scispace - formally typeset
Search or ask a question
Author

R. Thandeeswaran

Bio: R. Thandeeswaran is an academic researcher from VIT University. The author has contributed to research in topics: Cloud computing & Denial-of-service attack. The author has an hindex of 5, co-authored 12 publications receiving 59 citations.

Papers
More filters
Book
01 Feb 2017
TL;DR: Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology.
Abstract: Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things.

16 citations

Journal ArticleDOI
TL;DR: Performance analysis, cost analysis and cost-performance ratio analysis are done by comparing different cluster configurations, and high security is provided at this point for data using AES algorithm and also a password protection key for privileged user’s access.
Abstract: Cloud computing is a model where software applications and computing resources are accessed over Internet with minimal cost and effort by interacting with the service provider. Along with these benefits there are also some significant security concerns that need to be addressed for handling sensitive data and critical applications. The simultaneous use of multiple clouds can provide several potential benefits, such as high availability, fault tolerance and reduced infrastructural cost. The model proposed which is the implementation of a secured multi-cloud virtual infrastructure consists of a grid engine on top of the multi-cloud infrastructure to distribute the task among the worker nodes that are supplied with various resources from different clouds to enhance cost efficiency of the infrastructure set up and also to implement high availability feature. The Oracle grid engine is used to schedule the jobs to the worker nodes (in-house and cloud). Worker nodes will be acting like listeners to receive the job from the oracle grid engine master node. High security is provided at this point for data using AES algorithm and also a password protection key for privileged user’s access. Performance analysis, cost analysis and cost-performance ratio analysis are done by comparing different cluster configurations.

10 citations

Journal ArticleDOI
TL;DR: A Recurrence Quantification based approach to detect and prevent VoIP from a DDoS attack, which detects the attack at an earlier stage and also helps to prevent from further attacks.
Abstract: Voice over Internet Protocol VoIP is a family of technologies for the transmission of voice over Internet. Voice is converted into digital signals and transmitted as data packets. The Session Initiation Protocol SIP is an IETF protocol for VoIP and other multimedia. SIP is an application layer protocol for creating, modifying and terminating sessions in VoIP communications. Since SIP is a more flexible and simple protocol, it is quite easy to add features to it. Distributed Denial of Service Attack DDoS floods the server with numerous requests from various hosts. Hence, the legitimate clients will not be able to get their intended services. A major concern in VoIP and almost in all network domains is availability rather than data consistency. Most of the surviving techniques could prevent VoIP network only after collision. This paper proposes a Recurrence Quantification based approach to detect and prevent VoIP from a DDoS attack. This model detects the attack at an earlier stage and also helps to prevent from further attacks. In addition, this techniques enables the efficient utilization of resources. QUALNET has been used to simulate the operation of the proposed technology.

9 citations

03 Dec 2016
TL;DR: DPCA is proposed, an authentication at two different phases, where only man is allowed to access the cloud resources, he is authenticated with Dempster Shafter hypothetical approach combined with the user intent and not the content.
Abstract: Every user appreciates the security of their datairrespective of its sensitivity. At the same time, user does not wantto be held up with the legacy systems, which may be stronglysecured but not with fantasy. Network travelled many phases of itsown such as internet, intranet, wireless network, sensor network,Ad-hoc network, Mobile network, Blue-tooth, Cloud and IoT, themost popular technique now. Hence, whatever the type of networkhitting the end user with improvised quality, get compromised insecurity.People feel pleasure upon sharing their moments with theirconnections. Huge amount of data are in transit either by means ofstoring them in cloud or retrieving. Users lose control over theirdata, they are unaware about the people accessing and modifying.Hence DataCentres have to be protected from unauthorized illegalaccess. Illegal data access may be initiated by a boot or a bot. Manor a Machine discrimination has been resolved with CAPTCHA.This paper, DPCA, proposes an authentication at two differentphases. In the first phase, the user is authenticated with the newtype of CAPTCHA. With this methodology, user is segregated asman or machine. Thereby bot-nets are filtered out and the floodingmessages from bots are mitigated. In the second phase, where onlyman is allowed to access the cloud resources, he is authenticatedwith Dempster Shafter hypothetical approach combined with theuser intent and not the content. DPCA has been tested in theinfrastructure and the experimental results proved the strength ofthe algorithm.

7 citations

Proceedings ArticleDOI
17 Jun 2014
TL;DR: This paper lights up on security without compromising quality of service because Secure Cloud based Telemedicine (SCT) uses Cloud which could free the people from administrative and accounting burdens.
Abstract: Telemedicine started its journey and successful deployment over several decades. But still it could not mark a remarkable contribution to neither rural nor urban areas. People realized its impact when it saved a life from becoming an extinct. Telemedicine connects patient and specialized doctors remotely and also allows them to share the sensitive medical records. Irrespective of the mode of data exchange, all types of media are vulnerable to security and performance issues. Remote data exchange during an emergency situation should not be delayed and at the same time should not be altered. While transit, a single bit change could be interpreted differently at the other end. Hence telemedicine comes with all the challenges of performance and security issues. Delay, cost and scalability are the pressing performance factors whereas integrity, availability and accountability are the security issues need to be addressed. This paper lights up on security without compromising quality of service. Telemedicine is on track from standard PSTN, wireless Mobile phones and satellites. Secure Cloud based Telemedicine (SCT) uses Cloud which could free the people from administrative and accounting burdens.

7 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This paper provides a systematic review of technological growth in eHealth services and analyzes the role of four important technologies, namely, satellite, internet, mobile, and cloud for providing health services.
Abstract: The infusion of information communication technology (ICT) into health services is emerging as an active area of research. It has several advantages but perhaps the most important one is providing medical benefits to one and all irrespective of geographic boundaries in a cost effective manner, providing global expertise and holistic services, in a time bound manner. This paper provides a systematic review of technological growth in eHealth services. The present study reviews and analyzes the role of four important technologies, namely, satellite, internet, mobile, and cloud for providing health services.

40 citations

Journal ArticleDOI
TL;DR: To take advantage of the volume and variety of data captured by and stored in ubiquitous IoT services, forensic investigators need to draw upon evidence-acquisition methods and techniques from all areas of digital forensics and possibly create new IoT-specific investigation processes.
Abstract: The Internet of Things (IoT) brings a set of unique and complex challenges to the field of digital forensics. To take advantage of the volume and variety of data captured by and stored in ubiquitous IoT services, forensic investigators need to draw upon evidence-acquisition methods and techniques from all areas of digital forensics and possibly create new IoT-specific investigation processes. Although a number of conceptual process models have been developed to address the unique characteristics of the IoT, many challenges remain unresolved.

39 citations

Proceedings ArticleDOI
01 Sep 2017
TL;DR: This paper evaluates ransomware attacks statistics for the past 2 years and the present year to estimate growth rate of the most emerging ransomware families from the last 3 years to evaluate most threatening ransomware attacks for IoT and presents a Cryptowall ransomware attack detection model based on the communication and behavioral study of cryptowall for IoT environment.
Abstract: Internet of things (IoT) is internetworking of various physical devices to provide a range of services and applications. IoT is a rapidly growing field, on an account of this; the security measurements for IoT should be at first concern. In the modern day world, the most emerging cyber-attack threat for IoT is ransomware attack. Ransomware is a kind of malware with the aim of rendering a victim's computer unusable or inaccessible, and then asking the user to pay a ransom to revert the destruction. In this paper we are evaluating ransomware attacks statistics for the past 2 years and the present year to estimate growth rate of the most emerging ransomware families from the last 3 years to evaluate most threatening ransomware attacks for IoT. Growth rate results shows that the number of attacks for Cryptowall and locky ransomware are notably increasing therefore, these ransomware families are potential threat to IoT. Moreover, we present a Cryptowall ransomware attack detection model based on the communication and behavioral study of Cryptowall for IoT environment. The proposed model observes incoming TCP/IP traffic through web proxy server then extracts TCP/IP header and uses command and control (C&C) server black listing to detect ransomware attacks.

34 citations

Journal ArticleDOI
TL;DR: A survey on the most up-to-date chaos-based image encryption techniques and classifies them into spatial, temporal and spatio-temporal domains for better understanding is presented in this paper .
Abstract: Abstract Chaos-based cryptosystems have been an active area of research in recent years. Although these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems like Chebyshev polynomials can provide additional security when used with standard public key cryptosystems like RSA and El-gamal. Standard encryption algorithms such as AES have always been the primary choice, but when it comes to image or video encryption, many researchers recommend chaos-based encryption techniques due to their computational efficiency. This paper presents a survey on the most up-to-date chaos-based image encryption techniques and classifies them into spatial, temporal and spatiotemporal domains for better understanding. The significant improvements in the field of image encryption are discussed. In addition, comparative analysis is performed to validate the evaluation matrices for quantifying the encryption algorithms’ security and performance in recent papers.

33 citations

Journal ArticleDOI
TL;DR: A new model that provides authentication and data integrity in a distributed and interoperable environment and achieves both identity authentication and the ability to inter-operate between processes running on different cloud’s provider is proposed.
Abstract: The necessity to improve security in a multi-cloud environment has become very urgent in recent years. Although in this topic, many methods using the message authentication code had been realized but, the results of these methods are unsatisfactory and heavy to apply, which, is why the security problem remains unresolved in this environment. This article proposes a new model that provides authentication and data integrity in a distributed and interoperable environment. For that in this paper, the authors first analyze some security models used in a large and distributed environment, and then, we introduce a new model to solve security issues in this environment. Our approach consists of three steps, the first step, was to propose a private virtual network to secure the data in transit. Secondly, we used an authentication method based on data encryption, to protect the identity of the user and his data, and finally, we realize an algorithm to know the integrity of data distributed on the various clouds of the system. The model achieves both identity authentication and the ability to inter-operate between processes running on different cloud’s provider. A data integrity algorithm will be demonstrated. The results of this proposed model can efficiently and safely construct a reliable and stable system in the cross-cloud environment.

29 citations