scispace - formally typeset
Search or ask a question
Author

S. Nithya

Bio: S. Nithya is an academic researcher from VIT University. The author has contributed to research in topics: Cloud testing & Converged infrastructure. The author has an hindex of 2, co-authored 2 publications receiving 16 citations.

Papers
More filters
01 Jan 2013
TL;DR: Survey of security issues at different levels such as application level, host level and network level is presented and pay-per-use model, on-demand network access to a shared pool of configurable computing resources like Application-as a service, Platform as a service and infrastructure as a services is presented.
Abstract: Nowadays, Cloud computing is booming in most of the IT industry. Most of the organizations are moving to cloud computing due to various reasons. It provide elastic architecture accessible through internet and also it eliminate the setting up of high cost computing infrastructure for the IT based solutions and services. Cloud computing is pay-per-use model, on-demand network access to a shared pool of configurable computing resources like Application-as a service, Platform as a services and infrastructure as a services. In this paper, survey of security issues at different levels such as application level, host level and network level is presented.

12 citations

Journal ArticleDOI
01 Nov 2017

5 citations

Proceedings ArticleDOI
03 Mar 2023
TL;DR: In this article , a GANCNN-ELM-based technique was used for detecting vehicle license plates, which achieved an accuracy of 98.94% and outperformed the GAN-SVM and GAN CNN models.
Abstract: The scientific community has given license plate recognition systems a lot of consideration. The current methods for vehicle identification need to be improved due to the swift increase in vehicle numbers. In order to lessen reliance on labor, a fully automated system is needed. With the growth of Intelligent Transportation Systems, demand for license plate recognition has increased significantly. License Plate Recognition (LPR) is susceptible to environmental factors such as a complex image background, angle view, and shift in illumination, it is still difficult to correctly recognize the digit letters on license plates. When reading license plates automatically, license plate recognition uses character recognition and image processing to identify the vehicles. The license plate detection and identification subsystems are typically combined into the vehicle license recognition system in order to locate the vehicle and identify the license plate. The Extreme Learning Machine (ELM) is used for categorization, identification, and training. This research suggests a GANCNN-ELM-based technique for detecting vehicle license plates. This method produces an accuracy of about 98.94% which outperforms the GAN-ELM, GAN-SVM, and GAN-CNN models.

Cited by
More filters
Journal ArticleDOI
TL;DR: An overview on the current state of high performance cloud computing technology is given and the underlying virtualization techniques and management methods are described, and a novel approach to use high speed cluster interconnects like InfiniBand in a highperformance cloud computing environment is presented.
Abstract: Today's high performance computing systems are typically managed and operated by individual organizations in private. Computing demand is fluctuating, however, resulting in periods where dedicated resources are either underutilized or overloaded. A cloud-based Infrastructure-as-a-Service (IaaS) approach for high performance computing applications promises cost savings and more flexibility. In this model virtualized and elastic resources are utilized on-demand from large cloud computing service providers to construct virtual clusters exactly matching a customer's specific requirements. This paper gives an overview on the current state of high performance cloud computing technology and we describe the underlying virtualization techniques and management methods. Furthermore, we present a novel approach to use high speed cluster interconnects like InfiniBand in a high performance cloud computing environment.

180 citations

Proceedings ArticleDOI
01 Sep 2018
TL;DR: This paper discusses how the new extension of COTS processors - namely Software Guard eXtension (SGX) - can be exploited to implement effective mechanisms against this specific category of attacks, which is particularly challenging.
Abstract: Cross-border healthcare requires that secure mechanisms for patient data exchange among distinct eHealth infrastructures be implemented. OpenNCP is a major initiative for achieving interoperability of eHealth data among European Member States. It is an Open Source implementation of a broker-based solution that enables the exchange of clinical data among countries having different languages and regulations. It provides some level of protection - using common security technologies (e.g., TLS) - but it has not been designed with the specific goal of achieving high levels of security, and therefore it is vulnerable to more subtle attacks, such as those by privileged users and/or software. In this paper we discuss how the new extension of COTS processors - namely Software Guard eXtension (SGX) - can be exploited to implement effective mechanisms against this specific category of attacks, which is particularly challenging. We present a general approach to harden systems, and discuss in detail how we implemented it in the context of OpenNCP. Also importantly, we evaluate the performance degradation induced by SGX.

11 citations

Proceedings ArticleDOI
01 Dec 2019
TL;DR: The security issues exist in context of infrastructure, data and storage, access control in cloud environment, and also the concept of Identity and Access Control in cloud are discussed.
Abstract: Cloud computing is an emerging paradigm that provides on demand access to various resources such as servers, storage, applications, networking etc., over the internet. Cloud computing enables access to shared pool of resources, which are managed by third party cloud service providers. It comes with wide range of benefits such as low operating cost, efficiency, scalability, flexibility, etc. The cloud users can access different services and/or resources at anytime and from anywhere on pay per use basis. Hence many individual users, organizations, and businesses are moving towards cloud computing and sharing large amount of data on cloud. However, the security concern is the biggest barrier for wide adoption of cloud computing. The security issues exist in context of infrastructure, data and storage, access control in cloud environment. This paper explores various security issues in all these perspectives. The paper briefly reviews the security issues at infrastructure level, data level, and also discusses the concept of Identity and Access Control in cloud. Also the different solutions to avoid or alleviate the security issues in cloud environment are discussed.

10 citations

Proceedings ArticleDOI
11 Jul 2018
TL;DR: A state of the art is presented to preserve and protect E-health data, which consists of two tiers: cryptographic and non-cryptographic approach.
Abstract: Cloud progression have led it to be adapted in many aspects and application that serve human demands. One of the recent trends in cloud computing is the e-health services, as many healthcare institutes have begun to interchange toward the digitalized version of health records. E-health provide easy sharing of personal health care records between multiple organizations and offered real-time monitoring for the patient's state via storing this data over the cloud servers. However, having the data in such a distributed setting rises the need for having a secured data sharing with fine- grained access control, as the records are stored in a third-party service provider that is considered a semi trusted. Also, many different aspects of security should be taken into count with e-health, for instance the data is critical and should be only available to its owners. Numerous works have been done to secure the medical data in cloud environment. This work focuses on the security challenges and solutions for on Cloud-based E-health systems. Specifically, a state of the art is presented to preserve and protect E-health data, which consists of two tiers: cryptographic and non-cryptographic approach. Also, some of main issues and open problems that can be used in future studies are pointed out in this work.

9 citations

Journal ArticleDOI
TL;DR: This paper has aimed at categorizing security and privacy threats based on the kind of usage of cloud and presented an algorithm to find the appropriate solution to address theSecurity and privacy related issues as per the usage category.
Abstract: The popularity of cloud computing technology is increasing tremendously. There is no disagreement about the effectiveness of the data storage and the data transition techniques of clouds. Earlier it used distributed computing just for sharing resources. However, with technology advancement, cloud computing has become more and more powerful as well as more adaptive in various business sectors. However, with the increase in number of users, there is also an increase in the security threats affecting the users’ privacy, personal data, identity and confidentiality. In this paper, we have aimed at categorizing security and privacy threats based on the kind of usage of cloud. We have also presented an algorithm to find the appropriate solution to address the security and privacy related issues as per the usage category. This paper helps in improving security and privacy of cloud technology users without compromising the benefits of data storage.

7 citations