0% found this document useful (0 votes)
6 views8 pages

IEEE JAVA 2024

The document outlines various innovative solutions and frameworks in cloud computing, focusing on privacy-preserving techniques, secure data sharing, and efficient resource management. It includes descriptions of multiple projects aimed at enhancing data security, optimizing storage, and improving data processing in cloud environments. Each project is identified by a unique code and provides a brief overview of its application and significance.

Uploaded by

Madiha Kulsum
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views8 pages

IEEE JAVA 2024

The document outlines various innovative solutions and frameworks in cloud computing, focusing on privacy-preserving techniques, secure data sharing, and efficient resource management. It includes descriptions of multiple projects aimed at enhancing data security, optimizing storage, and improving data processing in cloud environments. Each project is identified by a unique code and provides a brief overview of its application and significance.

Uploaded by

Madiha Kulsum
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

JAVA

CODE TITLE APPLICATION / DESCRIPTION


Privacy-Preserving and Trusted Description: We provide a privacy-preserving, verifiable, accountable, and
Keyword Search for Multi-Tenancy parallelizable solution for “privacy-preserving keyword search problem”
Cloud among multiple independent data owners. We consider a scenario in which
VTJCC01
each tenant is a data owner and a user's goal is to efficiently search for
granted documents that contain the target keyword among all the data
owners.
A t t r i b u t e - B a s e d S e a r c h a b l e Description: The data owner punctures the trapdoor to accomplish the data
Encryption with Forward Security for deletion. Then, the deletion process does not need to communicate with a
Cloud-Assisted IoT trusted third party and can guarantee forward security.
VTJCC02

PoEDDP-A Fast RSA-Based Proof of Description: However, the most critical factor is the efficiency of integrity
Possession Accumulator of Dynamic checks, which must prioritize restricted-resource data owners without
Data on the Cloud affecting the performance of the Cloud Service Provider.
VTJCC03

IEEE 2024 - CLOUD COMPUTING


EDASVIC: Enabling Efficient and Description: We propose an efficient and dynamic storage verification
Dynamic Storage Verification for scheme Edasvic for cloud storage in the IIP. We adopt the polynomial
Clouds of Industrial Internet Platforms commitment to build an efficient homomorphic authenticator, and further
VTJCC04 design an authenticator accumulator, which can be efficiently generated
with limited computational overheads.

Group Key Management and Sharing Description : As data on cloud is beyond the control area of authentic
Protocol in Cloud Computing participants, shared data should be made usable on demand of authentic
Environment users. Shared data are vulnerable to misplaced or erroneously altered by
VTJCC05
Cloud Service Provider (CSP) or attackers.

Achieving Secure, Verifiable, and Description: The Searchable Encryption (SE) technique is palpable for
Efficient Boolean Keyword supporting the keyword searches over the encrypted data. Although many
Searchable Encryption for Cloud Data SE schemes have introduced their own unique searching methods based on
VTJCC06 indexing structure on top of searchable encryption techniques, there are no
Warehouse
schemes that support Boolean expression queries essential for the search
conditions over the DW schema

Optimal Resource Allocation Using Description : The proposed framework simplifies the deployment of cloud
Genetic Algorithm in Container- services and streamlines workload monitoring and analysis within a
Based Heterogeneous Cloud diverse cloud system
VTJCC07

Attribute-Based Management of Description: Our model addresses the challenges of complexity, cost, and
Secure Kubernetes Cloud Bursting data protection compliance by leveraging both Kubernetes and ABE. We
introduce an attribute-based bursting component that uses Kubernetes
VTJCC08 labels for orchestration, and an encryption component that employs ABE
for data protection

PRBFPT: A Practical Redactable Description: Hence, this paper proposes a practical, redactable blockchain
Blockchain Framework With a Public framework with a public trapdoor (hereafter referred to as PRBFPT). PRBFPT
Trapdoor comprises an editing scheme for adding blocks using a new type of blockchain
VTJCC09 with a chameleon hash. Specifically, PRBFPT is able to involve all nodes in the
blockchain in the editing operations by means of a public trapdoor, without
requiring additional trapdoor management by predefined nodes or organizations

Contact: +91 40-66418877, +91 95810 22022, +91 40-66418876, +91 95810 12012
Email: [email protected], [email protected], www.vertilinktech.com
1
JAVA

CODE TITLE APPLICATION / DESCRIPTION


I/O Causality Based In-Line Data Description:We propose I/O Causality based In-line Deduplication (ICID)
Deduplication for Non-Volatile to maximize the deduplication ratio for NVM-based storage systems.
Memory Enabled Storage Systems Unlike previous inline deduplication schemes that use hash indexes to
VTJCC10
identify duplicate data slices, ICID records memory-copy operations in a
B-tree structure to achieve causality-based inline deduplication.

