Papers by A. H. Shanthakumara
International Journal of Advanced Intelligence Paradigms, Dec 31, 2022
2022 International Conference on Computer Communication and Informatics (ICCCI)

Proceedings of International Symposium on Sensor Networks, Systems and Security, 2018
The periodical re-encryption-based archival systems have many specific characteristics such as ac... more The periodical re-encryption-based archival systems have many specific characteristics such as actively re-encrypting the stored data objects periodically with or without conscious to the owner. For such a system, traditional techniques cannot be applied to check the integrity and proof of existence of a data object. For example, most traditional systems check integrity and proof of existence by comparing hash value of a data object stored in the archival system to the corresponding hash value with the owner. It may not be realistic solution due to continuous change in the bit patterns of the archivals due to periodical re-encryption. Therefore, we present a solution that is not only suitable to a specific periodical re-encryption-based archival system but also to any existing storage systems from long-term point of view.

2016 International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), 2016
This paper presents a design of an efficient archival system which dynamically balances three cru... more This paper presents a design of an efficient archival system which dynamically balances three crucial features such as security, reliability and availability. Research in archival system has focused very little on dynamic data replication to serve availability, but has instead been directed more at improving system availability through static replications. We propose an archival system, which automatically avoids unnecessary replicas and also places them to a read intensive node dynamically, instead of previously defined static locations. Traditionally, same security mechanism is used to secure all archival data objects. Our designed archival system applies different security levels for different data objects depending on their sensitivity and also varies the security level accordingly as sensitivity of the data objects varies from time to time. We have reduced the operational load by using light weight cryptographic algorithm and there is a tremendous change in the speed of data ob...
In computer vision, detection and tracking of targets is very complex problem and demands sophist... more In computer vision, detection and tracking of targets is very complex problem and demands sophisticated solutions. Unmanned Aerial Vehicles (UAVs) are increasingly being used for reconnaissance and Surveillance. This framework mainly consists of image matching for reconnaissance and Surveillance. This framework mainly consists of image matching for Digital Scene Matching Area Correlation (DSMAC), Image Registration by using various correlation techniques, Mean Shift Algorithm, Cam shift Algorithm, Otsu Thresholding and Principal Component Analysis (PCA) and using Point detectors like Scale Invariant Feature Transform (SIFT) , Speed Up Robust Feature (SURF) and Saliency Map”. KeywordsCorrelation, Cam shift algorithm, DSMAC, Image registration, Mean shift algorithm, Otsu thresholding, PCA, Saliency Map, SIFT, SURF.
2021 2nd International Conference on Smart Electronics and Communication (ICOSEC), 2021
Communications in Computer and Information Science, 2012
The accuracy of localization is a significant criterion to evaluate the practical utility of loca... more The accuracy of localization is a significant criterion to evaluate the practical utility of localization algorithm in wireless sensor networks (WSN). In mostly localization algorithms, one of the main methods to improve localization accuracy is to increase the number of anchor nodes. But the number of anchor nodes is always limited because of the hardware restrict, such as cost, energy consumption and so on. In this paper, we propose a novel which uses forwarding a query message in flooding technique for localization using anchor nodes and once a node localized it acts as virtual anchor node and it helps to localize remaining sensor nodes. It is scheme to increase and upgrade the virtual anchor nodes, while the real number of physical anchors is the same as before.
2017 2nd International Conference On Emerging Computation and Information Technologies (ICECIT), 2017
It is observed and well known that the most challenging task is to maintain availability, reliabi... more It is observed and well known that the most challenging task is to maintain availability, reliability and security of archival over a long period of time. A scalable and dynamic approach like periodical re-encryption is used to preserve these crucial features. Ensuring the retained archival in a verifiable way is a special issue due to the effect of re-encryption. The insurance to an archival is an important mechanism to quantify the value of retained document. This paper proposes a reference architecture for re-encryption based archival system with insurability services by combining the different requirements of archival users.

International Journal of Distributed and Cloud Computing, 2019
This article analyzes the needs and proposes a cloud based comprehensive reference architecture b... more This article analyzes the needs and proposes a cloud based comprehensive reference architecture based on the concept of "Archiving-as-a-Service". The reference architecture is designed in the context of new technology and organization for storing the documents and ensuring their security, reliability, availability, and authenticity over long periods of time. The article aims to bring changes in the practices of archiving documents by proposing comprehensive reference architecture with possibilities of wider approach to current outsourcing problems. This perspective, addresses the impact of cloud computing on today's archiving business, archiving service gaps, and the need of changes in the archive practice. The prototype implementation of selected modules, consider monitoring and supervising the archive documents. Finally, the authors justify the comprehensive reference architecture with the performance evaluations for some crucial services such as archiving, re-encryption, confirmation of integrity and proof of existence.
Uploads
Papers by A. H. Shanthakumara