Repository logo
Communities & Collections
All of DSpace
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Chandra Sekaran, K."

Filter results by typing the first few letters
Now showing 1 - 14 of 14
  • Results Per Page
  • Sort Options
  • No Thumbnail Available
    Item
    A framework to monitor cloud infrastructure in service oriented approach
    (2013) Veigas, J.P.; Chandra Sekaran, K.
    Cloud computing processes and stores the organization's sensitive data in the third party infrastructure. Monitoring these activities within the cloud environment is a major task for the security analysts and the cloud consumer. The cloud service providers may voluntarily suppress the security threats detected in their Infrastructure from the consumers. The goal is to decouple Intrusion Detection System (IDS) related logic from individual application business logic and adhere to the Service Oriented Architecture Standards. This paper provides a framework for Intrusion Detection and reporting service to the cloud consumers based on the type of applications and their necessary security needs. Cloud consumers can choose the desired signatures from this framework to protect their applications. The proposed technique is deployed in existing open source cloud environment with minimum changes. A proof-of-concept prototype has been implemented based on Eucalyptus open source packages to show the feasibility of this approach. Our results show that this framework provides effective way to monitor the cloud infrastructure in service oriented approach. © 2013 IEEE.
  • No Thumbnail Available
    Item
    A Generic Agent Based Cloud Computing Architecture for E-Learning
    (Springer Verlag service@springer.de, 2014) Babu, S.R.; Kulkarni, K.G.; Chandra Sekaran, K.
    E-learning can be referred to as "education through electronic media". It is one of the most emerging concepts in the field of technology. E-learning systems can be either synchronous or asynchronous. Agent based e-learning is helpful in managing the information overload, it can serve as academic expert and manages creation of programming environment for learners. There are many characteristics that an E-learning environment has to support; they are Interaction, Data Security, User Personalization, Adaptability, Intelligence, Interoperability, Accessibility and User Authentication. E-learning must also support a few other features like cost effectiveness, reusability, storage capacity, powerful computing and virtualization which can be provided by Cloud computing. Cloud computing is everywhere these days, pick any blogs, journals, papers. The Cloud computing Architecture is built using three models, Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS), which provides a variety of services. This proposed architecture integrates the features of Agents and Cloud Computing to produce an Agent based Cloud Computing Architecture to enhance e-learning.
  • No Thumbnail Available
    Item
    Agent-based approach for distributed access control in cloud environments
    (IEEE Computer Society, 2013) Thomas, M.V.; Chandra Sekaran, K.
    Recently, considerable attention has been given to the emerging cloud computing paradigm in the distributed computing environments where, users access various services and shared resources hosted by the service providers, for the successful and efficient completion of their tasks. In this context, in order to prevent the unauthorized access of the distributed system components, authentication and authorization functions are to be enforced effectively. Hence, the proper access control of distributed shared resources assumes high significance, as far as the secure computing paradigm is concerned. In this paper, we make an analysis of the distributed access control issue considering the various mechanisms proposed by the researchers in this area, discussing their merits and demerits. The issues and concerns in different contexts of distributed computing environments are highlighted. We propose an agent-based approach for the distributed access control in cloud environments for mediating the access requests of cloud consumers, considering the present day requirements of the cloud computing paradigm. We also give the workflow model for the proposed agent-based approach for the distributed access control in cloud. A few open issues in the area of distributed access control are also discussed. © 2013 IEEE.
  • No Thumbnail Available
    Item
    An access control model for cloud computing environments
    (IEEE Computer Society help@computer.org, 2013) Thomas, M.V.; Chandra Sekaran, K.
    Cloud Computing is a distributed computing paradigm which allows the users to access the services and shared resources hosted by the various service providers, to meet their services or resources requirements. In order to prevent the unauthorized or illegal access of the cloud resources, authentication of the requesting users and the authorization of their access privileges are extremely important. The access control of distributed resources is most important in securing the cloud scenario. In this paper, we analyze the various access control mechanisms adopted in the distributed computing domain, considering their pros and cons. We propose an architecture for the Distributed Access Control (DAC) in the Cloud Computing paradigm, taking into account the access control requirements of the cloud service providers and consumers. We also give the workflow model for the proposed access control architecture. A few open issues in the area of DAC are also discussed in this paper. © 2013 IEEE.
  • No Thumbnail Available
    Item
    An agent based peer-to-peer network with thesaurus based searching, and load balancing
    (2005) Thampi, S.M.; Chandra Sekaran, K.
