Time filter

Source Type

Bangalore, India

The International Institute of Information Technology, Bangalore commonly known as IIIT-B, is a graduate school in India. Founded in 1999, it offers Integrated M.Tech., M.Tech., M.S. and PhD programs in the field of Information Technology. In February 2005, IIIT-B was conferred Deemed University status under Section 3 of the University Grants Commission Act 1956. This was re-affirmed by the Tandon Committee report in October 2009, which gave of the report) IIIT-B a score of 41 .IIIT-Bangalore is promoted by the government of Karnataka and the IT industry. IIIT-B is managed by a Governing Body with S Gopalakrishnan , executive co-chairman, Infosys Ltd., as the chairperson. Wikipedia.

Prasad A.S.,Alcatel - Lucent | Rao S.,International Institute of Information Technology Bangalore
IEEE Transactions on Computers | Year: 2014

We present a cloud resource procurement approach which not only automates the selection of an appropriate cloud vendor but also implements dynamic pricing. Three possible mechanisms are suggested for cloud resource procurement: cloud-dominant strategy incentive compatible (C-DSIC), cloud-Bayesian incentive compatible (C-BIC), and cloud optimal (C-OPT). C-DSIC is dominant strategy incentive compatible, based on the VCG mechanism, and is a low-bid Vickrey auction. C-BIC is Bayesian incentive compatible, which achieves budget balance. C-BIC does not satisfy individual rationality. In C-DSIC and C-BIC, the cloud vendor who charges the lowest cost per unit QoS is declared the winner. In C-OPT, the cloud vendor with the least virtual cost is declared the winner. C-OPT overcomes the limitations of both C-DSIC and C-BIC. C-OPT is not only Bayesian incentive compatible, but also individually rational. Our experiments indicate that the resource procurement cost decreases with increase in number of cloud vendors irrespective of the mechanisms. We also propose a procurement module for a cloud broker which can implement C-DSIC, C-BIC, or C - OPT to perform resource procurement in a cloud computing context. A cloud broker with such a procurement module enables users to automate the choice of a cloud vendor among many with diverse offerings, and is also an essential first step toward implementing dynamic pricing in the cloud. © 2013 IEEE. Source

Kulkarni S.S.,Michigan State University | Bruhadeshwar B.,International Institute of Information Technology Bangalore
Computer Communications | Year: 2010

We focus on the problem of distributing key updates in secure dynamic group communication. In secure groups, to reflect changing group membership, the group controller needs to change and distribute new keys to ensure confidentiality of the group communication. However, in the current key management algorithms, which include the well-known logical key hierarchical algorithms, the group controller broadcasts all key updates even if only a subset of users need them. In this paper, we describe key-update distribution algorithms for distributing keys to only those users who need them. Our algorithms consist of a descendant tracking scheme - to track downstream users in the multicast tree and forwarding mechanisms - to forward key updates using the descendant tracking information. The forwarding mechanisms, in turn, depend on the type of key management algorithm used by the group controller. Using our descendant tracking scheme, a node forwards an encrypted key update only if it believes that there are descendents who know the encrypting key which enables them to decrypt the required key update. Our descendant tracking scheme requires minimal state overhead, of the order of log N bits for a group of N users, to be stored at the intermediate nodes in the multicast tree. We also describe an identifier assignment algorithm that assigns closely clustered logical identifiers to users who are in physical proximity in the multicast tree. Our identifier assignment algorithms leverages the fact that logically clustered users require the approximately same set of key updates. We show that our identifier assignment algorithm improves the performance of our key update distribution algorithms as well as that of a previous solution. Furthermore, we show that, our proposed algorithms reduce the cost of secure data distribution in applications where data needs to be sent securely to only a subset of the group users. To validate our algorithms, we tested them on different key management algorithms for distributing key updates and data. Our simulations results show that a bandwidth reduction of up to 55%, compared to broadcast, is achieved by our algorithms. We also discuss implications of topology matching and logical key tree balancing on our key distribution algorithm and show that it is possible to achieve bandwidth saving up to 90% by combining all three techniques. © 2010. Source

Dash P.K.,Siksha O' Anusandhan University | Padhee M.,Siksha O' Anusandhan University | Panigrahi T.K.,International Institute of Information Technology Bangalore
International Journal of Electrical Power and Energy Systems | Year: 2012

A new time-frequency approach for power island detection in distributed generation systems is presented in this paper, using a hybrid fast variant of the S-Transform (ST) algorithm and a fuzzy expert system. The fast S-Transform algorithm with different types of frequency scaling, band pass filtering and interpolation techniques, results in significantly reduced computational cost, than the conventional S-Transform approach. The relevant spectral features of negative sequence voltage and current signals obtained from the distributed generation (DG) system terminals are extracted from the time-frequency matrix, obtained through fast ST. These features are used as inputs to a fuzzy expert system (FES), to distinguish between an islanding or non-islanding event, over a variety of operating conditions of the DGs including the change of system configurations, power imbalance, etc. The accuracy and response time of this new approach is compared with several well-known techniques (including time-frequency transform based methods), by applying it on both standard and existing distribution networks. © 2012 Elsevier Ltd. All rights reserved. Source

Das A.K.,International Institute of Information Technology Bangalore
Security and Communication Networks | Year: 2011

Key establishment in sensor networks is a challenging problem because of resource constraints of the sensors. Due to resource limitations and vulnerable to physical capture of the sensor nodes, the classical public-key routines are impractical in most sensor network architectures. In this paper, we propose a new random key pre-distribution scheme. Our scheme always defines a relationship between the ids of neighbor nodes and the keys possessed by those nodes while maintaining the required randomness in choice of keys. Our proposed scheme provides better security against node capture attack than the existing random key pre-distribution schemes. Moreover, it has better trade-off between communication overhead, network connectivity and security against node capture compared to the existing random key pre-distribution schemes. In addition, it supports dynamic node addition efficiently after initial deployment of the nodes in the network. © 2009 John Wiley & Sons, Ltd. Source

Ray P.K.,International Institute of Information Technology Bangalore | Kishor N.,Motilal Nehru National Institute of Technology | Mohanty S.R.,Motilal Nehru National Institute of Technology
IEEE Transactions on Smart Grid | Year: 2012

In this paper, comparative study between wavelet transform (WT) and S-transform (ST) based on extracted features for detection of islanding and power quality (PQ) disturbances in hybrid distributed generation (DG) system is presented. The hybrid system consists of DG resources like photovoltaic, fuel cell, and wind energy systems connected to grid. The negative sequence component of the voltage signal is used in islanding detection of these resources from the grid. Voltage signal extracted directly at the point of common coupling is considered for detection of PQ disturbances. Further, the effect of variation of grid impedances on islanding and PQ disturbances and effect of islanding on the coherency between the energy resources is also presented in this paper. The study for different scenarios of DG system is presented in the form of time-frequency analysis. The energy content and standard deviation of ST contour and WT signal is also reported in order to validate the graphical results. The results demonstrate the advantages of S-transform over WT in detection of islanding and different disturbances under noise-free as well as noisy scenarios. © 2010-2012 IEEE. Source

Discover hidden collaborations