Ashish Kumar

ORCID: 0000-0002-3073-3614
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • User Authentication and Security Systems
  • Advanced Authentication Protocols Security
  • Cryptography and Data Security
  • Mobile and Web Applications
  • Distributed systems and fault tolerance
  • Biometric Identification and Security
  • Cloud Computing and Resource Management
  • Advanced Data Storage Technologies
  • IoT and Edge/Fog Computing
  • Distributed and Parallel Computing Systems
  • Peer-to-Peer Network Technologies
  • Advanced Database Systems and Queries
  • Cloud Data Security Solutions
  • Parallel Computing and Optimization Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Computational Techniques and Applications
  • Caching and Content Delivery
  • Blockchain Technology Applications and Security
  • Digital Rights Management and Security
  • Image Retrieval and Classification Techniques
  • Data Mining Algorithms and Applications
  • Cloud Computing and Remote Desktop Technologies
  • Web Data Mining and Analysis
  • Web Application Security Vulnerabilities
  • Genomics and Chromatin Dynamics

Doon University
2023

Lovely Professional University
2020-2022

Indian Institute of Technology Dhanbad
2017-2021

Indian Institute of Technology Kanpur
2020

Motilal Nehru National Institute of Technology
2016-2020

Christ University
2018

KIIT University
2014

Persistent Systems (India)
2012

Dr. B. R. Ambedkar National Institute of Technology Jalandhar
2011

With the advancement in internet technologies, number of servers has increased remarkably to provide more services end users. These are provided over public channels, which insecure and susceptible interception, modification, deletion. To security, registered entities authenticated then a session key is established between them communicate securely. The conventional schemes allow user access only after their independent registration with each desired server multiserver system. Therefore,...

10.1016/j.dcan.2017.09.004 article EN cc-by-nc-nd Digital Communications and Networks 2017-09-09

10.1016/j.jisa.2020.102662 article EN Journal of Information Security and Applications 2020-10-21

The Internet of Things (IoT) has emerged as a promising technology with trans formative potential in various industries, including libraries. An overview the applications IoT libraries highlights importance data privacy considerations context adoption. Libraries are increasingly leveraging to enhance their operations and improve user experiences. Intelligent library management systems, automated inventory tracking, self-checkout intelligent shelf management, streamline processes optimize...

10.18231/j.ijlsit.2023.003 article EN IP Indian Journal of Library Science and Information Technology 2023-06-15

SQL injection attack is a commonly used method to the database server. Injection attacks enable attacker bypass validation and authorization mechanisms by server gain access database. The easiest way launch this exploiting loopholes in of user inputs provided through login pages. Each page that visits can contribute towards revealing identity user. Feedbacks given while executing an code reveal information regarding vulnerabilities process This be misused attack. paper discusses technique...

10.14419/ijet.v7i2.6.10569 article EN International Journal of Engineering & Technology 2018-03-11

This paper concerns with the conversion of a Spoken English Language Query into SQL for retrieving data from RDBMS. A User submits query as speech signal through user interface and gets result in text format. We have developed acoustic language models using which utterance can be converted thus natural processing techniques applied on this to generate an equivalent query. For HTK Julius tools been used we implemented System uses rule based translation translate Query. The lexical analyzer,...

10.48550/arxiv.1308.3106 preprint EN other-oa arXiv (Cornell University) 2013-01-01

Transaction is a set of/unit of sequential operations, which used for purpose Technological, Organizational, programming languages, and operating systems. It examines the performance transaction manager with help Remote Procedure Calls (RPC) Applications. Call distributed application constructing database system. When it communicates between sender side (client side) receiver (server side). executes ensure atomicity protocols. Simple optimization Two Phase Commit Protocol (2PC) reduces...

10.1109/icices.2014.7033930 article EN 2014-02-01

The services of the internet play an essential part in daily life users. So, safety and confidentiality information are to be maintained preserve user conviction various offered by network. two-factor-based password verification techniques used between remote server legitimate users for over insecure channel. Several protocols have been suggested previously claiming their simplicity, privacy, safety, robustness. authors proved that enhanced vulnerable different attacks on network permit only...

10.4018/ijdcf.2021010104 article EN International Journal of Digital Crime and Forensics 2020-11-16

In the cloud computing and distributed database systems is some aspect of transparency, for hidden information from users (programmer, system developer, application program). are used set transparency mechanisms in at a layer interface, where required. this paper, we construct diagram using framing, Strategic Approach framing approaches, improving network infrastructure. will describe how to reduce cost implementing transparencies interact environment. It considered that if such type...

10.1109/icaccct.2014.7019403 article EN IEEE International Conference on Advanced Communications, Control and Computing Technologies 2014-05-01

Transaction Management plays the key role in any type of database system. In order to make Application Query, many protocols have been designed. this paper, we developed very efficient and enhanced Three Phase Commit Protocol (3PC), after studying drawback 2PC. 2PC, observed that if two side transaction will perform 2PC(i.e., one called sender other a receiver). When communicates with receiver form performing initial values prepare for commit or abort message. They some possibilities both...

10.1109/icroit.2014.6798309 article EN 2014-02-01

The main objective of the paper is to replace conventional interface and interconnectivity with Amanda (Advanced Maryland Automated Network Disk Archiver) that SQLite's. Its design develop a tool user friendly, portable can be easily used by any technical non-technical user. system being developed will create an between SQLite Amanda. This allow use instead database back-up his data. In first module, data present on each individual host in network. Then take (incremental or full) backup all...

10.1109/iccict.2012.6398203 article EN 2012-10-01

This paper describes a Distributed File Server, implemented in Java Sockets, based on TCP protocol.The server responds file request of multiple formats like txt, doc, pdf, jpeg, mp3, mp4, flv etc to clients at time.The requested first checks the file, with it.If search is not successful then it turns toward other servers connected it.The Dedicated Server performs client authentication Ipaddress connecting and maintains list files present end perform check user requests, for better...

10.5120/2388-3162 article EN International Journal of Computer Applications 2011-04-30

In today's scenario File Server using reliable connection oriented protocol like TCP are well active, but majorly they task specific for chat server, document file image audio server or Video etc.If all present together the might be other transfer and application is not transparent.To promote easy transparent across network Java Sockets, we introduce a Server.The multiclient multithreaded multi format supported Application.The requesting client validates user request at its end improves...

10.5120/2906-3816 article EN International Journal of Computer Applications 2011-06-30

10.1007/s40010-020-00662-4 article EN Proceedings of the National Academy of Sciences India Section A Physical Sciences 2020-02-19

We present a resource broker for MPI jobs in shared cluster, considering the current compute load and available network bandwidths. programs are generally communication-intensive. Thus availability between nodes impacts performance. Many existing allocation techniques mostly consider static node attributes some dynamic attributes. This does not lead to good case of clusters because usage system vary. developed network-aware heuristic allocation. incorporated state our heuristic. It is able...

10.1145/3409390.3409406 article EN 2020-08-17

Internet-of-Things (IoTs) are developing each day and proving their potential value in various applications. The increasing number of devices for IoTs also posing a high security concern authentication is one them. Along with the traditional sign-then encryption techniques, signcryption, light weight methods developed recent years. cons among those existing algorithms have urged need to extend strengthen algorithm. We have, therefore, proposed signcryption scheme that uses PHOTON-256...

10.1109/isssc50941.2020.9358905 article EN 2020 IEEE International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC) 2020-12-16

The growth of data at an unprecedented rate poses challenge on its storage and analysis. To cope up with this, new machines are procured a regular basis. On the other hand, lot computing resources in Institute labs, government offices etc. remain underutilized, since they used for Internet basic utilities. aggregation these underutilized can be more than handful to satisfy needs any large scale computation. This paper presents approach applying MapReduce framework non-dedicated nodes. target...

10.1109/ants.2016.7947816 article EN 2016-11-01
Coming Soon ...