IEEE JAVA 2024
IEEE JAVA 2024
PoEDDP-A Fast RSA-Based Proof of Description: However, the most critical factor is the efficiency of integrity
Possession Accumulator of Dynamic checks, which must prioritize restricted-resource data owners without
Data on the Cloud affecting the performance of the Cloud Service Provider.
VTJCC03
Group Key Management and Sharing Description : As data on cloud is beyond the control area of authentic
Protocol in Cloud Computing participants, shared data should be made usable on demand of authentic
Environment users. Shared data are vulnerable to misplaced or erroneously altered by
VTJCC05
Cloud Service Provider (CSP) or attackers.
Achieving Secure, Verifiable, and Description: The Searchable Encryption (SE) technique is palpable for
Efficient Boolean Keyword supporting the keyword searches over the encrypted data. Although many
Searchable Encryption for Cloud Data SE schemes have introduced their own unique searching methods based on
VTJCC06 indexing structure on top of searchable encryption techniques, there are no
Warehouse
schemes that support Boolean expression queries essential for the search
conditions over the DW schema
Optimal Resource Allocation Using Description : The proposed framework simplifies the deployment of cloud
Genetic Algorithm in Container- services and streamlines workload monitoring and analysis within a
Based Heterogeneous Cloud diverse cloud system
VTJCC07
Attribute-Based Management of Description: Our model addresses the challenges of complexity, cost, and
Secure Kubernetes Cloud Bursting data protection compliance by leveraging both Kubernetes and ABE. We
introduce an attribute-based bursting component that uses Kubernetes
VTJCC08 labels for orchestration, and an encryption component that employs ABE
for data protection
PRBFPT: A Practical Redactable Description: Hence, this paper proposes a practical, redactable blockchain
Blockchain Framework With a Public framework with a public trapdoor (hereafter referred to as PRBFPT). PRBFPT
Trapdoor comprises an editing scheme for adding blocks using a new type of blockchain
VTJCC09 with a chameleon hash. Specifically, PRBFPT is able to involve all nodes in the
blockchain in the editing operations by means of a public trapdoor, without
requiring additional trapdoor management by predefined nodes or organizations
Contact: +91 40-66418877, +91 95810 22022, +91 40-66418876, +91 95810 12012
Email: [email protected], [email protected], www.vertilinktech.com
1
JAVA
Scalable Data Partitioning Techniques Description: Cloud computing is a technology that shows great promise
for Distributed Data Processing in owing to its ability to provide unlimited resources for computing and data
Cloud Environments storage services. These services are crucial for effectively managing the
VTJCC11 data according to specific requirements. In the current system, data is saved
in the cloud using dynamic data operations and computations
Dynamic AES Encryption and Description: Traditional methods usually fall short in mitigating risks
Optimized Encryption-Integrated Description : This paper presents a novel two-stage container scheduling
Strategy for Containers Scheduling solution that addresses node imbalances and efficiently deploys containers.
and Secure Migration in Multi-Cloud The proposed solution formulates the scheduling process as an
VTJCC14
Data Centers optimization problem, integrating various objective functions and
constraints to enhance server consolidation and minimize energy
DEDUCT: A Secure Deduplication of Description: This paper introduces DEDUCT, an innovative data
Textual Data in Cloud Environments deduplication method for textual data. DEDUCT employs a hybrid
approach that combines cloud-side and client-side deduplication
VTJCC15 mechanisms to achieve high compression rates while maintaining data
security
Efficient Privacy-Friendly and Description: In addition, they almost exclusively focus on data aggregation
Flexible Wearable Data Processing operations, neglecting multiplication and division operations on encrypted data,
With User-Centric Access Control which are fundamental operations with significant importance in various
VTJCC17 application scenarios. In this paper, we present efficient and privacy-preserving
schemes for multiplication and division operations with fine-grain data-sharing
and user-centric access control capabilities, called SAMM and SAMD,
respectively
Dynamic Searchable Symmetric Description: Dynamic Searchable Symmetric Encryption (DSSE) is a
DATA MINING
IEEE 2024
Encryption With Strong Security and prospective technique in the field of cloud storage for secure search over
Robustness encrypted data. A DSSE client can issue update queries to an honest-but-
VTJDM01 curious server for adding or deleting his ciphertexts to or from the server
and delegate keyword search over those ciphertexts to the server.
