Visible to the public Biblio

Filters: Author is Gopalan, N. P.  [Clear All Filters]
2018-01-16
Preethi, G., Gopalan, N. P..  2016.  Integrity Verification For Outsourced XML Database In Cloud Storage. Proceedings of the International Conference on Informatics and Analytics. :42:1–42:5.

Database outsourcing has gained significance like the "Application-as-a-Service" model wherein a third party provider has not trusted. The problems related to security and privacy of outsourced XML data are data confidentiality, user privacy/data privacy and finally query assurance. Existing techniques of query assurance involve properties of certain cryptographic primitives in static scenarios. A novel dynamic index structure is called Merkle Hash and B+- Tree. The combination of B+- Tree and Merkle Hash Tree advantages has been proposed in this paper for dynamic outsourced XML databases. The query assurances having the issues are correctness query Completeness and Freshness for the stored XML Database. In addition, the outsourced XML database with integrity verification has been shown to be more efficient and supports updates in cloud paradigms.

2017-10-27
Samson, A., Gopalan, N. P..  2016.  Software Defined Networking: Identification of Pathways for Security Threats. Proceedings of the International Conference on Informatics and Analytics. :16:1–16:6.
As Industries and Data Center plan to implement Software Defined Networking (SDN), the main concern is the anxiety about security. The Industries and Data Centers are curious to know how a SDN product will support them that their data, supporting applications and built in infrastructure are not vulnerable to threats. The initiation of SDN, will demand new pathways for securing control plane traffic. The traditional networks usually trust switching intelligence to implement various defense mechanisms besides known attacks. Many attacks which distress traditional networks also affect SDNs, partially due to SDN architecture complexities and most prominent among them is DoS. This paper identifies the pathways of threats to SDN systems and discuss methods to ways to mitigate them.