Papers by Bineet Kumar Joshi

International Journal of Cloud Applications and Computing
In cloud computing, a third party hosts a client's data, which raises privacy and security co... more In cloud computing, a third party hosts a client's data, which raises privacy and security concerns. To maintain privacy, data should be encrypted by cryptographic techniques. However, encrypting the data makes it unsuitable for indexing and fast processing, as data needs to be decrypted to plain text before it can be further processed. Homomorphic encryption helps to overcome this shortcoming by allowing users to perform operations on encrypted data without decryption. Many academics have attempted to address the issue of data security, but none have addressed the issue of data privacy in cloud computing as thoroughly as this study has. This paper discusses the challenges involved in maintaining the privacy of cloud-based data and the techniques used to address these challenges. It was identified that homomorphic encryption is the best solution of all. This work also identified and compared the various homomorphic encryption schemes which are capable of ensuring the privacy of ...

Advances in Intelligent Systems and Computing, 2017
Cloud Computing refers to rendering services to the users over the internet. It includes the hard... more Cloud Computing refers to rendering services to the users over the internet. It includes the hardware and software in the datacenter which facilitates these services. This concept was introduced to increase the utilization of the resources available and to decrease the cost to the user because of the sharing nature of the resources. It offers a number of benefits but with those benefits come a large number of challenges. These challenges need to be tackled by the service provider in order to provide secure and reliable service. Data Storage being the main area of concern as the private data of all the users are stored at one place at all times. This data must be kept available only for that user to whom it belongs and an additional level of security must be introduces in order to prevent breach into these private sections. This paper tries to address these issues and strategies to mitigate them.

Data, Engineering and Applications, 2019
A DDoS attack is known to deny services to legitimate users. IP trace back and attack detection a... more A DDoS attack is known to deny services to legitimate users. IP trace back and attack detection are one of the main components in saving a network from such an attack. One of the key challenges is to reduce the number of packets required for trace back. Also, an attacker can spoof its IP address in order to disguise its identity. In this paper, we propound an entropy variation technique to detect the attack and a random and flow-based scheme to trace back the attack. Our algorithm is meant to deal with DDoS detection and trace back. We have also kept IP spoofing into consideration. We have defined a threshold time to check for an attack. This algorithm shows better space utilization, and works well in separating legitimate from illegitimate traffic. Our paper is divided into four parts—introduction, related work, analysis, and conclusion. Introduction consists of the basic introduction of DoS and DDoS attacks and the techniques used for the prevention, detection, and trace back of s...

International Journal of Software Science and Computational Intelligence
The term “distributed denial of service” (DDoS) refers to one of the most common types of attacks... more The term “distributed denial of service” (DDoS) refers to one of the most common types of attacks. Sending a huge volume of data packets to the server machine is the target of a DDoS attack. This results in the majority of the consumption of network bandwidth and server, which ultimately leads to an issue with denial of service. In this paper, a majority vote-based ensemble of classifiers is utilized in the Sever technique, which results in improved accuracy and reduced computational overhead, when detecting attacks. For the experiment, the authors have used the CICDDOS2019 dataset. According to the findings of the experiment, a high level of accuracy of 99.98% was attained. In this paper, the classifiers use random forest, decision tree, and naïve bayes for majority voting classifiers, and from the results and performance, it can be seen that majority vote classifiers performed better.

Lots of research and development work is going on in the field of Internet of Things. Gartner, In... more Lots of research and development work is going on in the field of Internet of Things. Gartner, Inc. has also predicted that 6.4 billion connected things will be in use worldwide in 2016 and will reach 20.8 billion by 2020. Internet of Things has so many applications in today’s day to day life like Home automation, Healthcare, Smart grid, Smart car etc., and it is generating huge amount of data which these devices are sharing. It leads to many security concerns like how to secure these devices, data and communication from unauthorized access. IoT uses minimal capacity “things” (devices) and wireless technology for communication which makes it more vulnerable. While without providing enough security, the promising benefits of Internet of Things will be misused and worthless. In this paper we will discuss briefly about Internet of Things, its applications, security requirements, security issues and major security threats.
International Journal of Modeling and Optimization, 2013
Communication channels are one of the important components of the wireless mobile ad hoc network.... more Communication channels are one of the important components of the wireless mobile ad hoc network. The link connectivity among mobile nodes moving in these channels can be measured through various performance metrics. This paper analysis the link connectivity of mobile nodes in one of the well known channel model, the Ricean fading channel, in which a strong dominant signal component is always present among several multipath signals received by receiver. Two performance matrices have been used to evaluate the link analysis of nodes. These are Link duration and Link ratio. It is discovered that the link duration is dependent on Ricean Factor K where as Link ratio shows irregular results, which represent true picture of link connectivity in the presence of fading.
2012 International Conference on Computer Communication and Informatics, 2012
Cloud computing is becoming one of the next IT industry buzz word. However, as cloud computing is... more Cloud computing is becoming one of the next IT industry buzz word. However, as cloud computing is still in its infancy, current adoption is associated with numerous challenges like security, performance, availability, etc. In cloud computing where infrastructure is shared by potentially millions of users, Distributed Denial of Service (DDoS) attacks have the potential to have much greater impact than
HCTL Open Science and Technology Letters (STL)
2018 Eleventh International Conference on Contemporary Computing (IC3)
Advances in Intelligent Systems and Computing, 2016
Perspectives in Science, 2016
T his paper deals with different types of attacks in Cloud Computing and the main aim of the pape... more T his paper deals with different types of attacks in Cloud Computing and the main aim of the paper is to pin-point the service attacks on the Cloud and the possible ways to deal with them. It deals with the issues, challenges and risks in Cloud Computing. This paper discuss different techniques to deal with the issues, challenges and risks in Cloud Computing DDoS attacks. In Cloud, Distributed Denial of Service (DDoS) attack is when the flood of messages attacks all nodes at same time.
Electronics Computer Technology (ICECT), Jan 1, 2011
Wireless communication channels experience high variability in channel quality due to a variety o... more Wireless communication channels experience high variability in channel quality due to a variety of phenomenon, including multipath, fading, atmospheric effects, and obstacles. Due to this different wireless communication channels have different capacity for transferring the data. This paper studies the movements of nodes within channel environments using Ricean, Rayleigh and Free space channel models. Three performance metrics are used for
Uploads
Papers by Bineet Kumar Joshi