Tuesday 7 April 2020

IEEE 2023: ADVANCED JAVA WITH BLOCKCHAIN AND CLOUD COMPUTING


IEEE-2023A Proxy Re-Encryption Approach to Secure Data sharing in the Internet of Things based on Blockchain            
Abstract: Blockchain first emerged in 2008 because secretive transactions over the internet needed enormous trust between donor and NGO or organization to mediate. Now that digital currencies have been firmly established, charities have the opportunity to engage with a new set of donors. Looking across borders, fundraising platforms that accept donations are the easiest first place to look for charities to starting out. Using Blockchain technology we can track the donation funds contributed to the fundraiser cause and get reassured that the funds are reaching their required destination without any middle intervention and saving the donors from scams. The AI helps predict the cost estimation required for the total cause using datasets and approaching potential donors while maintaining data hygiene. AI is used to predict the requirement for approximate fund for any task to be accomplished..

Click for more details



IEEE-2023Sensing Image sharing with Storage optimization Techniques in Cloud

 Abstract:  Blockchain is a newly emerging technology for data sharing and application. It can exchange de-centralized information in distributed systems without mutual trust by means of data encryption, timestamp and distributed consensus, so as to improve the efficiency of data sharing and application. This technology can be fully utilized in the large data remote sensing image system, and the multi-system shared node storage system can be managed efficiently and uniformly, so as to improve the economic efficiency of the system. This system designs the shared architecture based on block chain technology, proposes key research technologies. The main objective of this system is to identify a duplicate image and minimizing the storage space in Block chain.





IEEE 2023: Fake Product Identification System Using Blockchain.    
Abstract: Fake product identification is a growing concern in today’s global market. The use of blockchain technology can help address this issue by providing a secure and transparent way to track the provenance of products. We propose a system for fake product identification using blockchain, which involves assigning a unique identifier to each product at the time of manufacture and storing its transaction history on the blockchain. By leveraging the decentralized nature of blockchain, this system ensures the authenticity and integrity of product information, making it virtually impossible to tamper with. We discuss the benefits and challenges of implementing such a system and highlights the potential impact it could have on consumer trust. Overall, we provide insights into the potential of blockchain technology to tackle the issue of fake products in a secure and efficient manner. Moreover, block chain-based solutions for fake product identification enable stakeholders to trace the source of counterfeit products. This enables them to take appropriate measures to prevent further counterfeiting and safeguard their brand reputation. In conclusion, blockchain-based solutions for fake product identification offer a secure and transparent way to combat counterfeiting and protect consumers from potentially harmful products. By creating an immutable record of a product’s blockchain technology can enable manufacturers, retailers, and consumers to verify the authenticity of products and prevent counterfeiting.

 IEEE-2023: An Efficient Cloud-Of-Cloud system For Storing and Sharing Big Data.  

 Abstract:  Visual We present CHARON, a cloud-backed storage system capable of storing and sharing big data in a reliable and efficient way using multiple cloud storage repositories to comply with the legal requirements of sensitive personal data.  Features: •It efficiently deals with large files over a set of geo-dispersed storage services.  •Efficient system which cut down network traffic cost.  •Map out a novel intermediate data participant schema.

The map reduce type simplifies the large scale data deal with product group even though many times effort have been made to maximize the execution of map reduce work.

A hash capacity made use of session middle of the topology among minimizes the task even so is note movement valued in network topology. At last board reproduced outcome that shows at the proposed algorithm can together minimize network cost.

.

Click for more details




No comments:

Post a Comment

IEEE 2023: WEB SECURITY OR CYBER CRIME

  IEEE 2023:   Machine Learning and Software-Defined Networking to Detect DDoS Attacks in IOT Networks Abstract:   In an era marked by the r...