Skip to main content

Showing 1–50 of 76 results for author: Mukhopadhyay, D

  1. arXiv:2406.06034  [pdf, other

    cs.CR

    Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors

    Authors: Anirban Chakraborty, Nimish Mishra, Debdeep Mukhopadhyay

    Abstract: Transient execution attacks have been one of the widely explored microarchitectural side channels since the discovery of Spectre and Meltdown. However, much of the research has been driven by manual discovery of new transient paths through well-known speculative events. Although a few attempts exist in literature on automating transient leakage discovery, such tools focus on finding variants of kn… ▽ More

    Submitted 14 June, 2024; v1 submitted 10 June, 2024; originally announced June 2024.

    Comments: USENIX Security Symposium, 2024

  2. arXiv:2402.11953  [pdf, other

    cs.CR cs.LG

    Stealing the Invisible: Unveiling Pre-Trained CNN Models through Adversarial Examples and Timing Side-Channels

    Authors: Shubhi Shukla, Manaar Alam, Pabitra Mitra, Debdeep Mukhopadhyay

    Abstract: Machine learning, with its myriad applications, has become an integral component of numerous technological systems. A common practice in this domain is the use of transfer learning, where a pre-trained model's architecture, readily available to the public, is fine-tuned to suit specific tasks. As Machine Learning as a Service (MLaaS) platforms increasingly use pre-trained models in their backends,… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.

  3. arXiv:2401.14098  [pdf, other

    cs.CR

    Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM

    Authors: Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, Ingrid Verbauwhede

    Abstract: Post-quantum cryptographic (PQC) algorithms, especially those based on the learning with errors (LWE) problem, have been subjected to several physical attacks in the recent past. Although the attacks broadly belong to two classes - passive side-channel attacks and active fault attacks, the attack strategies vary significantly due to the inherent complexities of such algorithms. Exploring further a… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    ACM Class: E.3.3

  4. arXiv:2310.05172  [pdf, other

    cs.CR cs.AR

    On the Amplification of Cache Occupancy Attacks in Randomized Cache Architectures

    Authors: Anirban Chakraborty, Nimish Mishra, Sayandeep Saha, Sarani Bhattacharya, Debdeep Mukhopadhyay

    Abstract: In this work, we explore the applicability of cache occupancy attacks and the implications of secured cache design rationales on such attacks. In particular, we show that one of the well-known cache randomization schemes, MIRAGE, touted to be resilient against eviction-based attacks, amplifies the chances of cache occupancy attack, making it more vulnerable compared to contemporary designs. We lev… ▽ More

    Submitted 8 October, 2023; originally announced October 2023.

  5. arXiv:2304.00955  [pdf, other

    cs.CR cs.AR

    A short note on the paper `Are Randomized Caches Really Random?'

    Authors: Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopadhyay

    Abstract: In this paper, we analyse the results and claims presented in the paper \emph{`Are Randomized Caches Truly Random? Formal Analysis of Randomized Partitioned Caches'}, presented at HPCA conference 2023. In addition, we also analyse the applicability of `Bucket and Ball' analytical model presented in MIRAGE (Usenix Security 2021) for its security estimation. We put forth the fallacies in the origina… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

  6. arXiv:2208.08697  [pdf, other

    cs.LG cs.CR cs.CV

    Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries

    Authors: Manaar Alam, Shubhajit Datta, Debdeep Mukhopadhyay, Arijit Mondal, Partha Pratim Chakrabarti

    Abstract: The security of deep learning (DL) systems is an extremely important field of study as they are being deployed in several applications due to their ever-improving performance to solve challenging tasks. Despite overwhelming promises, the deep learning systems are vulnerable to crafted adversarial examples, which may be imperceptible to the human eye, but can lead the model to misclassify. Protecti… ▽ More

    Submitted 18 August, 2022; originally announced August 2022.

  7. arXiv:2208.01113  [pdf, other

    cs.CR cs.LG

    On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel

    Authors: Shubhi Shukla, Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Pabitra Mitra

    Abstract: Recent Deep Learning (DL) advancements in solving complex real-world tasks have led to its widespread adoption in practical applications. However, this opportunity comes with significant underlying risks, as many of these models rely on privacy-sensitive data for training in a variety of applications, making them an overly-exposed threat surface for privacy violations. Furthermore, the widespread… ▽ More

    Submitted 17 February, 2024; v1 submitted 1 August, 2022; originally announced August 2022.

