Papers by Akashdeep Bhardwaj
Internet of Things, 2019
INTRODUCTION: Internet was initially designed to connect web sites and portals with data packets ... more INTRODUCTION: Internet was initially designed to connect web sites and portals with data packets flowing over the networks for communications at corporate levels. Over time, live video streaming, real-time data and voice is being offered over hosted Clouds for business entertainment. Enterprise applications like Office 365, banking and e-commerce are available over smartphones. With the advent of Fog Computing and Internet of Things, corporate enterprises and non-IT industries see potential in this technology. Billions of Internet-enabled devices, globally distributed nodes, embedded sensor gateways transmit real-time generated over the internet to the cloud data centres. Cloud environments are not designed to handle this level of data that is being generated and Computing limits are being severely tested. Fog Computing has the potential to be the go-to option for Cloud service delivery. OBJECTIVES: This paper reviewed existing research works and presents unique Smart Fog Computing based taxonomy. The authors also implemented experimental setup for Smart Cities using Smart Fog Computing for controlling Vehicular traffic. METHODS: Smart Vehicular Management is viable use case for Fog and IoT technology. The authors designed and implemented two experimental setups. The first setup involves standard Cloud implementation and the second setup employs Fog Computing implemented using IoT Sensor nodes to compare the performance of the Vehicle Management Fog application regarding the Response time and Bandwidth Consumed. The architecture and implementation involved deploying 50 IoT sensors nodes across the university areas and routes. RESULTS: The main results obtained in this paper are the following. As compared to Cloud computing, on deploying Fog Computing and IoT devices: End-to-End Processing time dropped from 29.44 to 6.7 seconds almost 77% less Number of hops traversed reduced from 56 to 4 hops almost 92% less Bandwidth usage dropped from 247 to 8 kbps almost 96.7% less CONCLUSION: From the experimental setups as compared to Cloud computing, the Fog and IoT processes the traffic data locally on the edge devices, which reduces the end-to-end time.
Network Security Journal, 2019
Network Security 15 FEATURE exploit and patch, which is the reverse of what you should expect in ... more Network Security 15 FEATURE exploit and patch, which is the reverse of what you should expect in your API security solution strategy. By contrast, an API or IAM security product is built with a secure, locked-down architecture with self-integrity checks to ensure that the product itself is not able to be compromised. This is the essential difference between a product and a toolkit. A toolkit providing security is far from being a secure product. While a toolkit bolts on security capabilities, the underlying architecture is still vulnerable to attack. Do you know whether your toolkit has all of its original parts? A hacker would certainly like you to think so. Should you build a car by gathering hundreds of different parts, or instead simply buy the car? A new security product technology is available that combines API and IAM capabilities. This product technology is called an API security gateway and it is the industry's answer to protecting and ensuring successful API and IAM strategies. Instead of the parts, it is the car. The API security gateway has emerged as a distinct and unique category of API and IAM technology where 'security' means the literal, cyber-hardening of the product itself so that API and IAM enablement can be done without risk of compromise.
Network Security Journal, 2019
Robotic technology has been rapidly transforming world economies in terms of business productivit... more Robotic technology has been rapidly transforming world economies in terms of business productivity and profitability. The market is shifting towards optimisation and automation – not just for the warehousing and manufacturing sectors, but even non-industrial areas such as defence, farming, hospitals, offices and even schools. The availability of open source platforms, falling hardware and electronics prices, prompt
prototyping and convergence of technologies are some of the major reasons for this new revolution. However, cyber security and physical threats are high-priority areas when critical applications and missions are involved.
International Journal of Computer Science Engineering (IJCSE), 2018
The rapid development of Internet and its associated content delivery technologies and use of int... more The rapid development of Internet and its associated content delivery technologies and use of interactive and innovative web application portals has led to a situation where the Web can be accessed on a multitude of different platforms. These range from desktops, laptops and tablets to smart phones like Android, Blackberry and Apple. Web designers are always on the lookout for innovative interface options. This helps easing web navigation and user experience as well as offers better enhancements and performance. Web site and application design involves use of various types of menus like Top down, Simultaneous or Sequential as interactive alternative options for the users. The menu structure defines the extent of control which is provided to the user in performing a task. Success of web applications also depends a lot on the complexity or ease of information retrieval but also the manner in which information is presented during retrieval tasks. This research paper compares the use of Simultaneous and Sequential menus on e-Commerce web application portals. This involves a survey with users browsing web content using different system for computer-human interactions with regards to user experience and web portal performance.
