0% found this document useful (0 votes)
13 views2 pages

Blockchain Titles

Uploaded by

Sana Shaik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views2 pages

Blockchain Titles

Uploaded by

Sana Shaik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

VEDHA TECHNOLOGIES

IEEE JAVA 2024-2025 TOPICS

Sl.No 2024 & 2025 Project Title


BLOCK CHAIN TECHNOLOGY

1 A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things


Based on Blockchain
2 Composite Behavioral Modeling for Identity Theft Detection

3 Secure Decentralized Aggregation to Prevent Membership Privacy Leakage


in Edge-Based Federated Learning
4 Securing EHRs With a Novel Token-Based and PPoS Blockchain Methodology

5 Blockchain-Based Trust and Authentication Model for Detecting and Isolating Malicious Nodes in
Flying Ad Hoc Networks

6 Blockchain-backed Assault Detection for Cyber Physical Systems

7 Blockchain-Based Framework for Traffic Event Verification in Smart Vehicles

8 Blockchain-Based REC System for Improving the Aspects of Procedural Complexity and Cyber
Security
9 Block chain-based Decentralized Authentication Modeling Scheme in Edge and IoT Environment

10 Data Trust Framework Using Block chain Technology and Adaptive Transaction Validation

11 A Block chain-based Approach for Drug Traceability in Healthcare Supply Chain

12 A Block chain based Autonomous Decentralized Online Social Network


VEDHA TECHNOLOGIES
IEEE JAVA 2024-2025 TOPICS

13 A Blockchain-based Security Management Framework for Cyber-Physical Systems

14
Blockchain based an efficient and secure privacy preserved framework for smart cities

15 Blockchain-Based Decentralized Storage Design for Data Confidence Over Cloud-Native Edge
Infrastructure

16 Revocable and Efficient Blockchain-based Fine-grained Access Control against EDoS Attacks in
Cloud Storage

17
Identity-based Network Security for Commercial Blockchain Services
18 Blockchain-Based Logging to Defeat Malicious Insiders: The Case of Remote

19
Blockchain Based Data Integrity Verification for Large-Scale IoT Data

20 Secure Federated Cloud Storage Protection Strategy Using Hybrid Heuristic Attribute-Based
Encryption With Permissioned Blockchain

21
Fishing for Fraudsters: Uncovering Ethereum Phishing Gangs With Blockchain Data

22 Defending Against Poisoning Attacks in Federated Learning with Blockchain

23
Collaborative Learning for Cyberattack Detection in Blockchain Networks

24 Trust System- and Multiple Verification Technique-Based Method for Detecting Wormhole Attacks in
MANETs

25 Blockchain-Based Logging to Defeat Malicious Insiders: The Case of Remote Health Monitoring
Systems

26
Enabling Trust and Privacy Preserving e-KYC System Using Blockchain
27 Data Integrity Audit Scheme Based on Blockchain Expansion Technology

You might also like