Faculty Publications
Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736
Publications by NITK Faculty
Browse
2 results
Search Results
Item Dynamic resource allocation for multi-tier applications in cloud(Springer Verlag service@springer.de, 2016) Achar, R.; Santhi Thilagam, P.; Meghana; Niha Fathima Haris, B.; Bhat, H.; Ekta, K.Increasing demand for computing resources and widespread adaption of service-oriented architecture has made cloud as a new IT delivery mechanism. Number of cloud providers offer computing resources in the form of virtual machines to the cloud customers based on business requirements. Load experienced by the present business applications hosted in cloud are dynamic in nature. This creates a need for a mechanism which allocates resources dynamically to the applications in order to minimize performance degradations. This paper presents a mechanism which dynamically allocates the resources based on load of the application using vertical and horizontal scaling. Cloud environment is set up using Xen cloud platform and multi-tier web application is deployed on virtual machines. Experimental study conducted for various loads show that proposed mechanism ensures the response time is within the acceptable range. © Springer Science+Business Media Singapore 2016.Item Searchable encryption approaches: attacks and challenges(Springer London, 2019) Siva Kumar, D.V.N.; Santhi Thilagam, P.Searchable encryption (SE) is a cryptographic technique that allows the users to perform search over outsourced encrypted data in cloud servers while preserving the privacy of data and search query. In order to preserve privacy and security, data owners use various encryption schemes to encrypt their data and indexes. Due to the vulnerabilities in the encryption schemes adopted by SE schemes, information leakages are possible from the encrypted data. The cloud servers use various information disclosure attacks that exploit these leakages to infer plaintext information. In this paper, we analyze the existing SE approaches with respect to their security and precision goals and possible attacks on them. We also identify the root causes of these attacks and their remedies. An experimental study is also performed to investigate the susceptibility of SE schemes against attacks and countermeasures to prevent them. © 2018, Springer-Verlag London Ltd., part of Springer Nature.
