Ramya Peruri

Work place: Department of Computer Science, Kennesaw State University, Kennesaw, Georgia, USA

E-mail: rperuri@students.kennesaw.edu

Website:

Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Data Structures and Algorithms, Models of Computation

Biography

Ramya Peruri, Graduate Research Assistant at Kennesaw State University, born in India on 4th may 1992. Peruri is pursuing Masters of Science in Computer Science at Kennesaw State University, Kennesaw, GA, USA with graduation in May 2016.  Peruri has done Bachelors of Technology in field of computer science at Jawaharlal Nehru Technological University, Hyderabad, India, 2014.

She is currently working as a Graduate Research Assistant in the Department of Computer Science and doing Thesis degree in masters under the research area of computational models for HPC. She was offered with an employment by Tata Consultancy Services-Asian biggest IT Company after her under-graduation. She worked as a web-developer and Lab Assistant of Information Technology during her Under-Graduation. Several papers and posters on HPC were presented by her in Graduation seminars. Her Previous research interests include Mobile Computing and cloud computing with current Research Interests of Computational Models, HPC, Big Data, and Mobile Security.

Ms. Ramya was a member of IEEE in the past and currently she is a member of ACM Student Chapter. She was awarded for her presentation on “Concurrency in HPC” in the seminar of ACM. Her android project of Expense Tracker was awarded with merit of Excellence on poster day at Kennesaw, ACM Student Chapter.

Author Articles
Security in Fog Computing through Encryption

By Akhilesh Vishwanath Ramya Peruri Jing Selena

DOI: https://doi.org/10.5815/ijitcs.2016.05.03, Pub. Date: 8 May 2016

Cloud computing is considered as one of the most exciting technology because of its flexibility and scalability. The main problem that occurs in cloud is security. To overcome the problems or issues of security, a new technique called fog-computing is evolved. As there are security issues in fog even after getting the encrypted data from cloud, we implemented the process of encryption using AES algorithm to check how it works for the fog. So far, to our analysis AES algorithm is the most secured process of encryption for security. Three datasets of different types are considered and applied the analysed encryption technique over those datasets. On validation, entire data over datasets is being accurately encrypted and decrypted back as well. We took android mobile as an edge device and deployed the encryption over datasets into it. Further, performance of encryption is evaluated over selected datasets for accuracy if the entire data is correctly encrypted and decrypted along with the time, User load, Response time, Memory Utilization over file size. Further best and worst cases among the datasets are analysed thereby evaluating the suitability of AES in fog.

[...] Read more.
Other Articles