Author
Sumit Kalra
Other affiliations: Indian Institute of Technology Kanpur, Infosys, Indian Institutes of Technology
Bio: Sumit Kalra is an academic researcher from Indian Institute of Technology, Jodhpur. The author has contributed to research in topic(s): Smart contract & Cloud computing. The author has an hindex of 4, co-authored 20 publication(s) receiving 44 citation(s). Previous affiliations of Sumit Kalra include Indian Institute of Technology Kanpur & Infosys.
Papers
More filters
[...]
TL;DR: This paper has developed smart contract architecture for Leave Management System using Solidity and Ethereum, which is a decentralized app architecture leveraged from Blockchain Technology.
Abstract: In today’s time, we use Leave Application System managed by some central authority. This can lead to corruption, misuse by a single authority or unnecessary time for approval. So, in this paper, we have developed smart contract architecture for Leave Management System using Solidity and Ethereum, which is a decentralized app architecture leveraged from Blockchain Technology. We also include smartphones as IoT devices by which any client can use this app. Due to the resource-constrained nature of these devices, the smart contract app is coupled with an alternative centralized architecture which is a classic client/server architecture with an underlying Blockchain backend.
15 citations
Patent•
[...]
TL;DR: In this article, a mobile device comprising a core phone with a detachable primary device is presented, where the core phone transfers an incoming call alert to the detached primary device by synchronizing the display frame buffer of the core mobile phone with the display frames buffer associated with the primary device.
Abstract: Embodiments of the present invention provide a mobile device comprising a core phone with a detachable primary device. The core phone transfers an incoming call alert to the detached primary device by synchronizing the display frame buffer of the core phone with the display frame buffer associated with the detached primary device. A plurality of remote secondary devices can be paired with the core phone on request by said secondary devices to transfer an incoming call alert to said plurality of secondary devices and establish a connection after authorization with said detached primary device. The detachable primary device is usable by pairing with the core phone when the core phone is not used directly but remains in the vicinity. Important data in the primary device is synchronized with the core phone to avoid data loss when the primary device is accidentally dropped or lost or damaged.
7 citations
[...]
09 Feb 2018
TL;DR: This work proposes a methodological framework to manage the degree of tenancy for a microservice based multi-tenant cloud application and presents a case study to show how microservices can be distributed among multiple tenants to increase the resource utilization and meet with the heterogeneous requirements of the tenants.
Abstract: In a multi-tenant cloud application, more than one heterogeneous tenants share the single instance of the application. It increases the degree of resource sharing among tenants and brings down the operational cost. In this work, we propose a methodological framework to manage the degree of tenancy for a microservice based multi-tenant cloud application. We also present a case study to show how microservices can be distributed among multiple tenants to increase the resource utilization and, at the same time meeting with the heterogeneous requirements of the tenants.
5 citations
[...]
18 Dec 2011
TL;DR: A decision support system which can provide first level assessment of a patient by taking all the symptoms as well as vital parameters like heart rate, blood pressure, etc and uploaded to a server, which can be assessed by a doctor to provide actual treatment.
Abstract: Wireless technologies are evolving in rapid pace and becoming cheaper - this can be used to facilitate providing primary healthcare services in rural India. We have built a decision support system which can provide first level assessment of a patient by taking all the symptoms as well as vital parameters like heart rate, blood pressure, etc. It can also provide some basic treatment suggestions like Oral Rehydration Salts (ORS) for diarrhea, etc. The patient details as well as assessment can be uploaded to a server, which can be assessed by a doctor to provide actual treatment. The patient details can also be used for analytical purpose for drafting plans for future by Government agencies. The system also works as personal assistant for ASHA (Accredited Social Health Activist) health workers to assist them to do their job efficiently. This system mainly has three components: Mobile Client, Server and Database. Mobile clients are used to collect data from patients and provide first level assessment. Server component will process the data for the purpose of analysis and Authorized Doctors can retrieve patient details, ask few more questions to the patient via ASHA worker and can provide treatments over SMS or email. Database system will be used to archive data for analysis purposes.
4 citations
[...]
TL;DR: An authentication scheme that uses no centralized servers and makes IoT devices interact directly with Blockchain is designed and is implemented, which provides users the flexibility to design there own rules for authentication.
