- User Authentication and Security Systems
- Advanced Authentication Protocols Security
- Cryptography and Data Security
- Mobile and Web Applications
- Distributed systems and fault tolerance
- Biometric Identification and Security
- Cloud Computing and Resource Management
- Advanced Data Storage Technologies
- IoT and Edge/Fog Computing
- Distributed and Parallel Computing Systems
- Peer-to-Peer Network Technologies
- Advanced Database Systems and Queries
- Cloud Data Security Solutions
- Parallel Computing and Optimization Techniques
- Internet Traffic Analysis and Secure E-voting
- Advanced Computational Techniques and Applications
- Caching and Content Delivery
- Blockchain Technology Applications and Security
- Digital Rights Management and Security
- Image Retrieval and Classification Techniques
- Data Mining Algorithms and Applications
- Cloud Computing and Remote Desktop Technologies
- Web Data Mining and Analysis
- Web Application Security Vulnerabilities
- Genomics and Chromatin Dynamics
Doon University
2023
Lovely Professional University
2020-2022
Indian Institute of Technology Dhanbad
2017-2021
Indian Institute of Technology Kanpur
2020
Motilal Nehru National Institute of Technology
2016-2020
Christ University
2018
KIIT University
2014
Persistent Systems (India)
2012
Dr. B. R. Ambedkar National Institute of Technology Jalandhar
2011
With the advancement in internet technologies, number of servers has increased remarkably to provide more services end users. These are provided over public channels, which insecure and susceptible interception, modification, deletion. To security, registered entities authenticated then a session key is established between them communicate securely. The conventional schemes allow user access only after their independent registration with each desired server multiserver system. Therefore,...
The Internet of Things (IoT) has emerged as a promising technology with trans formative potential in various industries, including libraries. An overview the applications IoT libraries highlights importance data privacy considerations context adoption. Libraries are increasingly leveraging to enhance their operations and improve user experiences. Intelligent library management systems, automated inventory tracking, self-checkout intelligent shelf management, streamline processes optimize...
SQL injection attack is a commonly used method to the database server. Injection attacks enable attacker bypass validation and authorization mechanisms by server gain access database. The easiest way launch this exploiting loopholes in of user inputs provided through login pages. Each page that visits can contribute towards revealing identity user. Feedbacks given while executing an code reveal information regarding vulnerabilities process This be misused attack. paper discusses technique...
This paper concerns with the conversion of a Spoken English Language Query into SQL for retrieving data from RDBMS. A User submits query as speech signal through user interface and gets result in text format. We have developed acoustic language models using which utterance can be converted thus natural processing techniques applied on this to generate an equivalent query. For HTK Julius tools been used we implemented System uses rule based translation translate Query. The lexical analyzer,...
Transaction is a set of/unit of sequential operations, which used for purpose Technological, Organizational, programming languages, and operating systems. It examines the performance transaction manager with help Remote Procedure Calls (RPC) Applications. Call distributed application constructing database system. When it communicates between sender side (client side) receiver (server side). executes ensure atomicity protocols. Simple optimization Two Phase Commit Protocol (2PC) reduces...
The services of the internet play an essential part in daily life users. So, safety and confidentiality information are to be maintained preserve user conviction various offered by network. two-factor-based password verification techniques used between remote server legitimate users for over insecure channel. Several protocols have been suggested previously claiming their simplicity, privacy, safety, robustness. authors proved that enhanced vulnerable different attacks on network permit only...
In the cloud computing and distributed database systems is some aspect of transparency, for hidden information from users (programmer, system developer, application program). are used set transparency mechanisms in at a layer interface, where required. this paper, we construct diagram using framing, Strategic Approach framing approaches, improving network infrastructure. will describe how to reduce cost implementing transparencies interact environment. It considered that if such type...
Transaction Management plays the key role in any type of database system. In order to make Application Query, many protocols have been designed. this paper, we developed very efficient and enhanced Three Phase Commit Protocol (3PC), after studying drawback 2PC. 2PC, observed that if two side transaction will perform 2PC(i.e., one called sender other a receiver). When communicates with receiver form performing initial values prepare for commit or abort message. They some possibilities both...
The main objective of the paper is to replace conventional interface and interconnectivity with Amanda (Advanced Maryland Automated Network Disk Archiver) that SQLite's. Its design develop a tool user friendly, portable can be easily used by any technical non-technical user. system being developed will create an between SQLite Amanda. This allow use instead database back-up his data. In first module, data present on each individual host in network. Then take (incremental or full) backup all...
This paper describes a Distributed File Server, implemented in Java Sockets, based on TCP protocol.The server responds file request of multiple formats like txt, doc, pdf, jpeg, mp3, mp4, flv etc to clients at time.The requested first checks the file, with it.If search is not successful then it turns toward other servers connected it.The Dedicated Server performs client authentication Ipaddress connecting and maintains list files present end perform check user requests, for better...
In today's scenario File Server using reliable connection oriented protocol like TCP are well active, but majorly they task specific for chat server, document file image audio server or Video etc.If all present together the might be other transfer and application is not transparent.To promote easy transparent across network Java Sockets, we introduce a Server.The multiclient multithreaded multi format supported Application.The requesting client validates user request at its end improves...
We present a resource broker for MPI jobs in shared cluster, considering the current compute load and available network bandwidths. programs are generally communication-intensive. Thus availability between nodes impacts performance. Many existing allocation techniques mostly consider static node attributes some dynamic attributes. This does not lead to good case of clusters because usage system vary. developed network-aware heuristic allocation. incorporated state our heuristic. It is able...
Internet-of-Things (IoTs) are developing each day and proving their potential value in various applications. The increasing number of devices for IoTs also posing a high security concern authentication is one them. Along with the traditional sign-then encryption techniques, signcryption, light weight methods developed recent years. cons among those existing algorithms have urged need to extend strengthen algorithm. We have, therefore, proposed signcryption scheme that uses PHOTON-256...
The growth of data at an unprecedented rate poses challenge on its storage and analysis. To cope up with this, new machines are procured a regular basis. On the other hand, lot computing resources in Institute labs, government offices etc. remain underutilized, since they used for Internet basic utilities. aggregation these underutilized can be more than handful to satisfy needs any large scale computation. This paper presents approach applying MapReduce framework non-dedicated nodes. target...