Oracle IEEE Project 2019 – 2020


Oracle Is An Object-Oriented Language That Allows Learners To Make Real-World Applications. Oracle Technology Based Mostly Software Package Works Almost Everywhere  From The Tiniest Devices To Super Computers!



SNO Projects List
1 Secure Optimization Computation Outsourcing in Cloud Computing A Case Study of Linear Programming
2  A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era
3 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
4 CSecure Data Sharing in Cloud Computing Using Revocable Storage Identity Based Encryption
5 Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts
6 SeDas A DeyPoS DE duplicatable Dynamic Proof of Storage for Multi User Environments
7 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud 
8 Secure Auditing and Deduplicating Data in Cloud
9  A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing
10 Relevance Feedback Algorithms Inspired By Quantum Detection
11 Top k Dominating Queries on Incomplete Data
12 Cross Domain Sentiment Classification Using Sentiment Sensitive Embeddings
13 Crowdsourcing for Top-K Query Processing over Uncertain Data
14 Understanding Short Texts through Semantic Enrichment and Hashing
15 Sentiment Embeddings with Applications to Sentiment Analysis
16 A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments
17 RSkNN kNN Search on Road Networks by Incorporating Social Influence
18 A Novel Recommendation Model Regularized with User Trust and Item Ratings
19 Data Integrity Auditing without Private Key Storage for Secure Cloud Storage
20 Top-Down XML Keyword Query Processing
21 Inverted Linear Quad tree Efficient Top K Spatial Keyword Search
22 Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
23 Analysis of customer churn prediction in telecom industry using decision trees and logistic regression
34 Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data  
25 Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data
26  Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System
27 Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially
28 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
29 Hidden Cipher text Policy Attribute Based Encryption under Standard Assumptions
30 Hidden Cipher text Policy Attribute Based Encryption under Standard Assumptions
31  Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms Review of Literature and Open Challenges
32 Profiling Online Social Behaviors for Compromised Account Detection
33  Mining Users Trust from E-Commerce Reviews Based on Sentiment Similarity Analysis
34 Cloud Armor Supporting Reputation based Trust Management for Cloud Services
35 An Efficient Privacy Preserving Ranked Keyword Search Method
36 Protecting Your Right Attribute based Keyword Search with Fine grained Owner
37 Circuit Cipher text-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud
38 A Secure Anti Collusion Data Sharing Scheme for Dynamic Groups in Cloud
39 A Secure and Dynamic Multi keyword Ranked search scheme over Encrypted Cloud Data
40  Credibility Evaluation of Twitter-Based Event Detection by a Mixing Analysis of Heterogeneous Data
41 Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted
42 An enhanced system to identify mischievous social malwares on Facebook applications
43 Social Friend Recommendation Based on Multiple Network Correlation
44 Privacy Preserving Location Sharing Services for Social Networks
45 STAMP Enabling Privacy Preserving Location Proofs for Mobile Users
46 Detecting Malicious Facebook Applications
47 Data Filtering Instagram hashtags through crowdtagging and the HITS algorithm
48 EPLQ Efficient Privacy Preserving Location Based Query Over Outsourced Encrypted Data 
49   Mining Users Trust from E-Commerce Reviews Based on Sentiment Similarity Analysis
50 Learning Customer Behaviors for Effective Load Forecasting
51 Trust Agent-Based Behavior Induction in Social Networks