Dr. Sheetal Kalra - Academia.edu (original) (raw)

Papers by Dr. Sheetal Kalra

Research paper thumbnail of A Survey on Security Threats in Cloud ComputingTechnology

International Journal of Research, Sep 13, 2014

This manuscript introduces the characteristics, deployment and service models of cloud computing ... more This manuscript introduces the characteristics, deployment and service models of cloud computing technology. Secondly, an analysis of the security threats in cloud computing under various areas of cloud has been done. The main aim of this manuscript is to understand the security risks and challenges which are currently security threats under the cloud models as well as network concerns to stagnate the threats within cloud environment

Research paper thumbnail of A Novel Passwordless Authentication Scheme For Smart Phones Using Elliptic Curve Cryptography

Today, a large number of people access internet through their smart phones to login to their bank... more Today, a large number of people access internet through their smart phones to login to their bank accounts, social networking accounts and various other blogs. In such a scenario, user authentication has emerged as a major security issue in mobile internet. To date, password based authentication schemes have been extensively used to provide authentication and security. The password based authentication has always been cumbersome for the users because human memory is transient and remembering a large number of long and complicated passwords is impossible. Also, it is vulnerable to various kinds of attacks like brute force, rainbow table, dictionary, sniffing, shoulder surfing and so on. As the main contribution of this paper, a new passwordless authentication scheme for smart phones is presented which not only resolves all the weaknesses of password based schemes but also provide robust security. The proposed scheme relieves users from memorizing and storing long and complicated passwords. The proposed scheme uses ECDSA which is based on Elliptic Curve Cryptography (ECC). ECC has remarkable strength and efficiency advantages in terms of bandwidth, key sizes and computational overheads over other public key cryptosystems. It is therefore suitable for resource constraint devices like smart phone. Furthermore, the proposed scheme incorporate CAPTCHA which play a very important role in protecting the web resources from spamming and other malicious activities. To the best of our knowledge, until now no passwordless user authentication protocol based on ECC has been proposed for smart phones. Finally, the security and functionality analysis shows that compared with existing password based authentication schemes, the proposed scheme is more secure and efficient.

Research paper thumbnail of A Comprehensive Study of Various Load Balancing Techniques used in Cloud Based Biomedical Services

International Journal of Grid and Distributed Computing, 2015

With an increase in the demands, the Cloud computing has become one of the ongoing scalable appro... more With an increase in the demands, the Cloud computing has become one of the ongoing scalable approaches to fulfill the cloud based services. The biggest advantage of the cloud computing is the ability to overcome the infrastructural challenges those are earlier faced by other technologies. Since the technology is new, therefore the development of the whole structure is not so efficient. It does have a lot of issues on which various scientists and others are working on. Scheduling, load balancing, fault tolerance, etc. are various challenges faced by cloud computing. For this purpose various techniques and algorithms have been proposed. In this paper, we will discuss the issue of load balancing of cloud computing and we will study the different types of load balancing techniques used in in biomedical services and make a comparative analysis among all the existing techniques.

Research paper thumbnail of WSN Based Wheeze Detection Systems for Diagnosing Disease like Asthma: A Survey

International Journal of Bio-Science and Bio-Technology, 2015

The potential of computer science of integrating various other branches of science with the techn... more The potential of computer science of integrating various other branches of science with the technology of computer machine has changed the various trends in human being's life by providing the health as service too. With the development of new technology of cloud computing which have the ability to provide the software on rent allowed the cheaper medium of services to the customer. In this paper, we will make a survey of the various wheezes detection system that have been used for detecting the chronic disease like asthma. We will also make a comparative study at the end of the paper.

Research paper thumbnail of Advanced Data Mining Appraoch for Handoff Procedure’s in Lte Technology

International Journal of Database Theory and Application, 2016

With expansion in the innovation, the requests of the individuals are expanding as individuals ar... more With expansion in the innovation, the requests of the individuals are expanding as individuals are more intrigued by the web offices with higher information rate. Despite the fact that 3G advances convey essentially higher bit rates than 2G innovations, "LTE" (3GPP Long Term Evolution) got a blast in the field of advancements with new offices like Internet applications or versatile broadband (Voice over IP (VoIP), feature spilling, music downloading, portable TV and numerous others material) all around. It is very much necessary to extract the useful information of the user using LTE technology to understand he performance and durability of this new technology. In this paper we present a novel architecture for mining the data for extracting useful information regarding the success rates of various handoff procedures in LTE technology.

Research paper thumbnail of A Novel Decision Model to Support the Prediction of Asthma among the Big Data’s of Various Different Patient's

International Journal of Database Theory and Application, 2016

The capability of distributed computing for overriding the requirements for sending different fra... more The capability of distributed computing for overriding the requirements for sending different frameworks for running a server based administrations raised a progressive change in the way the conventional requests of the individuals utilization to be taken care of. Distributed computing gives the rental support of the client in which a client can utilize the specific programming by paying for that on the cloud server. Since the entire situation is useful for enormous businesses like facebook, google, orkut and so on, different fields are likewise getting reliant on distributed computing. Since huge amounts of information is transferring consistently to the cloud server does should be dug appropriately for productive information stockpiling. In this paper, we attempt to coordinate the information preprocessing strategy with an information grouping method to mine enormous information's of asthma based patients. We have utilized simulation tool called eclipse to run the Programming interface's of weak and cloudsim for setting up the trial environment.

Research paper thumbnail of Elliptic curve cryptography for real time embedded systems in IoT networks

2016 5th International Conference on Wireless Networks and Embedded Systems (WECON)

Internet of things (IoT) is a growing network of embedded devices that can interact with the exte... more Internet of things (IoT) is a growing network of embedded devices that can interact with the external environment. With this increasing global network, electronic communication between devices is becoming wireless and ubiquitous. Also, most of the IoT services will be realized as real time embedded systems which rely heavily on security mechanisms. This makes security imperative to embedded devices in IoT. This paper presents security challenges faced by system designers while designing secure embedded systems. The most difficult task for embedded system security is implementation of Public Key Cryptography (PKC). PKC based on Elliptic Curve Cryptography (ECC) which uses smaller key sizes is efficient for both private and public operations. Moreover, with IoT several embedded devices are becoming interconnected which makes ECC advantageous when you need to embed security. The comparative study suggests that ECC is best suited for resource constrained real time embedded systems in IoT.

Research paper thumbnail of Advanced password based authentication scheme for wireless sensor networks

Journal of Information Security and Applications, 2015

This era of ubiquitous computing has led to the development of complex communication networks all... more This era of ubiquitous computing has led to the development of complex communication networks all over the world. Wireless sensors, due to their wide applicability, form a key component of any complex network. But, security is a major challenge in making wireless sensor networks robust. Many remote user authentication schemes have been proposed for authenticating the legitimate users of a wireless sensor network. Most of the recently proposed schemes are vulnerable to one or more security attacks and are inefficient in terms of processing time. In this paper, the scheme proposed by Xue et al. has been reviewed and it has been found that the scheme is vulnerable to impersonation attack, stolen smart card attack, server spoofing attack. This paper proposes a robust and efficient password based authentication scheme which is secure against all well known security attacks. Moreover, the scheme has a low computation and communication cost and does not suffer from time synchronization problem. A formal security analysis has been performed using AVISPA tool to prove the security of the protocol.

Research paper thumbnail of IoT-Fog-Cloud Centric Earthquake Monitoring and Prediction

ACM Transactions on Embedded Computing Systems

Earthquakes are among the most inevitable natural catastrophes. The uncertainty about the severit... more Earthquakes are among the most inevitable natural catastrophes. The uncertainty about the severity of the earthquake has a profound effect on the burden of disaster and causes massive economic and societal losses. Although unpredictable, it can be expected to ameliorate damage and fatalities, such as monitoring and predicting earthquakes using the Internet of Things (IoT). With the resurgence of the IoT, an emerging innovative approach is to integrate IoT technology with Fog and Cloud Computing to augment the effectiveness and accuracy of earthquake monitoring and prediction. In this study, the integrated IoT-Fog-Cloud layered framework is proposed to predict earthquakes using seismic signal information. The proposed model is composed of three layers: (i) at sensor layer, seismic data are acquired, (ii) fog layer incorporates pre-processing, feature extraction using fast Walsh–Hadamard transform (FWHT), selection of relevant features by applying High Order Spectral Analysis (HOSA) t...

