Rekha Kashyap | Krishna Institute Of Engg And Technology (original) (raw)

Papers by Rekha Kashyap

Research paper thumbnail of Trends of Retailing in E-Commerce - Product and Services

Today's retail market is going down and the new changes in the market searching for a signifi... more Today's retail market is going down and the new changes in the market searching for a significant shift in its development and the way the investment is done. Current players and emerging players are looking for new retail format. The current attractive pattern is Electronic retailing which is on a fast progress development. Internet access to the customer's changing and huge process is developing and also the peddlers take note and consumer right to make your design and traditional value approach you need to make. All the above increase of current attempts to paper: E-commerce retail business's current description of tilt-in Indian conditions and services and discussed the worldwide electronic commerce current inclination. Describe Indian conditions electronic retail sales in regards to customers at the time of purchase due to their attitude. Research Design: Gathered secondary data for research study for the purposes of e-commerce in retail business products and servic...

Research paper thumbnail of Immutable and Privacy Protected E-Certificate Repository on Blockchain

International Journal of Engineering and Advanced Technology, 2020

Fake education certificates or fake degree is one of the major concerns in higher education. This... more Fake education certificates or fake degree is one of the major concerns in higher education. This fraud can be minimized if there is a tamper-proof and confidential registry of certificates wherein not one but multiple certified authorities verifies and stores the issued certificate in immutable repositories with proper privacy maintained. Secondly, there should be a mechanism for retrieving the authentic certificate without much cost and time. Blockchain is an immutable, shared, distributed ledger without the control of a single centralized authority that fits very well for the discussed use case. The proposed work, PrivateCertChain, has implemented the idea for university having multiple affiliated colleges, by deploying and verifying digitally signed e-certificate on Ethereum Blockchain. Multiple affiliated colleges can serve as the miners for verifying the signature of the issuer. For privacy concerns, the content of the certificate will be hashed and this hashed value will be s...

Research paper thumbnail of A Secured Real Time Scheduling Model for Cloud Hypervisor

International Journal of Cloud Applications and Computing, 2016

Virtualization is critical to cloud computing and is possible through hypervisors, which maps the... more Virtualization is critical to cloud computing and is possible through hypervisors, which maps the Virtual machines((VMs) to physical resources but poses security concerns as users relinquish physical possession of their computation and data. Good amount of research is initiated for resource provisioning on hypervisors, still many issues need to be addressed for security demanding and real time VMs. First work SRT-CreditScheduler (Secured and Real-time), maximizes the success rate by dynamically prioritizing the urgency and the workload of VMs but ensures highest security for all. Another work, SA-RT-CreditScheduler (Security-aware and Real-time) is a dual objective scheduler, which maximizes the success rate of VMs in best possible security range as specified by the VM owner. Though the algorithms can be used by any hypervisor, for the current work they have been implemented on Xen hypervisor. Their effectiveness is validated by comparing it with Xen's, Credit and SEDF scheduler...

Research paper thumbnail of A Security Prioritized Computational Grid Scheduling Model

International Journal of Grid and High Performance Computing, 2009

Grid supports heterogeneities of resources in terms of security and computational power. Applicat... more Grid supports heterogeneities of resources in terms of security and computational power. Applications with stringent security requirement introduce challenging concerns when executed on the grid resources. Though grid scheduler considers the computational heterogeneity while making scheduling decisions, little is done to address their security heterogeneity. This work proposes a security aware computational grid scheduling model, which schedules the tasks taking into account both kinds of heterogeneities. The approach is known as Security Prioritized MinMin (SPMinMin). Comparing it with one of the widely used grid scheduling algorithm, MinMin (secured) shows that SPMinMin performs better and sometimes behaves similar to MinMin under all possible situations in terms of makespan and system utilization.

Research paper thumbnail of Security Driven Scheduling Model for Computational Grid Using NSGA-II

Journal of Grid Computing, 2013

Research paper thumbnail of Weight-balanced security-aware scheduling for real-time computational grid

International Journal of Grid and Utility Computing, 2011

Research paper thumbnail of Measurement of ultra-steep edge, high rejection fibre Bragg grating filters

Electronics Letters, 1995

Research paper thumbnail of Security-aware scheduling model for computational grid

Concurrency and Computation: Practice and Experience, 2011

Research paper thumbnail of Security-Aware Real-Time Scheduling for Hypervisors

2014 IEEE 17th International Conference on Computational Science and Engineering, 2014

Virtualization is critical to cloud computing because it simplifies the delivery of services by p... more Virtualization is critical to cloud computing because it simplifies the delivery of services by providing a platform for optimizing complex IT resources in a scalable manner. Virtualization architecture provides this illusion through hyper visors/Virtual Machine Monitor, which maps the physical resource to Virtual machines. Security is very essential for cloud users as they relinquish physical possession of their computation and data, which inevitably poses new security risks towards the confidentiality and integrity of the data. Lot of research is initiated in resource provisioning for hyper visors, but still many problems need to be addressed specially for security-aware and real time tasks. A dual objective scheduling algorithm, Real Time Security Maximization (RT-Smax), which aims to meet the deadline of the Virtual machines with best possible security is being proposed. Though this algorithm can be used by any hyper visor, for the current work it has been implemented on Xen VMM. Finally its effectiveness is validated by comparing it with Xen's credit scheduler on security demanding tasks having stringent deadline constraints.

