Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
13 results
Search Results
Item An agent based peer-to-peer network with thesaurus based searching, and load balancing(2005) Thampi, S.M.; Chandra Sekaran, K.This paper describes a search mechanism for files in an unstructured peer-to-peer network. Most of the existing P2P architectures cannot autonomously locate services on the P2P network. Peers can hardly work and cooperate as a team. Using well-designed agents can improve the efficiency of the operations and data communication in the P2P applications. In the proposed system, agents are residing on peers and almost take care of every thing. They receive a problem from the user or other agents, send each job to the responsible agents and merge the sub-solution gathered from them to present a final solution. The communication among nodes takes place through mobile agents. The key features include content matching, parallel downloads, agent based load balancing and thesaurus based searching. © 2005 IEEE.Item Proactive model for mitigating Internet denial-of-service attacks(2007) Nagesh, H.R.; Chandra Sekaran, K.; Kordcal, A.R.Denial-of-Service is one of the most frequent, costly and rapidly growing attacks on the Internet. In a denial of service attack, a malicious user exploits the connectivity of the Internet to cripple the services offered by a victim site, often simply by flooding a victim with many requests. In this paper we have compared the three main architectures already proposed for mitigating the DoS attacks. The comparison is with respect to incremental deployment, traffic analysis, and the attacks on the infrastructure itself. Finally, we combine the strengths of the different proposals to propose a new model for denial of service. Our model uses the concept of active networks to mitigate DoS attacks. © 2007 IEEE.Item Determination of sequences responsible for generation of a sequence(IEEE Computer Society, 2008) Navada, K.C.; Chandra Sekaran, K.; Geetha, M.For the construction of a phylogenetic network, it is essential to know if the new sequence that is being inserted is the result of mutations or due to events like recombinations. Recombination is a process of formation of new genetic sequences by piecing together segments of previously existing sequences [1][2], Once it is determined that it is a recombination process, it is then necessary to determine the number of recombinations required for the generation of this sequence[4], This is because, in certain cases more than one recombination event are necessary. Here we propose an algorithm which determines the sequences already existing in the network that are likely to be responsible for the creation of the given sequence. © 2007 IEEE.Item An intelligent framework for CAD of complex systems(2008) Chandra Sekaran, K.The fast growing complexity of today's control systems necessitates new design methods and tools to face the problems of design, analysis, integration and validation of complex systems. Conventional Computer Aided Design (CAD) approaches do not address the requirements of today's complexity in systems development. This paper describes the specification, design and implementation framework that uses Object Oriented Analysis and Design (OOAD) with Unified Modeling Language (UML) as the formalism with multi-agent based intelligence for the complex system development. Example of a control system has been demonstrated using this approach in this paper. © 2007 IEEE.Item Agent-based approach for distributed access control in cloud environments(IEEE Computer Society, 2013) Thomas, M.V.; Chandra Sekaran, K.Recently, considerable attention has been given to the emerging cloud computing paradigm in the distributed computing environments where, users access various services and shared resources hosted by the service providers, for the successful and efficient completion of their tasks. In this context, in order to prevent the unauthorized access of the distributed system components, authentication and authorization functions are to be enforced effectively. Hence, the proper access control of distributed shared resources assumes high significance, as far as the secure computing paradigm is concerned. In this paper, we make an analysis of the distributed access control issue considering the various mechanisms proposed by the researchers in this area, discussing their merits and demerits. The issues and concerns in different contexts of distributed computing environments are highlighted. We propose an agent-based approach for the distributed access control in cloud environments for mediating the access requests of cloud consumers, considering the present day requirements of the cloud computing paradigm. We also give the workflow model for the proposed agent-based approach for the distributed access control in cloud. A few open issues in the area of distributed access control are also discussed. © 2013 IEEE.Item An access control model for cloud computing environments(IEEE Computer Society help@computer.org, 2013) Thomas, M.V.; Chandra Sekaran, K.Cloud Computing is a distributed computing paradigm which allows the users to access the services and shared resources hosted by the various service providers, to meet their services or resources requirements. In order to prevent the unauthorized or illegal access of the cloud resources, authentication of the requesting users and the authorization of their access privileges are extremely important. The access control of distributed resources is most important