scispace - formally typeset
Search or ask a question
Author

Sumit Kalra

Bio: Sumit Kalra is an academic researcher from Indian Institute of Technology, Jodhpur. The author has contributed to research in topics: Smart contract & Cloud computing. The author has an hindex of 4, co-authored 20 publications receiving 44 citations. Previous affiliations of Sumit Kalra include Indian Institute of Technology Kanpur & Infosys.

Papers
More filters
Proceedings ArticleDOI
01 Jan 2019
TL;DR: This paper has developed smart contract architecture for Leave Management System using Solidity and Ethereum, which is a decentralized app architecture leveraged from Blockchain Technology.
Abstract: In today’s time, we use Leave Application System managed by some central authority. This can lead to corruption, misuse by a single authority or unnecessary time for approval. So, in this paper, we have developed smart contract architecture for Leave Management System using Solidity and Ethereum, which is a decentralized app architecture leveraged from Blockchain Technology. We also include smartphones as IoT devices by which any client can use this app. Due to the resource-constrained nature of these devices, the smart contract app is coupled with an alternative centralized architecture which is a classic client/server architecture with an underlying Blockchain backend.

26 citations

Proceedings ArticleDOI
09 Feb 2018
TL;DR: This work proposes a methodological framework to manage the degree of tenancy for a microservice based multi-tenant cloud application and presents a case study to show how microservices can be distributed among multiple tenants to increase the resource utilization and meet with the heterogeneous requirements of the tenants.
Abstract: In a multi-tenant cloud application, more than one heterogeneous tenants share the single instance of the application. It increases the degree of resource sharing among tenants and brings down the operational cost. In this work, we propose a methodological framework to manage the degree of tenancy for a microservice based multi-tenant cloud application. We also present a case study to show how microservices can be distributed among multiple tenants to increase the resource utilization and, at the same time meeting with the heterogeneous requirements of the tenants.

7 citations

Patent
21 Mar 2012
TL;DR: In this article, a mobile device comprising a core phone with a detachable primary device is presented, where the core phone transfers an incoming call alert to the detached primary device by synchronizing the display frame buffer of the core mobile phone with the display frames buffer associated with the primary device.
Abstract: Embodiments of the present invention provide a mobile device comprising a core phone with a detachable primary device. The core phone transfers an incoming call alert to the detached primary device by synchronizing the display frame buffer of the core phone with the display frame buffer associated with the detached primary device. A plurality of remote secondary devices can be paired with the core phone on request by said secondary devices to transfer an incoming call alert to said plurality of secondary devices and establish a connection after authorization with said detached primary device. The detachable primary device is usable by pairing with the core phone when the core phone is not used directly but remains in the vicinity. Important data in the primary device is synchronized with the core phone to avoid data loss when the primary device is accidentally dropped or lost or damaged.

7 citations

Book ChapterDOI
15 Apr 2020
TL;DR: An authentication scheme that uses no centralized servers and makes IoT devices interact directly with Blockchain is designed and is implemented, which provides users the flexibility to design there own rules for authentication.
Abstract: Authentication of users and devices is one of the security issues on the internet of things (IoT). Traditionally, the authentication system is based on a centralized server, which makes it prone to various security threats and potential attacks; also, the stored data can tamper. In this paper, existing issues are resolved using Blockchain. IoT devices do not have much computational power. Blockchain technology, which uses the Proof-of-Work concept, consumes a lot of energy, which makes it not suitable for IoT devices. A new efficient scheme to reduce the computational energy of the devices is discussed, along with an authentication scheme that uses no centralized servers and makes IoT devices interact directly with Blockchain is designed and is implemented. The smart contract concept is used in this scheme, which provides users the flexibility to design there own rules for authentication.

5 citations

Proceedings ArticleDOI
18 Dec 2011
TL;DR: A decision support system which can provide first level assessment of a patient by taking all the symptoms as well as vital parameters like heart rate, blood pressure, etc and uploaded to a server, which can be assessed by a doctor to provide actual treatment.
Abstract: Wireless technologies are evolving in rapid pace and becoming cheaper - this can be used to facilitate providing primary healthcare services in rural India. We have built a decision support system which can provide first level assessment of a patient by taking all the symptoms as well as vital parameters like heart rate, blood pressure, etc. It can also provide some basic treatment suggestions like Oral Rehydration Salts (ORS) for diarrhea, etc. The patient details as well as assessment can be uploaded to a server, which can be assessed by a doctor to provide actual treatment. The patient details can also be used for analytical purpose for drafting plans for future by Government agencies. The system also works as personal assistant for ASHA (Accredited Social Health Activist) health workers to assist them to do their job efficiently. This system mainly has three components: Mobile Client, Server and Database. Mobile clients are used to collect data from patients and provide first level assessment. Server component will process the data for the purpose of analysis and Authorized Doctors can retrieve patient details, ask few more questions to the patient via ASHA worker and can provide treatments over SMS or email. Database system will be used to archive data for analysis purposes.

4 citations


Cited by
More filters
Journal Article
TL;DR: A framework for model driven engineering is set out, which proposes an organisation of the modelling 'space' and how to locate models in that space, and identifies the need for defining families of languages and transformations, and for developing techniques for generating/configuring tools from such definitions.
Abstract: The Object Management Group's (OMG) Model Driven Architecture (MDA) strategy envisages a world where models play a more direct role in software production, being amenable to manipulation and transformation by machine. Model Driven Engineering (MDE) is wider in scope than MDA. MDE combines process and analysis with architecture. This article sets out a framework for model driven engineering, which can be used as a point of reference for activity in this area. It proposes an organisation of the modelling 'space' and how to locate models in that space. It discusses different kinds of mappings between models. It explains why process and architecture are tightly connected. It discusses the importance and nature of tools. It identifies the need for defining families of languages and transformations, and for developing techniques for generating/configuring tools from such definitions. It concludes with a call to align metamodelling with formal language engineering techniques.

1,476 citations

01 Jan 2016
TL;DR: The requirements engineering a good practice guide is universally compatible with any devices to read, and can be read on any device to read.
Abstract: requirements engineering a good practice guide is available in our digital library an online access to it is set as public so you can get it instantly. Our books collection saves in multiple countries, allowing you to get the most less latency time to download any of our books like this one. Kindly say, the requirements engineering a good practice guide is universally compatible with any devices to read.

273 citations

OtherDOI
01 Dec 2009
TL;DR: Anyone can be considered a domain expert if he or she has deep knowledge and strong practical experience in a particular domain and is capable of expressing their knowledge in the form of rules for problem solving.
Abstract: What is knowledge? § is a theoretical or practical understanding of a subject or a domain. § is also the sim of what is currently known, and apparently knowledge is power. Those who possess knowledge are called experts. § Anyone can be considered a domain expert if he or she has deep knowledge and strong practical experience in a particular domain. § The human mental process is internal, and it is too complex to be represented as an algorithm § However, most experts are capable of expressing their knowledge in the form of rules for problem solving.

154 citations

Journal ArticleDOI
TL;DR: A comprehensive survey of blockchain-enabled smart contracts from both technical and usage points of view is presented in this article, where the authors identify a set of challenges and open issues that need to be addressed in future studies.
Abstract: In recent years, the rapid development of blockchain technology and cryptocurrencies has influenced the financial industry by creating a new crypto-economy. Then, next-generation decentralized applications without involving a trusted third-party have emerged thanks to the appearance of smart contracts, which are computer protocols designed to facilitate, verify, and enforce automatically the negotiation and agreement among multiple untrustworthy parties. Despite the bright side of smart contracts, several concerns continue to undermine their adoption, such as security threats, vulnerabilities, and legal issues. In this paper, we present a comprehensive survey of blockchain-enabled smart contracts from both technical and usage points of view. To do so, we present a taxonomy of existing blockchain-enabled smart contract solutions, categorize the included research papers, and discuss the existing smart contract-based studies. Based on the findings from the survey, we identify a set of challenges and open issues that need to be addressed in future studies. Finally, we identify future trends.

140 citations

Journal Article
TL;DR: A new framework that captures many of the design issues of Internet-scale event-based infrastructure is presented and a speculation about the potential areas for research is given.
Abstract: A new framework that captures many of the design issues was presented in this paper and it comprises seven models: an object model, event model, observation model, naming model, time model, notification model, resource model. This paper discusses each of these models in detail. We discuss the some issues related to Internet-scale event-based infrastructure and give a speculation about the potential areas for research.

70 citations