IEEE 2022-23: NFC- Near-field communication


For Outstation Students, we are having online project classes both technical and coding using net-meeting software

For details, Call: 9886692401/9845166723

DHS Informatics providing latest 2022-2023 IEEE projects on Blockchain projects for the final year engineering students. DHS Informatics trains all students in Blockchain techniques to develop their project with good idea what they need to submit in college to get good marks. DHS Informatics offers placement training in Blockchain at Bangalore and the program name is OJT – On Job Training, job seekers as well as final year college students can join in this placement training program and job opportunities in their dream IT companies. We are providing IEEE projects for B.E / B.TECH, M.TECH, MCA, BCA, DIPLOMA students from more than two decades.IEEE Blockchain projects Bangalore

NFC- Near-field communication


Blockchain is an emerging decentralized architecture and distributed public ledger technology underlying Bitcoin, and has recently attracted intensive attention from governments, financial institutions and high-tech enterprises. It is believed that blockchain can improve efficiency, reduce costs and enhance data security, but it is still in the face of serious privacy issues which may hinder the wide application of blockchain. In this paper, We present a practical scheme by adding the Identity-Based encryption system, which effectively improves the data privacy for non-transaction applications. Analyses show that our proposal has a high security level which can prevent both disguise and passive attacks, and is functional, effective and practical in many applications for non-transactional scenarios.


The electronic voting has emerged over time as a replacement to the paper-based voting to reduce the redundancies and inconsistencies. The historical perspective presented in the last two decades suggests that it has not been so successful due to the security and privacy flaws observed over time. This paper suggests a framework by using effective hashing techniques to ensure the security of the data. The concept of block creation and block sealing is introduced in this paper. The introduction of a block sealing concept helps in making the blockchain adjustable to meet the need of the polling process. The use of consortium blockchain is suggested, which ensures that the blockchain is owned by a governing body (e.g., election commission), and no unauthorized access can be made from outside. The framework proposed in this paper discusses the effectiveness of the polling process, hashing algorithms’ utility, block creation and sealing, data accumulation, and result declaration by using the adjustable blockchain method. This paper claims to apprehend the security and data management challenges in blockchain and provides an improved manifestation of the electronic voting process.


Cloud computing provides individuals and enterprises massive computing power and scalable storage capacities to support a variety of big data applications in domains like health care and scientific research, therefore more and more data owners are involved to outsource their data on cloud servers for great convenience in data management and mining. However, data sets like health records in electronic documents usually contain sensitive information, which brings about privacy concerns if the documents are released or shared to partially untrusted third-parties in cloud. A practical and widely used technique for data privacy preservation is to encrypt data before outsourcing to the cloud servers, which however reduces the data utility and makes many traditional data analytic operators like keyword-based top- k k document retrieval obsolete. In this paper, we investigate the multi-keyword top- k k search problem for big data encryption against privacy breaches, and attempt to identify an efficient and secure solution to this problem. Specifically, for the privacy concern of query data, we construct a special tree-based index structure and design a random traversal algorithm, which makes even the same query to produce different visiting paths on the index, and can also maintain the accuracy of queries unchanged under stronger privacy. For improving the query efficiency, we propose a group multi-keyword top- k k search scheme based on the idea of partition, where a group of tree-based indexes are constructed for all documents. Finally, we combine these methods together into an efficient and secure approach to address our proposed top- k k similarity search. Extensive experimental results on real-life data sets demonstrate that our proposed approach can significantly improve the capability of defending the privacy breaches, the scalability and the time efficiency of query processing over the state-of-the-art methods.


Attribute-based encryption has been widely employed to achieve data confidentiality and fine-grained access control in cloud storage. To enable users to identify accessible data in numerous dataset, clear attributes should be appended to the ciphertext, which results in the exposure of attribute privacy. In this paper, we propose an efficient attribute-based access control with authorized search scheme (EACAS) in cloud storage by extending the anonymous key-policy attribute-based encryption (AKP-ABE) to support fine-grained data retrieval with attribute privacy preservation. Specifically, by integrating the key delegation technique into AKP-ABE, EACAS enables data users to customize search policies based on their access policies, and generate the corresponding trapdoor using the secret key granted by the data owner to retrieve their interested data. In addition, a virtual attribute with no semantic meaning is utilized in data encryption and trapdoor generation to empower the cloud to perform attribute-based search on the outsourced ciphertext without knowing the underlying attributes or outsourced data. The data owners can achieve fine-grained access control on their outsourced data, and the data users are flexible to search their interested data based on protected attributes through customizing the search policies. Finally, we demonstrate that EACAS is more efficient than existing solutions on computation and storage overheads.