Scalable Data Partitioning Techniques Description: Cloud computing is a technology that shows great promise
for Distributed Data Processing in owing to its ability to provide unlimited resources for computing and data
Cloud Environments storage services. These services are crucial for effectively managing the
VTJCC11 data according to specific requirements. In the current system, data is saved
in the cloud using dynamic data operations and computations

Dynamic AES Encryption and Description: Traditional methods usually fall short in mitigating risks

IEEE 2024 - CLOUD COMPUTING


Blockchain Key Management: A associated with compromised encryption keys and centralized key storage.
Novel Solution for Cloud Data To combat these challenges, our proposed solution encompasses a two-
VTJCC12 phase approach. In the first phase, dynamic Advanced Encryption Standard
Security
(AES) keys are generated, ensuring each file's encryption with a unique and
ever-changing key

Heterogeneous Reconfigurable Description: We propose a homomorphic evaluation accelerator with


Accelerator for Homomorphic heterogeneous reconfigurable modular computing units (RCUs) for the
Evaluation on Encrypted Data Brakerski/Fan-Vercauteren (BFV) scheme. RCUs leverage operator
VTJCC13 abstraction to efficiently perform basic sub-operations of homomorphic
evaluation such as residue number system (RNS) conversion, number
theoretic transform (NTT), and other modular computations.

Optimized Encryption-Integrated Description : This paper presents a novel two-stage container scheduling
Strategy for Containers Scheduling solution that addresses node imbalances and efficiently deploys containers.
and Secure Migration in Multi-Cloud The proposed solution formulates the scheduling process as an
VTJCC14
Data Centers optimization problem, integrating various objective functions and
constraints to enhance server consolidation and minimize energy

DEDUCT: A Secure Deduplication of Description: This paper introduces DEDUCT, an innovative data
Textual Data in Cloud Environments deduplication method for textual data. DEDUCT employs a hybrid
approach that combines cloud-side and client-side deduplication
VTJCC15 mechanisms to achieve high compression rates while maintaining data
security

Cloud-assisted Privacy-Preserving Description : In response to this challenge, we explore the outsourcing


Spectral Clustering Algorithm within dilemma of spectral clustering in a cloud and multi-user environment and
a Multi-User Setting propose a quantum-secure and efficient solution. Specifically, by
VTJCC16 employing the CKKS homomorphic encryption algorithm within a dual
non-collusive server model, we formulate a comprehensive and multi-user
spectral clustering outsourcing scheme

Efficient Privacy-Friendly and Description: In addition, they almost exclusively focus on data aggregation
Flexible Wearable Data Processing operations, neglecting multiplication and division operations on encrypted data,
With User-Centric Access Control which are fundamental operations with significant importance in various
VTJCC17 application scenarios. In this paper, we present efficient and privacy-preserving
schemes for multiplication and division operations with fine-grain data-sharing
and user-centric access control capabilities, called SAMM and SAMD,
respectively
Dynamic Searchable Symmetric Description: Dynamic Searchable Symmetric Encryption (DSSE) is a
DATA MINING
IEEE 2024

Encryption With Strong Security and prospective technique in the field of cloud storage for secure search over
Robustness encrypted data. A DSSE client can issue update queries to an honest-but-
VTJDM01 curious server for adding or deleting his ciphertexts to or from the server
and delegate keyword search over those ciphertexts to the server.
Numerous investigations focus on achieving strong security

Contact: +91 40-66418877, +91 95810 22022, +91 40-66418876, +91 95810 12012
Email: [email protected], [email protected], www.vertilinktech.com
2
JAVA

CODE TITLE APPLICATION / DESCRIPTION


A Novel Proxy Re-Encryption Description: Due to the data owners' lack of trust, they save their data in an
Technique for Secure Data Sharing in encrypted format that is inaccessible to outsiders. The phrase “proxy re-
Cloud Environment encryption” (PRE) refers to a popular way of delivering encrypted data
VTJDM02
stored in the cloud