Numerous investigations focus on achieving strong security
Contact: +91 40-66418877, +91 95810 22022, +91 40-66418876, +91 95810 12012
Email: [email protected], [email protected], www.vertilinktech.com
2
JAVA
Comment on "Expressive Public-Key Description: An expressive PEKS scheme is a variant of the PEKS scheme
Encryption with Keyword Search: that supports conjunctive and disjunctive searches (expressive search).
Generic Construction from KP-ABE
VTJDM03
and an Efficient Scheme Over Prime-
Order Groups"
An Implementation for Secure Data Description: Reconciling client-side encryption with cross-user
Deduplication on End-to-End deduplication is an active research topic. We present the first secure cross-
Encrypted Documents user deduplication scheme that supports client-side.
VTJDM04
Enhancing the prediction of employee Description : The proposed methodology extends beyond prediction and
turnover with knowledge graphs and incorporates explainable artificial intelligence (XAI) techniques to unearth the
explainable AI pivotal factors influencing an employee's decision to either remain with or depart
VTJDM06
from a particular organization. The empirical analysis was conducted using a
comprehensive dataset from IBM that includes the records of 1,470 employees
A Reinforcement Learning Based Description: A single course may contain one or more CLOs. These CLOs
Recommendation System to Improve are then mapped to PLOs and PLOs are then mapped to PEOs. Therefore,
Performance of Students in Outcome our objective in this work is to improve deficient/weak CLOs of students by
VTJDM07 suggesting online resources. Whereas, in the absence of this proposed
Based Education Model
system, students have to find out these resources by themselves or course
teacher recommends relevant online resources
Novel Transformer Based Description : This research aims to detect depression early by analyzing
Contextualized Embedding and social media user content with machine learning techniques. We have built
Probabilistic Features for Depression advanced machine learning models using a benchmark depression
VTJDM08 database containing 20,000 tagged tweets from user profiles identified as
Detection From Social Media
depressed or non-depressed
A Secure Medical Data Sharing Description: However, they still have flaws in granting full authorization to
Framework for Fight Against individuals, ensuring the security of personal information, speed, and
Pandemics Like Covid-19 by Using scalability. They mostly use private or consortium blockchains. However,
VTJDM09 in a public blockchain, a system that everyone can participate in and follow
Public Blockchain
provides more reliable information
Secure Sharing Architecture of Description: Telemedicine primarily aims to facilitate the transmission of
Personal Healthcare Data Using healthcare data through electronic channels, enabling users to access
Private Permissioned Blockchain for medical services. It supports healthcare services around the globe, aids in
VTJDM10 early diagnosis and treatment, and assists with remote care by provisioning
Telemedicine
effective healthcare that is safe, secure, and reliable
Contact: +91 40-66418877, +91 95810 22022, +91 40-66418876, +91 95810 12012
Email: [email protected], [email protected], www.vertilinktech.com
3
JAVA
Blockchain-Enabled Framework for Description: We present a Blockchain driven system that not only tackles
Transparent Land Lease and Mortgage alteration and double-spending issues in traditional systems but also
Management implements distributed data management. Current state-of-the-art
VTJDM12 solutions do not fully incorporate crucial features of Blockchain, such as
transparency, prevention of double-spending, auditability, immutability,
and user participation
Enhancing Gun detections with Description: The Mel spectrograms created from the collected features are
transfer learning and YAMNet Audio used for multi-class audio classification, which makes it possible to
classification identify different types of guns. 1174 audio samples from 12 distinct
VTJDM13 weapons make up the study's extensive dataset, which offers a varied and
A Novel Early Detection and Description: This work proposed an Optimal Scrutiny Boosted Graph
Prevention of Coronary Heart Disease Convolutional LSTM (O-SBGC-LSTM), SBGC-LSTM enhanced by
Framework Using Hybrid Deep Eurygaster Optimization Algorithm (EOA) to tune hyper-parameters for
VTJDM14 early prevention and detection of diabetes disease
Learning Model and Neural Fuzzy
Inference System
Scalable and Popularity-Based Secure Description : Our scheme uses homomorphic encryption (HE) to generate
Deduplication Schemes With Fully comparable random tags to record data popularity and then uses the binary
Random Tags search in the AVL tree to accelerate the tag comparisons. Besides, we find
VTJDM15
the popularity tamper attacks in existing schemes and design a proof of
ownership (PoW) protocol against it
IPO-PEKS: Effective Inner Product Description: Public-key Encryption with Keyword Search (PEKS) allows
Outsourcing Public Key Searchable customers to search for target encrypted files using keywords. However,
Encryption From Lattice in the IoT the majority of PEKS implementations are unable to repel malicious
VTJDM16 quantum-capable attackers
Enhancing IoT Security and Description: The attribute-based searchable encryption (ABSE) as been
Efficiency: A Blockchain Assisted used within IoT to maintain data privacy and integrity. However, existing
Multi-Keyword Searchable ABSE approaches often rely on centralized systems that are susceptible to
VTJDM17
Encryption Scheme single-point failures and are inefficient in terms of decryption and data
retrieval
Medical Image Encryption through Description: The encryption process initiates with a secure key exchange
Chaotic Asymmetric Cryptosystem mechanism using elliptic curves and the Blum-Goldwasser Cryptosystem.
