Faculty Publications
Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736
Publications by NITK Faculty
Browse
16 results
Search Results
Item A trust based approach for AODV protocol to mitigate black hole attack in MANET(2012) Thachil, F.; Shet, K.C.This paper presents a trust based collaborative approach to mitigate black hole nodes in AODV protocol for MANET. In this approach every node monitors neighbouring nodes and calculates trust value on its neighbouring nodes dynamically. If the trust value of a monitored node goes below a predefined threshold, then the monitoring node assume it as malicious and avoids that node from the route path. The experiments reveal that the proposed scheme secures the AODV routing protocol for MANET by mitigating and avoiding black hole nodes. © 2012 IEEE.Item An access control model for cloud computing environments(IEEE Computer Society help@computer.org, 2013) Thomas, M.V.; Chandra Sekaran, K.Cloud Computing is a distributed computing paradigm which allows the users to access the services and shared resources hosted by the various service providers, to meet their services or resources requirements. In order to prevent the unauthorized or illegal access of the cloud resources, authentication of the requesting users and the authorization of their access privileges are extremely important. The access control of distributed resources is most important in securing the cloud scenario. In this paper, we analyze the various access control mechanisms adopted in the distributed computing domain, considering their pros and cons. We propose an architecture for the Distributed Access Control (DAC) in the Cloud Computing paradigm, taking into account the access control requirements of the cloud service providers and consumers. We also give the workflow model for the proposed access control architecture. A few open issues in the area of DAC are also discussed in this paper. © 2013 IEEE.Item Performance comparison of executing fast transactions in bitcoin network using verifiable code execution(IEEE Computer Society help@computer.org, 2013) Singh, P.; Chandavarkar, B.R.; Arora, S.; Agrawal, N.In this paper, we study Bitcoin network for electronic cash transactions, and compare the extension to the BTCs network which inculcates provision of executing fast transactions with greater security and assurance with the former method of Proof-Of-Work for executing transactions. Above milestones are achieved by introducing the concepts of mutual trust and verifiable code execution between the payer and the payee in the network. Our work proposes a significant modification of the Pioneer model to provide a two-party trust framework for Bitcoin transactions; considerably faster compared to the generic trust platform of Bitcoin networks based on slow proof-of-work. The scheme proposed can promote the use of Bitcoin transactions in real life scenarios, where fast transactions are desirable due time constraints between the payment and the service. © 2013 IEEE.Item Workflow model for distributed access control(2013) Thomas, M.V.; Chandra Sekaran, K.In the distributed computing environments like cloud computing or service computing, users access various services and shared resources hosted by the service providers, to achieve their tasks done efficiently. Authentication and authorization are the two important functions to be performed in this context, to make sure that unauthorized users do not access the distributed system components. In this paper, we analyse the various distributed access control approaches already adopted in this area, considering the advantages and the disadvantages. We propose a distributed access control architecture for the cloud computing paradigm considering the present day requirements of the service consumers and service providers. We also give the workflow model for the proposed distributed access control system in the cloud. A few open issues in the area of distributed access control are also discussed. © 2013 IEEE.Item Trusted path between two entities in Cloud(Institute of Electrical and Electronics Engineers Inc., 2016) Divakarla, U.; Chandrasekaran, K.Trust plays an important role in the security of resources of the emerging technology called Cloud. To develop a strong trust there has to be a strong trust path between two entities. In cloud, trust plays a major role as the basic services between the user and service provider is due to the trust. Our paper proposes scheme to build a strong trust path between two important entities in cloud namely user and resources of the service provider. The performance analysis proves that the proposed model platform independent and also much stronger in case of migration and more efficient in terms of computation time. © 2016 IEEE.Item A novel approach for evaluating trust of resources in cloud environment(Institute of Electrical and Electronics Engineers Inc., 2017) Divakarla, U.; Chandrasekaran, K.Trust is a significant facet in decision making of any distributed network. Cloud computing is a new computing model that provides computing resources to consumers. Due to outsourcing. there is always an uncertainty about the reliability and quality of the services. Though service providers assure of quality and secure services, these assurances do not satisfy the trustworthiness of the