Comment on "Expressive Public-Key Description: An expressive PEKS scheme is a variant of the PEKS scheme
Encryption with Keyword Search: that supports conjunctive and disjunctive searches (expressive search).
Generic Construction from KP-ABE
VTJDM03
and an Efficient Scheme Over Prime-
Order Groups"

An Implementation for Secure Data Description: Reconciling client-side encryption with cross-user
Deduplication on End-to-End deduplication is an active research topic. We present the first secure cross-
Encrypted Documents user deduplication scheme that supports client-side.
VTJDM04

IEEE 2024 - DATA MINING


Prediction of Chronic Kidney Disease Description: Chronic Kidney Disease dataset has been taken from the UCI
- A Machine Learning Perspective repository. Seven classifier algorithms have been applied in this research
such as artificial neural network, C5.0, Chi-square Automatic interaction
VTJDM05 detector, logistic regression, linear support vector machine with penalty L1
& with penalty L2 and random tree

Enhancing the prediction of employee Description : The proposed methodology extends beyond prediction and
turnover with knowledge graphs and incorporates explainable artificial intelligence (XAI) techniques to unearth the
explainable AI pivotal factors influencing an employee's decision to either remain with or depart
VTJDM06
from a particular organization. The empirical analysis was conducted using a
comprehensive dataset from IBM that includes the records of 1,470 employees

A Reinforcement Learning Based Description: A single course may contain one or more CLOs. These CLOs
Recommendation System to Improve are then mapped to PLOs and PLOs are then mapped to PEOs. Therefore,
Performance of Students in Outcome our objective in this work is to improve deficient/weak CLOs of students by
VTJDM07 suggesting online resources. Whereas, in the absence of this proposed
Based Education Model
system, students have to find out these resources by themselves or course
teacher recommends relevant online resources

Novel Transformer Based Description : This research aims to detect depression early by analyzing
Contextualized Embedding and social media user content with machine learning techniques. We have built
Probabilistic Features for Depression advanced machine learning models using a benchmark depression
VTJDM08 database containing 20,000 tagged tweets from user profiles identified as
Detection From Social Media
depressed or non-depressed

A Secure Medical Data Sharing Description: However, they still have flaws in granting full authorization to
Framework for Fight Against individuals, ensuring the security of personal information, speed, and
Pandemics Like Covid-19 by Using scalability. They mostly use private or consortium blockchains. However,
VTJDM09 in a public blockchain, a system that everyone can participate in and follow
Public Blockchain
provides more reliable information

Secure Sharing Architecture of Description: Telemedicine primarily aims to facilitate the transmission of
Personal Healthcare Data Using healthcare data through electronic channels, enabling users to access
Private Permissioned Blockchain for medical services. It supports healthcare services around the globe, aids in
VTJDM10 early diagnosis and treatment, and assists with remote care by provisioning
Telemedicine
effective healthcare that is safe, secure, and reliable

Contact: +91 40-66418877, +91 95810 22022, +91 40-66418876, +91 95810 12012
Email: [email protected], [email protected], www.vertilinktech.com
3
JAVA

CODE TITLE APPLICATION / DESCRIPTION


Investigating Gender and Age Description: Leveraging the capabilities of ensemble learning, an
Variability in Diabetes Prediction: A advanced technique that combines multiple models, the predictive model's
Multi-Model Ensemble Learning efficiency is substantially enhanced, resulting in precise and reliable
VTJDM11 predictions of individuals' diabetic status. Addressing the challenge of
Approach
diabetes prediction, a novel ensemble learning model was proposed

Blockchain-Enabled Framework for Description: We present a Blockchain driven system that not only tackles
Transparent Land Lease and Mortgage alteration and double-spending issues in traditional systems but also
Management implements distributed data management. Current state-of-the-art
VTJDM12 solutions do not fully incorporate crucial features of Blockchain, such as
transparency, prevention of double-spending, auditability, immutability,
and user participation

Enhancing Gun detections with Description: The Mel spectrograms created from the collected features are
transfer learning and YAMNet Audio used for multi-class audio classification, which makes it possible to
classification identify different types of guns. 1174 audio samples from 12 distinct
VTJDM13 weapons make up the study's extensive dataset, which offers a varied and

