2. Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/1/7
Browse
15 results
Search Results
Item Mobile single sign-on solution for enterprise cloud applications(2014) Spoorthi, V.; Sekaran, K.C.The cloud computing paradigm has been adopted extensively for offering reliable and scalable services over internet. As more and more users are using smartphones for accessing cloud applications, the security risks involving user identity is also increasing. Especially for Enterprise applications which involve critical data, authenticating each and every user is an imperative task. The inherent problem of resource constraints in mobile devices adds more challenges in implementing strong authentication at client end. This paper presents a mobile Single Sign-On (SSO) solution based on Public Key Infrastructure (PKI). It explains how authentication of mobile users can be done using Digital Certificates and how this solution can be used to enable single sign-on in cloud systems. The experimental result shows that the authentication latency for the mobile devices can be greatly reduced once registered with the application. Further, the analysis shows that the proposed system improves bandwidth efficiency and provides better security for SSO systems. � 2014 IEEE.Item Implementation of an adaptive buffering algorithm to improve QoS in VoIP(2005) Nagesh, H.R.; Sekaran, K.C.; Kordcal, A.R.The Internet has evolved into a worldwide communication infrastructure and it now provides various services including Voice over IP (VoIP) or Internet Telephony [7]. VoIP involves transmission of voice packets across the IP network known as IP telephony. Internet Protocol (IP) Telephony has many issues that have to be overcome before it can be considered a rival to the existing telephony infrastructure. One such issue is the Quality of service (QoS). The use of play-out buffering at the receiver helps to improve the quality of Voice over IP (VoIP). There exists a buffering algorithm, which uses a dynamic adaptive approach. In this algorithm the playout times of voice packets are calculated using adaptive estimation of the network delays. In contrast to previous solutions, weighting factor that controls the estimation process is dynamically adjusted according to the observed delay variations. This results in higher quality estimates of network delay. The contribution of this paper is to analyze, implement and incorporate one such adaptive buffering algorithm into the Session Initiation Protocol (SIP) through which one can achieve better delay/loss trade-off and thus better call quality.Item Game theoretic approaches for job scheduling in cloud computing: A survey(2015) Ananth, A.; Sekaran, K.C.Cloud computing is one of the promising technology in current day scenario. Job scheduling in cloud environment is an important issue where the main aim is to schedule the jobs appropriately in order to effectively utilize the resources and also meet the user's satisfaction. Cloud provider has to consider various aspects like number of cloud users requesting for a service at the same time, availability of resources at that time, Service Level Agreements (SLAs), Quality of Service (QoS) requirements, etc. There are various approaches for scheduling the jobs. In this paper we focus on game theory based approaches for job scheduling in cloud. Survey of existing approaches and various issues in game theory based job scheduling is the main objective of this paper. We study the existing approaches for job scheduling focusing game theoretic approaches and analyze the open issues for research in this area. � 2014 IEEE.Item Cloud workflow and security: A survey(2014) Anupa, J.; Sekaran, K.C.The cloud revolution has helped enterprises to improve their business and performance by providing them computing power, storage capabilities and a variety of services for very less or no infrastructure and reasonable cost. It also provisioned the scientific and academic communities to run complex applications involving large data sets, high performance or distributed resources. The Workflow Management Systems (WfMSs) help the enterprises in automation of their business processes and thus help the management to take critical decisions fast. Cloud Workflows club the advantages of both Cloud Computing and WfMSs. In spite of the advantages of the cloud, security is a major area of concern. The use of WfMSs for critical and strategic applications, which is common in case of Business and Scientific community, gives rise to major concerns regarding the threats against integrity, authorization, availability etc. The concept of running secure workflow instances on public cloud processing platforms is still in its infancy. This paper gives an overview of workflow management systems, cloud computing, cloud workflows and security in these areas. This paper also provides a survey on security mechanisms for WfMSs and Cloud Workflows. � 2014 IEEE.Item Distributed multi level security token based authentication for ubiquitous objects -DMSA(2006) Kulkarni, U.P.; Vadavi, J.V.; Joshi, S.M.; Sekaran, K.C.; Yardi, A.R.Ubiquitous computing technology provides an environment where users expect to access resources and services anytime and anywhere. The serious security risks and problems arise because resources can now be accessed by almost anyone with a mobile device in such an open model. This paper explores security in ubiquitous computing with focus on authentication. We propose a new model, which uses distributed hierarchical tree based approach for authenticating ubiquitous objects which overcomes the problems associated with centralized source of information. � 2006 IEEE.Item A