Vijay Bhanu S - Academia.edu (original) (raw)

Papers by Vijay Bhanu S

Research paper thumbnail of Systematic Component Clustering Scheme for Collective Objects through Micro - Clusters

International journal of scientific research in computer science, engineering and information technology, Jul 25, 2016

Research paper thumbnail of A Secure Scheme for Trust Attribute Based Lightweight Authentication (TALA) in IoT Healthcare Environment

International journal of innovative technology and exploring engineering, Oct 30, 2019

Research paper thumbnail of Privacy preserving steganography based biometric authentication system for cloud computing environment

Measurement: Sensors, Dec 1, 2022

Research paper thumbnail of Random Dummy Packet Distribution Approach for Detection of Routing Misbehavior in Mobile Ad Hoc Network

Journal of Computer Science, Nov 1, 2012

Research paper thumbnail of Crypto-Deep Reinforcement Learning Based Cloud Security For Trusted Communication

2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), Jan 20, 2022

One of the most essential business models in modern information technology is cloud computing. It... more One of the most essential business models in modern information technology is cloud computing. It offers a variety of services for user interaction as well as low-cost hardware and software. Cloud services are built on newline virtualization designs that use multi-tenancy for improved resource management and newline strong isolation across several Virtual Machines (VMs). Despite advancements in virtualization, data security and isolation assurances continue to be the major difficulties faced by cloud providers using existing approaches. To overcome this problem, Deep Reinforcement Learning is applied to offload the task and also to detect the generalized attackers in the cloud network. This proposed solution enables remote data monitoring approaches such as identity-based linear classification algorithms for VM attack classification channels. It can minimise data secrecy and increase communication by using a reinforcement learning technique. The attacker channel is identified using identity-based linear classification when data is transferred/retrieved from the VM cloud server. When the classifier finds channel misbehaviour, the port or channel may be blocked, and the communication of other accessible ports may be modified maintaining the end to end communication secrecy using the improved Multi Agent Deep Reinforcement Learning (MADRL). The service verification is done to ensure that users have secure access to the cloud server. When an unknown request to the cloud server runs the key authentication to check the user authorization, this linear classification trains the existingside-channel attack datasets to the classifier and detects the VM cloud's attack channel. In terms of overall performance, the proposed methodology is investigated and compared to the existing approaches.

Research paper thumbnail of Design of Multiple Share Creation with Optimal Signcryption based Secure Biometric Authentication System for Cloud Environment

International Journal of Computers and Applications, Aug 8, 2022

Research paper thumbnail of Power Consumption using Cryptography Algorithms in Cloud Computing

International journal of recent technology and engineering, Sep 30, 2019

Research paper thumbnail of Enhancing cloud security using crypto-deep neural network for privacy preservation in trusted environment

Soft Computing, Jul 8, 2020

Research paper thumbnail of Modified H-HABE and Most Common Encryption and Decryption Algorithms using Different Operating Systems

International journal of innovative technology and exploring engineering, Jul 30, 2019

Research paper thumbnail of Comparative Study of Hybrid Attribute Based Encryption for Cloud Computing System

International journal of computer sciences and engineering, Oct 31, 2018

Research paper thumbnail of Analysis of Cloud Storage Issues in Distributed Cloud Data Centres by Parameter Improved Particle Swarm Optimization (PIPSO) Algorithm

International journal on future revolution in computer science & communication engineering, Jan 31, 2018

Cloud Computing environment provides several on demand services for users. The recent problem and... more Cloud Computing environment provides several on demand services for users. The recent problem and important issues in cloud computing is to optimize cloud storage over distributed data centers. The cloud storage optimization problem is considered as one of most challenging task. To overcome storage issues, the Parameter Improved Particle Swarm Optimization (PIPSO) technique is proposed. This paper presents the objective and the requirements of the distributed cloud storage issue based on the current topology. PIPSO technique manages each other between two server centers. The simulation has been done in MATLAB programming software. The results show that proposed technique achieves better results when compared with the other existing methods.

