Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Manish Prateek is active.

Publication


Featured researches published by Manish Prateek.


2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014) | 2014

Data encryption and decryption algorithms using key rotations for data security in cloud system

G. L. Prakash; Manish Prateek; Inder Singh

Outsourcing the data in cloud computing is exponentially generating to scale up the hardware and software resources. How to protect the outsourced sensitive data as a service is becomes a major data security challenge in cloud computing. To address these data security challenges, we propose an efficient data encryption to encrypt sensitive data before sending to the cloud server. This exploits the block level data encryption using 256 bit symmetric key with rotation. In addition, data users can reconstruct the requested data from cloud server using shared secret key. We analyze the privacy protection of outsourced data using experiment is carried out on the repository of text files with variable size. The security and performance analysis shows that the proposed method is highly efficient than existing methods performance.


International Journal of Computer Applications | 2013

Distance based (DBCP) Cluster Protocol for Heterogeneous Wireless Sensor Network

Surender Kumar; Manish Prateek; Bharat Bhushan

Clustering is an important concept to reduce the energy consumption and prolonging the life of a wireless sensor network. In heterogeneous wireless sensor network some of the nodes are equipped with more energy than the other nodes. Many routing algorithms are proposed for heterogeneous wireless sensor network. Stable Election Protocol (SEP) is one of the important protocol in this category. In this research paper a novel energy efficient distance based cluster protocol (DBCP) is proposed for single hop heterogeneous wireless sensor network to increase the life and energy efficiency of a sensor network. DBCP use the average distance of the sensor from the base station as the major issue for the selection of a cluster head in the sensor network.


Archive | 2018

A Review on VANET Routing Protocols and Wireless Standards

Gagan Deep Singh; Ravi Tomar; Hanumat Sastry; Manish Prateek

The vehicular ad hoc network (VANET) is an ad hoc network system based on the concept of mobile ad hoc network (MANET) in which nodes (vehicle) that are being connected with each other by wireless technologies. But due to the non deterministic mobility behavior and high velocity of automobiles, the topology is unpredictable. Such types of system can work independently and can also be interconnected through internet with in its infrastructure. The system characteristics such as multi-hop paths, node mobility, huge network, device heterogeneity, congestion and bandwidth are the constraints in designing the routing protocols for VANET. The present routing protocols that have been deployed for MANET are used to test the VANET accuracy and performance. Present research efforts are strongly emphasized on designing a novel routing algorithm and its implementations. Recent VANET research are majorly focused on predefined areas such as broadcasting and routing, security, quality of service (QoS) and infotainment with information dissemination during emergencies. In this paper authors present a detailed review of wireless standards used in VANET with a number of trials in VANET and its deployment in many of the developed countries. As a conclusion we conceptualized some of the issues and research challenges in VANET that had not yet addressed so that industry can opt for widespread adoption of scalable, reliable, secure and robust VANET protocols, architectures services and technologies and enable the ubiquitous deployment of it.


Archive | 2018

Secure Public Auditing Using Batch Processing for Cloud Data Storage

G. L. Prakash; Manish Prateek; Inder Singh

Cloud computing enables the users to outsource and access data economically from the distributed cloud server. Cloud provider offers data storage as a service and share the data across multiple authorized users in a cost-effective manner. In the cloud-computing model, once the data leaves the owner premises, there is no control of data to the data owner. To provide security for the outsources, data is one of the challenging tasks in cloud computing. Public auditing of outsourced data to verify the integrity of the data provides the data security. In this paper, we proposed a multisector public auditing system by utilizing a linear combination of homomorphic linear authenticator tags of the file blocks. Our proposed method performs the multiple auditing tasks simultaneously, without retrieving the entire file, which reduces the computation and communication overheads in the auditing. The analysis of the proposed system shows that, multisector public auditing method is better than the existing auditing method in terms of data security, communication, and computation overheads by utilizing linear combination of homomorphic linear authenticator tags of the file blocks. Our proposed method performs the multiple auditing tasks simultaneously, without retrieving the entire file, which reduces the computation and communication overheads in the auditing. The analysis of the proposed system shows that, multisector public auditing method is better than the existing auditing method in terms of data security, communication, and computation overheads.


