Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
5 results
Search Results
Item A Privacy Preserved Data Mining Approach Based on k-Partite Graph Theory(Elsevier, 2015) Bhat, T.P.; Karthik, C.; Chandrasekaran, K.Traditional approaches to data mining may perform well on extraction of information necessary to build a classification rule useful for further categorisation in supervised classification learning problems. However most of the approaches require fail to hide the identity of the subject to whom the data pertains to, and this can cause a big privacy breach. This document addresses this issue by the use of a graph theoretical approach based on k-partitioning of graphs, which paves way to creation of a complex decision tree classifier, organised in a prioritised hierarchy. Experimental results and analytical treatment to justify the correctness of the approach are also included. © 2015 The Authors.Item Construing microservice architectures: State-of-the-art algorithms and research issues(Springer Verlag service@springer.de, 2019) Nene, A.V.; Joseph, C.T.; Chandrasekaran, K.Cloud Computing is one of the leading paradigms in the IT industry. Earlier, cloud applications used to be built as single monolithic applications, and are now built using the Microservices Architectural Style. Along with several advantages, the microservices architecture also introduce challenges at the infrastructural level. Five such concerns are identified and analysed in this paper. The paper presents the state-of-art in different infrastructural concerns of microservices, namely, load balancing, scheduling, energy efficiency, security and resource management of microservices. The paper also suggests some future trends and research domains in the field of microservices. © Springer Nature Switzerland AG 2019.Item Location Privacy Using Data Obfuscation in Fog Computing(Institute of Electrical and Electronics Engineers Inc., 2019) Naik, C.; Sri Siddhartha, M.; Martin, J.P.; Chandrasekaran, K.In the past few decades, smartphones and Global Positioning System(GPS) devices have led to the popularity of Location Based Services. It is crucial for large MNCs to get a lot of data from people and provide their services accordingly. However, on the other side, the concern of privacy has also increased among the users, and they would like to hide their whereabouts. The rise of data consumption and the hunger for faster network speed has also led to the emergence of new concepts such as the Fog Computing. Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing towards the edge of the networks while removing the load on the server centers and decreasing the latency at the edge device. The fog computing will help in unlimited growth of location services and this adoption of fog computing calls for the need for more secure and robust algorithms for location privacy. One of the ways we can alter the information regarding the location of the user is Location Obfuscation. This can be done reversibly or irreversibly. In this paper, we address the problem of location privacy and present a solution based on the type of data that has to be preserved (in our case, it is distance). A mobile application has been designed and developed to test and validate the feasibility of the proposed obfuscation techniques for the Fog computing environments. © 2019 IEEE.Item DNS Cache Poisoning: Investigating Server and Client-Side Attacks and Mitigation Methods(Institute of Electrical and Electronics Engineers Inc., 2023) Chandrasekaran, K.; Divakarla, U.; Srinivasan, K.S.DNS cache poisoning is a type of cyber attack that aims to redirect traffic from legitimate websites to malicious ones. In this attack, the attacker modifies the DNS cache of a DNS server, allowing them to redirect requests for legitimate domain names to their own servers. This can result in distribution of malware and phishing attacks. To mitigate the risk of DNS cache poisoning, various techniques such as DNSSEC, source port randomization, and response rate limiting have been developed. This paper provides an overview of DNS cache poisoning, the techniques used to perform the attack, and the countermeasures that can be employed to protect against it. © 2023 IEEE.Item Secure Intelligence Development Lifecycle (SIDL) Model for Vulnerability Detection(Springer Science and Business Media Deutschland GmbH, 2025) Dhanush, V.; Chandra, T.S.; Divakarla, U.; Chandrasekaran, K.This paper presents the Secure Intelligence Development Life-Cycle, a Software Development Life-Cycle created to address the need for advanced security and intelligent technologies, such as artificial intelligence and machine learning, at the development level. It differs from standard software development models that usually involve security measures only in the later stages of development; this one integrates security measures right from the early stage of requirements gathering through design, development, and deployment. The embedding of security from the onset allows real-time vulnerability detection and response with adaptability to emerging threats. It has also improved threat detection, made better decisions, and enhanced system resilience with intelligent processes. It is most effective with sectors like healthcare, finance, and critical infrastructure for secure and complex software systems. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.