Generic Agent Based Cloud Computing Architecture for E-Learning(2014) Babu, S.R.; Kulkarni, K.G.; Sekaran, K.C.E-learning can be referred to as "education through electronic media". It is one of the most emerging concepts in the field of technology. E-learning systems can be either synchronous or asynchronous. Agent based e-learning is helpful in managing the information overload, it can serve as academic expert and manages creation of programming environment for learners. There are many characteristics that an E-learning environment has to support; they are Interaction, Data Security, User Personalization, Adaptability, Intelligence, Interoperability, Accessibility and User Authentication. E-learning must also support a few other features like cost effectiveness, reusability, storage capacity, powerful computing and virtualization which can be provided by Cloud computing. Cloud computing is everywhere these days, pick any blogs, journals, papers. The Cloud computing Architecture is built using three models, Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS), which provides a variety of services. This proposed architecture integrates the features of Agents and Cloud Computing to produce an Agent based Cloud Computing Architecture to enhance e-learning.Item A framework to monitor cloud infrastructure in service oriented approach(2013) Veigas, J.P.; Sekaran, K.C.Cloud computing processes and stores the organization's sensitive data in the third party infrastructure. Monitoring these activities within the cloud environment is a major task for the security analysts and the cloud consumer. The cloud service providers may voluntarily suppress the security threats detected in their Infrastructure from the consumers. The goal is to decouple Intrusion Detection System (IDS) related logic from individual application business logic and adhere to the Service Oriented Architecture Standards. This paper provides a framework for Intrusion Detection and reporting service to the cloud consumers based on the type of applications and their necessary security needs. Cloud consumers can choose the desired signatures from this framework to protect their applications. The proposed technique is deployed in existing open source cloud environment with minimum changes. A proof-of-concept prototype has been implemented based on Eucalyptus open source packages to show the feasibility of this approach. Our results show that this framework provides effective way to monitor the cloud infrastructure in service oriented approach. � 2013 IEEE.Item An approach for dynamic scaling of resources in enterprise cloud(2013) Kanagala, K.; Sekaran, K.C.Elasticity is one of the key governing properties of cloud computing that has major effects on cost and performance directly. Most of the popular Infrastructure as a Service (IaaS) providers such as Amazon Web Services (AWS), Windows Azure, Rack space etc. work on threshold-based auto-scaling. In current IaaS environments there are various other factors like "Virtual Machine (VM)-turnaround time", "VM-stabilization time" etc. that affect the newly started VM from start time to request servicing time. If these factors are not considered while auto-scaling, then they will have direct effect on Service Level Agreement (SLA) implementations and users' response time. Therefore, these thresholds should be a function of load trend, which makes VM readily available when needed. Hence, we developed an approach where the thresholds adapt in advance and these thresholds are functions of all the above mentioned factors. Our experimental results show that our approach gives the better response time. � 2013 IEEE.Item An access control model for cloud computing environments(2013) Thomas, M.V.; Sekaran, K.C.Cloud Computing is a distributed computing paradigm which allows the users to access the services and shared resources hosted by the various service providers, to meet their services or resources requirements. In order to prevent the unauthorized or illegal access of the cloud resources, authentication of the requesting users and the authorization of their access privileges are extremely important. The access control of distributed resources is most important in securing the cloud scenario. In this paper, we analyze the various access control mechanisms adopted in the distributed computing domain, considering their pros and cons. We propose an architecture for the Distributed Access Control (DAC) in the Cloud Computing paradigm, taking into account the access control requirements of the cloud service providers and consumers. We also give the workflow model for the proposed access control architecture. A few open issues in the area of DAC are also discussed in this paper. � 2013 IEEE.Item Simulation environment for maximizing profits in an autonomic computing system using fuzzy control(2009) Venkatarama, H.S.; Sekaran, K.C.eCommerce is an area where an Autonomic Computing system could be very effectively deployed. The growth of eCommerce has created demand for services with financial incentives for service providers. Revenues accrue if the admitted requests are processed within the specified deadline and costs are incurred if the admitted requests are not processed within the deadline. The number of requests to be admitted depends oil system capacity and workload. This paper describes a simulation environment to implement an approach to automate the admission control decisions in an Apache web server for maximizing profits. A fuzzy controller that implements hill climbing logic is used. This is an illustration of the self-optimizing characteristic of an autonomic computing system. Copyright � 2009 by IICAI.