IEEE 2024 - DATA MINING


representative collection for training and evaluation

A Novel Early Detection and Description: This work proposed an Optimal Scrutiny Boosted Graph
Prevention of Coronary Heart Disease Convolutional LSTM (O-SBGC-LSTM), SBGC-LSTM enhanced by
Framework Using Hybrid Deep Eurygaster Optimization Algorithm (EOA) to tune hyper-parameters for
VTJDM14 early prevention and detection of diabetes disease
Learning Model and Neural Fuzzy
Inference System

Scalable and Popularity-Based Secure Description : Our scheme uses homomorphic encryption (HE) to generate
Deduplication Schemes With Fully comparable random tags to record data popularity and then uses the binary
Random Tags search in the AVL tree to accelerate the tag comparisons. Besides, we find
VTJDM15
the popularity tamper attacks in existing schemes and design a proof of
ownership (PoW) protocol against it

IPO-PEKS: Effective Inner Product Description: Public-key Encryption with Keyword Search (PEKS) allows
Outsourcing Public Key Searchable customers to search for target encrypted files using keywords. However,
Encryption From Lattice in the IoT the majority of PEKS implementations are unable to repel malicious
VTJDM16 quantum-capable attackers

Enhancing IoT Security and Description: The attribute-based searchable encryption (ABSE) as been
Efficiency: A Blockchain Assisted used within IoT to maintain data privacy and integrity. However, existing
Multi-Keyword Searchable ABSE approaches often rely on centralized systems that are susceptible to
VTJDM17
Encryption Scheme single-point failures and are inefficient in terms of decryption and data
retrieval

Medical Image Encryption through Description: The encryption process initiates with a secure key exchange
Chaotic Asymmetric Cryptosystem mechanism using elliptic curves and the Blum-Goldwasser Cryptosystem.
Pixel randomization is achieved through a chaotic map, followed by
VTJDM18 encryption using ECC and BGC, which integrates the discrete logarithmic
problem, probabilistic encryption, and the quadratic residuosity problem.
NETWORK SECURITY

Leakage-Resilient Anonymous Description: Very recently, several leakage-resilient anonymous multi-


IEEE 2024

Heterogeneous Multi-Receiver receiver encryption (LR-AMRE) schemes based on various public-key


Hybrid Encryption in Heterogeneous systems were also proposed. However, these LR-AMRE schemes are not
VTJNS01 suitable for a heterogeneous public-key environment under which an
Public-Key System Settings authorized receiver group includes heterogeneous receivers under various
PKS settings and these receivers have various types of secret/public key pairs

Contact: +91 40-66418877, +91 95810 22022, +91 40-66418876, +91 95810 12012
Email: [email protected], [email protected], www.vertilinktech.com
4
JAVA

CODE TITLE APPLICATION / DESCRIPTION


F o r m a l Ve r i f i c a t i o n o f D a t a Description: Formal verification of these operations can improve the
Modifications in Cloud Block Storage reliability of CBS to some extent. Although separation logic is a
Based on Separation Logic mainstream approach to verifying program correctness, the complex
VTJNS02
architecture of CBS creates some challenges for verifications

An Efficient IoT-Fog-Cloud Resource Description: One common feature of the fog paradigm is its limitations in
Allocation Framework Based on Two- capabilities, which make it unsuitable for processing large volumes of data.
Stage Approach To ensure the smooth execution of delay-sensitive application tasks and the
VTJNS03 large volume of data generated, there is a need for the fog paradigm to
collaborate with the cloud paradigm to achieve a common goal

Multi-Smart Meter Data Encryption Description: We use an improved homomorphic encryption method to
Scheme Based on Distributed realize the encryption aggregation of users' data. Second, we propose a
Differential Privacy double-blind noise addition protocol to generate distributed noise through
VTJNS04 interaction between users and a cloud platform to prevent semi-honest

IEEE 2024 - NETWORK SECURITY


participants from stealing data by colluding with one another

Multi-grained Trace Collection, Description: On the one hand, such uniform layer-level management
Analysis, and Management of Diverse probably cannot fit the various requirements of different kinds of
Container Images containerized services well. On the other hand, new image formats
VTJNS05 organizing data in blocks or files cannot benefit from such uniform layer-
level image management. In this paper, we perform the first analysis of
image traces at multiple granularities (i.e., image-, layer-, and file-level)

AES Security Improvement by Description : We propose an algorithm to create new, key-dependent XOR
Utilizing New Key-Dependent XOR tables from an initial secret key. At the same time, we prove that in the
Tables ciphertext the new XOR operation can preserve the independent, co-
VTJNS06
probability distribution of the random key.