Abstract: Authentication of users and devices is one of the security issues on the internet of things (IoT). Traditionally, the authentication system is based on a centralized server, which makes it prone to various security threats and potential attacks; also, the stored data can tamper. In this paper, existing issues are resolved using Blockchain. IoT devices do not have much computational power. Blockchain technology, which uses the Proof-of-Work concept, consumes a lot of energy, which makes it not suitable for IoT devices. A new efficient scheme to reduce the computational energy of the devices is discussed, along with an authentication scheme that uses no centralized servers and makes IoT devices interact directly with Blockchain is designed and is implemented. The smart contract concept is used in this scheme, which provides users the flexibility to design there own rules for authentication.
3 citations
Cited by
More filters
Journal Article•
[...]
TL;DR: A framework for model driven engineering is set out, which proposes an organisation of the modelling 'space' and how to locate models in that space, and identifies the need for defining families of languages and transformations, and for developing techniques for generating/configuring tools from such definitions.
Abstract: The Object Management Group's (OMG) Model Driven Architecture (MDA) strategy envisages a world where models play a more direct role in software production, being amenable to manipulation and transformation by machine. Model Driven Engineering (MDE) is wider in scope than MDA. MDE combines process and analysis with architecture. This article sets out a framework for model driven engineering, which can be used as a point of reference for activity in this area. It proposes an organisation of the modelling 'space' and how to locate models in that space. It discusses different kinds of mappings between models. It explains why process and architecture are tightly connected. It discusses the importance and nature of tools. It identifies the need for defining families of languages and transformations, and for developing techniques for generating/configuring tools from such definitions. It concludes with a call to align metamodelling with formal language engineering techniques.
1,476 citations
[...]
01 Jan 2016
TL;DR: The requirements engineering a good practice guide is universally compatible with any devices to read, and can be read on any device to read.
Abstract: requirements engineering a good practice guide is available in our digital library an online access to it is set as public so you can get it instantly. Our books collection saves in multiple countries, allowing you to get the most less latency time to download any of our books like this one. Kindly say, the requirements engineering a good practice guide is universally compatible with any devices to read.
258 citations
[...]
01 Dec 2009
TL;DR: Anyone can be considered a domain expert if he or she has deep knowledge and strong practical experience in a particular domain and is capable of expressing their knowledge in the form of rules for problem solving.
Abstract: What is knowledge? § is a theoretical or practical understanding of a subject or a domain. § is also the sim of what is currently known, and apparently knowledge is power. Those who possess knowledge are called experts. § Anyone can be considered a domain expert if he or she has deep knowledge and strong practical experience in a particular domain. § The human mental process is internal, and it is too complex to be represented as an algorithm § However, most experts are capable of expressing their knowledge in the form of rules for problem solving.
127 citations
Journal Article•
[...]
TL;DR: A new framework that captures many of the design issues of Internet-scale event-based infrastructure is presented and a speculation about the potential areas for research is given.
Abstract: A new framework that captures many of the design issues was presented in this paper and it comprises seven models: an object model, event model, observation model, naming model, time model, notification model, resource model. This paper discusses each of these models in detail. We discuss the some issues related to Internet-scale event-based infrastructure and give a speculation about the potential areas for research.
70 citations
Posted Content•
[...]
TL;DR: In this article, the authors introduce a quantitative framework to analyze the security and performance implications of various consensus and network parameters of PoW blockchains, and devise optimal adversarial strategies for double-spending and selfish mining.
Abstract: Proof of Work (PoW) powered blockchains currently account for more than 90% of the total market capitalization of existing digital cryptocurrencies. Although the security provisions of Bitcoin have been thoroughly analysed, the security guarantees of variant (forked) PoW blockchains (which were instantiated with different parameters) have not received much attention in the literature. This opens the question whether existing security analysis of Bitcoin's PoW applies to other implementations which have been instantiated with different consensus and/or network parameters. In this paper, we introduce a novel quantitative framework to analyse the security and performance implications of various consensus and network parameters of PoW blockchains. Based on our framework, we devise optimal adversarial strategies for double-spending and selfish mining while taking into account real world constraints such as network propagation, different block sizes, block generation intervals, information propagation mechanism, and the impact of eclipse attacks. Our framework therefore allows us to capture existing PoW-based deployments as well as PoW blockchain variants that are instantiated with different parameters, and to objectively compare the tradeoffs between their performance and security provisions.
29 citations