Research paper thumbnail of Trends of Retailing in E-Commerce - Product and Services

Today's retail market is going down and the new changes in the market searching for a signifi... more Today's retail market is going down and the new changes in the market searching for a significant shift in its development and the way the investment is done. Current players and emerging players are looking for new retail format. The current attractive pattern is Electronic retailing which is on a fast progress development. Internet access to the customer's changing and huge process is developing and also the peddlers take note and consumer right to make your design and traditional value approach you need to make. All the above increase of current attempts to paper: E-commerce retail business's current description of tilt-in Indian conditions and services and discussed the worldwide electronic commerce current inclination. Describe Indian conditions electronic retail sales in regards to customers at the time of purchase due to their attitude. Research Design: Gathered secondary data for research study for the purposes of e-commerce in retail business products and servic...

Research paper thumbnail of Immutable and Privacy Protected E-Certificate Repository on Blockchain

International Journal of Engineering and Advanced Technology, 2020

Fake education certificates or fake degree is one of the major concerns in higher education. This... more Fake education certificates or fake degree is one of the major concerns in higher education. This fraud can be minimized if there is a tamper-proof and confidential registry of certificates wherein not one but multiple certified authorities verifies and stores the issued certificate in immutable repositories with proper privacy maintained. Secondly, there should be a mechanism for retrieving the authentic certificate without much cost and time. Blockchain is an immutable, shared, distributed ledger without the control of a single centralized authority that fits very well for the discussed use case. The proposed work, PrivateCertChain, has implemented the idea for university having multiple affiliated colleges, by deploying and verifying digitally signed e-certificate on Ethereum Blockchain. Multiple affiliated colleges can serve as the miners for verifying the signature of the issuer. For privacy concerns, the content of the certificate will be hashed and this hashed value will be s...

Research paper thumbnail of A Secured Real Time Scheduling Model for Cloud Hypervisor

International Journal of Cloud Applications and Computing, 2016

Virtualization is critical to cloud computing and is possible through hypervisors, which maps the... more Virtualization is critical to cloud computing and is possible through hypervisors, which maps the Virtual machines((VMs) to physical resources but poses security concerns as users relinquish physical possession of their computation and data. Good amount of research is initiated for resource provisioning on hypervisors, still many issues need to be addressed for security demanding and real time VMs. First work SRT-CreditScheduler (Secured and Real-time), maximizes the success rate by dynamically prioritizing the urgency and the workload of VMs but ensures highest security for all. Another work, SA-RT-CreditScheduler (Security-aware and Real-time) is a dual objective scheduler, which maximizes the success rate of VMs in best possible security range as specified by the VM owner. Though the algorithms can be used by any hypervisor, for the current work they have been implemented on Xen hypervisor. Their effectiveness is validated by comparing it with Xen's, Credit and SEDF scheduler...

Research paper thumbnail of A Security Prioritized Computational Grid Scheduling Model

International Journal of Grid and High Performance Computing, 2009

Grid supports heterogeneities of resources in terms of security and computational power. Applicat... more Grid supports heterogeneities of resources in terms of security and computational power. Applications with stringent security requirement introduce challenging concerns when executed on the grid resources. Though grid scheduler considers the computational heterogeneity while making scheduling decisions, little is done to address their security heterogeneity. This work proposes a security aware computational grid scheduling model, which schedules the tasks taking into account both kinds of heterogeneities. The approach is known as Security Prioritized MinMin (SPMinMin). Comparing it with one of the widely used grid scheduling algorithm, MinMin (secured) shows that SPMinMin performs better and sometimes behaves similar to MinMin under all possible situations in terms of makespan and system utilization.

Research paper thumbnail of Security Driven Scheduling Model for Computational Grid Using NSGA-II

Journal of Grid Computing, 2013

Research paper thumbnail of Weight-balanced security-aware scheduling for real-time computational grid

International Journal of Grid and Utility Computing, 2011

Research paper thumbnail of Measurement of ultra-steep edge, high rejection fibre Bragg grating filters

Electronics Letters, 1995

Research paper thumbnail of Security-aware scheduling model for computational grid

Concurrency and Computation: Practice and Experience, 2011

Research paper thumbnail of Security-Aware Real-Time Scheduling for Hypervisors

2014 IEEE 17th International Conference on Computational Science and Engineering, 2014

Virtualization is critical to cloud computing because it simplifies the delivery of services by p... more Virtualization is critical to cloud computing because it simplifies the delivery of services by providing a platform for optimizing complex IT resources in a scalable manner. Virtualization architecture provides this illusion through hyper visors/Virtual Machine Monitor, which maps the physical resource to Virtual machines. Security is very essential for cloud users as they relinquish physical possession of their computation and data, which inevitably poses new security risks towards the confidentiality and integrity of the data. Lot of research is initiated in resource provisioning for hyper visors, but still many problems need to be addressed specially for security-aware and real time tasks. A dual objective scheduling algorithm, Real Time Security Maximization (RT-Smax), which aims to meet the deadline of the Virtual machines with best possible security is being proposed. Though this algorithm can be used by any hyper visor, for the current work it has been implemented on Xen VMM. Finally its effectiveness is validated by comparing it with Xen's credit scheduler on security demanding tasks having stringent deadline constraints.