    This paper describes a search mechanism for files in an unstructured peer-to-peer network. Most of the existing P2P architectures cannot autonomously locate services on the P2P network. Peers can hardly work and cooperate as a team. Using well-designed agents can improve the efficiency of the operations and data communication in the P2P applications. In the proposed system, agents are residing on peers and almost take care of every thing. They receive a problem from the user or other agents, send each job to the responsible agents and merge the sub-solution gathered from them to present a final solution. The communication among nodes takes place through mobile agents. The key features include content matching, parallel downloads, agent based load balancing and thesaurus based searching. © 2005 IEEE.
  • No Thumbnail Available
    Item
    An approach for dynamic scaling of resources in enterprise cloud
    (IEEE Computer Society, 2013) Kanagala, K.; Chandra Sekaran, K.
    Elasticity is one of the key governing properties of cloud computing that has major effects on cost and performance directly. Most of the popular Infrastructure as a Service (IaaS) providers such as Amazon Web Services (AWS), Windows Azure, Rack space etc. work on threshold-based auto-scaling. In current IaaS environments there are various other factors like "Virtual Machine (VM)-turnaround time", "VM-stabilization time" etc. that affect the newly started VM from start time to request servicing time. If these factors are not considered while auto-scaling, then they will have direct effect on Service Level Agreement (SLA) implementations and users' response time. Therefore, these thresholds should be a function of load trend, which makes VM readily available when needed. Hence, we developed an approach where the thresholds adapt in advance and these thresholds are functions of all the above mentioned factors. Our experimental results show that our approach gives the better response time. © 2013 IEEE.
  • No Thumbnail Available
    Item
    An intelligent framework for CAD of complex systems
    (2008) Chandra Sekaran, K.
    The fast growing complexity of today's control systems necessitates new design methods and tools to face the problems of design, analysis, integration and validation of complex systems. Conventional Computer Aided Design (CAD) approaches do not address the requirements of today's complexity in systems development. This paper describes the specification, design and implementation framework that uses Object Oriented Analysis and Design (OOAD) with Unified Modeling Language (UML) as the formalism with multi-agent based intelligence for the complex system development. Example of a control system has been demonstrated using this approach in this paper. © 2007 IEEE.
  • No Thumbnail Available
    Item
    Autonomic SLA Management in Cloud Computing Services
    (Springer Verlag service@springer.de, 2014) Anithakumari, S.; Chandra Sekaran, K.
    Cloud computing has developed into a more acceptable computing paradigm for implementing scalable infrastructure resources given on-demand in a pay-by-use basis. Self-adaptable cloud resources are needed to meet users application needs defined by Service Level Agreements (SLAs) and to limit the amount of human interactions with the processing environment. Sufficient SLA monitoring techniques and timely discovery of possible SLA violations are of principal importance for both cloud providers and cloud customers. The identification of possible violations of SLA is done by analyzing predefined service level objectives together by using knowledgebases for managing and preventing such violations. In this paper we propose a new architecture for the detection of SLA violation and also for the re-negotiation of established SLAs in the case of multiple SLA violations. This re-negotiation of SLAs will really help to limit the over provisioning of resources and thus leads to the optimum usage of resources. As a consolidation the proposed architecture may yield maximized Business Level Objectives (BLOs) to the cloud providers. © Springer-Verlag Berlin Heidelberg 2014.
  • No Thumbnail Available
    Item
    Determination of sequences responsible for generation of a sequence
    (IEEE Computer Society, 2008) Navada, K.C.; Chandra Sekaran, K.; Geetha, M.
    For the construction of a phylogenetic network, it is essential to know if the new sequence that is being inserted is the result of mutations or due to events like recombinations. Recombination is a process of formation of new genetic sequences by piecing together segments of previously existing sequences [1][2], Once it is determined that it is a recombination process, it is then necessary to determine the number of recombinations required for the generation of this sequence[4], This is because, in certain cases more than one recombination event are necessary. Here we propose an algorithm which determines the sequences already existing in the network that are likely to be responsible for the creation of the given sequence. © 2007 IEEE.
  • No Thumbnail Available
    Item
    Network anomaly detection using artificial neural networks optimised with PSO-DE hybrid
    (Springer Verlag service@springer.de, 2019) Rithesh, K.; Gautham, A.V.; Chandra Sekaran, K.