International Conference on Recent Developments in Science, Engineering and Technology | 2017

Performance Analysis of Cloud Data Verification Using MD5 and ECDSA Method

G. L. Prakash; Manish Prateek; Inder Singh

Cloud computing enable the users to outsource and access data economically using storage as a service. In this storage model, the data owner doesnot have any control of the data once its stores on cloud server. Therefore, privacy and security of the data is a challenging issue in cloud computing. To provide the integrity of the outsourced data, we have proposed a lightweight data auditing technique such as MD5 and ECDSA signature method using third party auditor. The result analysis of the proposed method shows that, ECDSA has better security performance than the computation as compared to MD5 method for larger data size. The selection of the signature method depends on the priority of the data size and frequency of accessing.


international conference on next generation computing technologies | 2016

Computer vision based personalized clothing assistance system: A proposed model

Bhavya Kalra; Kingshuk Srivastava; Manish Prateek

With fashion industry included e-commerce (worldwide) is expected to hit the


International Journal of Wireless and Mobile Computing | 2015

Evaluation of mobility managed reactive protocol AODVMM in a sparsely deployed mobile ad hoc network

Monit Kapoor; Manish Prateek; Kamal Bansal

35 billion mark by 2020. Theres a need for applications which help the user in making intelligent decisions on their day to day online purchases. In this paper, our aim is to build a system that would be able to understand fashion and the user to provide personalized clothing recommendations to the user. Our approach includes Caffe, a deep learning framework for computer vision tasks such as Clothing type classification and Clothing attribute classification. Furthermore we use Conditional Random Fields (CRF) to learn the intricacies of fashion. CRFs also learn the correlations between attributes of the user such as ethnicity, body type etc., expert opinion and the type of outfit. We expect the proposed system would be able to provide personalized recommendations.


Recent Advances and Innovations in Engineering (ICRAIE), 2014 | 2014

Efficient data security method to control data in cloud storage system using cryptographic techniques

Prakash G L; Manish Prateek; Inder Singh

Mobile ad hoc networks are characterised by random movement of nodes leading to frequent link disruptions apart from extra overhead to maintain network topology. AODV is a reactive protocol intended to maintain the network topology periodically for a MANET. This work aims to deploy a mobility managed mobile ad hoc network which uses AODV protocol along with the mobility managed MM scheme as proposed to enhance throughput by using MM scheme. The AODVMM protocol is also tested under varying buffer availability conditions and reduced transmission range for varying network sizes and different number of nodes.


Archive | 2014

A Proposed Architecture for Efficient Data Delivery and Route Maintenance in a Sparsely Deployed Mobile Ad Hoc Network

Monit Kapoor; Manish Prateek

Cloud computing paradigm enables the users toaccess the outsourced data from the cloud server without the hardware and software management. For the effective utilization of sensitive data from CSP, the data owner encrypts before outsourcing to the cloud server. To protect data in cloud, data privacy is the challenging task. In order to address this problem, we proposed an efficient data security method using cryptographic techniques. Thus, the proposed method not only encrypts the sensitive data, but also detects the dishonest party to access the data using combined hash functions. We have analyzed the proposed method in terms of storage, communication and computational overheads. The result shows that the proposed security method is more efficient than the existing security system.


International Journal of Computer Applications | 2013

Use of Reinforcement Learning as a Challenge: A Review

Rashmi Sharma; Manish Prateek; Ashok K. Sinha

Mobile ad hoc networks have seen tremendous research being carried out looking into various issues in the area of routing, disruption tolerance and mobility control amongst other issues. MANET has a typical environment and in many works MANET is not treated as a case of infrastructureless network. This work aims to treat Ad Hoc networks differently than a Wireless Infrastructure Network. This work also aims at proposing a framework for route maintenance of a network of any size in case of sparsely deployed topologies and maintain the mobility of all the nodes to the advantage of the participating nodes.

Collaboration


Dive into the Manish Prateek's collaboration.

Top Co-Authors

Avatar

Inder Singh

Center for Information Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

G. L. Prakash

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar

Neelu Jyothi Ahuja

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar

Prakash G L

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar

Hanumat Sastry

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar

Inder Singh

Center for Information Technology

View shared research outputs
Top Co-Authors

Avatar

Monit Kapoor

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar

Paawan Sharma

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar

Ravi Tomar

University of Petroleum and Energy Studies

View shared research outputs
Researchain Logo
Decentralizing Knowledge