    Comments: 15 pages, 20 figures

  8. arXiv:2202.02430  [pdf

    cs.AI cs.MA cs.NI

    HENRI: High Efficiency Negotiation-based Robust Interface for Multi-party Multi-issue Negotiation over the Internet

    Authors: Saurabh Deochake, Shashank Kanth, Subhadip Chakraborty, Suresh Sarode, Vidyasagar Potdar, Debajyoti Mukhopadhyay

    Abstract: This paper proposes a framework for a full fledged negotiation system that allows multi party multi issue negotiation. It focuses on the negotiation protocol to be observed and provides a platform for concurrent and independent negotiation on individual issues using the concept of multi threading. It depicts the architecture of an agent detailing its components. The paper sets forth a hierarchical… ▽ More

    Submitted 4 February, 2022; originally announced February 2022.

    Comments: CUBE '12: Proceedings of the CUBE International Information Technology Conference. arXiv admin note: substantial text overlap with arXiv:1206.5884

    ACM Class: I.2.11

  9. arXiv:2112.05474  [pdf, ps, other

    cs.IT cs.DM

    A Class of $(n, k, r, t)_i$ LRCs Via Parity Check Matrix

    Authors: Deep Mukhopadhyay, Sanjit Bhowmick, Kalyan Hansda, Satya Bagchi

    Abstract: A code is called $(n, k, r, t)$ information symbol locally repairable code \big($(n, k, r, t)_i$ LRC\big) if each information coordinate can be achieved by at least $t$ disjoint repair sets, containing at most $r$ other coordinates. This paper considers a class of $(n, k, r, t)_i$ LRCs, where each repair set contains exactly one parity coordinate. We explore the systematic code in terms of the sta… ▽ More

    Submitted 24 August, 2022; v1 submitted 10 December, 2021; originally announced December 2021.

    Comments: 12 pages

  10. arXiv:2112.04948  [pdf, other

    cs.LG

    PARL: Enhancing Diversity of Ensemble Networks to Resist Adversarial Attacks via Pairwise Adversarially Robust Loss Function

    Authors: Manaar Alam, Shubhajit Datta, Debdeep Mukhopadhyay, Arijit Mondal, Partha Pratim Chakrabarti

    Abstract: The security of Deep Learning classifiers is a critical field of study because of the existence of adversarial attacks. Such attacks usually rely on the principle of transferability, where an adversarial example crafted on a surrogate classifier tends to mislead the target classifier trained on the same dataset even if both classifiers have quite different architecture. Ensemble methods against ad… ▽ More

    Submitted 9 December, 2021; originally announced December 2021.

  11. arXiv:2111.08054  [pdf, other

    econ.EM cs.AI stat.ME

    Abductive Inference and C. S. Peirce: 150 Years Later

    Authors: Deep Mukhopadhyay

    Abstract: This paper is about two things: (i) Charles Sanders Peirce (1837-1914) -- an iconoclastic philosopher and polymath who is among the greatest of American minds. (ii) Abductive inference -- a term coined by C. S. Peirce, which he defined as "the process of forming explanatory hypotheses. It is the only logical operation which introduces any new idea." Abductive inference and quantitative economics… ▽ More

    Submitted 2 February, 2023; v1 submitted 15 November, 2021; originally announced November 2021.

    Comments: Final accepted version

  12. arXiv:2110.09578  [pdf, ps, other

    cs.LO cs.LG

    Permutation Invariance of Deep Neural Networks with ReLUs

    Authors: Diganta Mukhopadhyay, Kumar Madhukar, Mandayam Srivas

    Abstract: Consider a deep neural network (DNN) that is being used to suggest the direction in which an aircraft must turn to avoid a possible collision with an intruder aircraft. Informally, such a network is well-behaved if it asks the own ship to turn right (left) when an intruder approaches from the left (right). Consider another network that takes four inputs -- the cards dealt to the players in a game… ▽ More

    Submitted 18 October, 2021; originally announced October 2021.

