Percorrer por autor "Misra, Sudip"
A mostrar 1 - 2 de 2
Resultados por página
Opções de ordenação
- An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computingPublication . Kumar, Neeraj; Singh, Jaskaran Preet; Bali, Rasmeet S.; Misra, Sudip; Ullah, SanaIn recent years, vehicular cloud computing (VCC) has emerged as a new technology which is being used in wide range of applications in the area of multimedia-based healthcare applications. In VCC, vehicles act as the intelligent machines which can be used to collect and transfer the healthcare data to the local, or global sites for storage, and computation purposes, as vehicles are having comparatively limited storage and computation power for handling the multimedia files. However, due to the dynamic changes in topology, and lack of centralized monitoring points, this information can be altered, or misused. These security breaches can result in disastrous consequences such as-loss of life or financial frauds. Therefore, to address these issues, a learning automata-assisted distributive intrusion detection system is designed based on clustering. Although there exist a number of applications where the proposed scheme can be applied but, we have taken multimedia-based healthcare application for illustration of the proposed scheme. In the proposed scheme, learning automata (LA) are assumed to be stationed on the vehicles which take clustering decisions intelligently and select one of the members of the group as a cluster-head. The cluster-heads then assist in efficient storage and dissemination of information through a cloud-based infrastructure. To secure the proposed scheme from malicious activities, standard cryptographic technique is used in which the auotmaton learns from the environment and takes adaptive decisions for identification of any malicious activity in the network. A reward and penalty is given by the stochastic environment where an automaton performs its actions so that it updates its action probability vector after getting the reinforcement signal from the environment. The proposed scheme was evaluated using extensive simulations on ns-2 with SUMO. The results obtained indicate that the proposed scheme yields an improvement of 10 % in detection rate of malicious nodes when compared with the existing schemes.
- Guest editorial: Secure cloud computing for mobile health servicesPublication . Abbas, Haider; Ullah, Sana; Misra, Sudip; Chen, Yuh-ShyanSeamless availability of medical and biological data to legitimate users is the top concern for healthcare systems that are being managed electronically. This demand, as a result, has paved multiple ways for modern technologies deployment in telemedicine and mobile healthcare services. The cloud computing technology deployment in healthcare systems is also considered as a part of the same initiative that has provided numerous benefits to this area. However, at the same time this also gave rise to the possibility of sensitive data exposure by various unpredictable threats associated with cloud computing technology. This threat landscape becomes more critical when it comes to the sensitive data and services management of a healthcare system. As noticed through the recent incidents, the healthcare systems are vulnerable to multiple threats, that may have serious impact on the healthcare working environment, safety of operations, patient’s data privacy and secure transmissions of medical data.