Research paper thumbnail of Enhancing WLAN MAC Protocol performance using Differentiated VOIP and Data Services Strategy

Research paper thumbnail of An efficient clustering scheme for cloud computing problems using metaheuristic algorithms

Cluster Computing, Jan 29, 2018

Research paper thumbnail of An ECPABE Algorithm and RPLS Protocol for Secured Transmission on IOT based Environment

International journal of recent technology and engineering, Sep 30, 2019

Research paper thumbnail of A Survey on variants of DoS attacks: Issues and defense mechanisms

Journal of applied research and technology, Feb 21, 2023

Research paper thumbnail of Privacy preserving steganography based biometric authentication system for cloud computing environment

Research paper thumbnail of Modified H-HABE and Most Common Encryption and Decryption Algorithms using Different Operating Systems

International Journal of Innovative Technology and Exploring Engineering, 2019

Cloud computing has been viewed as the cutting edge engineering of Information Technology(IT). Th... more Cloud computing has been viewed as the cutting edge engineering of Information Technology(IT). The Cloud worldview included preferences and its potential for decreasing expenses and time for an administration that favors towards security issues. Distributed computing is a total of data technology(IT) that offered to the client dependent on renting. Despite the fact that countless security issues are tended to, in any case some are not tended to and a few calculations are proposed for security issues. This paper shows an on the diverse Operating Systems of utilizing our refreshed H-HABE calculations and contrast and the different most normal encryption instruments. A near report made on a few encryption methods are utilized in the Different Operating Systems in the cloud. At long last, the real measurements like distinctive working framework issues present in distributed computing are examined.

Research paper thumbnail of An ECPABE Algorithm and RPLS Protocol for Secured Transmission on IOT based Environment

International Journal of Recent Technology and Engineering (IJRTE), 2019

WSN include Internet Protocol (IP) which extends the Internet of Things (IoT) related to routine ... more WSN include Internet Protocol (IP) which extends the Internet of Things (IoT) related to routine life. Security is main thing in emerging technology for IOT application. Therefore, WSN has lot of issues which include: (i) To promote the sensor devices efficiently during the transmission of data for consuming low energy (ii) To resolve the security issues of data faced at the time of transmission through large area of networks. In this paper, to overcome the above issues the novel scheme is proposed. A Secure based smart home automation system in IOT application is built for this study. Furthermore, the data transmission utilizes the energy using Low power consumption protocol using RPLS and to secure the data a data security scheme ECPABE have been proposed here. The performance of proposed protocol shows the limited energy consumes and proposed ECPABE provides better security level to IoT data than the existing schemes. The results show the proposed scheme security analysis is effi...

Research paper thumbnail of Bayesian Network with CSA to optimize the selection of QoS- aware Web service

International Journal on Computer Science and Engineering, 2018

Research paper thumbnail of Design of Multiple Share Creation with Optimal Signcryption based Secure Biometric Authentication System for Cloud Environment

International Journal of Computers and Applications

Research paper thumbnail of Systematic Component Clustering Scheme for Collective Objects through Micro - Clusters

International journal of scientific research in computer science, engineering and information technology, Jul 25, 2016

Research paper thumbnail of A Secure Scheme for Trust Attribute Based Lightweight Authentication (TALA) in IoT Healthcare Environment

International journal of innovative technology and exploring engineering, Oct 30, 2019

Research paper thumbnail of Privacy preserving steganography based biometric authentication system for cloud computing environment

Measurement: Sensors, Dec 1, 2022

Research paper thumbnail of Random Dummy Packet Distribution Approach for Detection of Routing Misbehavior in Mobile Ad Hoc Network

Journal of Computer Science, Nov 1, 2012

Research paper thumbnail of Crypto-Deep Reinforcement Learning Based Cloud Security For Trusted Communication

2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), Jan 20, 2022

One of the most essential business models in modern information technology is cloud computing. It... more One of the most essential business models in modern information technology is cloud computing. It offers a variety of services for user interaction as well as low-cost hardware and software. Cloud services are built on newline virtualization designs that use multi-tenancy for improved resource management and newline strong isolation across several Virtual Machines (VMs). Despite advancements in virtualization, data security and isolation assurances continue to be the major difficulties faced by cloud providers using existing approaches. To overcome this problem, Deep Reinforcement Learning is applied to offload the task and also to detect the generalized attackers in the cloud network. This proposed solution enables remote data monitoring approaches such as identity-based linear classification algorithms for VM attack classification channels. It can minimise data secrecy and increase communication by using a reinforcement learning technique. The attacker channel is identified using identity-based linear classification when data is transferred/retrieved from the VM cloud server. When the classifier finds channel misbehaviour, the port or channel may be blocked, and the communication of other accessible ports may be modified maintaining the end to end communication secrecy using the improved Multi Agent Deep Reinforcement Learning (MADRL). The service verification is done to ensure that users have secure access to the cloud server. When an unknown request to the cloud server runs the key authentication to check the user authorization, this linear classification trains the existingside-channel attack datasets to the classifier and detects the VM cloud's attack channel. In terms of overall performance, the proposed methodology is investigated and compared to the existing approaches.

