||
16 | VTJCC16 | Solving Task Scheduling Problem in Mobile Cloud Computing Using the Hybrid Multi-Objective Harris Hawks Optimization Algorithm |
DATA MINING |
||||
---|---|---|---|---|
1 | VTJDM01 | Delegate and Verify the Update Keys of Revocable Identity-Based Encryption | ||
2 | VTJDM02 | A Novel Construction of Updatable Identity Based Hash Proof System and Its Applications | ||
3 | VTJDM03 | Early Predicting of Students Performance in Higher Education | ||
4 | VTJDM04 | A Diabetes Monitoring System and Health-Medical Service Composition Model in Cloud Environment | ||
5 | VTJDM05 | A Rankable Boolean Searchable Encryption Scheme Supporting Dynamic Updates in a Cloud Environment | ||
6 | VTJDM06 | Improving Shopping Mall Revenue by Real-Time Customized Digital Coupon Issuance | ||
7 | VTJDM07 | Accountable Clouds Through Blockchain | ||
8 | VTJDM08 | A User-Priorities-Based Strategy for Three - Phase Intelligent Recommendation and Negotiating Agents for Cloud Services | ||
9 | VTJDM09 | Private Web Search Using Proxy- Query Based Query Obfuscation Scheme | ||
10 | VTJDM10 | False-Bottom Encryption: Deniable Encryption from Secret Sharing | ||
11 | VTJDM11 | Mining Insights from Esports Game ReABSTRACTs with an Aspect-Based Sentiment Analysis Framework | ||
12 | VTJDM12 | PRUS: Product Recommender System Based on User Specifications and Customers ReABSTRACTs | ||
13 | VTJDM13 | Privacy Preserving and Serverless Homomorphic-Based Searchable Encryption as a Service (SEaaS) | ||
14 | VTJDM14 | Security-Aware Provenance for Transparency in IoT Data Propagation | ||
15 | VTJDM15 | Supporting Schema References in Keyword Queries Over Relational Databases | ||
16 | VTJDM16 | Leakage-Resilient Anonymous Multi- Receiver Certificate-Based Key Encapsulation Scheme | ||
17 | VTJDM17 | Normalized Storage Model Construction and Query Optimization of Book Multi-Source Heterogeneous Massive Data |
NETWORKING |
|||
---|---|---|---|
1 | VTJNW01 | NDPsec: Neighbor Discovery Protocol Security Mechanism | |
2 | VTJNW02 | Efficient Multi-Client Functional Encryption for Conjunctive Equality and Range Queries | |
3 | VTJNW03 | VeriDedup: A Verifiable Cloud Data Deduplication Scheme with Integrity and Duplication Proof | |
4 | VTJNW04 | Secret Key Generation by Continuous Encryption Before Quantization | |
5 | VTJNW05 | Efficient Anonymous Authentication for Wireless Body Area Networks | |
6 | VTJNW06 | Research on Data Routing Strategy of Deduplication in Cloud Environment | |
7 | VTJNW07 | PRMS: Design and Development of Patients' E-Healthcare Records Management System for Privacy Preservation in Third | |
8 | VTJNW08 | Surgical DDoS Filtering With Fast LPM | |
9 | VTJNW09 | Localization Of Data Injection Attacks on Distributed M-Estimation | |
10 | VTJNW10 | Cross - Platform Reputation Generation System Based on Aspect- Based Sentiment Analysis | |
11 | VTJNW11 | Detecting and Mitigating Collusive Interest Flooding Attacks in Named Data Networking |
NETWORK SECURITY |
||||
---|---|---|---|---|
1 | VTJNS01 | Data Secure De-Duplication and Recovery Based on Public Key Encryption with Keyword Search | ||
2 | VTJNS02 | Analysis and Design of Secure Sampled-Data Control Subject to Denial-of-Service Attacks | ||
3 | VTJNS03 | A Data-Driven Smart Evaluation Framework for Teaching Effect Based on Fuzzy Comprehensive Analysis | ||
4 | VTJNS04 | Offloading Mechanisms Based on Reinforcement Learning and Deep Learning Algorithms in the Fog Computing Environment | ||
5 | VTJNS05 | Automated Firewall Configuration in Virtual Networks | ||
6 | VTJNS06 | Privacy-Preserving Searchable Encryption Scheme Based on Public and Private Blockchains | ||
7 | VTJNS07 | A Data Deduplication Scheme Based on DBSCAN With Tolerable Clustering Deviation | ||