Ethereum Blockchain Framework Description: The potential of blockchain technology in revolutionizing the
Enabling Banks to Know Their KYC process has been acknowledged globally. Blockchain technology
Customers provides a decentralized platform for storing customer data, enabling
VTJNS07 financial institutions to access the information seamlessly

An Efficient Task Scheduling for Description : To facilitate comparison, the number of virtual machines in
Cloud Computing Platforms Using the Visual Studio.Net framework environment is used for the
Energy Management Algorithm: A implementation. The experimental findings indicate that increasing the
VTJNS08 number of virtual machines reduces Makespan. Moreover, the Energy
Comparative Analysis of Workflow
Management Algorithm (EMA) outperforms
Execution Time

AASSI: A Self-Sovereign Identity Description: We bridge this gap by introducing AASSI, a pioneering SSI
Protocol With Anonymity and protocol meticulously designed to balance the twin imperatives of privacy
Accountability and accountability. Specifically, AASSI extends support for anonymity,
VTJNS09 self-derivation, fine-grained tracing and selective revocation.

A C o m p a r a t i v e A n a l y s i s o f Description: In cloud environments, dynamic management of load


Metaheuristic Techniques for High balancing is crucial. This study explores how virtual machines can
Availability Systems effectively remap resources in response to fluctuating loads dynamically,
VTJNS10 optimizing overall network performance. The core of this research
involves an in-depth analysis of several metaheuristic algorithms applied
to load balancing in cloud computing

Contact: +91 40-66418877, +91 95810 22022, +91 40-66418876, +91 95810 12012
Email: [email protected], [email protected], www.vertilinktech.com
5
JAVA

NETWORK SECURITY
CODE TITLE APPLICATION / DESCRIPTION

IEEE 2024 -
MS-FL: A Federated Learning Description: To address these issues, this paper proposes a novel federated
Framework Based on Multiple learning framework MS-FL based on multiple security strategies. The
Security Strategies framework's algorithms guarantee that data providers need not worry about
VTJNS11
data privacy leakage. At the same time, it can defend against poisoning
attack from malicious nodes

PASSP: A Private Authorization Description: We propose a private authorization scheme oriented service
Scheme Oriented Service Providers providers. A decentralized publicly-verifiable re-encryption method based
on IPFS is proposed to minimize the reliance on service providers, by
VTJBC01 shifting to a distributed storage and computation model

PEEV: Parse Encrypt Execute Description: Homomorphic encryption can be used to allow processing
Verify—A Verifiable FHE Framework directly on encrypted data, but a dishonest cloud provider can alter the
computations performed, thus violating the integrity of the results. To
VTJBC02 overcome these issues, we propose PEEV (Parse, Encrypt, Execute,
Verify), a framework that allows a developer with no background in
cryptography to write programs operating on encrypted data

An Inner Product Predicate-Based Description: In order to solve all the above problems, this paper proposes a
Medical Data-Sharing and Privacy blockchain aided attribute-based searchable scheme with the properties of
Protection System inner product predicate. In the proposed scheme, the attribute encryption
VTJBC03 mechanism implements fine-grained access policies with wildcards, which

IEEE 2024 - BLOCK CHAIN


improves the data owner's ability to control access authorization precisely

Optimizing Industrial IoT Data Description : To mitigate these challenges, we have proposed a secure and
Security Through Blockchain- incentive-based data-sharing framework for IIoT systems using
Enabled Incentive-Driven Game blockchain technology. We leverage blockchain due to its ability to provide
VTJBC04
Theoretic Approach for Data Sharing secure and tamper-resistant data storage and sharing as participants store
their data on a distributed ledger (DL), preventing unauthorized access

Blockchain-Assisted Hierarchical Description: To address the need to exchange data between logistics
Attribute-Based Encryption Scheme networks, we proposed a novel decentralized hierarchical attribute-based
for Secure Information Sharing in encryption (HABE) scheme combining edge computing and blockchain.
VTJBC05 To begin, we offer an IoT data encryption strategy in which edge devices
Industrial Internet of Things
can send data to a nearby cloud network for data processing while
maintaining privacy