    Comments: There are 31 pages and 2 figures in this document. This paper was submitted to the 23rd International Conference on Verification, Model Checking, and Abstract Interpretation, but was not selected for publication

    ACM Class: F.2.1

  13. arXiv:2008.05966  [pdf, other

    cs.LG cs.CR stat.ML

    Deep-Lock: Secure Authorization for Deep Neural Networks

    Authors: Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu

    Abstract: Trained Deep Neural Network (DNN) models are considered valuable Intellectual Properties (IP) in several business models. Prevention of IP theft and unauthorized usage of such DNN models has been raised as of significant concern by industry. In this paper, we address the problem of preventing unauthorized usage of DNN models by proposing a generic and lightweight key-based model-locking scheme, wh… ▽ More

    Submitted 18 February, 2024; v1 submitted 13 August, 2020; originally announced August 2020.

  14. Skip to Secure: Securing Cyber-physical Control Loops with Intentionally Skipped Executions

    Authors: Sunandan Adhikary, Ipsita Koley, Sumana Ghosh, Saurav Kumar Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay

    Abstract: We consider the problem of provably securing a given control loop implementation in the presence of adversarial interventions on data exchange between plant and controller. Such interventions can be thwarted using continuously operating monitoring systems and also cryptographic techniques, both of which consume network and computational resources. We provide a principled approach for intentional s… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

    Comments: 9 pages

  15. arXiv:2006.13109  [pdf, other

    cs.MA cs.DC cs.NI

    An Agent-based Cloud Service Negotiation in Hybrid Cloud Computing

    Authors: Saurabh Deochake, Debajyoti Mukhopadhyay

    Abstract: With the advent of evolution of cloud computing, large organizations have been scaling the on-premise IT infrastructure to the cloud. Although this being a popular practice, it lacks comprehensive efforts to study the aspects of automated negotiation of resources among cloud customers and providers. This paper proposes a full-fledged framework for the multi-party, multi-issue negotiation system fo… ▽ More

    Submitted 16 June, 2020; originally announced June 2020.

    Comments: Fifth International Conference on ICT for Sustainable Development

  16. arXiv:2004.01712  [pdf, other

    cs.CR cs.AR

    RAPPER: Ransomware Prevention via Performance Counters

    Authors: Manaar Alam, Sayan Sinha, Sarani Bhattacharya, Swastika Dutta, Debdeep Mukhopadhyay, Anupam Chattopadhyay

    Abstract: Ransomware can produce direct and controllable economic loss, which makes it one of the most prominent threats in cyber security. As per the latest statistics, more than half of malwares reported in Q1 of 2017 are ransomwares and there is a potent threat of a novice cybercriminals accessing ransomware-as-a-service. The concept of public-key based data kidnapping and subsequent extortion was introd… ▽ More

    Submitted 3 April, 2020; originally announced April 2020.

    Comments: Australian Workshop on Offensive Cryptography, Kangacrypt 2018. arXiv admin note: substantial text overlap with arXiv:1802.03909

  17. arXiv:2002.12412  [pdf, ps, other

    cs.CR eess.SY

    Formal Synthesis of Monitoring and Detection Systems for Secure CPS Implementations

    Authors: Ipsita Koley, Saurav Kumar Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay, Amogh Kashyap K N, Sachin Kumar Singh, Lavanya Lokesh, Jithin Nalu Purakkal, Nishant Sinha

    Abstract: We consider the problem of securing a given control loop implementation of a cyber-physical system (CPS) in the presence of Man-in-the-Middle attacks on data exchange between plant and controller over a compromised network. To this end, there exist various detection schemes that provide mathematical guarantees against such attacks for the theoretical control model. However, such guarantees may not… ▽ More

    Submitted 27 February, 2020; originally announced February 2020.

    Comments: 4 Pages, Date 2019 Poster Presentation

  18. Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA

    Authors: Johann Knechtel, Elif Bilge Kavun, Francesco Regazzoni, Annelie Heuser, Anupam Chattopadhyay, Debdeep Mukhopadhyay, Soumyajit Dey, Yunsi Fei, Yaacov Belenky, Itamar Levi, Tim Güneysu, Patrick Schaumont, Ilia Polian

    Abstract: Modern electronic systems become evermore complex, yet remain modular, with integrated circuits (ICs) acting as versatile hardware components at their heart. Electronic design automation (EDA) for ICs has focused traditionally on power, performance, and area. However, given the rise of hardware-centric security threats, we believe that EDA must also adopt related notions like secure by design and… ▽ More

    Submitted 27 January, 2020; originally announced January 2020.