Cloud computing has become increasingly popular among individuals and enterprises because of the benefits it provides by outsourcing their data to cloud servers. However, the security of the outsourced data has become a major concern. For privacy concerns, searchable encryption, which supports searching over encrypted data, has been proposed and developed rapidly in secure Boolean search and similarity search. However, different users may have different requirements on their queries, which mean different weighted searches. This problem can be solved perfectly in the plaintext domain, but hard to be addressed over encrypted data. In this study, the authors use locality-sensitive hashing (LSH) and searchable symmetric encryption (SSE) to deal with a privacy preserving weighted similarity search. In the authors’ scheme, data users can generate a search request and set the weight for each attribute according to their requirements. They treat the LSH values as keywords and mix them into the framework of SSE. They use homomorphic encryption to securely address the weight problem and return the top-k data without revealing any weight information of data users. They formally analysed the security strength of their scheme. Extensive experiments on actual datasets showed that their scheme is extremely effective and efficient.


Searchable encryption facilitates cloud server to search over encrypted data without decrypting the data. Single keyword based searchable encryption enables a user to access only a subset of documents, which contains the keyword of the user’s interest. In this paper we present a single keyword based searchable encryption scheme for the applications where multiple data owners upload their data and multiple users access the data. We use attribute based encryption scheme that allows user to access the selective subset of data from cloud without revealing his/her access rights to the cloud server. The proposed scheme is proven adaptively secure against chosen-keyword attack in the random oracle model. We have implemented the scheme on Google cloud instance and the performance of the scheme found feasible in real-world applications.

ABSTRACT: Biometric identification has become increasingly popular in recent years. With the development of cloud computing, database owners are motivated to outsource the large size of biometric data and identification tasks to the cloud to get rid of the expensive storage and computation costs, which however brings potential threats to users’ privacy. In this paper, we propose an efficient and privacy-preserving biometric identification outsourcing scheme. Specifically, the biometric data is encrypted and outsourced to the cloud server. To execute a biometric identification, the database owner encrypts the query data and submits it to the cloud. The cloud performs identification operations over the encrypted database and returns the result to the database owner. A thorough security analysis indicates the proposed scheme is secure even if attackers can forge identification requests and collude with the cloud. Compared with previous protocols, experimental results show the proposed scheme achieves a better performance in both preparation and identification procedures.

Abstract : E-VOTING IS AMONG the key public sectors that can be disrupted by blockchain technology.1 The idea in blockchain-enabled e-voting (BEV) is simple. To use a digital-currency analogy, BEV issues each voter a “wallet” containing a user credential. Each voter gets a single “coin” representing one opportunity to vote. Casting a vote transfers the voter’s coin to a candidate’s wallet. A voter can spend his or her coin only once. However, voters can change their vote before a preset deadline.                                                                                                                                                                                                                                                                 Contact:                                                                                                                                                                                                                                                                                                                 +91-98451 66723                                                                                                                                                                                                                                                                                                       ☎ 080-413 07435  

Abstract: Electronic Health Records (EHRs) are entirely controlled by hospitals instead of patients, which complicates seeking medical advices from different hospitals. Patients face a critical need to focus on the details of their own healthcare and restore management of their own medical data. The rapid development of blockchain technology promotes population healthcare, including medical records as well as patient-related data. This technology provides patients with comprehensive, immutable records and access to EHRs free from service providers and treatment websites. In this paper, to guarantee the validity of EHRs encapsulated in blockchain, we present an attribute-based signature scheme with multiple authorities, in which a patient endorses a message according to the attribute while disclosing no information other than the evidence that he has attested to it. Furthermore, there are multiple authorities without a trusted single or central one to generate and distribute public/private keys of the patient, which avoids the escrow problem and conforms to the mode of distributed data storage in the blockchain.                                                                                                                                                                                                                                                  Contact:                                                                                                                                                                                                                                                                                                                 +91-98451 66723                                                                                                                                                                                                                                                                                                        ☎  080-413 07435   

Abstract: In a block-chain IoT environment, when data or device authentication information is put on a block chain, personal information may be leaked through the proof-of-work process or address search. In this paper, we apply Zero- Knowledge proof to a smart meter system to prove that a prover without disclosing information such as public key, and we have studied how to enhance anonymity of block chain for privacy protection .                                                      Contact:                                                                                                                                                                                                                                                                                                                 +91-98451 66723                                                                                                                                                                                                                                                                                                        ☎  080-413 07435   