Pixel randomization is achieved through a chaotic map, followed by
VTJDM18 encryption using ECC and BGC, which integrates the discrete logarithmic
problem, probabilistic encryption, and the quadratic residuosity problem.
NETWORK SECURITY
Contact: +91 40-66418877, +91 95810 22022, +91 40-66418876, +91 95810 12012
Email: [email protected], [email protected], www.vertilinktech.com
4
JAVA
An Efficient IoT-Fog-Cloud Resource Description: One common feature of the fog paradigm is its limitations in
Allocation Framework Based on Two- capabilities, which make it unsuitable for processing large volumes of data.
Stage Approach To ensure the smooth execution of delay-sensitive application tasks and the
VTJNS03 large volume of data generated, there is a need for the fog paradigm to
collaborate with the cloud paradigm to achieve a common goal
Multi-Smart Meter Data Encryption Description: We use an improved homomorphic encryption method to
Scheme Based on Distributed realize the encryption aggregation of users' data. Second, we propose a
Differential Privacy double-blind noise addition protocol to generate distributed noise through
VTJNS04 interaction between users and a cloud platform to prevent semi-honest
Multi-grained Trace Collection, Description: On the one hand, such uniform layer-level management
Analysis, and Management of Diverse probably cannot fit the various requirements of different kinds of
Container Images containerized services well. On the other hand, new image formats
VTJNS05 organizing data in blocks or files cannot benefit from such uniform layer-
level image management. In this paper, we perform the first analysis of
image traces at multiple granularities (i.e., image-, layer-, and file-level)
AES Security Improvement by Description : We propose an algorithm to create new, key-dependent XOR
Utilizing New Key-Dependent XOR tables from an initial secret key. At the same time, we prove that in the
Tables ciphertext the new XOR operation can preserve the independent, co-
VTJNS06
probability distribution of the random key.
Ethereum Blockchain Framework Description: The potential of blockchain technology in revolutionizing the
Enabling Banks to Know Their KYC process has been acknowledged globally. Blockchain technology
Customers provides a decentralized platform for storing customer data, enabling
VTJNS07 financial institutions to access the information seamlessly
An Efficient Task Scheduling for Description : To facilitate comparison, the number of virtual machines in
Cloud Computing Platforms Using the Visual Studio.Net framework environment is used for the
Energy Management Algorithm: A implementation. The experimental findings indicate that increasing the
VTJNS08 number of virtual machines reduces Makespan. Moreover, the Energy
Comparative Analysis of Workflow
Management Algorithm (EMA) outperforms
Execution Time
AASSI: A Self-Sovereign Identity Description: We bridge this gap by introducing AASSI, a pioneering SSI
Protocol With Anonymity and protocol meticulously designed to balance the twin imperatives of privacy
Accountability and accountability. Specifically, AASSI extends support for anonymity,
VTJNS09 self-derivation, fine-grained tracing and selective revocation.