Research paper thumbnail of A robust multi-factor remote user authentication scheme for cloud-IoT services

International Journal of Information and Computer Security

Research paper thumbnail of IoT-based Earthquake Prediction Using Fog and Cloud Computing

Proceedings of International Conference on Women Researchers in Electronics and Computing

Earthquakes are severe, unexpected, life-threatening catastrophes that affect all kind of living ... more Earthquakes are severe, unexpected, life-threatening catastrophes that affect all kind of living beings. It frequently results in the loss of life and property. Predicting earthquake is the most important aspect of this field. With the golden age of the Internet of Things (IoT), an innovative new idea is to couple IoT technology with cloud and fog computing to improve the potency and accuracy of earthquake monitoring and forecasting. The embedded IoT-Fog-Cloud layered structure is adopted in this research to predict earthquakes using seismic signal data. This model transfers sensed seismic signals to fog for analysis of seismic data. At fog, Fast Walsh Hadamard transform is used to extract time and frequency domain features and PCA is employed to reduce the dimensionality of feature sets. Random Forest algorithm has been used to classify seismic signals into two different events, viz., earthquake and non-earthquake accompanied by the real-time warnings. When compared to other classi...

Research paper thumbnail of A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications

Journal of Information Security and Applications

Research paper thumbnail of A secure multifactor remote user authentication scheme for Internet of Multimedia Things environment

International Journal of Communication Systems

Research paper thumbnail of A Lightweight User Authentication Scheme for Cloud-IoT Based Healthcare Services

Iranian Journal of Science and Technology, Transactions of Electrical Engineering

Research paper thumbnail of Secure and efficient ECC based SIP authentication scheme for VoIP communications in internet of things

Multimedia Tools and Applications

Research paper thumbnail of Multi-factor user authentication scheme for IoT-based healthcare services

Journal of Reliable Intelligent Environments

Research paper thumbnail of Advanced lightweight multi-factor remote user authentication scheme for cloud-IoT applications

Journal of Ambient Intelligence and Humanized Computing

Research paper thumbnail of Advanced multi-factor user authentication scheme for E-governance applications in smart cities

International Journal of Computers and Applications

Research paper thumbnail of A secure remote user authentication scheme for smart cities e-governance applications

Journal of Reliable Intelligent Environments

Research paper thumbnail of Smart computing based student performance evaluation framework for engineering education

Computer Applications in Engineering Education

Research paper thumbnail of A Survey on Security Threats in Cloud ComputingTechnology

International Journal of Research, Sep 13, 2014

This manuscript introduces the characteristics, deployment and service models of cloud computing ... more This manuscript introduces the characteristics, deployment and service models of cloud computing technology. Secondly, an analysis of the security threats in cloud computing under various areas of cloud has been done. The main aim of this manuscript is to understand the security risks and challenges which are currently security threats under the cloud models as well as network concerns to stagnate the threats within cloud environment

Research paper thumbnail of A Novel Passwordless Authentication Scheme For Smart Phones Using Elliptic Curve Cryptography

Today, a large number of people access internet through their smart phones to login to their bank... more Today, a large number of people access internet through their smart phones to login to their bank accounts, social networking accounts and various other blogs. In such a scenario, user authentication has emerged as a major security issue in mobile internet. To date, password based authentication schemes have been extensively used to provide authentication and security. The password based authentication has always been cumbersome for the users because human memory is transient and remembering a large number of long and complicated passwords is impossible. Also, it is vulnerable to various kinds of attacks like brute force, rainbow table, dictionary, sniffing, shoulder surfing and so on. As the main contribution of this paper, a new passwordless authentication scheme for smart phones is presented which not only resolves all the weaknesses of password based schemes but also provide robust security. The proposed scheme relieves users from memorizing and storing long and complicated passwords. The proposed scheme uses ECDSA which is based on Elliptic Curve Cryptography (ECC). ECC has remarkable strength and efficiency advantages in terms of bandwidth, key sizes and computational overheads over other public key cryptosystems. It is therefore suitable for resource constraint devices like smart phone. Furthermore, the proposed scheme incorporate CAPTCHA which play a very important role in protecting the web resources from spamming and other malicious activities. To the best of our knowledge, until now no passwordless user authentication protocol based on ECC has been proposed for smart phones. Finally, the security and functionality analysis shows that compared with existing password based authentication schemes, the proposed scheme is more secure and efficient.

