Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Balamurugan Balusamy is active.

Publication


Featured researches published by Balamurugan Balusamy.


Future Generation Computer Systems | 2018

Computationally Efficient Privacy Preserving Anonymous Mutual and Batch Authentication Schemes for Vehicular Ad Hoc Networks

Pandi Vijayakumar; Victor Chang; L. Jegatha Deborah; Balamurugan Balusamy; P. G. Shynu

In the near future, it is envisioned that vehicular Ad hoc networks (VANETs) will be making use of long-distance communication techniques, such as cellular networks and Worldwide Interoperability for Microwave Access (WiMAX), to get instant Internet access for making the communication between vehicles and fixed road side infrastructure. Moreover, VANETs will also make use of short-distance communication methods, such as Dedicated Short-Range Communications (DSRC) and Wireless Fidelity (Wi-Fi) to perform short range communication between vehicles in an ad hoc manner. This Internet connection can provide facility to other vehicles to send traffic related messages, collisions, infotainment messages other useful safety alerts. In such a scenario, providing authentication between vehicle to infrastructure and vehicle to vehicle is a challenging task. In order to provide this facility, in this paper, we propose a computationally efficient privacy preserving anonymous authentication scheme based on the use of anonymous certificates and signatures for VANETs in making them an important component of Internet of Things (IoT) and the development of smart cities. Even though there are several existing schemes available to provide such anonymous authentication based on anonymous certificates and signatures in VANETs, the existing schemes suffer from high computational cost in the certificate revocation list (CRL) checking process and in the certificate and the signature verification process. Therefore, it is not possible to meet the requirement of verifying a large number of messages per second in VANETs which would lead to increased message loss. Hence, we use a computationally efficient anonymous mutual authentication scheme to validate the message source as well as to ensure the integrity of messages along with a conditional tracking mechanism to trace the real identity of misbehaving vehicles and revoke them from VANET in the case of dispute. In this paper, we also introduce an efficient anonymous batch authentication protocol to be used in IoT for Road Side Units (RSUs) to authenticate multiple vehicles simultaneously rather than one after the other such that the total authentication time can be dramatically reduced. This proposed scheme is implemented and the performance analysis shows that our scheme is more efficient in terms of certificate and signature verification cost, while preserving conditional privacy in VANETs.


Future Generation Computer Systems | 2017

Time efficient secure DNA based access control model for cloud computing environment

Suyel Namasudra; Pinki Roy; Pandi Vijayakumar; Sivaraman Audithan; Balamurugan Balusamy

The uses of Big Data (BD) are gradually increasing in many new emerging applications, such as Facebook, eBay, Snapdeal, etc. BD is a term, which is used for describing a large volume of data. The data security is always a big concern of BD. Besides the data security, other issues of BD are data storage, high data accessing time, high data searching time, high system overhead, server demand, etc. In this paper, a new access control model has been proposed for BD to solve all these issues, where fast accessing of the large volume of data are provided based on the data size Here, a long 512-bit Deoxyribonucleic Acid (DNA) based key sequence has been used for improving the data security, and it is secured against the collision attack, man-in-the-middle attack, internal attack, etc. The proposed scheme is evaluated in terms of both theoretical and experimental results, which show the proficiency of the proposed scheme over the existing schemes. The proposed scheme uses data sizes for efficient and secure data accessing.To improve the data security, a long 512-bit key has been used in the proposed scheme.Key generation and key retrieval time at the data owners side and users side are respectively less.Experimental results and theoretical discussions prove the efficiency of the proposed scheme.


International Journal of Grid and Utility Computing | 2015

Collective advancements on access control scheme for multi-authority cloud storage system

Balamurugan Balusamy; P. Venkata Krishna

In this information age, the amount of data generated by an individual and organisation is increasing exponentially. Cloud computing has come as a rescue to store and compute the data efficiently at a low cost. On the other hand, according to cloud security alliance, the threats and vulnerabilities related to cloud computing are on the rise and they may reach an uncontrollable level if cloud security inhabits the same shape. Attribute-based encryption techniques are used in several critical applications for data access control. Our proposed work enhances the security of DAC-MAC during the user registration phase by the advent of digital signature over user credentials for avoiding man-in-the-middle attack and providing non-repudiation during user registration phase. Secondly, a verification scheme based on user-privilege list for file access request is included. Lastly, by logging the user behaviours in the separate database table, the authenticity of the access node can be verified, monitored and DDoS attack can be nullified. The framework could be used for IaaS application.