Secure Reviewing and Data Sharing in Description : Under this mechanism, only the assigned reviewer would
Scientific Collaboration: Leveraging have access to the confidential manuscript, ensuring the integrity of the
B l o c k c h a i n a n d Z e r o Tr u s t review process. In scientific collaborations, the imperative for confidential
VTJBC06 data sharing extends beyond reproducibility to encompass vital
Architecture
collaborative endeavors such as publications, Memorandums of
Understanding (MoUs), grants, and funding

Blockchain Based KYC Model for Description: Furthermore, a centralized system permits collaboration and
Credit Allocation in Banking operation execution by multiple financial institutions. Aside from these
two scenarios, KYC processes can also be executed via a blockchain-based
VTJBC07 system

Public Edu Chain: A Framework for Description: PublicEduChain allows students to store their data in smart contracts
Sharing Student-Owned Educational created on the public Ethereum network, making it possible to share this
information with any educational institution and administrative units. Educational
Data on Public Blockchain Network
VTJBC08 institutions can access student data stored in smart contracts on the public Ethereum
network through Learning Management System (LMS) applications and can add
data to these contracts. PublicEduChain ensures that data is managed under student
ownership within a fully decentralized infrastructure

Contact: +91 40-66418877, +91 95810 22022, +91 40-66418876, +91 95810 12012
Email: [email protected], [email protected], www.vertilinktech.com
6
JAVA

CODE TITLE APPLICATION / DESCRIPTION


Blockchain-Based Logging to Defeat Description: Malicious insiders may tamper, steal or change patients' health data,
Malicious Insiders: The Case of which results in a loss of patient trust in these systems. Audit logs in the cloud,
which may point to illegal data access, may also be erased or forged by malicious
Remote Health Monitoring Systems
VTJBC09 insiders as they tend to have technical knowledge and privileged access to the
system. Thus, in this work, we propose a Cloud Access Security Broker (CASB)
model that (a) logs every action performed on user data and (b) secures those logs
by placing them in a private blockchain that is viewable by the data owners.

Blockchain Based an Efficient and Description: The centralized repository that is currently in place made the
Secure Privacy Preserved Framework majority of hacks possible. The sharing of sensitive data and authentication
for Smart Cities are essential stages in guaranteeing the security of applications associated

IEEE 2024 - BLOCK CHAIN


VTJBC10
with IoT. Blockchain and IoT are two widely used technologies, with IoT
focusing on data collection via various devices and blockchain enabling

Research on the privacy protection Description: In this context, data holders often opt for cloud storage of their
technology of blockchain spatio- data to mitigate the pressure of local storage and computing overhead.
temporal big data However, this centralized storage mode renders the data susceptible to
VTJBC11 risks of tampering and leakage due to the absence of physical control over
spatiotemporal big data

A New Identity Authentication and Description: In the edge computing environment, with the frequent cross-
Key Agreement Protocol Based on domain authentication and data sharing of IoT devices in different security
Multi-Layer Blockchain in Edge domains, identity authentication faces a series of challenges and security
VTJBC12 issues. Most of the traditional identity authentication methods are based on
Computing public key infrastructure

Stub Signature-Based Efficient Public Description : we suggest proposing a partial signature-based data auditing system so that
both privacy and accuracy can be fortified while reducing the computational cost
Data Auditing System Using Dynamic associated with auditing processes significantly. This system would involve using
Procedures in Cloud Computing cryptographic techniques such as homomorphic encryption and hash functions, which
VTJBC13 would enable secure sharing between multiple parties while ensuring integrity checks on
stored files at regular intervals for any potential tampering attempts made by external
attackers or malicious insiders who may try to gain unauthorized access into confidential
user information stored within cloud sites.

Effective Identity Authentication Description: To address these issues, we suggest proposing a partial
Based on Multi-attribute Centers for signature-based data auditing system so that both privacy and accuracy can
Secure Government Data Sharing be fortified while reducing the computational cost associated with auditing
VTJBC14 processes significantly. This system would involve using cryptographic
techniques such as homomorphic encryption and hash functions

Intelligent SLA Selection Through the Description : Cloud computing has transformed digital service delivery by IEEE 2024 - NETWORKING
Validation Cloud Broker System providing scalable, flexible access to computing resources, including
servers, storage, and applications, under a pay-per-use model
VTJNW01