    Comments: To appear in DATE'20

  19. arXiv:1905.12974  [pdf, other

    cs.CR cs.OS

    ExplFrame: Exploiting Page Frame Cache for Fault Analysis of Block Ciphers

    Authors: Anirban Chakraborty, Sarani Bhattacharya, Sayandeep Saha, Debdeep Mukhopadhyay

    Abstract: Page Frame Cache (PFC) is a purely software cache, present in modern Linux based operating systems (OS), which stores the page frames that are recently being released by the processes running on a particular CPU. In this paper, we show that the page frame cache can be maliciously exploited by an adversary to steer the pages of a victim process to some pre-decided attacker-chosen locations in the m… ▽ More

    Submitted 12 February, 2020; v1 submitted 30 May, 2019; originally announced May 2019.

    Comments: 7 pages, 4 figues

  20. arXiv:1902.04560  [pdf, other

    cs.LG cs.CR stat.ML

    Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications

    Authors: Manaar Alam, Arnab Bag, Debapriya Basu Roy, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay

    Abstract: Neural Networks (NN) have recently emerged as backbone of several sensitive applications like automobile, medical image, security, etc. NNs inherently offer Partial Fault Tolerance (PFT) in their architecture; however, the biased PFT of NNs can lead to severe consequences in applications like cryptography and security critical scenarios. In this paper, we propose a revised implementation which enh… ▽ More

    Submitted 5 February, 2019; originally announced February 2019.

  21. arXiv:1812.05347  [pdf, ps, other

    cs.CR

    A 0.16pJ/bit Recurrent Neural Network Based PUF for Enhanced Machine Learning Atack Resistance

    Authors: Nimesh Shah, Manaar Alam, Durga Prasad Sahoo, Debdeep Mukhopadhyay, Arindam Basu

    Abstract: Physically Unclonable Function (PUF) circuits are finding widespread use due to increasing adoption of IoT devices. However, the existing strong PUFs such as Arbiter PUFs (APUF) and its compositions are susceptible to machine learning (ML) attacks because the challenge-response pairs have a linear relationship. In this paper, we present a Recurrent-Neural-Network PUF (RNN-PUF) which uses a combina… ▽ More

    Submitted 13 December, 2018; originally announced December 2018.

  22. arXiv:1811.05259  [pdf, other

    cs.LG stat.ML

    How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?

    Authors: Manaar Alam, Debdeep Mukhopadhyay

    Abstract: Deep Learning algorithms have recently become the de-facto paradigm for various prediction problems, which include many privacy-preserving applications like online medical image analysis. Presumably, the privacy of data in a deep learning system is a serious concern. There have been several efforts to analyze and exploit the information leakages from deep learning architectures to compromise data… ▽ More

    Submitted 13 November, 2018; originally announced November 2018.

  23. arXiv:1810.08821  [pdf, other

    cs.CR

    Testability Analysis of PUFs Leveraging Correlation-Spectra in Boolean Functions

    Authors: Durba Chatterjee, Aritra Hazra, Debdeep Mukhopadhyay

    Abstract: Testability of digital ICs rely on the principle of controllability and observability. Adopting conventional techniques like scan-chains open up avenues for attacks, and hence cannot be adopted in a straight-forward manner for security chips. Furthermore, testing becomes incredibly challenging for the promising class of hardware security primitives, called PUFs, which offer unique properties like… ▽ More

    Submitted 20 October, 2018; originally announced October 2018.

  24. arXiv:1810.00069  [pdf, other

    cs.LG cs.CR stat.ML

    Adversarial Attacks and Defences: A Survey

    Authors: Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, Debdeep Mukhopadhyay

    Abstract: Deep learning has emerged as a strong and efficient framework that can be applied to a broad spectrum of complex learning problems which were difficult to solve using the traditional machine learning techniques in the past. In the last few years, deep learning has advanced radically in such a way that it can surpass human-level performance on a number of tasks. As a consequence, deep learning is b… ▽ More

    Submitted 28 September, 2018; originally announced October 2018.

