JAVA MINI TOPICS
Project
Project Title
Code
CLOUD COMPUTING
Automated Security Assessment and Approval for Conveyed registering Including
MJCC01
Graphical Models for Security
MJCC02 Cloud and Fog Environment using Data Integrity Audit
MJCC03 Cloud Split : Enhancing and Security with Data Division and Replication
A Blended Cloud Email Looking and Separating Plan thinking about Stowed away
MJCC04
System
Protection Saving Information Digging Plan for Negative Union Principles: An
MJCC05
Application to Clinical advantages Informatics
MJCC06 Dynamic Security Task Distribution Strategy for Heterogeneous Cloud Platform
MJCC07 Privacy-Preserving Data Share with Secure Group Management
MJCC08 Microservices Planning for Additional created Help Partaking in IoT Edge Conditions
A Particle Large Number Improvement with Outing for Organization Putting away and
MJCC09
Task Offloading in Edge-Appropriated registering
MJCC10 Hybrid Ranking Method for Cloud Services Based on User Requirements
MJCC11 Efficient Access Control for Cloud-Based User Data Storage and Sharing
DATA MINING
Obtain Patient Health Data Priority Classification in a Remote e-Healthcare System
MJDM01
While Maintaining Privacy
MJDM02 Frequent and High Utility Patterns for Mining Transactional Databases
MJDM03 Trapdoor Privacy Data in PKE With Keyword Search
Security Saving Brand Name Centered Anonymization Plan for Clinical advantages
MJDM04
Information Dispersing
Further made Re-linearization Evaluation of the Multikey Homomorphic Encryption
MJDM05
Plan
MJDM06 Students’ Academic Based on Educational Data Mining
MJDM07 An Efficient Data Search with Match Keyword with Encrypted Data
MJDM08 Predict Student Execution Considering Even and Text based Data
MJDM09 A Deliberate Survey Towards Huge Information Examination in Virtual Entertainment
MJDM10 Movie Recommender System Using Combined Correlation Methodology
MJDM11 A Symmetric Encryption Search Data
Inconceivably Randomized Trees with Insurance Preservation for Appropriated
MJDM12
Coordinated Prosperity Data
MJDM13 Authorized Searchable Framework for e-Healthcare System
Normalized Storage Model Construction and Query Optimization of Book using
MJDM14
MongoDB
MJDM15 Dynamic keyword search scheme over encrypted Cloud Environment
NETWORK SECURITY
MJNS01 Methodology for Endpoint Careful Assessment in an Association Security Game plan
MJNS02 Data Transfer and Deletion from Bloom Filter
MJNS03 An Identity Based Proxy Re-Encryption Data Sharing
MJNS04 Improvement of Security Plan for Radio Environment Guide Under Gigantic Pursuing
MJNS05 An Algorithm for Safe Optimization Routing in Mobile Ad Hoc Networks
MJNS06 A New Architecture for Network Intrusion Detection and Prevention
MJNS07 Security Awareness of University in Network Information
MJNS08 Dynamic Virtual Machine Hardening Estimation considering Changing Energy Use
MJNS09 Multilayered Networks for Emotion Analysis and Graphical Representation of Tweets
MJNS10 On Accelerating Source Code Analysis at Massive Scale
MJNS11 Quick Mart: Fast and Convenient Shopping for Customers
NETWORKING
MJNW01 NDPsec: Security Mechanism for Neighbor Discovery Protocol
MJNW02 Analysis of Network Attacks in Cloud Environment
MJNW03 A Verifiable Data Deduplication of a Database with Proof
MJNW04 Secret Key by Steady Encryption Before Quantization
MJNW05 Effective Unknown-ID Verification for Wireless Body Area Networks
MJNW06 Research on Data Routing Strategy in Cloud Environment
MJNW07 Patient’s Healthcare Records Data Share with Privacy in a Database
MJNW08 Careful DDoS Secluding with Quick LPM
MJNW09 Localization of Injection Attacks Using Distributed M-Estimation
MJNW10 Network Multipathing in Software-Defined Data Center Networks
Identification and Preventive Measures for Flooding Attacks with Collusive Interest in
MJNW11
Named Data Networking
MJNW12 A Sharing Question and Answers in A Web Application Using Database
BLOCK CHAIN
MJBC01 Engaging Trust and Security Saving e-KYC System Using Blockchain
MJBC02 User Data-Centric Authentication for Network Data Retrieval
MJBC03 Identity-Based Data Checking with a Designated Verifier on Database
MJBC04 Orderly Survey of Safety Weaknesses in Ethereum Blockchain Brilliant Agreement
Electronic Success Records Giving Model thinking about Blockchain to Checkable State
MJBC05
PBFT Figuring out Calculation
MJBC06 Blockchain Technology using Data Security and Integrity Audit Schem
MJBC07 A Decentralized Data Using a Block Chain Technique
MJBC08 A User Data Sharing with Secure Data in Block chain
MJBC09 Secure deduplication with efficient user revocation in cloud storage
MJBC10 A blockchain-based approach for data accountability and provenance tracking
IMAGE PROCESSING
MJIM01 Privacy Enhanced and Verifiable for Medical Image Processing on the Cloud
MJIM02 A Medical Image Encryption Data Sharing
MJIM03 Image Watermark Embedding Method Based on Security Service Secure