Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where B. B. Gupta is active.

Publication


Featured researches published by B. B. Gupta.


Future Generation Computer Systems | 2018

Secure integration of IoT and Cloud Computing

Christos Stergiou; Kostas E. Psannis; Byung-Gyu Kim; B. B. Gupta

Abstract Mobile Cloud Computing is a new technology which refers to an infrastructure where both data storage and data processing operate outside of the mobile device. Another recent technology is Internet of Things. Internet of Things is a new technology which is growing rapidly in the field of telecommunications. More specifically, IoT related with wireless telecommunications. The main goal of the interaction and cooperation between things and objects which sent through the wireless networks is to fulfill the objective set to them as a combined entity. In addition, there is a rapid development of both technologies, Cloud Computing and Internet of Things, regard the field of wireless communications. In this paper, we present a survey of IoT and Cloud Computing with a focus on the security issues of both technologies. Specifically, we combine the two aforementioned technologies (i.e Cloud Computing and IoT) in order to examine the common features, and in order to discover the benefits of their integration. Concluding, we present the contribution of Cloud Computing to the IoT technology. Thus, it shows how the Cloud Computing technology improves the function of the IoT. Finally, we survey the security challenges of the integration of IoT and Cloud Computing.


International Journal of Computer Applications | 2012

Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art

Esraa Alomari; Selvakumar Manickam; B. B. Gupta; Shankar Karuppayah; Rafeef Alfaris

Botnets are prevailing mechanisms for the facilitation of the distributed denial of service (DDoS) attacks on computer networks or applications. Currently, Botnet-based DDoS attacks on the application layer are latest and most problematic trends in network security threats. Botnet-based DDoS attacks on the application layer limits resources, curtails revenue, and yields customer dissatisfaction, among others. DDoS attacks are among the most difficult problems to resolve online, especially, when the target is the Web server. In this paper, we present a comprehensive study to show the danger of Botnet-based DDoS attacks on application layer, especially on the Web server and the increased incidents of such attacks that has evidently increased recently. Botnetbased DDoS attacks incidents and revenue losses of famous companies and government websites are also described. This provides better understanding of the problem, current solution space, and future research scope to defend against such attacks efficiently.


The Journal of Supercomputing | 2017

Internet of surveillance: a cloud supported large-scale wireless surveillance system

Mohammad A. Alsmirat; Yaser Jararweh; Islam Obaidat; B. B. Gupta

Large-scale video surveillance systems are among the necessities for securing our life these days. The high bandwidth demand and the large storage requirements are the main challenges in such systems. To face these challenges, the system can be deployed as a multi-tier framework that utilizes different technologies. In such a framework, technologies proposed under the umbrella of the Internet of Things (IoT) can play a significant rule in facing the challenges. In video surveillance, the cameras can be considered as “the things” that are streaming videos to a central processing and storage server (the cloud) through the Internet. Wireless technologies can be used to connect wireless cameras to the surveillance system more conveniently than wired cameras. Unfortunately, wireless communication in general tend to have limited bandwidth that needs careful management to achieve scalability. In this paper, we design and evaluate a reliable IoT-based wireless video surveillance system that provides an optimal bandwidth distribution and allocation to minimize the overall surveillance video distortion. We evaluate our system using NS-3 simulation. The results show that the proposed framework fully utilizes the available cloud bandwidth budget and achieves high scalability.


Future Generation Computer Systems | 2017

An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework

Vasileios A. Memos; Kostas E. Psannis; Yutaka Ishibashi; Byung-Gyu Kim; B. B. Gupta

Abstract Internet of Things (IoT) is the new technological revolution that aspires to connect all the everyday physical objects to the Internet, making a huge global network of uniquely things which can share information amongst each other and complete scheduled tasks, bringing significant benefits to users and companies of a Smart City (SC). A Smart City represents a new future framework, which integrates multiple information and communication technology (ICT) and Internet of Things (IoT) solutions, so as to improve the quality life of its citizens. However, there are many security and privacy issues which must be taken into account before the official launching of this new technological concept. Many methods which focus on media security of wireless sensor networks have been proposed and can be adopted in the new expandable network of IoT. In this paper, we describe the upcoming IoT network architecture and its security challenges and analyze the most important researches on media security and privacy in wireless sensor networks (WSNs). Subsequently, we propose an Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT network for Smart City Framework, which merges two algorithms introduced by other researchers for WSN packet routing and security, while it reclaims the new media compression standard, High Efficiency Video Coding (HEVC). Experimental analysis shows the efficacy of our proposed scheme in terms of users’ privacy, media security, and sensor node memory requirements. This scheme can be successfully integrated into the IoT network of the upcoming Smart City concept.


The Journal of Supercomputing | 2017

Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags

Aakanksha Tewari; B. B. Gupta

Internet of Things (IoT) is an evolving architecture which connects multiple devices to Internet for communication or receiving updates from a cloud or a server. In future, the number of these connected devices will increase immensely making them an indistinguishable part of our daily lives. Although these devices make our lives more comfortable, they also put our personal information at risk. Therefore, security of these devices is also a major concern today. In this paper, we propose an ultra-lightweight mutual authentication protocol which uses only bitwise operation and thus is very efficient in terms of storage and communication cost. In addition, the computation overhead is very low. We have also compared our proposed work with the existing ones which verifies the strength of our protocol, as obtained results are promising. A brief cryptanalysis of our protocol that ensures untraceability is also presented.


