Oracle IEEE Project 2020 – 2021

ABOUT ORACLE PROJECT 2020 – 2021

Oracle Is An Object-Oriented Language That Allows Learners To Make Real-World Applications. Oracle Technology Based Mostly Software Package Works Almost Everywhere – From The Tiniest Devices To Super Computers!

IEEE ORACLE PROJECT 2020 – 2021

 

SNO Projects List
1  Secure Content-Based Image Retrieval in the Cloud With Key Confidentiality
2  Verifiable Attribute-Based Keyword Search Over Encrypted Cloud Data Supporting Data Deduplication
3 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
4 Joint Pricing and Security Investment for Cloud-Insurance A Security Interdependency Perspective
5  Large-Universe Attribute-Based Encryption with Public Traceability for Cloud Storage
6 Mining Users Trust from E-Commerce Reviews Based on Sentiment Similarity Analysis
7 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud
8  Key-Policy Attribute-Based Encryption With Keyword Search in Virtulaized Environments
9  Identity Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud
10  Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography
11 Top k Dominating Queries on Incomplete Data 
12 Crisis-Critical Intellectual Property Findings From the COVID-19 Pandemic
13 Crowdsourcing for Top-K Query Processing over Uncertain Data
14 Understanding Short Texts through Semantic Enrichment and Hashing
15 Sentiment Embeddings with Applications to Sentiment Analysis
16 A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks
17 RSkNN kNN Search on Road Networks by Incorporating Social Influence
18 A Novel Recommendation Model Regularized with User Trust and Item Ratings
19 Topic Sketch: Real-Time Bursty Topic Detection from Twitter
20  User Behavior Prediction of Social Hotspots Based on Multimessage Interaction and Neural Network
21 Inverted Linear Quad tree Efficient Top K Spatial Keyword Search
22  Detecting and Characterizing Extremist Reviewer Groups in Online Product Reviews
23 Analysis of customer churn prediction in telecom industry using decision trees and logistic regression
34 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
25 Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data  
26 Dual Server Public Key Encryption with keyword search for secure cloud storage
27 Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially
28 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
29 Hidden Cipher text Policy Attribute Based Encryption under Standard Assumptions
30 Hidden Cipher text Policy Attribute Based Encryption under Standard Assumptions 
31 Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
32 Profiling Online Social Behaviors for Compromised Account Detection
33 Top-k Dominating Queries on Skyline Groups
34 Cloud Armor Supporting Reputation based Trust Management for Cloud Services
35 An Efficient Privacy Preserving Ranked Keyword Search Method
36 Protecting Your Right Attribute based Keyword Search with Fine grained Owner
37 Circuit Cipher text-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud
38 A Secure Anti Collusion Data Sharing Scheme for Dynamic Groups in Cloud
39 A Secure and Dynamic Multi keyword Ranked search scheme over Encrypted Cloud Data
40 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
41 Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted
42 An enhanced system to identify mischievous social malwares on Facebook applications
43 Social Friend Recommendation Based on Multiple Network Correlation
44 Privacy Preserving Location Sharing Services for Social Networks
45 STAMP Enabling Privacy Preserving Location Proofs for Mobile Users
46 Detecting Malicious Facebook Applications
47 Answering Approximate Queries over XML Data
48 EPLQ Efficient Privacy Preserving Location Based Query Over Outsourced Encrypted Data
49 Mapping Bug Reports to Relevant Files A Ranking Model, a Fine Grained Benchmark, and Feature Evaluate
50 Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
51 Trust Agent-Based Behavior Induction in Social Networks