    Anomaly Detection is an important field of research in the present age of ubiquitous computing. Increased importance in Network Monitoring and Security due to the growing Internet is the driving force for coming up with new techniques for detecting anomalies in network behaviour. In this paper, Artificial Neural Network (ANN) model optimised with a hybrid of Particle Swarm Optimiser (PSO) and Differential Evolution (DE) is proposed to monitor the behaviour of the network and detect any anomaly in it. We have considered two subsets of 2000 and 10000 dataset size of the NSL KDD dataset for training and testing our model and the results from this model is compared with the traditional ANN-PSO algorithm, and one of the existing variants of PSO-DE algorithm. The performance measures used for the analysis of results are the training time, precision, recall and f1-score. © Springer Nature Singapore Pte Ltd. 2019.
  • No Thumbnail Available
    Item
    Proactive model for mitigating Internet denial-of-service attacks
    (2007) Nagesh, H.R.; Chandra Sekaran, K.; Kordcal, A.R.
    Denial-of-Service is one of the most frequent, costly and rapidly growing attacks on the Internet. In a denial of service attack, a malicious user exploits the connectivity of the Internet to cripple the services offered by a victim site, often simply by flooding a victim with many requests. In this paper we have compared the three main architectures already proposed for mitigating the DoS attacks. The comparison is with respect to incremental deployment, traffic analysis, and the attacks on the infrastructure itself. Finally, we combine the strengths of the different proposals to propose a new model for denial of service. Our model uses the concept of active networks to mitigate DoS attacks. © 2007 IEEE.
  • No Thumbnail Available
    Item
    Software development for cloud: An experiential study
    (IEEE Computer Society help@computer.org, 2013) Marimuthu, C.; Chandra Sekaran, K.
    Most of the enterprises are using web application for communicating with their customers, partners, shareholders and others. Additionally the web applications are used to carry out commercial activities and business transactions. As web applications are extensively used, its operating environment plays an important role which determines its efficiency. Nowadays cloud has proved to be one of the best operating environments for deploying web applications because of its features like automatic load balancing, scalability, maintenance and cost. As the demand is increasing for cloud computing, many organizations are looking for cloud based software to reduce their deployment cost and server maintenance overhead. The existing web application like individual/corporate websites, CRM/ERP applications, E-Publishing, E-Government, E-Commerce and E-Learning are slowly migrating to cloud. On the other hand managing the content of such web applications is a tedious task. The Content Management Systems (CMS) has already proved to be a good choice for developing web applications which ensures rapid application development and ease of use. CMS allows even a non-technical user to create, edit, manage and publish the content easily. When CMS is coupled with cloud the resultant application is highly efficient and easily manageable. In this paper we have proposed a new technique to develop cloud based software using content management systems. © 2014 IEEE.
  • No Thumbnail Available
    Item
    Trust models in cloud: A survey on pros and cons
    (Springer Verlag service@springer.de, 2015) Divakarla, U.; Chandra Sekaran, K.
    Cloud is the recent emerging technology in all aspects. The basic concern with the usage of this cloud technology is security. Security poses a major drawback with data storage, resource utilization, virtualization, etc. In the highly competitive environment the assurances are insufficient for the customers to identify the trust worthy cloud service providers. In a nut shell all the entities in cloud and cloud computing environment should be trusted by each other and the entities that have communication should be trusted by each other. This paper throws light on different Trust Models developed and their drawback with respect to resource security. A strong Trust Model is recommended to enhance the security of the resources in Cloud. © Springer International Publishing Switzerland 2015.
  • No Thumbnail Available
    Item
    Workflow model for distributed access control
    (2013) Thomas, M.V.; Chandra Sekaran, K.
    In the distributed computing environments like cloud computing or service computing, users access various services and shared resources hosted by the service providers, to achieve their tasks done efficiently. Authentication and authorization are the two important functions to be performed in this context, to make sure that unauthorized users do not access the distributed system components. In this paper, we analyse the various distributed access control approaches already adopted in this area, considering the advantages and the disadvantages. We propose a distributed access control architecture for the cloud computing paradigm considering the present day requirements of the service consumers and service providers. We also give the workflow model for the proposed distributed access control system in the cloud. A few open issues in the area of distributed access control are also discussed. © 2013 IEEE.

Maintained by Central Library NITK | DSpace software copyright © 2002-2026 LYRASIS

  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify