Vijay Bhanu S - Academia.edu (original) (raw)
Papers by Vijay Bhanu S
International journal of scientific research in computer science, engineering and information technology, Jul 25, 2016
International journal of innovative technology and exploring engineering, Oct 30, 2019
Measurement: Sensors, Dec 1, 2022
Journal of Computer Science, Nov 1, 2012
2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), Jan 20, 2022
One of the most essential business models in modern information technology is cloud computing. It... more One of the most essential business models in modern information technology is cloud computing. It offers a variety of services for user interaction as well as low-cost hardware and software. Cloud services are built on newline virtualization designs that use multi-tenancy for improved resource management and newline strong isolation across several Virtual Machines (VMs). Despite advancements in virtualization, data security and isolation assurances continue to be the major difficulties faced by cloud providers using existing approaches. To overcome this problem, Deep Reinforcement Learning is applied to offload the task and also to detect the generalized attackers in the cloud network. This proposed solution enables remote data monitoring approaches such as identity-based linear classification algorithms for VM attack classification channels. It can minimise data secrecy and increase communication by using a reinforcement learning technique. The attacker channel is identified using identity-based linear classification when data is transferred/retrieved from the VM cloud server. When the classifier finds channel misbehaviour, the port or channel may be blocked, and the communication of other accessible ports may be modified maintaining the end to end communication secrecy using the improved Multi Agent Deep Reinforcement Learning (MADRL). The service verification is done to ensure that users have secure access to the cloud server. When an unknown request to the cloud server runs the key authentication to check the user authorization, this linear classification trains the existingside-channel attack datasets to the classifier and detects the VM cloud's attack channel. In terms of overall performance, the proposed methodology is investigated and compared to the existing approaches.
International Journal of Computers and Applications, Aug 8, 2022
International journal of recent technology and engineering, Sep 30, 2019
Soft Computing, Jul 8, 2020
International journal of innovative technology and exploring engineering, Jul 30, 2019
International journal of computer sciences and engineering, Oct 31, 2018
International journal on future revolution in computer science & communication engineering, Jan 31, 2018
Cloud Computing environment provides several on demand services for users. The recent problem and... more Cloud Computing environment provides several on demand services for users. The recent problem and important issues in cloud computing is to optimize cloud storage over distributed data centers. The cloud storage optimization problem is considered as one of most challenging task. To overcome storage issues, the Parameter Improved Particle Swarm Optimization (PIPSO) technique is proposed. This paper presents the objective and the requirements of the distributed cloud storage issue based on the current topology. PIPSO technique manages each other between two server centers. The simulation has been done in MATLAB programming software. The results show that proposed technique achieves better results when compared with the other existing methods.
Cluster Computing, Jan 29, 2018
International journal of recent technology and engineering, Sep 30, 2019
Journal of applied research and technology, Feb 21, 2023
International Journal of Innovative Technology and Exploring Engineering, 2019
Cloud computing has been viewed as the cutting edge engineering of Information Technology(IT). Th... more Cloud computing has been viewed as the cutting edge engineering of Information Technology(IT). The Cloud worldview included preferences and its potential for decreasing expenses and time for an administration that favors towards security issues. Distributed computing is a total of data technology(IT) that offered to the client dependent on renting. Despite the fact that countless security issues are tended to, in any case some are not tended to and a few calculations are proposed for security issues. This paper shows an on the diverse Operating Systems of utilizing our refreshed H-HABE calculations and contrast and the different most normal encryption instruments. A near report made on a few encryption methods are utilized in the Different Operating Systems in the cloud. At long last, the real measurements like distinctive working framework issues present in distributed computing are examined.
International Journal of Recent Technology and Engineering (IJRTE), 2019
WSN include Internet Protocol (IP) which extends the Internet of Things (IoT) related to routine ... more WSN include Internet Protocol (IP) which extends the Internet of Things (IoT) related to routine life. Security is main thing in emerging technology for IOT application. Therefore, WSN has lot of issues which include: (i) To promote the sensor devices efficiently during the transmission of data for consuming low energy (ii) To resolve the security issues of data faced at the time of transmission through large area of networks. In this paper, to overcome the above issues the novel scheme is proposed. A Secure based smart home automation system in IOT application is built for this study. Furthermore, the data transmission utilizes the energy using Low power consumption protocol using RPLS and to secure the data a data security scheme ECPABE have been proposed here. The performance of proposed protocol shows the limited energy consumes and proposed ECPABE provides better security level to IoT data than the existing schemes. The results show the proposed scheme security analysis is effi...
International Journal on Computer Science and Engineering, 2018
International Journal of Computers and Applications
International journal of scientific research in computer science, engineering and information technology, Jul 25, 2016
International journal of innovative technology and exploring engineering, Oct 30, 2019
Measurement: Sensors, Dec 1, 2022
Journal of Computer Science, Nov 1, 2012
2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), Jan 20, 2022
One of the most essential business models in modern information technology is cloud computing. It... more One of the most essential business models in modern information technology is cloud computing. It offers a variety of services for user interaction as well as low-cost hardware and software. Cloud services are built on newline virtualization designs that use multi-tenancy for improved resource management and newline strong isolation across several Virtual Machines (VMs). Despite advancements in virtualization, data security and isolation assurances continue to be the major difficulties faced by cloud providers using existing approaches. To overcome this problem, Deep Reinforcement Learning is applied to offload the task and also to detect the generalized attackers in the cloud network. This proposed solution enables remote data monitoring approaches such as identity-based linear classification algorithms for VM attack classification channels. It can minimise data secrecy and increase communication by using a reinforcement learning technique. The attacker channel is identified using identity-based linear classification when data is transferred/retrieved from the VM cloud server. When the classifier finds channel misbehaviour, the port or channel may be blocked, and the communication of other accessible ports may be modified maintaining the end to end communication secrecy using the improved Multi Agent Deep Reinforcement Learning (MADRL). The service verification is done to ensure that users have secure access to the cloud server. When an unknown request to the cloud server runs the key authentication to check the user authorization, this linear classification trains the existingside-channel attack datasets to the classifier and detects the VM cloud's attack channel. In terms of overall performance, the proposed methodology is investigated and compared to the existing approaches.
International Journal of Computers and Applications, Aug 8, 2022
International journal of recent technology and engineering, Sep 30, 2019
Soft Computing, Jul 8, 2020
International journal of innovative technology and exploring engineering, Jul 30, 2019
International journal of computer sciences and engineering, Oct 31, 2018
International journal on future revolution in computer science & communication engineering, Jan 31, 2018
Cloud Computing environment provides several on demand services for users. The recent problem and... more Cloud Computing environment provides several on demand services for users. The recent problem and important issues in cloud computing is to optimize cloud storage over distributed data centers. The cloud storage optimization problem is considered as one of most challenging task. To overcome storage issues, the Parameter Improved Particle Swarm Optimization (PIPSO) technique is proposed. This paper presents the objective and the requirements of the distributed cloud storage issue based on the current topology. PIPSO technique manages each other between two server centers. The simulation has been done in MATLAB programming software. The results show that proposed technique achieves better results when compared with the other existing methods.
Cluster Computing, Jan 29, 2018
International journal of recent technology and engineering, Sep 30, 2019
Journal of applied research and technology, Feb 21, 2023
International Journal of Innovative Technology and Exploring Engineering, 2019
Cloud computing has been viewed as the cutting edge engineering of Information Technology(IT). Th... more Cloud computing has been viewed as the cutting edge engineering of Information Technology(IT). The Cloud worldview included preferences and its potential for decreasing expenses and time for an administration that favors towards security issues. Distributed computing is a total of data technology(IT) that offered to the client dependent on renting. Despite the fact that countless security issues are tended to, in any case some are not tended to and a few calculations are proposed for security issues. This paper shows an on the diverse Operating Systems of utilizing our refreshed H-HABE calculations and contrast and the different most normal encryption instruments. A near report made on a few encryption methods are utilized in the Different Operating Systems in the cloud. At long last, the real measurements like distinctive working framework issues present in distributed computing are examined.
International Journal of Recent Technology and Engineering (IJRTE), 2019
WSN include Internet Protocol (IP) which extends the Internet of Things (IoT) related to routine ... more WSN include Internet Protocol (IP) which extends the Internet of Things (IoT) related to routine life. Security is main thing in emerging technology for IOT application. Therefore, WSN has lot of issues which include: (i) To promote the sensor devices efficiently during the transmission of data for consuming low energy (ii) To resolve the security issues of data faced at the time of transmission through large area of networks. In this paper, to overcome the above issues the novel scheme is proposed. A Secure based smart home automation system in IOT application is built for this study. Furthermore, the data transmission utilizes the energy using Low power consumption protocol using RPLS and to secure the data a data security scheme ECPABE have been proposed here. The performance of proposed protocol shows the limited energy consumes and proposed ECPABE provides better security level to IoT data than the existing schemes. The results show the proposed scheme security analysis is effi...
International Journal on Computer Science and Engineering, 2018
International Journal of Computers and Applications