service providers for the consumers. In this paper, we have proposed a model that develops a strong trust relationship between consumer and resources of the service provider in cloud environment. This trust relation strengthens the security of the resources as well as the authentication of the consumer. The implementation proved that trust model developed is more efficient in terms of compute time and process time. © 2016 IEEE.Item Trusted partner selection in broker based cloud federation(Institute of Electrical and Electronics Engineers Inc., 2017) Gupta, M.K.; Annappa, B.Cloud federation is a group of aggregated providers, who are mutually cooperating and collaborating to share their resources in order to improve each other services. It has lured the attention of commercial industries towards itself for its effective utilization of cloud resources. Effective management of the resource is very much required in order to increase the profits of an individual service provider in federation, but a lack of proper business model hinders service provider in deploying its feature. In this paper, cloud federation is created based on intelligent, trusted broker. It opens a possibility of borrowing the resources from foreign clouds and deliver quality of service as promised by them. Trust factor is used in the paper to classify the foreign clouds according to previous performances and its neighbouring recommendations. Foreign clouds can only take participation, if it is approved by the broker. Furthermore, broker enforces foreign clouds to participate in the federation and behave reliably. © 2016 IEEE.Item Agent-based approach for the management of dynamic QoS violations in the inter-cloud environments(Springer Verlag service@springer.de, 2018) Thomas, M.V.; Chandrasekaran, K.; Mugeraya, G.Nowadays, considerable attention has been given by the researchers in the field of Cloud Computing to the emerging Inter-Cloud computing paradigm, where different cloud service providers collaborate or federate to achieve better QoS and cost efficiency. In this context, in order to prevent the unauthorized access of the distributed system components, authentication and authorization functions are to be enforced effectively. In this paper, we propose the conceptual model of the agent-based approach for the identity and access management in the dynamic inter-cloud environments where the Cloud Service Providers or the partners of the inter-cloud federation join and leave the federation dynamically. We further discuss the architectural model for the agent-based approach for solving the policy conflicts in the inter-cloud scenario while dealing with the access requests of cloud consumers in the inter-cloud environments. A few open issues in the area of identity and access management in the inter-cloud environment are also discussed. © 2018, Springer Nature Switzerland AG.Item An Ontology Based Trust Framework for Sensor-Driven Pervasive Environment(Institute of Electrical and Electronics Engineers Inc., 2018) Karthik, N.; Ananthanarayana, V.S.Pervasive computing is an environment consisting set of sensor nodes with the characteristics of perception, computation and communication capabilities. Wireless sensor nodes are deployed in various pervasive computing applications to observe the happenings in the surroundings. Data gathered from such wireless sensor nodes are utilized for critical decision making in context-aware environment. The Frequent incorrect data sampling, missing values, untrustworthy data, misbehavior and selfishness of nodes are common in pervasive applications since they are deployed in unfriendly and harsh environment. Moreover, the increasing number of sensor node fabricator leads to interoperability problems in context aware pervasive applications because they are represented in different formats and processed using different techniques. In this paper, we propose an ontology based trust framework for sensor driven pervasive environment for evaluating node and data trustworthiness which suffers from heterogeneity and interoperability problems. The proposed approach is capable of handling all types of nodes in pervasive environment and heterogeneous data generated from harsh and unfriendly environments of context aware pervasive applications. The proposed method comprises of semantic sensor data model and an ontology which is written in OWL language and implemented in protege. The proposed ontology is validated against use case and used for finding the trustworthiness of different sensor nodes and its data using a generic TRUST ontology. © 2017 IEEE.Item End-to-end monitoring of cloud resources using trust(Springer Verlag, 2019) Divakarla, D.; Chandrasekaran, K.Cloud computing is the fast-growing technology in the current era. With the growth, it brings with it multiple issues like privacy, security. Trusting the service provider and his resources is the major drawback for the user. In this paper, we have proposed a trust model which builds an end-to-end trust between the service provider resources and user. Our model calculates trust based on four parameters, namely utilization, saturation, failure, and availability. Our model builds a strong trust decision which enables the user to trust the resources of the service provider. © Springer Nature Singapore Pte Ltd. 2019.
