Aim: The main aim of this project is used to transparent and secure edge computing infrastructure for the work-ﬂow in government tenders to implement government schemes and policies by limiting human supervision to the minimal.Existing SystemThe allocation of tenders from governm..
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments
Aim:The main aim of this project is Secure and efficient ﬁle storage and sharing via authenticated physical devices, data can be shared among n number of client connected in the cloud. Abstract: The data that stored in clouds is highly sensitive, for example, medical records and social networks information, person information,..
AimThe main aim of this project is to preserve the outsourced data in cloud through gateway encryption, and to implement personalized search over the encrypted data in a secure way by NLP process without downloading and decrypting the entire group member file contents. Abstract Research in cloud computi..
Aim: The main aim of this project to provide effective survey that guarantees data truthfulness and privacy preservation.Introduction: In the era of big data, society has developed an insatiable appetite for sharing ..
Aim The main aim of this project is to provide Travel Route recommendation for passionate travelers using community-contributed pictures with Geo Tagging, people attributes and textual information like keyword and image descriptions of photos available in Social Networking Sites. Introduction &..
Aim: The main aim of this project is to achieve new distributed de-duplication systems we present an attribute-based storage system with secure deduplication in a hybrid cloud setting with higher reliability. Synopsis:  ..
Aim: The main aim of this project is to give knowledge regarding Health and diseases of human by receiving user query.Synopsis: Internet has demonstrated itself as a magnificent design over time. Today, billions of people have cont..
BEMPAS A decentralized Employee Performance Assesment System Based on Blockchain for Smart City Governance
Aim: The main aim of this project is to access the employee performance and to predict employee future performance.Abstract: In each organization their primary goal is to improve the organization and make benefits in it the im..
Aim: The main aim of this project is to develop user-friendly mobile applications ensuring data protection and high security. Synopsis: ..
Aim The main aim of this project is providing the secure communication between the two cars in VANET environment. Synopsis The Internet of vehicles (IoV) provides new opportunities for the coordination of vehicles for enhancing safety..
Aim The main aim of the project is to avoid the food adulteration and create transparent food supply chain. Introduction In this paper, we propose a blockchain inspired internet-of-things architecture for creating a transparent food supply c..
Aim:This project we are going to Provide Trusted Update on Traffic Status so that we can minimize the traffic jam based on blockchain techniques. Synopsis: In this project we are a going to provide the service of Trust Management which means it is a communication system between various vehicles present in different locations. The mai..
Aim: The main aim of this project is to provide a reliable and secure cloud service and also increase trustworthiness of certifications by Continuous Auditing.Introduction: An increasing number of organizations outsource their data, applications and bu..
Aim:The main aim of this project is to give high secured Authentication password scheme which user can easily remember. Synopsis:The popularity of mobile devices is due to a unique set of features including ubiquitous Internet access through communication technologies such as WiFi and 4G/LTE, easy to use touch-based inputs, and numerous ap..
Aim: The main aim of this project secures the query accessing and reduces the server load.Synopsys: Clients of outsourced databases need Query Authentication (QA) guaranteeing the integrity and authenticity of query results returned by potentially compromised..