Abstract: Blockchains, such as Bitcoin and Ethereum and their respective P2P networks have seen significant adoption in many sectors in the past few years. All these technologies that use the Blockchain pattern show that it is possible to rebuild any transactional system with better performance without relying on any trusted parties to manage transactions between peers. This insight has lead many companies to invest millions to understand the technology and to find a way to migrate from centralized to decentralized solutions.                                                                                                                                                                                            Contact:                                                                                                                                                                                                                                                                                                                 +91-98451 66723                                                                                                                                                                                                                                                                                                        ☎  080-413 07435   

Abstract: The cyber physical system (CPS) has gained considerable success in large-scale distributed integration environment. In such systems, the sensor devices collect data which would be disseminated via reliable manner to all interested co-operant entities from the physical world. However, highly unreliable environment of CPS, for example, a number of limitations of existing network middle wares, makes secure and reliable data distribution services a challenge issue. In this paper, we propose a new architecture called secure pub-sub (SPS) without middle ware, i.e., blockchain-based fair payment with reputation. In SPS, publishers publish a topic on the blockchain and subscribers specify an interest message by making a deposit to subscribing the topic. Then, if the interest message matches the topic, the publisher transmits the encrypted content of the topic to the blockchain such that the subscribers can decrypt the ciphertext to obtain the content, and mark the publisher as its reputation. Finally, the publisher receives the payment from the subscriber. The new proposal provides confidentiality and reliability of data, anonymity of subscribers and payment fairness between the publishers and subscribers. Different from the traditional pub-sub services, no trusted third party is involved in our system due to employing blockchain technique. The security of the proposed SPS is analyzed as well. The implementation of the protocol on Ethereum of smart contract demonstrates the validity of SPS.                                                                                                     Contact:                                                                                                                                                                                                                                                                                                                 +91-98451 66723                                                                                                                                                                                                                                                                                                        ☎  080-413 07435   

Abstract :

Block chaining technology is a distributed infrastructure and computing paradigm. The latest version is represented by the super account book. The latest version is block chain 3. From the perspective of large data, this paper systematically combs the essence and core technology of block chain technology, and expounds the application status of block chain technology in accounting industry. This paper focuses on building an irreversible distributed financial system based on large data in the context of  large data in order to apply the scenario of “Block Chain Technology + Accounting Services” to the accounting industry, and prospects the application of Block Chain Storage  Technology and Intelligent Internet of Things technology based on large data, providing inspiration for  future research.



Project CODE
1. IEEE Design and Implementation of an Automated and Decentralized Pollution Monitoring System with Blockchains, Smart Contracts, and LoRaWAN tite Title Title
2. IEEE Consortium Block chain-based Malware Detection in Mobile Devices Title Title Title
3. IEEE Block chain-Enabled E-Voting Title Title Title
4. IEEE Secure Attribute-Based Signature Scheme with Multiple Authorities for Block chain in Electronic Health Records Systems Title Title Title
5. IEEE Evaluating Block chains for IoT Title Title Title
6. IEEE Block chain: A Game Changer for Securing IoT Data Title Title Title
7. IEEE Poster Abstract: Privacy in Block chain-Enabled IoT Devices Title Title Title
8. IEEE Block chain and the Internet of Things in the Industrial Sector Title Title Title
9. IEEE Implementation of IoT System using Block Chain with Authentication and Data Protection Title Title Title
10. IEEE Block chain based data security enhanced IoT Server Platform Title Title Title
11. IEEE Block chain based secure scheme for mobile communication Title Title Title
12. IEEE NFB: A Protocol for Notarizing Files over the Block chain Title Title Title
13. IEEE Secure Pub-Sub: Block chain-based Fair Payment with Reputation for Reliable Cyber Physical Systems Title Title Title
14. IEEE Application of Block chain to Trade Clearing Title Title Title

DHS Informatics believes in students’ stratification, we first brief the students about the technologies and types of Blockchain projects and other domain projects. After a complete concept explanation of the IEEE Blockchain projects, students are allowed to choose more than one IEEE Blockchain project for functionality details. Even students can pick one project topic from Blockchain and another two from other domains like Blockchain, data mining, image process, information forensic, big data, Blockchain, Blockchain, data science, blockchain, etc. DHS Informatics is a pioneer institute in Bangalore / Bengaluru; we are supporting project works for other institutes all over India. We are the leading final year project center in Bangalore / Bengaluru and having offices in five different main locations Jayanagar, Yelahanka, Vijayanagar, RT Nagar & Indiranagar.