  25. arXiv:1802.04136  [pdf, other

    cs.CR

    Cryptographically Secure Multi-Tenant Provisioning of FPGAs

    Authors: Arnab Bag, Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay

    Abstract: FPGAs (Field Programmable Gate arrays) have gained massive popularity today as accelerators for a variety of workloads, including big data analytics, and parallel and distributed computing. This has fueled the study of mechanisms to provision FPGAs among multiple tenants as general purpose computing resources on the cloud. Such mechanisms offer new challenges, such as ensuring IP protection and bi… ▽ More

    Submitted 22 February, 2018; v1 submitted 12 February, 2018; originally announced February 2018.

  26. arXiv:1802.03909  [pdf, other

    cs.CR

    RAPPER: Ransomware Prevention via Performance Counters

    Authors: Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Anupam Chattopadhyay

    Abstract: Ransomware can produce direct and controllable economic loss, which makes it one of the most prominent threats in cyber security. As per the latest statistics, more than half of malwares reported in Q1 of 2017 are ransomware and there is a potent threat of a novice cybercriminals accessing rasomware-as-a-service. The concept of public-key based data kidnapping and subsequent extortion was introduc… ▽ More

    Submitted 12 February, 2018; originally announced February 2018.

  27. arXiv:1503.07477  [pdf

    cs.LG

    A Survey of Classification Techniques in the Area of Big Data

    Authors: Praful Koturwar, Sheetal Girase, Debajyoti Mukhopadhyay

    Abstract: Big Data concern large-volume, growing data sets that are complex and have multiple autonomous sources. Earlier technologies were not able to handle storage and processing of huge data thus Big Data concept comes into existence. This is a tedious job for users unstructured data. So, there should be some mechanism which classify unstructured data into organized form which helps user to easily acces… ▽ More

    Submitted 25 March, 2015; originally announced March 2015.

    Comments: 7 pages, 3 figures, 2 tables in IJAFRC, Vol.1, Issue 11, November 2014, ISSN: 2348-4853

  28. arXiv:1503.07475  [pdf

    cs.IR

    Role of Matrix Factorization Model in Collaborative Filtering Algorithm: A Survey

    Authors: Dheeraj kumar Bokde, Sheetal Girase, Debajyoti Mukhopadhyay

    Abstract: Recommendation Systems apply Information Retrieval techniques to select the online information relevant to a given user. Collaborative Filtering is currently most widely used approach to build Recommendation System. CF techniques uses the user behavior in form of user item ratings as their information source for prediction. There are major challenges like sparsity of rating matrix and growing natu… ▽ More

    Submitted 25 March, 2015; originally announced March 2015.

    Comments: 8 pages, 1 figure in IJAFRC, Vol.1, Issue 12, December 2014

  29. arXiv:1503.07474  [pdf

    cs.IR

    User Profiling Trends, Techniques and Applications

    Authors: Sumitkumar Kanoje, Sheetal Girase, Debajyoti Mukhopadhyay

    Abstract: The Personalization of information has taken recommender systems at a very high level. With personalization these systems can generate user specific recommendations accurately and efficiently. User profiling helps personalization, where information retrieval is done to personalize a scenario which maintains a separate user profile for individual user. The main objective of this paper is to explore… ▽ More

    Submitted 25 March, 2015; originally announced March 2015.

    Comments: 6 pages, 1 figure in IJAFRC, Vol.1, Issue 11, November 2014, ISSN: 2348-4853. arXiv admin note: text overlap with arXiv:1503.06555

  30. arXiv:1503.07473  [pdf

    cs.DC

    A Survey on Backup of Data on Remote Server

    Authors: Manali Raje, Debajyoti Mukhopadhyay

    Abstract: Large amount of electronic data is generated in Cloud computing every day. Efficient maintenance of this data requires proper services. Hence a method to collect data securely, by protecting and developing backups is mentioned. The Objective is to provide Auto Response Server, better solutions for data backup and restoring using Cloud. Data can be collected and sent to a centralized repository in… ▽ More

    Submitted 25 March, 2015; originally announced March 2015.

    Comments: 4 pages, 3 figures in IJSR, Vol.3, Issue 12, December 2014, ISSN: 2319-7064

  31. arXiv:1503.06562  [pdf

    cs.IR

    An Item-Based Collaborative Filtering using Dimensionality Reduction Techniques on Mahout Framework

    Authors: Dheeraj kumar Bokde, Sheetal Girase, Debajyoti Mukhopadhyay

    Abstract: Collaborative Filtering is the most widely used prediction technique in Recommendation System. Most of the current CF recommender systems maintains single criteria user rating in user item matrix. However, recent studies indicate that recommender system depending on multi criteria can improve prediction and accuracy levels of recommendation by considering the user preferences in multi aspects of i… ▽ More

    Submitted 23 March, 2015; originally announced March 2015.