This article describes how the rise of fog computing to improve cloud computing perf... more This article describes how the rise of fog computing to improve cloud computing performance and the acceptance of smart devices is slowly but surely changing our future and shaping the computing environment around us. IoT integrated with advances in low cost computing, storage and power ,along with high speed networks and big data, supports distributed computing. However, much like cloud computing, which are under constant security attacks and issues, distributed computing also faces similar challenges and security threats. This can be mitigated to a great extent using fog computing, which extends the limits of Cloud services to the last mile edge near to the nodes and networks, there by increasing the performance and security levels. Fog computing also helps increase the reach and comes across as a viable solution for distributed computing. This article presents a review of the academic literature research work on the Fog Computing. The authors discuss the challenges in Fog environment and propose a new taxonomy.
Withtheriseincyber-attacksoncloudenvironmentslikeBruteForce,MalwareorDistributedDenial ofServicea... more Withtheriseincyber-attacksoncloudenvironmentslikeBruteForce,MalwareorDistributedDenial ofServiceattacks,informationsecurityofficersanddatacenteradministratorshaveamonumental task on hand. Organizations design data center and service delivery with the aim of catering to maximizedeviceprovisioning&availability,improveapplicationperformance,ensurebetterserver virtualizationandendupsecuringdatacentersusingsecuritysolutionsatinternetedgeprotection level.ThesesecuritysolutionsprovetobelargelyinadequateintimesofaDDoScyber-attack.Inthis paper,traditionaldatacenterdesignisreviewedandcomparedtotheproposedthreetierdatacenter. TheresiliencetowithstandagainstDDoSattacksismeasuredforRealUserMonitoringparameters, comparedforthetwoinfrastructuredesignsandthedataisvalidatedusingT-Test.
Cloud Computing has emerged as the prime IT computing model for an on-demand access using a pool ... more Cloud Computing has emerged as the prime IT computing model for an on-demand access using a pool of shared resources with least IT support. Cloud computing is starting to replace the legacy office IT infrastructure and helpdesk support system. Corporate and home users alike are turning into cloud service consumers in a huge way and moving their data and work to the cloud. Therefore, the CSA between the cloud service consumers and cloud service providers has critical significance that can guarantee the highest-level service quality and delivery. The current CSA fall short on the service delivery commitments with no common terminology or standard followed industry wide by the cloud service providers. Comparing agreements from multiple cloud service providers continues to be an issue. This paper provides a pragmatic approach for Cloud Service Agreements, comparing the current process with the proposed parameters and the new framework for CSA to determine the role of various elements and terms in the decision-making process for cloud service agreements for SaaS, PaaS, IaaS and STaaS.
With mission critical web applications and resources being hosted on cloud environments, and clou... more With mission critical web applications and resources being hosted on cloud environments, and cloud services growing fast, the need for having greater level of service assurance regarding fault tolerance for availability and reliability has increased. The high priority now is ensuring a fault tolerant environment that can keep the systems up and running. To minimize the impact of downtime or accessibility failure due to systems, network devices or hardware, the expectations are that such failures need to be anticipated and handled proactively in fast, intelligent way. In this paper, fault tolerance for cloud computing environments is analyzed to determine if this is effective for Cloud environments.
Cloud computing has started to gain acceptance for adoption and implementation among organization... more Cloud computing has started to gain acceptance for adoption and implementation among organizations, however, this new technology area has already started to deal with security, performance and availability challenges. Within Cloud Security issues being paramount for the corporate, private enterprises, the denial of service attacks are rated as the highest priority threat to the cloud environments. This study presents a review on the academic literature research work on the DDoS attack on Cloud, introduces a new DDoS Classification taxonomy and proposes parameters for determining an effective DDoS solution.
