Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Samrat Mondal is active.

Publication


Featured researches published by Samrat Mondal.


trans. computational science | 2009

Role Based Access Control with Spatiotemporal Context for Mobile Applications

Subhendu Aich; Samrat Mondal; Shamik Sural; Arun K. Majumdar

Role based access control (RBAC) is an established paradigm in resource protection. However, with the proliferation of mobile computing, it is being frequently observed that the RBAC access decision is directly influenced by the spatiotemporal context of both the subjects and the objects in the system. Currently, there are only a few models (STRBAC, GSTRBAC) in place which specify spatiotemporal security policy on top of the classical RBAC. In this paper we propose a complete RBAC model in spatiotemporal domain based on the idea of spatiotemporal extent. The concept of spatiotemporal role extent and spatiotemporal permission extent introduced here enables our model to specify granular spatiotemporal access control policies not specifiable in the existing approaches. Our model is also powerful enough to incorporate classical role hierarchy and other useful RBAC policies including Role based Separation of Duty and Permission based Separation of Duty in spatiotemporal domain. Healthcare is an area in which information security is of utmost importance. The risk of personal medical data leakage is especially high in mobile healthcare applications. As a proof of concept, we have implemented the proposed spatiotemporal access control method in a mobile telemedicine system.


symposium on access control models and technologies | 2009

Towards formal security analysis of GTRBAC using timed automata

Samrat Mondal; Shamik Sural; Vijayalakshmi Atluri

An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whether a desirable property is satisfied in all the reachable states. Such an analysis calls for formal verification. While formal analysis on traditional RBAC has been done to some extent, the extensions of RBAC lack such an analysis. In this paper, we propose a formal technique to perform security analysis on the Generalized Temporal RBAC (GTRBAC) model which can be used to express a wide range of temporal constraints on different RBAC components like role, user and permission. In the proposed approach, at first the GTRBAC system is mapped to a state transition system built using timed automata. Characteristics of each role, user and permission are captured with the help of timed automata. A single global clock is used to express the various temporal constraints supported in a GTRBAC model. Next, a set of safety and liveness properties is specified using computation tree logic (CTL). Model checking based formal verification is then done to verify the properties against the model to determine if the system is secure with respect to a given set of access control policies. Both time and space analysis has been done for studying the performance of the approach under different configurations.


information assurance and security | 2008

Security Analysis of Temporal-RBAC Using Timed Automata

Samrat Mondal; Shamik Sural

Role Based Access Control (RBAC) is arguably the most common access control mechanism today due to its applicability at various levels of authorization in a system. Time varying nature of access control in RBAC administered systems is often implemented through Temporal-RBAC - an extension of RBAC in the temporal domain. In this paper, we propose an initial approach towards verification of security properties of a Temporal-RBAC system. Each role is mapped to a timed automaton. A controller automaton is used to activate and deactivate various roles. Security properties are specified using Computation Tree Logic (CTL) and are verified with the help of a model checking tool named Uppaal. We have specifically considered reachability, safety and liveness properties to show the usefulness of our approach.


database and expert systems applications | 2013

Entity Matching Technique for Bibliographic Database

Sumit Mishra; Samrat Mondal; Sriparna Saha

Some of the attributes of a database relation may evolve over time i.e., they change their values at different instants of time. For example, affiliation attribute of an author relation in a bibliographic database which maintains publication details of various authors, may change its value. When a database contains records of this nature and number of records grows to a large extent then it becomes really very challenging to identify which records belong to which entity due to lack of a proper key. In such a situation, the other attributes of the records and the timed information associated with the records may be useful in identifying whether the records belong to the same entity or different. In the proposed work, the records are initially clustered based on email-id attribute and the clusters are further refined based on other temporal and non-temporal attributes. The refinement process involves similarity check with other records and clusters. A comparative analysis with two existing systems DBLP and ArnetMiner shows that the proposed technique can able to produce better results in many cases.


international conference on pattern recognition | 2014

On Validation of Clustering Techniques for Bibliographic Databases

Sumit Mishra; Sriparna Saha; Samrat Mondal

In entity name disambiguation, performance evaluation of any approach is difficult. This is due to the fact that correct or actual results are often not known. Generally for evaluation purpose, three measures namely precision, recall and f-measure are used. They all are external validity indices because they need golden standard data. But in Bibliographic databases like DBLP, Arnetminer, Scopus, Web of Science, Google Scholar, etc., gold standard data is not easily available and it is very difficult to obtain this due to the overlapping nature of data. So, there is a need to use some other matrices for evaluation purpose. In this paper, some internal cluster validity index based schemes are proposed for evaluating entity name disambiguation algorithms when applied on bibliographic data without using any gold standard datasets. Two new internal validity indices are also proposed in the current paper for this purpose. Experimental results shown on seven bibliographic datasets reveal that proposed internal cluster validity indices are able to compare the results obtained by different methods without prior/gold standard. Thus the present paper demonstrates a novel way of evaluating any entity matching algorithm for bibliographic datasets without using any prior/gold standard information.