Contact: +91 40-66418877, +91 95810 22022, +91 40-66418876, +91 95810 12012
Email: [email protected], [email protected], www.vertilinktech.com
5
JAVA
NETWORK SECURITY
CODE TITLE APPLICATION / DESCRIPTION
IEEE 2024 -
MS-FL: A Federated Learning Description: To address these issues, this paper proposes a novel federated
Framework Based on Multiple learning framework MS-FL based on multiple security strategies. The
Security Strategies framework's algorithms guarantee that data providers need not worry about
VTJNS11
data privacy leakage. At the same time, it can defend against poisoning
attack from malicious nodes
PASSP: A Private Authorization Description: We propose a private authorization scheme oriented service
Scheme Oriented Service Providers providers. A decentralized publicly-verifiable re-encryption method based
on IPFS is proposed to minimize the reliance on service providers, by
VTJBC01 shifting to a distributed storage and computation model
PEEV: Parse Encrypt Execute Description: Homomorphic encryption can be used to allow processing
Verify—A Verifiable FHE Framework directly on encrypted data, but a dishonest cloud provider can alter the
computations performed, thus violating the integrity of the results. To
VTJBC02 overcome these issues, we propose PEEV (Parse, Encrypt, Execute,
Verify), a framework that allows a developer with no background in
cryptography to write programs operating on encrypted data
An Inner Product Predicate-Based Description: In order to solve all the above problems, this paper proposes a
Medical Data-Sharing and Privacy blockchain aided attribute-based searchable scheme with the properties of
Protection System inner product predicate. In the proposed scheme, the attribute encryption
VTJBC03 mechanism implements fine-grained access policies with wildcards, which
Optimizing Industrial IoT Data Description : To mitigate these challenges, we have proposed a secure and
Security Through Blockchain- incentive-based data-sharing framework for IIoT systems using
Enabled Incentive-Driven Game blockchain technology. We leverage blockchain due to its ability to provide
VTJBC04
Theoretic Approach for Data Sharing secure and tamper-resistant data storage and sharing as participants store
their data on a distributed ledger (DL), preventing unauthorized access
Blockchain-Assisted Hierarchical Description: To address the need to exchange data between logistics
Attribute-Based Encryption Scheme networks, we proposed a novel decentralized hierarchical attribute-based
for Secure Information Sharing in encryption (HABE) scheme combining edge computing and blockchain.
VTJBC05 To begin, we offer an IoT data encryption strategy in which edge devices
Industrial Internet of Things
can send data to a nearby cloud network for data processing while
maintaining privacy
Secure Reviewing and Data Sharing in Description : Under this mechanism, only the assigned reviewer would
Scientific Collaboration: Leveraging have access to the confidential manuscript, ensuring the integrity of the
B l o c k c h a i n a n d Z e r o Tr u s t review process. In scientific collaborations, the imperative for confidential
VTJBC06 data sharing extends beyond reproducibility to encompass vital
Architecture
collaborative endeavors such as publications, Memorandums of
Understanding (MoUs), grants, and funding
Blockchain Based KYC Model for Description: Furthermore, a centralized system permits collaboration and
Credit Allocation in Banking operation execution by multiple financial institutions. Aside from these
two scenarios, KYC processes can also be executed via a blockchain-based
VTJBC07 system
Public Edu Chain: A Framework for Description: PublicEduChain allows students to store their data in smart contracts
Sharing Student-Owned Educational created on the public Ethereum network, making it possible to share this
information with any educational institution and administrative units. Educational
Data on Public Blockchain Network
VTJBC08 institutions can access student data stored in smart contracts on the public Ethereum
network through Learning Management System (LMS) applications and can add
data to these contracts. PublicEduChain ensures that data is managed under student
ownership within a fully decentralized infrastructure
Contact: +91 40-66418877, +91 95810 22022, +91 40-66418876, +91 95810 12012
Email: [email protected], [email protected], www.vertilinktech.com
6
JAVA
Blockchain Based an Efficient and Description: The centralized repository that is currently in place made the
Secure Privacy Preserved Framework majority of hacks possible. The sharing of sensitive data and authentication
for Smart Cities are essential stages in guaranteeing the security of applications associated
Research on the privacy protection Description: In this context, data holders often opt for cloud storage of their
technology of blockchain spatio- data to mitigate the pressure of local storage and computing overhead.
temporal big data However, this centralized storage mode renders the data susceptible to
VTJBC11 risks of tampering and leakage due to the absence of physical control over
spatiotemporal big data
A New Identity Authentication and Description: In the edge computing environment, with the frequent cross-
Key Agreement Protocol Based on domain authentication and data sharing of IoT devices in different security
Multi-Layer Blockchain in Edge domains, identity authentication faces a series of challenges and security
VTJBC12 issues. Most of the traditional identity authentication methods are based on
Computing public key infrastructure
Stub Signature-Based Efficient Public Description : we suggest proposing a partial signature-based data auditing system so that
both privacy and accuracy can be fortified while reducing the computational cost
Data Auditing System Using Dynamic associated with auditing processes significantly. This system would involve using
Procedures in Cloud Computing cryptographic techniques such as homomorphic encryption and hash functions, which
VTJBC13 would enable secure sharing between multiple parties while ensuring integrity checks on
stored files at regular intervals for any potential tampering attempts made by external
attackers or malicious insiders who may try to gain unauthorized access into confidential
user information stored within cloud sites.