Cluster Computing | 2017

Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks

Pandi Vijayakumar; Maria Azees; Victor Chang; L. Jegatha Deborah; Balamurugan Balusamy

The incorporation of electronics by embedding the relevant sensors in the physical devices in home and office, vehicles of all types, buildings in the smart cities and in all possible spheres of life form a network of devices termed as internet of things (IoT). It is being realized that vehicular ad-hoc networks (VANETs) which are responsible for the reliable and secure communication among vehicles is a primary area of research in IoT and hence ensuring security in this area is essential. Thus, this work introduces a novel approach to improve the existing authentication support to VANETs. In this proposed framework, first an anonymous authentication approach for preserving the privacy is proposed which not only performs the vehicle user’s anonymous authentication but preserves the message integrity of the transmitting messages as well. Although many anonymous authentication schemes have been proposed in VANETs until now, the existing schemes suffer from a high computation cost during the signature and certificate verification process which leads to delayed authentication. Consequently, the vehicles and roadside units (RSUs) cannot authenticate more number of vehicles per second in VANETs. Second, an efficient anonymous group key distribution protocol is proposed in this paper for securely distributing the group key to the group of vehicles in the communication range of an RSU. The RSUs can send location based information to the group of vehicles in a secure manner using this group key. Experimental analysis portrays that the results of this new privacy preserving anonymous authentication and key management schemes are promising and efficient with regard to signature verification cost and computational cost in comparison with the existing schemes.


Archive | 2015

Enhanced Security Framework for Data Integrity Using Third-party Auditing in the Cloud System

Balamurugan Balusamy; P. Venkatakrishna; Abinaya Vaidhyanathan; Meenakshi Ravikumar; Nirmala Devi Munisamy

Cloud computing is an evolving paradigm that has been resulted as an adoption of available technologies. Although cloud technology allows users to take more benefits from available infrastructures, and virtualization, which is an enabling technology provided by the cloud allows users to manage and use the resources in an efficient and easiest manner, it does not guarantee data integrity and security over the resources stored in the cloud. Though many security frameworks have been developed for the cloud, still there may be loss of data or loss of control over data uploaded into the cloud. And also, many solutions for data integrity by third-party auditor are available but they are semi-trustable, if third-party auditors (TPA) compromise unauthorized access over the resource in the cloud. Hence, our proposed scheme focuses on extended framework that guarantees data integrity by involving data owner to perform auditing on the outsourced data in the cloud. And so, our proposed scheme achieves data integrity and guarantees security to the data owners for their resource in the cloud to major extent. Therefore, this type of TPA approach creates awareness to the data owner of their resource and thereby guarantees data integrity for every resources stored in the cloud.


International Journal of Innovative Computing and Applications | 2015

Bio-inspired algorithms for cloud computing: a review

Balamurugan Balusamy; Jayashree Sridhar; Divya Dhamodaran; P. Venkata Krishna

Cloud computing provides internet-based services to access different kind of service or resources, eliminating the need for centralised data access. There are several challenges available in cloud computing, where specific issues like resource provisioning, load imbalance and performance improvement can be solved using bio-inspired algorithms. Bio-inspired algorithms have the tendency to solve various kinds of problems naturally by providing optimised solutions. Though it is not used in cloud computing to a greater extent, it is applicable in networking, pattern recognition, data mining, wireless sensor networks, etc. The adaptability influences the use of bio-inspired algorithms to solve the major issues in cloud computing. The paper provides an extensive survey of bio-inspired algorithms for solving and optimising problems related to resource scheduling, load balancing, file searching and security in cloud computing. The work compares the performance, response time and cost optimisation of each algorithm applicable for cloud computing environment.