congress on evolutionary computation | 2016

Divide and conquer based non-dominated sorting for parallel environment

Sumit Mishra; Sriparna Saha; Samrat Mondal

Many of the real-life problems involve simultaneous optimization of multiple objectives. In recent years there is an enormous increase in the number of multi-objective optimization problems related to different real-life domains. Evolutionary algorithms are the most popular in solving these types of problems. The non-dominating sorting is one of the steps of any multiobjective evolutionary algorithms. This is used mostly to select the non-dominated set of solutions from a given population. In the past various efficient approaches are proposed in the literature to reduce the complexity of this step. As the evolutionary algorithms inhibit parallelism in it. But not all the existing non-dominating sorting approaches have the parallelism property. So in this paper, we have proposed a new approach named as DCNS (Divide and Conquer based Non-dominating Sorting) which inhibits parallelism in it. It has been shown theoretically and empirically that the proposed approach is computationally efficient than existing state-of-the-art methods.


international symposium on security in computing and communication | 2014

Tag Digit Based Honeypot to Detect Shoulder Surfing Attack

Nilesh Chakraborty; Samrat Mondal

Traditional password based authentication scheme is vulnerable to shoulder surfing attack. So if an attacker sees a legitimate user to enter password then it is possible for the attacker to use that credentials later to illegally login into the system and may do some malicious activities. Many methodologies exist to prevent such attack. These methods are either partially observable or fully observable to the attacker. In this paper we have focused on detection of shoulder surfing attack rather than prevention. We have introduced the concept of tag digit to create a trap known as honeypot. Using the proposed methodology if the shoulder surfers try to login using others’ credentials then there is a high chance that they will be caught red handed. Comparative analysis shows that unlike the existing preventive schemes, the proposed methodology does not require much computation from users end. Thus from security and usability perspective the proposed scheme is quite robust and powerful.


Computers & Security | 2011

Security analysis of GTRBAC and its variants using model checking

Samrat Mondal; Shamik Sural; Vijayalakshmi Atluri

Security analysis is a formal verification technique to ascertain certain desirable guarantees on the access control policy specification. Given a set of access control policies, a general safety requirement in such a system is to determine whether a desirable property is satisfied in all the reachable states. Such an analysis calls for the use of formal verification techniques. While formal analysis on traditional Role Based Access Control (RBAC) has been done to some extent, recent extensions to RBAC lack such an analysis. In this paper, we consider the temporal RBAC extensions and propose a formal technique using timed automata to perform security analysis by analyzing both safety and liveness properties. Using safety properties one ensures that something bad never happens while liveness properties show that some good state is also achieved. GTRBAC is a well accepted generalized temporal RBAC model which can handle a wide range of temporal constraints while specifying different access control policies. Analysis of such a model involves a process of mapping a GTRBAC based system into a state transition system. Different reduction rules are proposed to simplify the modeling process depending upon the constraints supported by the system. The effect of different constraints on the modeling process is also studied.


security of information and networks | 2009

XML-based policy specification framework for spatiotemporal access control

Samrat Mondal; Shamik Sural

Role based access control (RBAC) is an established paradigm in current enterprise resource protection environment. However, with the proliferation of mobile computing, it is being frequently observed that the RBAC access decision is directly influenced by the spatiotemporal context of both the subjects and the objects in the system. Currently, there exists few models which can handle spatiotemporal security policy on top of the classical RBAC. In this paper, an XML based policy specification framework is proposed for a spatiotemporal RBAC model. The framework is built on top of a spatiotemporal RBAC model known as ESTARBAC. It incorporates different constraints such as role hierarchy, separation of duty and cardinality, along with other constraints dependent on spatiotemporal conditions. The underlying model supports spatiotemporal role and permission extents. Use of such extents allows to specify a wide variety of spatiotemporal access control policies. The framework facilitates the administration task of a large organization by providing a convenient and efficient way of managing access control policies.


international conference on information systems security | 2008

A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper)

Samrat Mondal; Shamik Sural

In this paper a Timed Automata (TA) based verification framework is proposed for Temporal RBAC. Roles, users, permissions - three basic components of RBAC are modeled using TA. These components interact with each other through channel synchronization. A parallel composition of TA is used to construct the complete system. Temporal constraints on roles, user-role assignments and role-permission assignments are conveniently expressed in this representation. Furthermore, both role hierarchy and separation of duty (SoD) have been incorporated in the proposed framework. Security properties are specified using Computation Tree Logic (CTL) and verified by model checking.

Collaboration


Dive into the Samrat Mondal's collaboration.

Top Co-Authors

Avatar

Nilesh Chakraborty

Indian Institute of Technology Patna

View shared research outputs
Top Co-Authors

Avatar

Sumit Mishra

Indian Institute of Technology Patna

View shared research outputs
Top Co-Authors

Avatar

Sriparna Saha

Indian Institute of Technology Patna

View shared research outputs
Top Co-Authors

Avatar

Shamik Sural

Indian Institute of Technology Kharagpur

View shared research outputs
Top Co-Authors

Avatar

Nilotpal Chakraborty

Indian Institute of Technology Patna

View shared research outputs
Top Co-Authors

Avatar

Arijit Mondal

Indian Institute of Technology Patna

View shared research outputs
Top Co-Authors

Avatar

Asif Ekbal

Indian Institute of Technology Patna

View shared research outputs
Top Co-Authors

Avatar

Devjyoti Patra

Indian Institute of Technology Kharagpur

View shared research outputs
Top Co-Authors

Avatar

Gurpinder Singh Randhawa

Indian Institute of Technology Patna

View shared research outputs
Top Co-Authors

Avatar

Kalyan Goswami

Indian Institute of Technology Kharagpur

View shared research outputs
Researchain Logo
Decentralizing Knowledge