Multimedia Tools and Applications | 2017

Accelerating compute intensive medical imaging segmentation algorithms using hybrid CPU-GPU implementations

Mohammad A. Alsmirat; Yaser Jararweh; Mahmoud Al-Ayyoub; Mohammed A. Shehab; B. B. Gupta

Medical image processing is one of the most famous image processing fields in this era. This fame comes because of the big revolution in information technology that is used to diagnose many illnesses and saves patients lives. There are many image processing techniques used in this field, such as image reconstructing, image segmentation and many more. Image segmentation is a mandatory step in many image processing based diagnosis procedures. Many segmentation algorithms use clustering approach. In this paper, we focus on Fuzzy C-Means based segmentation algorithms because of the segmentation accuracy they provide. In many cases, these algorithms need long execution times. In this paper, we accelerate the execution time of these algorithms using Graphics Process Unit (GPU) capabilities. We achieve performance enhancement by up to 8.9x without compromising the segmentation accuracy.


Multimedia Tools and Applications | 2018

Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram

Chuying Yu; Jianzhong Li; Xuan Li; Xuechang Ren; B. B. Gupta

A novel four-image encryption scheme based on the quaternion Fresnel transforms (QFST), computer generated hologram and the two-dimensional (2D) Logistic-adjusted-Sine map (LASM) is presented. To treat the four images in a holistic manner, two types of the quaternion Fresnel transform (QFST) are defined and the corresponding calculation method for a quaternion matrix is derived. In the proposed method, the four original images, which are represented by quaternion algebra, are processed holistically in a vector manner by using QFST first. Then the input complex amplitude, which is constructed by the components of the QFST-transformed plaintext images, is encoded by Fresnel transform with two virtual independent random phase masks (RPM). In order to avoid sending entire RPMs to the receiver side for decryption, the RPMs are generated by utilizing 2D–LASM, which results that the amount of the key data is reduced dramatically. Subsequently, by using Burch’s method and the phase-shifting interferometry, the encrypted computer generated hologram is fabricated. To improve the security and weaken the correlation, the encrypted hologram is scrambled base on 2D–LASM. Experiments demonstrate the validity of the proposed image encryption technique.


Multimedia Tools and Applications | 2017

Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain

Samer Atawneh; Ammar Almomani; Hussein Al Bazar; Putra Sumari; B. B. Gupta

This paper presents a new efficient embedding algorithm in the wavelet domain of digital images based on the diamond encoding (DE) scheme. Current discrete wavelet transform (DWT) steganography adds an unacceptable distortion to the images and is considered as an ineffective in terms of security. Applying the DE scheme to the current DWT steganographic methods solves the problems of these methods, and reduces the distortion added to the images, and thus improves the embedding efficiency. The proposed algorithm first converts the secret image into a sequence of base-5 digits. After that, the cover image is transformed into the DWT domain and segmented into 2 × 1 coefficient pairs. The DE scheme is used then to change at most one coefficient of each coefficient pair to embed the base-5 digits. Experimental results depict that the proposed algorithm is more efficient in embedding compared to other methods in terms of embedding payload and image quality. Moreover, the proposed algorithm is attacked by well-known steganalysis software. Results are showing that the proposed algorithm is secure against the powerful universal steganalyzer “ensemble classifier” and the histogram attack. The results also reveal that the proposed algorithm is robust against different image processing attacks such as compression, added noise, and cropping attacks.


Neural Computing and Applications | 2017

Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment

B. B. Gupta; Omkar P. Badve

Abstract As Cloud computing is reforming the infrastructure of IT industries, it has become one of the critical security concerns of the defensive mechanisms applied to secure Cloud environment. Even if there are tremendous advancements in defense systems regarding the confidentiality, authentication and access control, there is still a challenge to provide security against availability of associated resources. Denial-of-service (DoS) attack and distributed denial-of-service (DDoS) attack can primarily compromise availability of the system services and can be easily started by using various tools, leading to financial damage or affecting the reputation. These attacks are very difficult to detect and filter, since packets that cause the attack are very much similar to legitimate traffic. DoS attack is considered as the biggest threat to IT industry, and intensity, size and frequency of the attack are observed to be increasing every year. Therefore, there is a need for stronger and universal method to impede these attacks. In this paper, we present an overview of DoS attack and distributed DoS attack that can be carried out in Cloud environment and possible defensive mechanisms, tools and devices. In addition, we discuss many open issues and challenges in defending Cloud environment against DoS attack. This provides better understanding of the DDoS attack problem in Cloud computing environment, current solution space, and future research scope to deal with such attacks efficiently.


Multimedia Tools and Applications | 2018

XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud

Shashank Gupta; B. B. Gupta

This article presents a novel framework XSS-Secure, which detects and alleviates the propagation of Cross-Site Scripting (XSS) worms from the Online Social Network (OSN)-based multimedia web applications on the cloud environment. It operates in two modes: training and detection mode. The former mode sanitizes the extracted untrusted variables of JavaScript code in a context-aware manner. This mode stores such sanitized code in sanitizer snapshot repository and OSN web server for further instrumentation in the detection mode. The detection mode compares the sanitized HTTP response (HRES) generated at the OSN web server with the sanitized response stored at the sanitizer snapshot repository. Any variation observed in this HRES message will indicate the injection of XSS worms from the remote OSN servers. XSS-Secure determines the context of such worms, perform the context-aware sanitization on them and finally sanitized HRES is transmitted to the OSN user. The prototype of our framework was developed in Java and integrated its components on the virtual machines of cloud environment. The detection and alleviation capability of our cloud-based framework was tested on the platforms of real world multimedia-based web applications including the OSN-based Web applications. Experimental outcomes reveal that our framework is capable enough to mitigate the dissemination of XSS worm from the platforms of non-OSN Web applications as well as OSN web sites with acceptable false negative and false positive rate.

Collaboration


Dive into the B. B. Gupta's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yaser Jararweh

Jordan University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Mahmoud Al-Ayyoub

Jordan University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mohammad A. Alsmirat

Jordan University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zhiyong Zhang

Henan University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge