scispace - formally typeset
Search or ask a question
Author

Sandeep K. Sood

Bio: Sandeep K. Sood is an academic researcher from National Institute of Technology, Kurukshetra. The author has contributed to research in topics: Cloud computing & Password. The author has an hindex of 28, co-authored 140 publications receiving 3132 citations. Previous affiliations of Sandeep K. Sood include Indian Institutes of Technology & Indian Institute of Technology Roorkee.


Papers
More filters
Journal ArticleDOI
TL;DR: Results depict that the proposed Bayesian belief network classifier-based model has high accuracy and response time in determining the state of an event when compared with other classification algorithms, which enhances the utility of the proposed system.
Abstract: Internet of Things (IoT) technology provides a competent and structured approach to handle service deliverance aspects of healthcare in terms of mobile health and remote patient monitoring. IoT generates an unprecedented amount of data that can be processed using cloud computing. But for real-time remote health monitoring applications, the delay caused by transferring data to the cloud and back to the application is unacceptable. Relative to this context, we proposed the remote patient health monitoring in smart homes by using the concept of fog computing at the smart gateway. The proposed model uses advanced techniques and services, such as embedded data mining, distributed storage, and notification services at the edge of the network. Event triggering-based data transmission methodology is adopted to process the patient’s real-time data at fog layer. Temporal mining concept is used to analyze the events adversity by calculating the temporal health index of the patient. In order to determine the validity of the system, health data of 67 patients in IoT-based smart home environment was systematically generated for 30 days. Results depict that the proposed Bayesian belief network classifier-based model has high accuracy and response time in determining the state of an event when compared with other classification algorithms. Moreover, decision making based on real-time healthcare data further enhances the utility of the proposed system.

346 citations

Journal ArticleDOI
TL;DR: This paper presents a secure dynamic identity based authentication protocol for multi-server architecture using smart cards that resolves the aforementioned security flaws, while keeping the merits of Hsiang and Shih's protocol.

235 citations

Journal ArticleDOI
TL;DR: An energy-efficien t architecture for IoT has been proposed, which consists of three layers, namely, sensing and control, information processing, and presentation, which allows the system to predict the sleep interval of sensors based upon their remaining battery level, their previous usage history, and quality of information required for a particular application.
Abstract: Internet of things (IoT) is a smart technology that connects anything anywhere at any time. Such ubiquitous nature of IoT is responsible for draining out energy from its resources. Therefore, the energy efficiency of IoT resources has emerged as a major research issue. In this paper, an energy-efficien t architecture for IoT has been proposed, which consists of three layers, namely, sensing and control, information processing, and presentation. The architectural design allows the system to predict the sleep interval of sensors based upon their remaining battery level, their previous usage history, and quality of information required for a particular application. The predicted value can be used to boost the utilization of cloud resources by reprovisioning the allocated resources when the corresponding sensory nodes are in sleep mode. This mechanism allows the energy-efficient utilization of all the IoT resources. The experimental results show a significant amount of energy saving in the case of sensor nodes and improved resource utilization of cloud resources.

228 citations

Journal ArticleDOI
TL;DR: A secure ECC based mutual authentication protocol for secure communication of embedded devices and cloud servers using Hyper Text Transfer Protocol (HTTP) cookies has been proposed and achieves mutual authentication and provides essential security requirements.

219 citations

Journal ArticleDOI
TL;DR: A frame work comprising of different techniques and specialized procedures is proposed that can efficiently protect the data from the beginning to the end, i.e., from the owner to the cloud and then to the user.

206 citations


Cited by
More filters
01 Jan 2012

3,692 citations

Posted Content
TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Abstract: In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.A POR may be viewed as a kind of cryptographic proof of knowledge (POK), but one specially designed to handle a large file (or bitstring) F. We explore POR protocols here in which the communication costs, number of memory accesses for the prover, and storage requirements of the user (verifier) are small parameters essentially independent of the length of F. In addition to proposing new, practical POR constructions, we explore implementation considerations and optimizations that bear on previously explored, related schemes.In a POR, unlike a POK, neither the prover nor the verifier need actually have knowledge of F. PORs give rise to a new and unusual security definition whose formulation is another contribution of our work.We view PORs as an important tool for semi-trusted online archives. Existing cryptographic techniques help users ensure the privacy and integrity of files they retrieve. It is also natural, however, for users to want to verify that archives do not delete or modify files prior to retrieval. The goal of a POR is to accomplish these checks without users having to download the files themselves. A POR can also provide quality-of-service guarantees, i.e., show that a file is retrievable within a certain time bound.

1,783 citations

Journal ArticleDOI
TL;DR: In this article, the authors present a state-of-the-art review that presents a holistic view of the BD challenges and BDA methods theorized/proposed/employed by organizations to help others understand this landscape with the objective of making robust investment decisions.

1,267 citations

Journal ArticleDOI
TL;DR: The IoT ecosystem is presented and how the combination of IoT and DA is enabling smart agriculture, and future trends and opportunities are provided which are categorized into technological innovations, application scenarios, business, and marketability.
Abstract: The surge in global population is compelling a shift toward smart agriculture practices. This coupled with the diminishing natural resources, limited availability of arable land, increase in unpredictable weather conditions makes food security a major concern for most countries. As a result, the use of Internet of Things (IoT) and data analytics (DA) are employed to enhance the operational efficiency and productivity in the agriculture sector. There is a paradigm shift from use of wireless sensor network (WSN) as a major driver of smart agriculture to the use of IoT and DA. The IoT integrates several existing technologies, such as WSN, radio frequency identification, cloud computing, middleware systems, and end-user applications. In this paper, several benefits and challenges of IoT have been identified. We present the IoT ecosystem and how the combination of IoT and DA is enabling smart agriculture. Furthermore, we provide future trends and opportunities which are categorized into technological innovations, application scenarios, business, and marketability.

814 citations