We allow the ECE, CSE, ISE final year students to use the lab and assist them in project development work; even we encourage students to get their own idea to develop their final year projects for their college submission.

DHS Informatics first trains students on project-related topics then students are entering into practical sessions. We have a well-equipped lab set-up, experienced faculty who are working on our client projects, and a friendly student coordinator to assist the students in their college project work.

We appreciated students for our Latest IEEE projects & concepts on final year Blockchain projects for ECE, CSE, and ISE departments.

Latest IEEE 2022-2023 projects on Blockchain with real-time concepts which are implemented using Java, MATLAB, and NS2 with innovative ideas. Final year students of computer Blockchain, computer science, information science, electronics, and communication can contact our corporate office located at Jayanagar, Bangalore for Blockchain project details.

IEEE Blockchain projects Bangalore

IEEE Blockchain projects Bangalore

Blockchain, originally block chain, is a growing list of records, called blocks, which are linked using cryptography. Blockchain which are readable by the public are widely used by crypto currencies. Private Blockchain has been proposed for business use. Some marketing of Blockchain has been called “snake oil.”

Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data (generally represented as a merkle tree root hash). By design, a Blockchain is resistant to modification of the data. It is “an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way”. For use as a distributed ledger, a Blockchain is typically managed by a peer-to-peer network collectively adhering to a protocol for inter-node communication and validating new blocks. Once recorded, the data in any given block cannot be altered retroactively without alteration of all subsequent blocks, which requires consensus of the network majority. Though Blockchain records are not unalterable, Blockchain may be considered secure by design and exemplify a distributed computing system with high Byzantine fault tolerance. Decentralized consensus has therefore been claimed with a Blockchain.IEEE Blockchain projects Bangalore

Blockchain was invented by Satoshi Nakamoto in 2008 to serve as the public transaction ledger of the crypto currency Bitcoins. The invention of the Blockchain for Bitcoins made it the first digital currency to solve the double-spending problem without the need of a trusted authority or central server. The Bitcoins design has inspired other applications.IEEE Blockchain projects Bangalore


A Blockchain is a decentralized, distributed and public digital ledger that is used to record transactions across many computers so that the record cannot be altered retroactively without the alteration of all subsequent blocks and the consensus of the network. This allows the participants to verify and audit transactions inexpensively. A Blockchain database is managed autonomously using a peer-to-peer network and a distributed time stamping server. They are authenticated by mass collaboration powered by collective self-interests. The result is a robust workflow where participants’ uncertainty regarding data security is marginal. The use of a Blockchain removes the characteristic of infinite reproducibility from a digital asset. It confirms that each unit of value was transferred only once, solving the long-standing problem of double spending. Blockchain have been described as a value-exchange protocol. This Blockchain-based exchange of value can be completed quicker, safer and cheaper than with traditional systems A Blockchain can assign title rights because, when properly set up to detail the exchange agreement, it provides a record that compels offer and acceptance.IEEE Blockchain projects Bangalore

IEEE Blockchain projects Bangalore

Types of Blockchain:

Currently, there are three types of Blockchain networks – public Blockchain, private Blockchain and consortium Blockchain.

Public Blockchain – A public Blockchain has absolutely no access restrictions. Anyone with an internet connection can send transactions (disambiguation needed) to it as well as become a validator (i.e., participate in the execution of a consensus protocol).  Usually, such networks offer economic incentives for those who secure them and utilize some type of a Proof of Stake or Proof of Work algorithm. Some of the largest, most known public Blockchain are Bitcoins and Ethereum. IEEE Blockchain projects Bangalore

Private Blockchain –A private Blockchain is permissioned. One cannot join it unless invited by the network administrators. Participant and validator access is restricted. This type of Blockchain can be considered a middle-ground for companies that are interested in the Blockchain technology in general but are not comfortable with a level of control offered by public networks. Typically, they seek to incorporate Blockchain into their accounting and record-keeping procedures without sacrificing autonomy and running the risk of exposing sensitive data to the public internet.IEEE Blockchain projects Bangalore

Consortium Blockchains A consortium Blockchain is often said to be semi-decentralized. It, too, is permissioned but instead of a single organization controlling it, a number of companies might each operate a node on such a network. The administrators of a consortium chain restrict users’ reading rights as they see fit and only allow a limited set of trusted nodes to execute a consensus protocol.IEEE Blockchain projects Bangalore