Work place: Department of Computer Applications, National Institute of Technology, Tiruchirappalli - 620015, India
E-mail: kumareshtce@gmail.com
Website:
Research Interests: Programming Language Theory, Automata Theory, Cellular Automata
Biography
G. Kumaresan: Research Scholar at Department of Computer Applications, National Institute of Technology Tiruchirappalli. He received MCA from Thiagarajar College of Engineering, Madurai, India. M.Tech from Bharathidasan University, Tiruchirappalli, India and M.Phil. from St.Joseph College, Tiruchirappalli, India. He has four years experience in teaching as an Assistant Professor. His areas of interest include Cellular Automata based Cryptography and Cloud Security.
By T. Vetriselvi N.P.Gopalan G. Kumaresan
DOI: https://doi.org/10.5815/ijeme.2019.04.02, Pub. Date: 8 Jul. 2019
Keyword ranking with similarity identification is an approach to find the significant Keywords in a corpus using a Variant Term Frequency Inverse Document Frequency (VTF-IDF) algorithm. Some of these may have same similarity and they get reduced to a single term when WordNet is used. The proposed approach that does not require any test or training set, assigns sentence based Weightage to the keywords(terms) and it is found to be effective. Its suitability is analyzed with several data sets using precision and recall as metrics.
[...] Read more.By G. Kumaresan N.P.Gopalan T. Vetriselvi
DOI: https://doi.org/10.5815/ijcnis.2019.02.04, Pub. Date: 8 Feb. 2019
Cryptographic image block encryption schemes play a significant role in information enabled services. This paper proposes an image block encryption scheme based on a novel three stage selection (TSS) method in a public cloud with reversible cellular automata. Due to the openness of public cloud, different attacks are possible over user sensitive information. The TSS method has three stages and they generate a robust master key with user plaintext as input and produces an encrypted block as key to be sent to authenticated users. An analysis of experimental results shows that this new method has a large key space and immune to brute force attacks, statistical cryptanalysis attacks and chosen plaintext attacks. Also, the encrypted image entropy value could be increased to 7.9988 making it ideal for a best image block encryption for key generation.
[...] Read more.DOI: https://doi.org/10.5815/ijcnis.2017.12.06, Pub. Date: 8 Dec. 2017
Security and confidentiality are the major concerns in information technology enabled services wherein data security, user authentication, industrial security and message authentication have a great deal of access to the world anywhere, anytime. The implication is: there is a need for efficient methods to secure digital data across different platforms. The concept of cellular automata finds application in the design of efficient methods to secure digital information. It is a recent field of research and its recognition has been on the rise with its high parallel structure and ability to design complex dynamic systems. In this paper, we study the basic concepts of different types of cellular automata and also discuss its applications in cryptography with various examples.
[...] Read more.DOI: https://doi.org/10.5815/ijem.2017.06.02, Pub. Date: 8 Nov. 2017
Now-a-days, one of the most exciting technology is cloud computing. Accessing dynamically virtualized resources through internet is called as cloud computing. Security and confidentiality are the major concerns in public cloud. Though EduCloud (Educational Cloud) uses public cloud, moving data from one location to another location may lead to risk. Information related to staff, student and management or admin that can be shared in EduCloud, are to be secured in public educational cloud environment. In this scenario, data security is the most critical issue in cloud. But present authentication system available does not provide enough security in public EduCloud. Hence, we propose new authentication framework to enhance security in public educational cloud. The features of various authentication techniques are discussed in this paper and a novel framework is proposed for pubic EduCloud, which provides not only security but also increases the response time. The developed software tool is best suited and provably a secured solution to the public educational cloud environment.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals