Faculty Publications
Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736
Publications by NITK Faculty
Browse
155 results
Search Results
Item Load Balancing of MongoDB with Tag Aware Sharding(De Gruyter, 2016) Shegokar, P.; Thomas, M.V.; Chandrasekaran, K.In the era of Big Data, traditional databases face many problems to process data effectively. To solve problems we have NoSQL databases which can solve the problems and are becoming very popular. MongoDB is a document oriented NoSQL database which can process large data sets with the help of sharding mechanism. MongoDB supports range-based sharding, hash-based sharding and tag aware sharding. Problem with range-based method is that one of the shard will have more load. In case of hash-based method, we can distribute the load among shards but related data aren’t together. Tag aware sharding method is better than the other two methods. But this method need to be enhanced as tagged data can belong to more shards and balancer have to migrate the data to most appropriate shard, hence we are enhancing the tag aware sharding in MongoDB. Improper distribution of data can’t allow us to use all the benefits of sharding. Tag aware sharding is administrator based method in which tags are mentioned by the administrator. According to tags, data is migrated but we need to balance the load. To solve this problem, Weighted Round Robin (WRR) load balancing algorithm is used and it has improved the writing and querying performance. © 2016 Walter de Gruyter GmbH, Berlin/Boston.Item Secure Data Management - Secret Sharing Principles Applied To Data Or Password Protection(De Gruyter, 2016) Upadhya, A.H.K.; Avinash.K; Chandrasekaran, K.This paper deals with the introduction of an information security mechanism to deal with the increasing threats of password hijack attacks. The proposed work deals with application of secret sharing principles for the protection of critical credentials of the stakeholders such as login Id and password. It is based on the fact that individual segments of passwords or credentials are ineffective without the existence of the remaining segments. We try to establish this fact to our advantage by proposing an implementation where password segments are distributed across several databases to strengthen their security and integrity and thereby, eliminate the threat of credential hijacking or phishing. The distributed nature of the divided segments of data can ensure lower probability of a successful attack. To summarize, an alternative encryption mechanism based on secret sharing is proposed which could be computationally efficient and which could provide equivalent or greater security in comparison with the standard cryptographic algorithms. © 2016 Walter de Gruyter GmbH, Berlin/Boston.Item Developing Software for Cloud: Opportunities and Challenges for Developers(wiley, 2016) Chandrasekaran, K.; Marimuthu, C.Software as a service (SaaS) is emerging as a widely used software delivery model, which is receiving a lot of attention across industry and academia. It is not only a software delivery model; it is also a business model that allows the SaaS provider to make money and SaaS consumer to save money. It gives rise to a lot of challenges and research opportunities in SaaS development, which will be discussed in this chapter. The chapter begins with basic understanding of cloud computing and SaaS followed by a discussion of the challenges and research opportunities to address them when developing SaaS. Then it covers the popular SaaS development platforms available for public cloud and private cloud followed by multitenancy at database level to secure the user data on cloud platforms. Finally, this chapter presents the best practices to transform traditional Web applications to cloud-based multitenant SaaS applications. © 2016 John Wiley & Sons, Ltd.Item Identity and access management in the cloud computing environments(IGI Global, 2016) Thomas, M.V.; Chandrasekaran, K.Nowadays, the issue of identity and access management (IAM) has become an important research topic in cloud computing. In the distributed computing environments like cloud computing, effective authentication and authorization are essential to make sure that unauthorized users do not access the resources, thereby ensuring the confidentiality, integrity, and availability of information hosted in the cloud environment. In this chapter, the authors discuss the issue of identity and access management in cloud computing, analyzing the work carried out by others in the area. Also, various issues in the current IAM scenario in cloud computing, such as authentication, authorization, access control models, identity life cycle management, cloud identity-as-a-service, federated identity management and also, the identity and access management in the inter-cloud environment are discussed. The authors conclude this chapter discussing a few research issues in the area of identity and access management in the cloud and inter-cloud environments. © 2017 by IGI Global. All rights reserved.Item Energy Efficient Network Design for IoT Healthcare Applications(Springer Science and Business Media Deutschland GmbH, 2017) Sarwesh, P.; Shet, V.; Chandrasekaran, K.Internet of Things (IoT) is the emerging technology, that holds huge number of internet enabled devices and allows to share the data globally. IoT technology provides effective healthcare service by constant monitoring and reporting the chronic conditions of patients. IoT is highly greeted by healthcare sectors. IoT devices are smart in nature but constrained by energy, because most of the IoT applications uses battery operated smart devices. Hence energy is considered as valuable resource in energy constrained IoT environment. In this chapter energy efficient network architecture is proposed for IoT health care applications. Proposed network architecture describes the suitable combination of two different techniques such as, routing technique and node placement technique. In routing technique energy level of the nodes are monitored, to transmit the data in energy efficient path. In node placement technique, data traffic is balanced by varying the density of the nodes. This chapter describes the major factors that affect energy efficiency and it elaborates the suitable techniques to improve energy efficiency in IoT network. © 2017, Springer International Publishing AG.Item Cloud Services and Service Providers(wiley, 2016) Chandrasekaran, K.; Ananth, A.Cloud computing provisions resources to consumers in the form of different services like software, infrastructure, platform, and more. Many companies have come forward to offer cloud services. This chapter provides an overview of cloud services offered by various major providers such as Amazon, Microsoft, Google, EMC, Salesforce.com and IBM. They provide various tools and services in order to give cloud support for their customers. Each section briefly describes cloud services offered by a provider and their features, and identifies tools and technologies adopted by the company in order to provide services to the users. This chapter helps readers to distinguish among different services provided by various companies and make appropriate choices to suit their requirements. © 2016 John Wiley & Sons, Ltd.Item Distributed Access Control in Cloud Computing Systems(wiley, 2016) Chandrasekaran, K.; Thomas, M.V.With the tremendous increase in the number of distributed applications, the issue of distributed access control has become an important research topic for both academia and industry. In distributed computing environments like cloud computing or service computing, authentication and authorization are the two important functions to be performed, to make sure that unauthorized users do not access distributed system components. An effective access control mechanism is an essential security component as far as protecting the confidentiality, integrity, and availability (CIA) of information hosted in the cloud is concerned. An effective access control mechanism implemented in the cloud domain should be scalable, reliable, and robust and it should provide required features and procedures for identity provisioning, deprovisioning, authentication, authorization, accounting, and auditing. In this chapter, we discuss the issue of distributed access control, major features and functionalities, access control policies and models, distributed access control architecture for multicloud environments, trust, and identity management in cloud computing environments. Related work shows some of the major research activities in the area of distributed access control considering the advantages and disadvantages of the approaches that have been adopted. We conclude this chapter by discussing a few research issues in the area of distributed access control in the cloud environment. © 2016 John Wiley & Sons, Ltd.Item Sustainable software development with a shared repository(Springer Verlag service@springer.de, 2018) Debbarma, T.; Chandrasekaran, K.Cloud-based computing services trend has significantly increased the building of new cloud data centres in the recent times. These data centres consume a large amount of electrical energy to run the Information Communication Technology (ICT) devices and for its cooling, as a result of that emission of $$CO:2$$ and Greenhouse Gas (GHG) has increased largely. This paper proposes a Sustainable Software Development Life Cycle (SDLC) Model. This model would contribute towards making the cloud computing systems more energy efficient and the ICT a green and sustainable development ecosystem. The Green Cloud Computing will be considered as an implementation platform for the proposed Sustainable SDLC. It is proposed that reusable, modular and cloud-shared development approach be used to make the software development and the software more energy efficient. The SDLC will use a cloud repository which will be accessible as per software development organizations cloud deployment model. © Springer Nature Singapore Pte Ltd. 2018Item Virtual machine migration—a perspective study(Springer Verlag service@springer.de, 2018) Joseph, C.; Martin, J.P.; Chandrasekaran, K.; Kandasamy, A.The technology of Cloud computing has been ruling the IT world for the past few decades. One of the most notable tools that helped in prolonging the reign of Cloud computing is virtualization. While virtualization continues to be a boon for the Cloud technology, it is not short of its own pitfalls. One such pitfall results from the migration of virtual machines. Though migration incurs an overhead on the system, an efficient system cannot neglect migrating the virtual machines. This work attempts to carry out a perspective study on virtual machine migration. The various migration techniques proposed in the literature have been classified based on the aspects of migration that they consider. A survey of the various metrics that characterize the performance of a migration technique is also done. © 2018, Springer Nature Singapore Pte Ltd.Item Reliable cross layer design for e-health applications—iot perspective(Springer Science and Business Media Deutschland GmbH, 2018) Sarwesh, P.; Shet, N.S.V.; Chandrasekaran, K.Of late, there has been many applications are developed by the aid of IoT technology, such as smart city, e-health, smart home, industrial automation etc. In that, e-health is one of the efficient idea that is decidedly developed for healthcare sectors. IoT devices used in e-health applications are run by battery powered smart objects and low frequency links, which says energy constrained and unreliable nature of IoT network. Thus, providing potent healthcare service (regularly following and reporting the patients’ health information) in energy constrained network environment (battery power smart objects and low frequency links) is the prime need in resource constrained networks environment. In this chapter, reliable cross layer design is introduced to prolong the lifetime of IoT devices and reliable data transfer in IoT e-health applications. In proposed cross layer model, network layer and data link layer (MAC layer) are integrated. Reliability related parameter are included in route discover process and later MAC based power control technique make use of routing information, to obtain the suitable transmission power. Our results show that proposed cross layer design is reliable and energy efficient and it is more suitable for IoT e-health applications. © Springer International Publishing AG 2018.