Research paper thumbnail of Design of Multiple Share Creation with Optimal Signcryption based Secure Biometric Authentication System for Cloud Environment

International Journal of Computers and Applications, Aug 8, 2022

Research paper thumbnail of Power Consumption using Cryptography Algorithms in Cloud Computing

International journal of recent technology and engineering, Sep 30, 2019

Research paper thumbnail of Enhancing cloud security using crypto-deep neural network for privacy preservation in trusted environment

Soft Computing, Jul 8, 2020

Research paper thumbnail of Modified H-HABE and Most Common Encryption and Decryption Algorithms using Different Operating Systems

International journal of innovative technology and exploring engineering, Jul 30, 2019

Research paper thumbnail of Comparative Study of Hybrid Attribute Based Encryption for Cloud Computing System

International journal of computer sciences and engineering, Oct 31, 2018

Research paper thumbnail of Analysis of Cloud Storage Issues in Distributed Cloud Data Centres by Parameter Improved Particle Swarm Optimization (PIPSO) Algorithm

International journal on future revolution in computer science & communication engineering, Jan 31, 2018

Cloud Computing environment provides several on demand services for users. The recent problem and... more Cloud Computing environment provides several on demand services for users. The recent problem and important issues in cloud computing is to optimize cloud storage over distributed data centers. The cloud storage optimization problem is considered as one of most challenging task. To overcome storage issues, the Parameter Improved Particle Swarm Optimization (PIPSO) technique is proposed. This paper presents the objective and the requirements of the distributed cloud storage issue based on the current topology. PIPSO technique manages each other between two server centers. The simulation has been done in MATLAB programming software. The results show that proposed technique achieves better results when compared with the other existing methods.

Research paper thumbnail of Enhancing WLAN MAC Protocol performance using Differentiated VOIP and Data Services Strategy

Research paper thumbnail of An efficient clustering scheme for cloud computing problems using metaheuristic algorithms

Cluster Computing, Jan 29, 2018

Research paper thumbnail of An ECPABE Algorithm and RPLS Protocol for Secured Transmission on IOT based Environment

International journal of recent technology and engineering, Sep 30, 2019

Research paper thumbnail of A Survey on variants of DoS attacks: Issues and defense mechanisms

Journal of applied research and technology, Feb 21, 2023

Research paper thumbnail of Privacy preserving steganography based biometric authentication system for cloud computing environment

Research paper thumbnail of Modified H-HABE and Most Common Encryption and Decryption Algorithms using Different Operating Systems

International Journal of Innovative Technology and Exploring Engineering, 2019

Cloud computing has been viewed as the cutting edge engineering of Information Technology(IT). Th... more Cloud computing has been viewed as the cutting edge engineering of Information Technology(IT). The Cloud worldview included preferences and its potential for decreasing expenses and time for an administration that favors towards security issues. Distributed computing is a total of data technology(IT) that offered to the client dependent on renting. Despite the fact that countless security issues are tended to, in any case some are not tended to and a few calculations are proposed for security issues. This paper shows an on the diverse Operating Systems of utilizing our refreshed H-HABE calculations and contrast and the different most normal encryption instruments. A near report made on a few encryption methods are utilized in the Different Operating Systems in the cloud. At long last, the real measurements like distinctive working framework issues present in distributed computing are examined.

Research paper thumbnail of An ECPABE Algorithm and RPLS Protocol for Secured Transmission on IOT based Environment

International Journal of Recent Technology and Engineering (IJRTE), 2019

WSN include Internet Protocol (IP) which extends the Internet of Things (IoT) related to routine ... more WSN include Internet Protocol (IP) which extends the Internet of Things (IoT) related to routine life. Security is main thing in emerging technology for IOT application. Therefore, WSN has lot of issues which include: (i) To promote the sensor devices efficiently during the transmission of data for consuming low energy (ii) To resolve the security issues of data faced at the time of transmission through large area of networks. In this paper, to overcome the above issues the novel scheme is proposed. A Secure based smart home automation system in IOT application is built for this study. Furthermore, the data transmission utilizes the energy using Low power consumption protocol using RPLS and to secure the data a data security scheme ECPABE have been proposed here. The performance of proposed protocol shows the limited energy consumes and proposed ECPABE provides better security level to IoT data than the existing schemes. The results show the proposed scheme security analysis is effi...

Research paper thumbnail of Bayesian Network with CSA to optimize the selection of QoS- aware Web service

International Journal on Computer Science and Engineering, 2018

Research paper thumbnail of Design of Multiple Share Creation with Optimal Signcryption based Secure Biometric Authentication System for Cloud Environment

International Journal of Computers and Applications