With the rise of cyber-attacks on cloud systems globally, Cloud Service Providers, Data carrier a... more With the rise of cyber-attacks on cloud systems globally, Cloud Service Providers, Data carrier and hosting providers are forced to provide consideration to the novel challenges posed and requirements for attacks and more specifically DDoS protection in large hosting environment setups. This paper proposes use of multi-tiered network design based on Hybrid cloud solution comprising of an On-premise solution as well as a public cloud infrastructure capable of handling hurricane sized DDoS storms.
Indian Journal of Science and Technology (INDJST), 2016
Imagine what would happen if you were stopped from accessing your own files or accessing your own... more Imagine what would happen if you were stopped from accessing your own files or accessing your own computer system. Now imagine further if to get back the access someone demanded ransom amount from you. Globally increasingly social interactions and financial transactions involve few critical aspects such as digital data, computing device and the internet. This is an area where Ransomware has spread and become a major concern against digital extortion in the form of a new age threat vector to corporate and end users alike. This paper presents the various ways and methods adopted by cyber criminals against Ransomware and present an anti-malware detection system.
The information security policy development lifecycle tend to lack focus on use of standard terms... more The information security policy development lifecycle tend to lack focus on use of standard terms and semantics. This results in blurred outlines for monitoring, evaluation and enforcement of the security policy for the employees causing confusion in adhering and implementing it which leads to lack of process of publishing form the security policy, end user awareness, translation of high level policy to lowest level component configuration plans and actions to take in time of crisis. This leads to the critical need for the designing an empirically tested, comprehensive security policy design. This paper proposes bridging the gap between the high level information security policy descriptions with the low level network infrastructure security implementation. Background Objectives: With new and innovative technologies such as Cloud, Remote computing, Enterprise Mobility, e-commerce on the rise, network security has remained an ever increasing challenge. This paper presents a security framework to bridge the gap between high level specification requirements and the low level implementation phase for network infrastructure security using the network architecture model with the security policies associated with the network components required to be enforced. Methods/Statistical Analysis: To achieve the framework design, architectural model and a set of design-level security policies are taken into consideration. Also discussed are the advantages and desired characteristics of the model, relating to existing process worked in the design area; and future research directions are pointed. Findings: The current information security policy development lifecycle tends to have few disadvantages with the most critical being the overall lack of view of the policy. Typically a narrow view can be found when focusing only on development of the security policy documents and not including the actual practices for implementation or even maintenance of the security policies. This process does not address how the security policy would be development and enforced or even evaluated. The lifecycle designs usually focus on policy for development instead of focusing on development process of the information security policy. Application: Utilizing Hybrid cloud architecture design so that internet facing tiers tend to be public clouds and internal secure applications and database tend to be private clouds. This change in network architecture helps take on the volumetric network and application layer DDoS attacks to ensure the traffic reaching the internal network tiers is free from such attackers. Using Rate controls, built-in intelligent WAFs, Client Reputation monitoring, be used in combination as part of a comprehensive defense against all types and sizes of cyber threats
With growing awareness and concerns regards to Cloud Computing and Information Security, there is... more With growing awareness and concerns regards to Cloud Computing and Information Security, there is growing awareness and usage of Security Algorithms into data systems and processes. This paper presents a brief overview and comparison of Cryptographic algorithms, with an emphasis on Symmetric algorithms which should be used for Cloud based applications and services that require data and link encryption. In this paper we review Symmetric and Asymmetric algorithms with emphasis on Symmetric Algorithms for security consideration on which one should be used for Cloud based applications and services that require data and link encryption.
Uploads
Papers by Akashdeep Bhardwaj
prototyping and convergence of technologies are some of the major reasons for this new revolution. However, cyber security and physical threats are high-priority areas when critical applications and missions are involved.
prototyping and convergence of technologies are some of the major reasons for this new revolution. However, cyber security and physical threats are high-priority areas when critical applications and missions are involved.