Research paper thumbnail of A Comprehensive Study of Various Load Balancing Techniques used in Cloud Based Biomedical Services

International Journal of Grid and Distributed Computing, 2015

With an increase in the demands, the Cloud computing has become one of the ongoing scalable appro... more With an increase in the demands, the Cloud computing has become one of the ongoing scalable approaches to fulfill the cloud based services. The biggest advantage of the cloud computing is the ability to overcome the infrastructural challenges those are earlier faced by other technologies. Since the technology is new, therefore the development of the whole structure is not so efficient. It does have a lot of issues on which various scientists and others are working on. Scheduling, load balancing, fault tolerance, etc. are various challenges faced by cloud computing. For this purpose various techniques and algorithms have been proposed. In this paper, we will discuss the issue of load balancing of cloud computing and we will study the different types of load balancing techniques used in in biomedical services and make a comparative analysis among all the existing techniques.

Research paper thumbnail of WSN Based Wheeze Detection Systems for Diagnosing Disease like Asthma: A Survey

International Journal of Bio-Science and Bio-Technology, 2015

The potential of computer science of integrating various other branches of science with the techn... more The potential of computer science of integrating various other branches of science with the technology of computer machine has changed the various trends in human being's life by providing the health as service too. With the development of new technology of cloud computing which have the ability to provide the software on rent allowed the cheaper medium of services to the customer. In this paper, we will make a survey of the various wheezes detection system that have been used for detecting the chronic disease like asthma. We will also make a comparative study at the end of the paper.

Research paper thumbnail of Advanced Data Mining Appraoch for Handoff Procedure’s in Lte Technology

International Journal of Database Theory and Application, 2016

With expansion in the innovation, the requests of the individuals are expanding as individuals ar... more With expansion in the innovation, the requests of the individuals are expanding as individuals are more intrigued by the web offices with higher information rate. Despite the fact that 3G advances convey essentially higher bit rates than 2G innovations, "LTE" (3GPP Long Term Evolution) got a blast in the field of advancements with new offices like Internet applications or versatile broadband (Voice over IP (VoIP), feature spilling, music downloading, portable TV and numerous others material) all around. It is very much necessary to extract the useful information of the user using LTE technology to understand he performance and durability of this new technology. In this paper we present a novel architecture for mining the data for extracting useful information regarding the success rates of various handoff procedures in LTE technology.

Research paper thumbnail of A Novel Decision Model to Support the Prediction of Asthma among the Big Data’s of Various Different Patient's

International Journal of Database Theory and Application, 2016

The capability of distributed computing for overriding the requirements for sending different fra... more The capability of distributed computing for overriding the requirements for sending different frameworks for running a server based administrations raised a progressive change in the way the conventional requests of the individuals utilization to be taken care of. Distributed computing gives the rental support of the client in which a client can utilize the specific programming by paying for that on the cloud server. Since the entire situation is useful for enormous businesses like facebook, google, orkut and so on, different fields are likewise getting reliant on distributed computing. Since huge amounts of information is transferring consistently to the cloud server does should be dug appropriately for productive information stockpiling. In this paper, we attempt to coordinate the information preprocessing strategy with an information grouping method to mine enormous information's of asthma based patients. We have utilized simulation tool called eclipse to run the Programming interface's of weak and cloudsim for setting up the trial environment.

Research paper thumbnail of Elliptic curve cryptography for real time embedded systems in IoT networks

2016 5th International Conference on Wireless Networks and Embedded Systems (WECON)

Internet of things (IoT) is a growing network of embedded devices that can interact with the exte... more Internet of things (IoT) is a growing network of embedded devices that can interact with the external environment. With this increasing global network, electronic communication between devices is becoming wireless and ubiquitous. Also, most of the IoT services will be realized as real time embedded systems which rely heavily on security mechanisms. This makes security imperative to embedded devices in IoT. This paper presents security challenges faced by system designers while designing secure embedded systems. The most difficult task for embedded system security is implementation of Public Key Cryptography (PKC). PKC based on Elliptic Curve Cryptography (ECC) which uses smaller key sizes is efficient for both private and public operations. Moreover, with IoT several embedded devices are becoming interconnected which makes ECC advantageous when you need to embed security. The comparative study suggests that ECC is best suited for resource constrained real time embedded systems in IoT.