Cluster Computing | 2018

A framework for smart traffic management using hybrid clustering techniques

E. Vijay Sekar; J. Anuradha; Anshita Arya; Balamurugan Balusamy; Victor Chang

Due to increase in traffic in cities and on major roads, it has become a necessity to have an efficient traffic management system to handle such scenarios. Present traffic management system performs mere traffic monitoring and event handling which cannot be a viable system for highly populous country like India and China. In this paper, we propose a system that will predict the densely populated roads based on the present and past traffic congestion. This system also suggests the alternate paths for the given source and destination. A simulation of live stream of online data is performed on legacy traffic data set which is processed incrementally. Density based clustering is applied after Fuzzification of data to assign weightage for the densely congested path on the route map. The weightage for the path on the given time helps to decide the best route form the source to destination. Floyd’s algorithm is also applied to find the shortest set of alternate path for the given source to destination.


the internet of things | 2017

Analysis of Measures to Achieve Resilience during Virtual Machine Interruptions in IaaS Cloud Service

Priya Vedhanayagam; S. Subha; Balamurugan Balusamy; Pandi Vijayakumar; Victor Chang

In cloud computing era, the resilience issues faced by cloud computing services may be high. And therefore, the best alternative to reckon with the effects on the Quality-of-Service is to preserve resilience of Cloud computing service. To address this issue, an analytical model is proposed to study queueing system to handle various virtual machine interruptions. The proposed model recommends a secondary virtual machine to redeem the primary virtual machine during a probable halt. The work highlights the innovation employed for analysing the measures to achieve resilience during virtual machine interruptions in IaaS cloud service, the main objective of this research. The model is simulated using SHARPE and the results declare guaranteed performance for the IaaS clients to achieve high availability of service as the response time never deflate during VM interruptions.


International Journal of Network Security | 2017

A Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System

Balamurugan Balusamy; P. Venkata Krishna; G. S. Tamizh Arasi; Victor Chang

Cloud computing has drastically condensed the computational and storage costs of outsourced data. The existing access control techniques offer users access provisions centered on the common user attributes like Roles, which reduces the fine-grained access measure. The paper defines a Storage Correctness and Fine-grained Access Provision (SCFAP) scheme, that provides the user an exclusive access through the use of a hierarchical structure which is a combination of users unique and common attributes. Also, we deploy the concept of Token Granting system that allows the users to verify the correctness of outsourced data without the retrieval of the respective files. The tokens are derived from the metadata containing file location that helps in the process of storage correctness verification and improvises the storage efficiency. The experimental results show SCFAP has improved storage efficiency and error recovery measures than existing techniques.


International Journal of Advanced Intelligence Paradigms | 2017

Ant colony-based load balancing and fault recovery for cloud computing environment

Balamurugan Balusamy; Kotteswari Karthikeyan; Arun Kumar Sangaiah

Scheduling a task and recovering resources in cloud computing is an important optimisation problem. Workload balancing of preemptive and non-preemptive task on the VM is a significant phase in task scheduling. The load of overloaded VM and under-loaded VM has to be balanced to achieve optimal machine utilisation. The recovery process is an essential phase when the failure in VM occurs. The resources that have been stored in the failed VM have to be recovered. The recovery process is done to reclaim the task that have been failed in the VM. In this paper, an algorithm named ant colony-based load balancing and fault recovery (ACB-LBR) is proposed that achieve well-balanced load across VM, activates recovery process at the time of VM failure and reduces power consumption among VMs. This algorithm uses for aging behaviour of Ant colony for balancing the tasks in overloaded VM that leads to high throughput. The ACB-LBR algorithm recovers the lost resource at failure time and manages less power consumption. The experimental results show that the proposed algorithm is effective compared to existing load balancing, recovery and power consumption algorithm.

Collaboration


Dive into the Balamurugan Balusamy's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Pandi Vijayakumar

University College of Engineering Tindivanam

View shared research outputs
Top Co-Authors

Avatar

Victor Chang

Xi'an Jiaotong-Liverpool University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

L. Jegatha Deborah

University College of Engineering Tindivanam

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge