9 results on '"PUTHAL, DEEPAK"'
Search Results
2. IoT and Big Data: An Architecture with Data Flow and Security Issues
- Author
-
Puthal, Deepak, Ranjan, Rajiv, Nepal, Surya, Chen, Jinjun, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Coulson, Geoffrey, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin Sherman, Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert Y., Series editor, Longo, Antonella, editor, Zappatore, Marco, editor, Villari, Massimo, editor, Rana, Omer, editor, Bruneo, Dario, editor, Ranjan, Rajiv, editor, Fazio, Maria, editor, and Massonet, Philippe, editor
- Published
- 2018
- Full Text
- View/download PDF
3. Running Industrial Workflow Applications in a Software-Defined Multicloud Environment Using Green Energy Aware Scheduling Algorithm.
- Author
-
Wen, Zhenyu, Garg, Saurabh, Aujla, Gagangeet Singh, Alwasel, Khaled, Puthal, Deepak, Dustdar, Schahram, Zomaya, Albert Y., and Ranjan, Rajiv
- Abstract
Industry 4.0 have automated the entire manufacturing sector (including technologies and processes) by adopting Internet of Things and cloud computing. To handle the workflows from Industrial Cyber-Physical systems, more and more data centers have been built across the globe to serve the growing needs of computing and storage. This has led to an enormous increase in energy usage by cloud data centers, which is not only a financial burden but also increases their carbon footprint. The private software defined wide area network (SDWAN) connects a cloud provider's data centers across the planet. This gives the opportunity to develop new scheduling strategies to manage cloud providers workload in a more energy-efficient manner. In this context, this article addresses the problem of scheduling data-driven industrial workflow applications over a set of private SDWAN connected data centers in an energy-efficient manner while managing tradeoff of a cloud provider’ revenue. Our proposed algorithm aims to minimize the cloud provider's revenue and the usage of nonrenewable energy by utilizing the real-world electricity prices with the availability of green energy on different cloud data centers, where the energy consumption consists of the usage of running application over multiple data centers and transferring the data among them through SDWAN. The evaluation shows that our proposed method can increase usage of green energy for the execution of industrial workflow up to $3\times$ times with a slight increase in the cost when compared to cost-based workflow scheduling methods. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
4. Detection of SLA Violation for Big Data Analytics Applications in Cloud.
- Author
-
Zeng, Xuezhi, Garg, Saurabh, Barika, Mutaz, Bista, Sanat, Puthal, Deepak, Zomaya, Albert Y., and Ranjan, Rajiv
- Subjects
BIG data ,CLOUD computing ,WEB services ,MACHINE learning ,QUALITY of service - Abstract
SLA violations do happen in real world. An SLA violation represents the failure of guaranteeing a service, which leads to unwanted consequences such as penalty payments, profit margin reduction, reputation degradation, customer churn and service interruptions. Hence, in the context of cloud-hosted big data analytics applications (BDAAs), it is paramount for providers to predict and prevent SLA violations. While machine learning-based techniques have been applied to detect SLA violations for web service or general cloud service, the study on detecting SLA violations dedicated for cloud-hosted BDAAs is still lacking. In this article, we propose four machine learning techniques and integrate 12 resampling methods to detect SLA violations for batch-based BDAAs in the cloud. We evaluate the efficiency of the proposed techniques in comparison with ideal and baseline classifiers based on a real-world trace dataset (Alibaba). Our work not only helps providers to choose the best performing prediction technique, but also provides them capabilities to uncover the hidden pattern of multiple configurations of BDAAs across layers. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
5. A dynamic prime number based efficient security mechanism for big sensing data streams.
- Author
-
Puthal, Deepak, Nepal, Surya, Ranjan, Rajiv, and Chen, Jinjun
- Subjects
- *
DATA security , *BIG data , *STREAMING technology , *PRIME numbers , *DATA quality , *SENSOR networks - Abstract
Big data streaming has become an important paradigm for real-time processing of massive continuous data flows in large scale sensing networks. While dealing with big sensing data streams, a Data Stream Manager (DSM) must always verify the security (i.e. authenticity, integrity, and confidentiality) to ensure end-to-end security and maintain data quality. Existing technologies are not suitable, because real time introduces delay in data stream. In this paper, we propose a Dynamic Prime Number Based Security Verification (DPBSV) scheme for big data streams. Our scheme is based on a common shared key that updated dynamically by generating synchronized prime numbers. The common shared key updates at both ends, i.e., source sensing devices and DSM, without further communication after handshaking. Theoretical analyses and experimental results of our DPBSV scheme show that it can significantly improve the efficiency of verification process by reducing the time and utilizing a smaller buffer size in DSM. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
6. DLSeF: A Dynamic Key-Length-Based Efficient Real-Time Security Verification Model for Big Data Stream.
- Author
-
PUTHAL, DEEPAK, NEPAL, SURYA, RANJAN, RAJIV, and JINJUN CHEN
- Subjects
DATA security ,PRIME numbers ,BIG data ,SYNCHRONIZATION ,EMERGENCY management - Abstract
Applications in risk-critical domains such as emergency management and industrial control systems need near-real-time stream data processing in large-scale sensing networks. The key problem is how to ensure online end-to-end security (e.g., confidentiality, integrity, and authenticity) of data streams for such applications. We refer to this as an online security verification problem. Existing data security solutions cannot be applied in such applications as they cannot deal with data streams with high-volume and high-velocity data in real time. They introduce a significant buffering delay during security verification, resulting in a requirement for a large buffer size for the stream processing server. To address this problem, we propose a Dynamic Key-Length-Based Security Framework (DLSeF) based on a shared key derived from synchronized prime numbers; the key is dynamically updated at short intervals to thwart potential attacks to ensure end-to-end security. Theoretical analyses and experimental results of the DLSeF framework show that it can significantly improve the efficiency of processing stream data by reducing the security verification time and buffer usage without compromising security. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
7. Editorial.
- Author
-
Pang, Shaoning, Zhang, Xuyun, Ikeda, Kazushi, Puthal, Deepak, Li, Jianxin, and Sarrafzadeh, Abdolhossein
- Subjects
REACTION time ,MOBILE computing ,ELECTRONIC data processing ,BIG data ,FUZZY neural networks ,HUMAN behavior - Abstract
We are pleased to announce the publication of the special issue focusing on the convergent study of big data processing, cloud, and Internet of Things (IoT). Big data, cloud/edge computing, and IoT have become the cornerstones that define and uphold our data-oriented, interconnected, and internet-driven reality. Scalable big data analytics for IoT with the cloud/edge computing infrastructure is the right answer. [Extracted from the article]
- Published
- 2019
- Full Text
- View/download PDF
8. Fuzzy knowledge based performance analysis on big data.
- Author
-
Bharill, Neha, Tiwari, Aruna, Malviya, Aayushi, Patel, Om Prakash, Gupta, Akahansh, Puthal, Deepak, Saxena, Amit, and Prasad, Mukesh
- Subjects
- *
BIG data , *DATA analysis , *INFORMATION storage & retrieval systems , *STATISTICAL sampling , *TECHNOLOGICAL innovations - Abstract
Due to the various emerging technologies, an enormous amount of data, termed as Big Data, gets collected every day and can be of great use in various domains. Clustering algorithms that store the entire data into memory for analysis become unfeasible when the dataset is too large. Many clustering algorithms present in the literature deal with the analysis of huge amount of data. The paper discusses a new clustering approach called an Incremental Random Sampling with Iterative Optimization Fuzzy c-Means (IRSIO-FCM) algorithm. It is implemented on Apache Spark, a framework for Big Data processing. Sparks works really well for iterative algorithms by supporting in-memory computations, scalability, etc. IRSIO-FCM not only facilitates effective clustering of Big Data but also performs storage space optimization during clustering. To establish a fair comparison of IRSIO-FCM, we propose an incremental version of the Literal Fuzzy c-Means (LFCM) called ILFCM implemented in Apache Spark framework. The experimental results are analyzed in terms of time and space complexity, NMI, ARI, speedup, sizeup, and scaleup measures. The reported results show that IRSIO-FCM achieves a significant reduction in run-time in comparison with ILFCM. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
9. Detection of SLA Violation for Big Data Analytics Applications in Cloud
- Author
-
Sanat Bista, Mutaz Barika, Deepak Puthal, Rajiv Ranjan, Saurabh Garg, Xuezhi Zeng, Albert Y. Zomaya, Zeng, Xuezhi, Garg, Saurabh, Barika, Mutaz, Bista, Sanat, Puthal, Deepak, Zomaya, Albert Y, and Ranjan, Rajiv
- Subjects
Service (systems architecture) ,Computer Hardware & Architecture ,neural network ,Computer science ,Big data ,service level agreement ,Cloud computing ,Context (language use) ,02 engineering and technology ,computer.software_genre ,Electronic mail ,Theoretical Computer Science ,Service-level agreement ,resampling ,big data ,0202 electrical engineering, electronic engineering, information engineering ,Service layer ,0803 Computer Software, 0805 Distributed Computing, 1006 Computer Hardware ,business.industry ,service layer ,SLA violation ,020202 computer hardware & architecture ,machine learning ,big data analytics application ,Computational Theory and Mathematics ,Hardware and Architecture ,Data mining ,Web service ,business ,computer ,Software - Abstract
SLA violations do happen in real world. An SLA violation represents the failure of guaranteeing a service, which leads to unwanted consequences such as penalty payments, profit margin reduction, reputation degradation, customer churn and service interruptions. Hence, in the context of cloud-hosted big data analytics applications (BDAAs), it is paramount for providers to predict and prevent SLA violations. While machine learning-based techniques have been applied to detect SLA violations for web service or general cloud service, the study on detecting SLA violations dedicated for cloud-hosted BDAAs is still lacking. In this article, we propose four machine learning techniques and integrate 12 resampling methods to detect SLA violations for batch-based BDAAs in the cloud. We evaluate the efficiency of the proposed techniques in comparison with ideal and baseline classifiers based on a real-world trace dataset (Alibaba). Our work not only helps providers to choose the best performing prediction technique, but also provides them capabilities to uncover the hidden pattern of multiple configurations of BDAAs across layers. Refereed/Peer-reviewed
- Published
- 2021
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.