Effective Identity Authentication Description: To address these issues, we suggest proposing a partial
Based on Multi-attribute Centers for signature-based data auditing system so that both privacy and accuracy can
Secure Government Data Sharing be fortified while reducing the computational cost associated with auditing
VTJBC14 processes significantly. This system would involve using cryptographic
techniques such as homomorphic encryption and hash functions
Intelligent SLA Selection Through the Description : Cloud computing has transformed digital service delivery by IEEE 2024 - NETWORKING
Validation Cloud Broker System providing scalable, flexible access to computing resources, including
servers, storage, and applications, under a pay-per-use model
VTJNW01
Parallel Enhanced Whale Description: In this paper, a parallel enhanced whale optimization
Optimization Algorithm for algorithm is proposed to schedule independent tasks in the cloud with
Independent Tasks Scheduling on heterogeneous resources. The proposed algorithm improves solution
VTJNW02 diversity and avoids local optima using a modified encircling maneuver
Cloud Computing
and an adaptive bubble net attacking mechanism
Design Aspects of Decentralized Description: To address this problem and open the way for a secure and
Identifiers and Self-Sovereign efficient society, where the privacy of citizens is paramount, the identity
Identity Systems concept and proof of identity mechanisms need to be redesigned from the
VTJNW03 ground up
Contact: +91 40-66418877, +91 95810 22022, +91 40-66418876, +91 95810 12012
Email: [email protected], [email protected], www.vertilinktech.com
7
JAVA
Incentive-Vacation Queueing for Description: We analyze an orchestrated ECC where devices rent
Edge Crowd Computing resources in exchange for incentives. Our incentive-vacation queueing
(IVQ) model associates performance with incentive payments using
VTJNW05 vacation queueing, considering the multitenancy of devices through a
server vacation dependent on incentives received
Concise and Efficient Multi-Identity Description: However, MKFHE schemes used to construct MIBFHE
Fully Homomorphic Encryption usually have complex construction and large computational complexity,
Scheme which also causes the same problem for MIBFHE schemes
VTJNW06
ACO-Based Scheme in Edge Learning Description : We propose efficient communications under a task-oriented
NOMA Networks for Task-Oriented principle by optimizing power allocation and edge learning-error
Communications prediction in an edge-aided non-orthogonal multiple access (NOMA)
VTJNW08
network. Furthermore, we propose a novel approach based on the ant
colony optimization (ACO) algorithm to jointly minimize the learning
error and optimize the power allocation variables
Non-Fungible Token Enhanced Description: One of the reasons for such a growth is their features such as
Blockchain based Online Social ubiquitous access, on-demand service, friendship networks, user
Network engagement strategies like recommendation engines, etc. However, there
VTJNW09 are various limitations to the current approach, such as the centralization of
control, lack of data ownership, poor access control, fake news, bot
accounts, censorship, digital rights management issues, etc.
R E H R E C : R e v i e w E f f e c t e d Description : Although user and business nodes have been used in HINs,
Heterogeneous Information Network review contents have not been used. In this work, we use review nodes in
Recommendation System HINs in addition to user and business nodes. Since written reviews provide
VTJNW10 valuable insights into points of interest within recommendation systems,
integrating review nodes into HINs allows us to assess their impact on
recommendation systems.
Federated Learning for Decentralized Description: This study introduces a Federated Learning-based approach,
DDoS Attack Detection in IoT named Federated Learning for Decentralized DDoS Attack Detection (FL-
Networks. DAD), which utilizes Convolutional Neural Networks (CNN) to
VTJNW11 efficiently identify DDoS attacks at the source.
Innovative Energy-Efficient Proxy Description: The proposed PRE scheme optimizes efficiency by
Re-Encryption for Secure Data integrating lightweight symmetric and asymmetric cryptographic
Exchange in Wireless Sensor techniques, thereby minimizing computational costs during PRE
VTJNW12 operations and conserving energy for resource-constrained nodes. In
Networks.
addition, the scheme incorporates sophisticated key management and
digital certificates to ensure secure key generation and distribution
Contact: +91 40-66418877, +91 95810 22022, +91 40-66418876, +91 95810 12012
Email: [email protected], [email protected], www.vertilinktech.com
8