    Comments: 6 pages, 4 figures, 3 tables

  32. arXiv:1503.06558  [pdf

    cs.DC cs.CR

    Algorithm for Back-up and Authentication of Data Stored on Cloud

    Authors: Manali Raje, Debajyoti Mukhopadhyay

    Abstract: Everyday a huge amount of data is generated in Cloud Computing. The maintenance of this electronic data needs some extremely efficient services. There is a need to properly collect this data, check for its authenticity and develop proper backups is needed. The Objective of this paper is to provide Response Server, some solution for the backup of data and its restoration, using the Cloud. Thecollec… ▽ More

    Submitted 23 March, 2015; originally announced March 2015.

    Comments: 4 pages, 4 figures

  33. arXiv:1503.06555  [pdf

    cs.IR cs.HC

    User Profiling for Recommendation System

    Authors: Sumitkumar Kanoje, Sheetal Girase, Debajyoti Mukhopadhyay

    Abstract: Recommendation system is a type of information filtering systems that recommend various objects from a vast variety and quantity of items which are of the user interest. This results in guiding an individual in personalized way to interesting or useful objects in a large space of possible options. Such systems also help many businesses to achieve more profits to sustain in their filed against thei… ▽ More

    Submitted 23 March, 2015; originally announced March 2015.

    Comments: 5 pages, 5 figures, 5 tables

  34. arXiv:1503.06548  [pdf

    cs.DB

    Using MongoDB for Social Networking Website

    Authors: Sumitkumar Kanoje, Varsha Powar, Debajyoti Mukhopadhyay

    Abstract: Social media is a biggest successful buzzword used in the recent time. Its success opened various opportunities for the developers. Developing any application requires storage of large data into databases. Many databases are available for the developers, Choosing the right one make development easier. MongoDB is a cross platform document oriented, schema-less database eschewed the traditional tabl… ▽ More

    Submitted 23 March, 2015; originally announced March 2015.

    Comments: 3 pages, 2 figures

  35. arXiv:1411.7639  [pdf

    cs.DC

    Analyzing Web Application Log Files to Find Hit Count Through the Utilization of Hadoop MapReduce in Cloud Computing Environment

    Authors: Sayalee Narkhede, Trupti Baraskar, Debajyoti Mukhopadhyay

    Abstract: MapReduce has been widely applied in various fields of data and compute intensive applications and also it is important programming model for cloud computing. Hadoop is an open-source implementation of MapReduce which operates on terabytes of data using commodity hardware. We have applied this Hadoop MapReduce programming model for analyzing web log files so that we could get hit count of specific… ▽ More

    Submitted 27 November, 2014; originally announced November 2014.

    Comments: 6 pages, 11 figures

  36. arXiv:1411.6777  [pdf

    cs.CR

    Modified Apriori Approach for Evade Network Intrusion Detection System

    Authors: Laxmi Lahoti, Chaitali Chandankhede, Debajyoti Mukhopadhyay

    Abstract: Intrusion Detection System or IDS is a software or hardware tool that repeatedly scans and monitors events that took place in a computer or a network. A set of rules are used by Signature based Network Intrusion Detection Systems or NIDS to detect hostile traffic in network segments or packets, which are so important in detecting malicious and anomalous behaviour over the network like known attack… ▽ More

    Submitted 25 November, 2014; originally announced November 2014.

    Comments: 5 pages, 3 figures

  37. arXiv:1411.6775  [pdf

    cs.DC

    Addressing NameNode Scalability Issue in Hadoop Distributed File System using Cache Approach

    Authors: Debajyoti Mukhopadhyay, Chetan Agrawal, Devesh Maru, Pooja Yedale, Pranav Gadekar

    Abstract: Hadoop is a distributed batch processing infrastructure which is currently being used for big data management. The foundation of Hadoop consists of Hadoop Distributed File System or HDFS. HDFS presents a client server architecture comprised of a NameNode and many DataNodes. The NameNode stores the metadata for the DataNodes and DataNode stores application data. The NameNode holds file system metad… ▽ More

    Submitted 25 November, 2014; originally announced November 2014.

