Institution
Thapar University
Education•Patiāla, Punjab, India•
About: Thapar University is a education organization based out in Patiāla, Punjab, India. It is known for research contribution in the topics: Cloud computing & Fuzzy logic. The organization has 2944 authors who have published 8558 publications receiving 130392 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: A two-stage lightweight mutual authentication protocol well suited to SDN-backed multi UAV networks deployed in surveillance areas and compared with other state-of-the-art works in terms of computation latency and resilience against known security attacks is presented.
63 citations
••
01 Sep 2018
TL;DR: Using the proposed survey, a detailed taxonomy based upon the types of attacks and possible solutions to handle these attacks is proposed and various emerging open issues and challenges along with the security threats are identified and discussed in the paper.
63 citations
••
TL;DR: This paper investigates deduplication techniques based on text and multimedia data along with their corresponding taxonomies as these techniques have different challenges for duplicate data detection.
Abstract: The exponential growth of digital data in cloud storage systems is a critical issue presently as a large amount of duplicate data in the storage systems exerts an extra load on it. Deduplication is an efficient technique that has gained attention in large-scale storage systems. Deduplication eliminates redundant data, improves storage utilization and reduces storage cost. This paper presents a broad methodical literature review of existing data deduplication techniques along with various existing taxonomies of deduplication techniques that have been based on cloud data storage. Furthermore, the paper investigates deduplication techniques based on text and multimedia data along with their corresponding taxonomies as these techniques have different challenges for duplicate data detection. This research work is useful to identify deduplication techniques based on text, image and video data. It also discusses existing challenges and significant research directions in deduplication for future researchers, and article concludes with a summary of valuable suggestions for future enhancements in deduplication.
63 citations
••
TL;DR: A novel multi-objective differential evolution based random forest technique is proposed that is able to tune the parameters of random forest in an efficient manner and outperforms existing techniques in terms of accuracy, f-measure, sensitivity and specificity.
Abstract: Many machine learning techniques have been used in past few decades for various medical applications. However, these techniques suffer from parameter tuning issue. Therefore, an efficient tuning of...
63 citations
••
20 May 2019TL;DR: Blockchain technology is used for the storage of collected data from the drones and update the information into the distributed ledgers to reduce the burden of drones.
Abstract: Data Dissemination is the distribution of data/statistics to the end users. With the adoption of Internet of Drones (IoD) environment for data dissemination, an efficient scheme is proposed which provides data integrity, identity anonymity, authentication, authorization, accountability (AAA) to the system model. We propose a system model having Ethereum based public blockchain distributed network in order to secure drone communication for the data collection and transmission. The proposed model provides secure communication between the drones and the users in a decentralized way. In this paper, blockchain technology is used for the storage of collected data from the drones and update the information into the distributed ledgers to reduce the burden of drones. It also provides integrity, authentication, and authorization to the collected data by the drones in the system model. Motivated by this consideration, the goal of this paper is threefold. First, we select a forger node from the number of drones. Second, we create blocks and validate their processes. Third, we provide secure data dissemination by applying Proof-of-Stake consensus mechanism. Afterward, we evaluate the security of the presented system model compared against the corresponding ones of some state-of-the-art in terms of communication time/cost. The results confirm that our system model is reliable and scalable for data dissemination in the IoD environment.
63 citations
Authors
Showing all 3035 results
Name | H-index | Papers | Citations |
---|---|---|---|
Gaurav Sharma | 82 | 1244 | 31482 |
Vinod Kumar | 77 | 815 | 26882 |
Neeraj Kumar | 76 | 587 | 18575 |
Ashish Sharma | 75 | 909 | 20460 |
Dinesh Kumar | 69 | 1333 | 24342 |
Pawan Kumar | 64 | 547 | 15708 |
Harish Garg | 61 | 311 | 11491 |
Rafat Siddique | 58 | 183 | 11133 |
Surya Prakash Singh | 55 | 736 | 12989 |
Abhijit Mukherjee | 55 | 378 | 10196 |
Ajay Kumar | 53 | 809 | 12181 |
Soumen Basu | 45 | 247 | 7888 |
Sudeep Tanwar | 43 | 263 | 5402 |
Yosi Shacham-Diamand | 42 | 287 | 6463 |
Rupinder Singh | 42 | 458 | 7452 |