Research paper thumbnail of Advanced password based authentication scheme for wireless sensor networks

Journal of Information Security and Applications, 2015

This era of ubiquitous computing has led to the development of complex communication networks all... more This era of ubiquitous computing has led to the development of complex communication networks all over the world. Wireless sensors, due to their wide applicability, form a key component of any complex network. But, security is a major challenge in making wireless sensor networks robust. Many remote user authentication schemes have been proposed for authenticating the legitimate users of a wireless sensor network. Most of the recently proposed schemes are vulnerable to one or more security attacks and are inefficient in terms of processing time. In this paper, the scheme proposed by Xue et al. has been reviewed and it has been found that the scheme is vulnerable to impersonation attack, stolen smart card attack, server spoofing attack. This paper proposes a robust and efficient password based authentication scheme which is secure against all well known security attacks. Moreover, the scheme has a low computation and communication cost and does not suffer from time synchronization problem. A formal security analysis has been performed using AVISPA tool to prove the security of the protocol.

Research paper thumbnail of IoT-Fog-Cloud Centric Earthquake Monitoring and Prediction

ACM Transactions on Embedded Computing Systems

Earthquakes are among the most inevitable natural catastrophes. The uncertainty about the severit... more Earthquakes are among the most inevitable natural catastrophes. The uncertainty about the severity of the earthquake has a profound effect on the burden of disaster and causes massive economic and societal losses. Although unpredictable, it can be expected to ameliorate damage and fatalities, such as monitoring and predicting earthquakes using the Internet of Things (IoT). With the resurgence of the IoT, an emerging innovative approach is to integrate IoT technology with Fog and Cloud Computing to augment the effectiveness and accuracy of earthquake monitoring and prediction. In this study, the integrated IoT-Fog-Cloud layered framework is proposed to predict earthquakes using seismic signal information. The proposed model is composed of three layers: (i) at sensor layer, seismic data are acquired, (ii) fog layer incorporates pre-processing, feature extraction using fast Walsh–Hadamard transform (FWHT), selection of relevant features by applying High Order Spectral Analysis (HOSA) t...

Research paper thumbnail of A robust multi-factor remote user authentication scheme for cloud-IoT services

International Journal of Information and Computer Security

Research paper thumbnail of IoT-based Earthquake Prediction Using Fog and Cloud Computing

Proceedings of International Conference on Women Researchers in Electronics and Computing

Earthquakes are severe, unexpected, life-threatening catastrophes that affect all kind of living ... more Earthquakes are severe, unexpected, life-threatening catastrophes that affect all kind of living beings. It frequently results in the loss of life and property. Predicting earthquake is the most important aspect of this field. With the golden age of the Internet of Things (IoT), an innovative new idea is to couple IoT technology with cloud and fog computing to improve the potency and accuracy of earthquake monitoring and forecasting. The embedded IoT-Fog-Cloud layered structure is adopted in this research to predict earthquakes using seismic signal data. This model transfers sensed seismic signals to fog for analysis of seismic data. At fog, Fast Walsh Hadamard transform is used to extract time and frequency domain features and PCA is employed to reduce the dimensionality of feature sets. Random Forest algorithm has been used to classify seismic signals into two different events, viz., earthquake and non-earthquake accompanied by the real-time warnings. When compared to other classi...

Research paper thumbnail of A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications

Journal of Information Security and Applications

Research paper thumbnail of A secure multifactor remote user authentication scheme for Internet of Multimedia Things environment

International Journal of Communication Systems

Research paper thumbnail of A Lightweight User Authentication Scheme for Cloud-IoT Based Healthcare Services

Iranian Journal of Science and Technology, Transactions of Electrical Engineering

Research paper thumbnail of Secure and efficient ECC based SIP authentication scheme for VoIP communications in internet of things

Multimedia Tools and Applications

Research paper thumbnail of Multi-factor user authentication scheme for IoT-based healthcare services

Journal of Reliable Intelligent Environments

Research paper thumbnail of Advanced lightweight multi-factor remote user authentication scheme for cloud-IoT applications

Journal of Ambient Intelligence and Humanized Computing

Research paper thumbnail of Advanced multi-factor user authentication scheme for E-governance applications in smart cities

International Journal of Computers and Applications

Research paper thumbnail of A secure remote user authentication scheme for smart cities e-governance applications

Journal of Reliable Intelligent Environments

Research paper thumbnail of Smart computing based student performance evaluation framework for engineering education

Computer Applications in Engineering Education