    Comments: 6 pages, 3 figures

  38. arXiv:1411.6773  [pdf

    cs.IR

    Efficient Fuzzy Search Engine with B-Tree Search Mechanism

    Authors: Simran Bijral, Debajyoti Mukhopadhyay

    Abstract: Search engines play a vital role in day to day life on internet. People use search engines to find content on internet. Cloud computing is the computing concept in which data is stored and accessed with the help of a third party server called as cloud. Data is not stored locally on our machines and the softwares and information are provided to user if user demands for it. Search queries are the mo… ▽ More

    Submitted 25 November, 2014; originally announced November 2014.

    Comments: 5 pages, 6 figures

  39. arXiv:1411.6771  [pdf

    cs.CR

    Securing the Data in Clouds with Hyperelliptic Curve Cryptography

    Authors: Debajyoti Mukhopadhyay, Ashay Shirwadkar, Pratik Gaikar, Tanmay Agrawal

    Abstract: In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility, which provides various services over a network, it is prone to network based attacks. Hence security in clouds is the most important in case of… ▽ More

    Submitted 25 November, 2014; originally announced November 2014.

    Comments: 5 pages, 3 figures

  40. arXiv:1411.6767  [pdf

    cs.CY cs.DC

    Mobile Agent based Market Basket Analysis on Cloud

    Authors: Vijayata Waghmare, Debajyoti Mukhopadhyay

    Abstract: This paper describes the design and development of a location-based mobile shopping application for bakery product shops. Whole application is deployed on cloud. The three-tier architecture consists of, front-end, middle-ware and back-end. The front-end level is a location-based mobile shopping application for android mobile devices, for purchasing bakery products of nearby places. Front-end level… ▽ More

    Submitted 25 November, 2014; originally announced November 2014.

    Comments: 6 pages, 7 figures

  41. arXiv:1411.6762  [pdf

    cs.SE

    A Tool to Automate the Sizing of Application Process for SOA based Platform

    Authors: Debajyoti Mukhopadhyay, Juhi Jariwala, Payal Innani, Sheetal Bablani, Sushama Kothawale

    Abstract: Service Oriented Architecture is a loosely coupled architecture designed to tackle the problem of Business Infrastructure alignment to meet the needs of an organization. A SOA based platform enables the enterprises to develop applications in the form of independent services. To provide scalable service interactions, there is a need to maintain services performance and have a good sizing guideline… ▽ More

    Submitted 25 November, 2014; originally announced November 2014.

    Comments: 6 pages, 8 figures

  42. arXiv:1401.2902  [pdf

    cs.CV cs.IR

    An Alternate Approach for Designing a Domain Specific Image Search Prototype Using Histogram

    Authors: Sukanta Sinha, Rana Dattagupta, Debajyoti Mukhopadhyay

    Abstract: Everyone knows that thousand of words are represented by a single image. As a result image search has become a very popular mechanism for the Web searchers. Image search means, the search results are produced by the search engine should be a set of images along with their Web page Unified Resource Locator. Now Web searcher can perform two types of image search, they are Text to Image and Image to… ▽ More

    Submitted 28 November, 2013; originally announced January 2014.

    Comments: 10 pages, 8 figures, 4 tables

  43. arXiv:1312.0001  [pdf

    cs.DB

    A Proposal for the Characterization of Multi-Dimensional Inter-relationships of RDF Graphs Based on Set Theoretic Approach

    Authors: Ayan Chakraborty, Shiladitya Munshi, Debajyoti Mukhopadhyay

    Abstract: In this paper a Set Theoretic approach has been reported for analyzing inter-relationship between any numbers of RDF Graphs. An RDF Graph represents triples in Resource Description Format of semantic web. So the identification and characterization of criteria for inter-relationship of RDF Graphs shows a new road in semantic search. Using set theoretic approach, a sound framing criteria can be desi… ▽ More

    Submitted 27 November, 2013; originally announced December 2013.

    Comments: 8 pages, 5 figures. arXiv admin note: substantial text overlap with arXiv:1311.7200

  44. arXiv:1311.7210  [pdf

    cs.DC

    QoS Based Framework for Effective Web Services in Cloud Computing

    Authors: Debajyoti Mukhopadhyay, Falguni J. Chathly, Nagesh N. Jadhav

    Abstract: Enhancements in technology always follow Consumer requirements. Consumer requires best of service with least possible mismatch and on time. Numerous applications available today are based on Web Services and Cloud Computing. Recently, there exist many Web Services with similar functional characteristics. Choosing a right Service from group of similar Web Service is a complicated task for Service C… ▽ More

    Submitted 28 November, 2013; originally announced November 2013.

