GEETA VEMULA - Academia.edu (original) (raw)

Papers by GEETA VEMULA

Research paper thumbnail of Blockchain Powered Mutual Authentication and Access Control Protocol

International Journal of Computer Networks and Applications, 2022

With the advancement in the network connectivity, services can be subscribed for limited period o... more With the advancement in the network connectivity, services can be subscribed for limited period of time. Subscribing for certain services is always an economic option rather than owning them. Implementing adequate procedures in the establishments, meeting the access control policies is challenging. Although the essential procedures are implemented using the centralized scheme where the single central server cater to the access control requests and the authorization mechanisms with the help of the stored identifiable attributes of the workstations in the web. In our article, we are proposing a blockchain powered lightweight, decentralized and secure framework for mutually authenticating the participating entities and levy the access control model among them. In our protocol, the device administrators (DA) can maintain their signed device policies for any of its services in the blockchain network which increases its visibility to more subscribers and at the same time, DAs can get rid of tedious job of authenticating each and every user/subscriber. On the other hand, users can also come to know about the wide range of services provided by different service providers and can avail appropriate service with the optimal constraints. We used elliptic curve cryptography (ECC) to transmit the secret sign parameters which makes our protocol lightweight. Secret sign parameters are used to verify the signature of any entity at the other end.

Research paper thumbnail of Simplex Email: Controlled Access of an Email Account among the Users of a Cluster

International Journal of Computer Applications, 2016

In this paper, we have addressed a scenario, where a group of people are in need to access the co... more In this paper, we have addressed a scenario, where a group of people are in need to access the common files of enormous size through mails. However, the space constraint observed in the mailbox of an individual, be in the public domain or in the private domain, either due to insufficient remaining space or the allocated space, the considerably large files cannot be communicated. We have proposed a simplex mail account, meant for people within an organization, academic institution, government, etc., wherein the bigger files can easily be stored and accessed through mail. The simplex mail account is a single mail account and can be viewed by number of people with two sets of privileges. Though a single mailbox is accessed with number of people simultaneously, the security issues are as good as the ones being offered by the other mailing systems already available.

Research paper thumbnail of Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation

The Internet of Things (IoT) is the latest web evolution that incorporates billions of devices th... more The Internet of Things (IoT) is the latest web evolution that incorporates billions of devices that are owned by different organizations and people who are deploying and using them for their own purposes. IoT-enabled harnessing of the information that is provided by federations of such IoT devices (which are often referred to as IoT things) provides unprecedented opportunities to solve internet-scale problems that have been too big and too difficult to tackle before. Just like other web-based information systems, IoT must also deal with the plethora of Cyber Security and privacy threats that currently disrupt organisations and can potentially hold the data of entire industries and even countries for ransom. To realize its full potential, IoT must deal effectively with such threats and ensure the security and privacy of the information collected and distilled from IoT devices. However, IoT presents several unique challenges that make the application of existing security and privacy techniques difficult. This is because IoT solutions encompass a variety of security and privacy solutions for protecting such IoT data on the move and in store at the device layer, the IoT infrastructure/platform layer, and the IoT application layer. Therefore, ensuring end-to-end privacy across these three IoT layers is a grand challenge in IoT. In this paper, we tackle the IoT privacy preservation problem. In particular, we propose innovative techniques for privacy preservation of IoT data, introduce a privacy preserving IoT Architecture, and also describe the implementation of an efficient proof of concept system that utilizes all these to ensure that IoT data remains private. The proposed privacy preservation techniques utilise multiple IoT cloud data stores to protect the privacy of data collected from IoT. The proposed privacy preserving IoT Architecture and proof of concept implementation are based on extensions of OpenIoT -a widely used open source platform for IoT application development. Experimental evaluations are also provided to validate the efficiency and performance outcomes of the proposed privacy preserving techniques and architecture.

Research paper thumbnail of Blockchain Powered Mutual Authentication and Access Control Protocol

International Journal of Computer Networks and Applications, 2022

With the advancement in the network connectivity, services can be subscribed for limited period o... more With the advancement in the network connectivity, services can be subscribed for limited period of time. Subscribing for certain services is always an economic option rather than owning them. Implementing adequate procedures in the establishments, meeting the access control policies is challenging. Although the essential procedures are implemented using the centralized scheme where the single central server cater to the access control requests and the authorization mechanisms with the help of the stored identifiable attributes of the workstations in the web. In our article, we are proposing a blockchain powered lightweight, decentralized and secure framework for mutually authenticating the participating entities and levy the access control model among them. In our protocol, the device administrators (DA) can maintain their signed device policies for any of its services in the blockchain network which increases its visibility to more subscribers and at the same time, DAs can get rid of tedious job of authenticating each and every user/subscriber. On the other hand, users can also come to know about the wide range of services provided by different service providers and can avail appropriate service with the optimal constraints. We used elliptic curve cryptography (ECC) to transmit the secret sign parameters which makes our protocol lightweight. Secret sign parameters are used to verify the signature of any entity at the other end.

Research paper thumbnail of Simplex Email: Controlled Access of an Email Account among the Users of a Cluster

International Journal of Computer Applications, 2016

In this paper, we have addressed a scenario, where a group of people are in need to access the co... more In this paper, we have addressed a scenario, where a group of people are in need to access the common files of enormous size through mails. However, the space constraint observed in the mailbox of an individual, be in the public domain or in the private domain, either due to insufficient remaining space or the allocated space, the considerably large files cannot be communicated. We have proposed a simplex mail account, meant for people within an organization, academic institution, government, etc., wherein the bigger files can easily be stored and accessed through mail. The simplex mail account is a single mail account and can be viewed by number of people with two sets of privileges. Though a single mailbox is accessed with number of people simultaneously, the security issues are as good as the ones being offered by the other mailing systems already available.

Research paper thumbnail of Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation

The Internet of Things (IoT) is the latest web evolution that incorporates billions of devices th... more The Internet of Things (IoT) is the latest web evolution that incorporates billions of devices that are owned by different organizations and people who are deploying and using them for their own purposes. IoT-enabled harnessing of the information that is provided by federations of such IoT devices (which are often referred to as IoT things) provides unprecedented opportunities to solve internet-scale problems that have been too big and too difficult to tackle before. Just like other web-based information systems, IoT must also deal with the plethora of Cyber Security and privacy threats that currently disrupt organisations and can potentially hold the data of entire industries and even countries for ransom. To realize its full potential, IoT must deal effectively with such threats and ensure the security and privacy of the information collected and distilled from IoT devices. However, IoT presents several unique challenges that make the application of existing security and privacy techniques difficult. This is because IoT solutions encompass a variety of security and privacy solutions for protecting such IoT data on the move and in store at the device layer, the IoT infrastructure/platform layer, and the IoT application layer. Therefore, ensuring end-to-end privacy across these three IoT layers is a grand challenge in IoT. In this paper, we tackle the IoT privacy preservation problem. In particular, we propose innovative techniques for privacy preservation of IoT data, introduce a privacy preserving IoT Architecture, and also describe the implementation of an efficient proof of concept system that utilizes all these to ensure that IoT data remains private. The proposed privacy preservation techniques utilise multiple IoT cloud data stores to protect the privacy of data collected from IoT. The proposed privacy preserving IoT Architecture and proof of concept implementation are based on extensions of OpenIoT -a widely used open source platform for IoT application development. Experimental evaluations are also provided to validate the efficiency and performance outcomes of the proposed privacy preserving techniques and architecture.