Parallel Enhanced Whale Description: In this paper, a parallel enhanced whale optimization
Optimization Algorithm for algorithm is proposed to schedule independent tasks in the cloud with
Independent Tasks Scheduling on heterogeneous resources. The proposed algorithm improves solution
VTJNW02 diversity and avoids local optima using a modified encircling maneuver
Cloud Computing
and an adaptive bubble net attacking mechanism

Design Aspects of Decentralized Description: To address this problem and open the way for a secure and
Identifiers and Self-Sovereign efficient society, where the privacy of citizens is paramount, the identity
Identity Systems concept and proof of identity mechanisms need to be redesigned from the
VTJNW03 ground up

Contact: +91 40-66418877, +91 95810 22022, +91 40-66418876, +91 95810 12012
Email: [email protected], [email protected], www.vertilinktech.com
7
JAVA

CODE TITLE APPLICATION / DESCRIPTION


Secure and Fine-Grained Access Description: The context of an IoT cloud data-sharing environment, where
Control With Optimized Revocation data originates from numerous devices and user authorization status
for Outsourced IoT EHRs With undergoes frequent changes, a gap persists in achieving a comprehensive
VTJNW04
Adaptive Load-Sharing in Fog- and systematic integration of secure IoT data transfer and aggregation,
Assisted Cloud Environment coupled with efficient user revocation procedures

Incentive-Vacation Queueing for Description: We analyze an orchestrated ECC where devices rent
Edge Crowd Computing resources in exchange for incentives. Our incentive-vacation queueing
(IVQ) model associates performance with incentive payments using
VTJNW05 vacation queueing, considering the multitenancy of devices through a
server vacation dependent on incentives received

Concise and Efficient Multi-Identity Description: However, MKFHE schemes used to construct MIBFHE
Fully Homomorphic Encryption usually have complex construction and large computational complexity,
Scheme which also causes the same problem for MIBFHE schemes
VTJNW06

IEEE 2024 - NETWORKING


Digitalized and Decentralized Open- Description: We identify the key properties for the development of
Cry Auctioning: Key Properties, decentralized open-cry auctioning systems, including verifiability,
Solution Design, and Implementation transaction immutability, ordering, and time synchronization. Three
VTJNW07 prominent blockchain platforms, namely, Ethereum, Hyperledger Fabric,
and R3 Corda were analyzed in terms of their capabilities to ensure these
properties for gap identification.

ACO-Based Scheme in Edge Learning Description : We propose efficient communications under a task-oriented
NOMA Networks for Task-Oriented principle by optimizing power allocation and edge learning-error
Communications prediction in an edge-aided non-orthogonal multiple access (NOMA)
VTJNW08
network. Furthermore, we propose a novel approach based on the ant
colony optimization (ACO) algorithm to jointly minimize the learning
error and optimize the power allocation variables
Non-Fungible Token Enhanced Description: One of the reasons for such a growth is their features such as
Blockchain based Online Social ubiquitous access, on-demand service, friendship networks, user
Network engagement strategies like recommendation engines, etc. However, there
VTJNW09 are various limitations to the current approach, such as the centralization of
control, lack of data ownership, poor access control, fake news, bot
accounts, censorship, digital rights management issues, etc.

R E H R E C : R e v i e w E f f e c t e d Description : Although user and business nodes have been used in HINs,
Heterogeneous Information Network review contents have not been used. In this work, we use review nodes in
Recommendation System HINs in addition to user and business nodes. Since written reviews provide
VTJNW10 valuable insights into points of interest within recommendation systems,
integrating review nodes into HINs allows us to assess their impact on
recommendation systems.

Federated Learning for Decentralized Description: This study introduces a Federated Learning-based approach,
DDoS Attack Detection in IoT named Federated Learning for Decentralized DDoS Attack Detection (FL-
Networks. DAD), which utilizes Convolutional Neural Networks (CNN) to
VTJNW11 efficiently identify DDoS attacks at the source.

Innovative Energy-Efficient Proxy Description: The proposed PRE scheme optimizes efficiency by
Re-Encryption for Secure Data integrating lightweight symmetric and asymmetric cryptographic
Exchange in Wireless Sensor techniques, thereby minimizing computational costs during PRE
VTJNW12 operations and conserving energy for resource-constrained nodes. In
Networks.
addition, the scheme incorporates sophisticated key management and
digital certificates to ensure secure key generation and distribution

Contact: +91 40-66418877, +91 95810 22022, +91 40-66418876, +91 95810 12012
Email: [email protected], [email protected], www.vertilinktech.com
8

You might also like