    Comments: 10 pages, 8 figures

  45. arXiv:1311.7204  [pdf

    cs.IR

    A Hybrid Web Recommendation System based on the Improved Association Rule Mining Algorithm

    Authors: Ujwala Wanaskar, Sheetal Vij, Debajyoti Mukhopadhyay

    Abstract: As the growing interest of web recommendation systems those are applied to deliver customized data for their users, we started working on this system. Generally the recommendation systems are divided into two major categories such as collaborative recommendation system and content based recommendation system. In case of collaborative recommen-dation systems, these try to seek out users who share s… ▽ More

    Submitted 27 November, 2013; originally announced November 2013.

    Comments: 9 pages, 7 figures, 2 tables

  46. arXiv:1311.7202  [pdf

    cs.DS

    Integrating RDF into Hypergraph-Graph (HG(2)) Data Structure

    Authors: Shiladitya Munshi, Ayan Chakraborty, Debajyoti Mukhopadhyay

    Abstract: Current paper discusses the methodologies involved in integrating Resource Description Framework into a HyperGraph Graph HG 2 data structure in order to preserve the semantics of the information contained in RDF document for dealing future cross platform information portability issues. The entire semantic web is mostly dominated by few information frameworks like RDF, Topic Map, OWL etc. Hence sem… ▽ More

    Submitted 27 November, 2013; originally announced November 2013.

    Comments: 5 pages, 3 figures, 2 tables

  47. arXiv:1311.7201  [pdf

    cs.DS

    Theories of Hypergraph-Graph (HG(2)) Data Structure

    Authors: Shiladitya Munshi, Ayan Chakraborty, Debajyoti Mukhopadhyay

    Abstract: Current paper introduces a Hypergraph Graph model of data storage which can be represented as a hybrid data structure based on Hypergraph and Graph. The pro-posed data structure is claimed to realize complex combinatorial structures. The formal definition of the data structure is presented along with the proper justification from real world scenarios. The paper reports some elementary concepts of… ▽ More

    Submitted 27 November, 2013; originally announced November 2013.

    Comments: 4 pages, 1 figure

  48. arXiv:1311.7200  [pdf

    cs.IR cs.DB

    Searching and Establishment of S-P-O Relationships for Linked RDF Graphs : An Adaptive Approach

    Authors: Ayan Chakraborty, Shiladitya Munshi, Debajyoti Mukhopadhyay

    Abstract: In the coming era of semantic web linked data analysis is a very burning issue for efficient searching and retrieval of information. One way of establishing this link is to implement subject predicate object relationship through Set Theory approach which is already done in our previous work. For analyzing inter relationship between two RDF Graphs, RDF- Schema (RDFS) should also be taken care of. I… ▽ More

    Submitted 27 November, 2013; originally announced November 2013.

    Comments: 5 pages, 4 figures. arXiv admin note: text overlap with arXiv:1107.1104 by other authors

  49. arXiv:1311.6709  [pdf

    cs.AI

    A Framework for Semi-automated Web Service Composition in Semantic Web

    Authors: Debajyoti Mukhopadhyay, Archana Chougule

    Abstract: Number of web services available on Internet and its usage are increasing very fast. In many cases, one service is not enough to complete the business requirement; composition of web services is carried out. Autonomous composition of web services to achieve new functionality is generating considerable attention in semantic web domain. Development time and effort for new applications can be reduced… ▽ More

    Submitted 26 November, 2013; originally announced November 2013.

    Comments: 6 pages, 9 figures; CUBE 2013 International Conference

  50. arXiv:1311.6578  [pdf

    cs.DB cs.CR

    Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database

    Authors: Vrushali Randhe, Archana Chougule, Debajyoti Mukhopadhyay

    Abstract: With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the database security. Attacker uses illegal and unauthorized approaches to hijack the confidential information like username, password and other vital de… ▽ More

    Submitted 26 November, 2013; originally announced November 2013.

    Comments: 9 pages, 6 figures, 3 tables; CIIT 2013 International Conference, Mumbai