8 | VTJNS08 | Multiuser Computation Offloading for Long-Term Sequential Tasks in Mobile Edge Computing Environments |
BLOCK CHAIN |
||||
---|---|---|---|---|
1 | VTJBC01 | Data Integrity Audit Scheme Based on Quad Merkle Tree and Blockchain | ||
2 | VTJBC02 | Sec-Health: A Blockchain-Based Protocol for Securing Health Records | ||
3 | VTJBC03 | A Comprehensive Survey on Blockchain-Based Decentralized Storage Networks | ||
4 | VTJBC04 | Secure and Lightweight Blockchain- Enabled Access Control for Fog- Assisted IoT Cloud Based Electronic Medical Records Sharing | ||
5 | VTJBC05 | Blockchain for Health care Management Systems: A Survey on Interoperability and Security | ||
6 | VTJBC06 | Blockchain-Based Service-Oriented Architecture for Consent Management, Access Control, and Auditing | ||
7 | VTJBC07 | Dynamic Secure Access Control and Data Sharing Through Trusted Delegation and Revocation in a Blockchain-Enabled Cloud-IoT Environment | ||
8 | VTJBC08 | EFPB: Efficient Fair Payment Based on Blockchain for Outsourcing Services in Cloud Computing | ||
9 | VTJBC09 | Blockchain-Based Process Quality Data Sharing Platform for Aviation Suppliers | ||
10 | VTJBC10 | Heart Disease Prediction Using Novel Quine McCluskey Binary Classifier (QMBC) | ||
11 | VTJBC11 | A Novel Secure and Privacy- Preserving Model for OpenID Connect Based on Blockchain | ||
12 | VTJBC12 | A Secure Big Data Storage Framework Based on Blockchain Consensus Mechanism with Flexible Finality | ||
13 | VTJBC13 | Blockchain-Enabled Technique for Privacy Preserved Medical Recommender System | ||
14 | VTJBC14 | A Data Integrity Verification Scheme for Centralized Database Using Smart Contract and Game Theory |
IMAGE PROCESSING |
||||
---|---|---|---|---|
1 | VTJIMO1 | Blockchain-Assisted Verifiable and Secure Remote Sensing Image Retrieval in Cloud Environment | ||
2 | VTJIMO2 | An Efficient Decentralized Identity Management System Based on Range Proof for Social Networks | ||
3 | VTJIMO3 | Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution | ||
4 | VTJIMO4 | Reversible data hiding in encrypted images with secret sharing and hybrid coding |
AMAZON WEB SERVICES |
|||||
---|---|---|---|---|---|
1 | VTJAW01 | LBA-EC: Load Balancing Algorithm Based on Weighted Bipartite Graph for Edge Computing | |||
2 | VTJAW02 | A Multi-Objective Based Scheduling Framework for Effective Resource Utilization in Cloud Computing | |||
3 | VTJAWO3 | An LTE Authentication and Key Agreement Protocol Based on the ECC Self-Certified Public Key | |||
4 | VTJAW04 | A Hybrid Framework for Ranking Cloud Services Based on Markov Chain and the Best-Only Method | |||
5 | VTJAW05 | An Integrated Optimization-Based Algorithm for Energy Efficiency and Resource Allocation in Heterogeneous Cloud Computing Centers | |||
6 | VTJAW06 | A Multi-Objective Bee Foraging Learning-Based Particle Swarm Optimization Algorithm for Enhancing the Security of Healthcare Data in Cloud System | |||
7 | VTJAW07 | A Distributed and Decentralized Certificateless Framework for Reliable Shared Data Auditing for FOG-CPS Networks | |||
8 | VTJAW08 | Efficient Identity-Based Data Integrity Auditing with Key-Exposure Resistance for Cloud Storage | |||
9 | VTJAW09 | Enhancing Secure Communication in the Cloud Through Blockchain Assisted-CP-DABE | |||
10 | VTJAW10 | Multi - Keywords Searchable Attribute-Based Encryption with Verification and Attribute Revocation Over Cloud Data | |||
11 | VTJAW11 | Dual-Phase Resource Allocation Algorithm in Software-Defined Network (SDN) Enabled Cloud | |||
12 | VTJAW12 | A Personal Privacy Data Protection Scheme for Encryption and Revocation of High-Dimensional Attribute Domains | |||
13 | VTJAW13 | Dynamic AES Encryption and Blockchain Key Management A Novel Solution for Cloud Data Security | |||
14 | VTJAW14 | Cloud Based Multi-Robot Task Scheduling Using PMW Algorithm | |||