ABOUT ORACLE PROJECT 2020 – 2021
Oracle Is An Object-Oriented Language That Allows Learners To Make Real-World Applications. Oracle Technology Based Mostly Software Package Works Almost Everywhere – From The Tiniest Devices To Super Computers!
IEEE ORACLE PROJECT 2020 – 2021
SNO | Projects List |
1 | Secure Content-Based Image Retrieval in the Cloud With Key Confidentiality |
2 | Verifiable Attribute-Based Keyword Search Over Encrypted Cloud Data Supporting Data Deduplication |
3 | Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
4 | Joint Pricing and Security Investment for Cloud-Insurance A Security Interdependency Perspective |
5 | Large-Universe Attribute-Based Encryption with Public Traceability for Cloud Storage |
6 | s Mining Users Trust from E-Commerce Reviews Based on Sentiment Similarity Analysis |
7 | TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud |
8 | Key-Policy Attribute-Based Encryption With Keyword Search in Virtulaized Environments |
9 | Identity Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud |
10 | Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography |
11 | Top k Dominating Queries on Incomplete Data |
12 | Crisis-Critical Intellectual Property Findings From the COVID-19 Pandemic |
13 | Crowdsourcing for Top-K Query Processing over Uncertain Data |
14 | Understanding Short Texts through Semantic Enrichment and Hashing |
15 | Sentiment Embeddings with Applications to Sentiment Analysis |
16 | A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks |
17 | RSkNN kNN Search on Road Networks by Incorporating Social Influence |
18 | A Novel Recommendation Model Regularized with User Trust and Item Ratings |
19 | Topic Sketch: Real-Time Bursty Topic Detection from Twitter |
20 | User Behavior Prediction of Social Hotspots Based on Multimessage Interaction and Neural Network |
21 | Inverted Linear Quad tree Efficient Top K Spatial Keyword Search |
22 | Detecting and Characterizing Extremist Reviewer Groups in Online Product Reviews |
23 | Analysis of customer churn prediction in telecom industry using decision trees and logistic regression |
34 | An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing |
25 | Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data |
26 | Dual Server Public Key Encryption with keyword search for secure cloud storage |
27 | Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially |
28 | Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates |
29 | Hidden Cipher text Policy Attribute Based Encryption under Standard Assumptions |
30 | Hidden Cipher text Policy Attribute Based Encryption under Standard Assumptions |
31 | Fine-grained Two-factor Access Control for Web-based Cloud Computing Services |
32 | Profiling Online Social Behaviors for Compromised Account Detection |
33 | Top-k Dominating Queries on Skyline Groups |
34 | Cloud Armor Supporting Reputation based Trust Management for Cloud Services |
35 | An Efficient Privacy Preserving Ranked Keyword Search Method |
36 | Protecting Your Right Attribute based Keyword Search with Fine grained Owner |
37 | Circuit Cipher text-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud |
38 | A Secure Anti Collusion Data Sharing Scheme for Dynamic Groups in Cloud |
39 | A Secure and Dynamic Multi keyword Ranked search scheme over Encrypted Cloud Data |
40 | FRoDO: Fraud Resilient Device for Off-Line Micro-Payments |
41 | Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted |
42 | An enhanced system to identify mischievous social malwares on Facebook applications |
43 | Social Friend Recommendation Based on Multiple Network Correlation |
44 | Privacy Preserving Location Sharing Services for Social Networks |
45 | STAMP Enabling Privacy Preserving Location Proofs for Mobile Users |
46 | Detecting Malicious Facebook Applications |
47 | Answering Approximate Queries over XML Data |
48 | EPLQ Efficient Privacy Preserving Location Based Query Over Outsourced Encrypted Data |
49 | Mapping Bug Reports to Relevant Files A Ranking Model, a Fine Grained Benchmark, and Feature Evaluate |
50 | Personalized Travel Sequence Recommendation on Multi-Source Big Social Media |
51 | Trust Agent-Based Behavior Induction in Social Networks |