in securing the cloud scenario. In this paper, we analyze the various access control mechanisms adopted in the distributed computing domain, considering their pros and cons. We propose an architecture for the Distributed Access Control (DAC) in the Cloud Computing paradigm, taking into account the access control requirements of the cloud service providers and consumers. We also give the workflow model for the proposed access control architecture. A few open issues in the area of DAC are also discussed in this paper. © 2013 IEEE.Item An approach for dynamic scaling of resources in enterprise cloud(IEEE Computer Society, 2013) Kanagala, K.; Chandra Sekaran, K.Elasticity is one of the key governing properties of cloud computing that has major effects on cost and performance directly. Most of the popular Infrastructure as a Service (IaaS) providers such as Amazon Web Services (AWS), Windows Azure, Rack space etc. work on threshold-based auto-scaling. In current IaaS environments there are various other factors like "Virtual Machine (VM)-turnaround time", "VM-stabilization time" etc. that affect the newly started VM from start time to request servicing time. If these factors are not considered while auto-scaling, then they will have direct effect on Service Level Agreement (SLA) implementations and users' response time. Therefore, these thresholds should be a function of load trend, which makes VM readily available when needed. Hence, we developed an approach where the thresholds adapt in advance and these thresholds are functions of all the above mentioned factors. Our experimental results show that our approach gives the better response time. © 2013 IEEE.Item Software development for cloud: An experiential study(IEEE Computer Society help@computer.org, 2013) Marimuthu, C.; Chandra Sekaran, K.Most of the enterprises are using web application for communicating with their customers, partners, shareholders and others. Additionally the web applications are used to carry out commercial activities and business transactions. As web applications are extensively used, its operating environment plays an important role which determines its efficiency. Nowadays cloud has proved to be one of the best operating environments for deploying web applications because of its features like automatic load balancing, scalability, maintenance and cost. As the demand is increasing for cloud computing, many organizations are looking for cloud based software to reduce their deployment cost and server maintenance overhead. The existing web application like individual/corporate websites, CRM/ERP applications, E-Publishing, E-Government, E-Commerce and E-Learning are slowly migrating to cloud. On the other hand managing the content of such web applications is a tedious task. The Content Management Systems (CMS) has already proved to be a good choice for developing web applications which ensures rapid application development and ease of use. CMS allows even a non-technical user to create, edit, manage and publish the content easily. When CMS is coupled with cloud the resultant application is highly efficient and easily manageable. In this paper we have proposed a new technique to develop cloud based software using content management systems. © 2014 IEEE.Item A framework to monitor cloud infrastructure in service oriented approach(2013) Veigas, J.P.; Chandra Sekaran, K.Cloud computing processes and stores the organization's sensitive data in the third party infrastructure. Monitoring these activities within the cloud environment is a major task for the security analysts and the cloud consumer. The cloud service providers may voluntarily suppress the security threats detected in their Infrastructure from the consumers. The goal is to decouple Intrusion Detection System (IDS) related logic from individual application business logic and adhere to the Service Oriented Architecture Standards. This paper provides a framework for Intrusion Detection and reporting service to the cloud consumers based on the type of applications and their necessary security needs. Cloud consumers can choose the desired signatures from this framework to protect their applications. The proposed technique is deployed in existing open source cloud environment with minimum changes. A proof-of-concept prototype has been implemented based on Eucalyptus open source packages to show the feasibility of this approach. Our results show that this framework provides effective way to monitor the cloud infrastructure in service oriented approach. © 2013 IEEE.Item Workflow model for distributed access control(2013) Thomas, M.V.; Chandra Sekaran, K.In the distributed computing environments like cloud computing or service computing, users access various services and shared resources hosted by the service providers, to achieve their tasks done efficiently. Authentication and authorization are the two important functions to be performed in this context, to make sure that unauthorized users do not access the distributed system components. In this paper, we analyse the various distributed access control approaches already adopted in this area, considering the advantages and the disadvantages. We propose a distributed access control architecture for the cloud computing paradigm considering the present day requirements of the service consumers and service providers. We also give the workflow model for the proposed distributed access control system in the cloud. A few open issues in the area of distributed access control are also discussed. © 2013 IEEE.
