Santosh Kumar Majhi
Indian Institute of Technology Bhubaneswar
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Santosh Kumar Majhi.
grid computing | 2014
Santosh Kumar Majhi; Padmalochan Bera
One of the key indicators of leveraging Cloud Computing is the penetration of e-business among Cloud Service Providers(CSP). The cloud computing applications are being developed across various domains to enable easy and efficient access to the data and services remotely. There is a potential for CSPs in applying e-business technologies, especially in the migration process between virtual machines (VM) running in different hosts. It is to enable efficient computing, resource sharing and to provide a real time response. There is a need to integrate an auction (bidding) in the VM migration process by applying new business models in the cloud computing marketplace to ensure competitiveness among CSPs. This paper describes an effort to establish a novel bidding process for the VM migration process in Cloud environment for e-business. The Internet-based auction process has been developed by considering English and Dutch auction. Various components for VM auction (actors, relations, VM, and business model) are presented. The suitable architecture in the VM auction service and the required tools are described. The IDEF0 model has been used for the central functionality of the broker service. In this proposed approach, the objective is to make independent CSPs function in a co-operative manner to provide uninterrupted service to the users on their interest and preference.
advances in computing and communications | 2016
Santosh Kumar Majhi; Sunil Kumar Dhal
Virtual Machine (VM) migration has recently received significant attention to address the issue of load balancing, system maintenance, intelligent energy management of the data center. However, the migration trust and security concerns still exist real in the placement of VM. In To resolve these challenging problems, we use the existing authentication schemes and also we propose an authentication framework as a basic and practical component of secure VM migration process. Especially, in the proposed framework, the physical machines (PM) which are distributed in diverse data centers can accomplish mutual authentication, launch the shared session key Diffie-Hellman exchange protocol, with the public session key between PMs and hash based authentications. In this work, a comprehensive security scrutiny shows that the anticipated framework can assure the desired security necessities of VM migration.
automated decision making for active cyber defense | 2015
Santosh Kumar Majhi; Padmalochan Bera
Virtual machine migration auction (VMMA) is a bidding process to select potential target cloud service providers (CSPs) for migration. It is realized as a single application running on top of the hypervisor, where the overall communication between the CSPs is done through the Internet, an insecure channel. Therefore, ensuring security along with performance satisfaction of the VMMA system is an important but challenging problem. This requires identification of various threats and development of security and systematic protection mechanism. In this paper, we present a security enforcement framework for VMMA system. The core element of our proposed framework identifies various potential threats and security constraints by investigating different interactions between participants in VMMA system. Then our framework extracts a set of formal security requirements based on the identified threats which enforces the security by using elliptic curve cryptography and bilinear pairing. Our approach will facilitate in designing and implementing strong security defense-in-depth against various threats to VMMA system in cloud computing platform.
Archive | 2019
Santosh Kumar Majhi; Shubhra Biswal
Kmeans is one of the most-efficient hard-clustering algorithms. It has been successfully applied to a number of problems. However, the efficiency of kmeans is dependent on its initialization of cluster centres. Different swarm intelligence techniques are applied for clustering problem. In this work, we have considered Ant Lion Optimization (ALO) which is a stochastic global optimization models. In this work Kmeans has been integrated with ALO for optimal clustering. The statistical measures of different performance metrics has been calculated and compared. The proposed method performs preferably better than Kmeans and PSO-Kmeans in terms of sum of intracluster distances and F-measure.
International Journal of Knowledge-Based Organizations (IJKBO) | 2018
Santosh Kumar Majhi; Shankho Subhra Pal; Shweta Bhuyan; Sunil Kumar Dhal
The emergence of cloud-computing and the apparent shift to this new paradigm has led to the creation of data centres that consist of hundreds of thousands of servers. The Cloud is a distributed system that helps share data and provides resources to the users. The data and the distributed resources are stored in the open environment. This paper presents a model of cloud load balancing using queuing and probability theory. A queuing cloud model is discussed with load balancing perspective. We present analysis for two servers and then extended it to n server. In addition, an optimal strategy is modelled for cloud load balancing. The analytical results are verified through numeric simulation.
International Journal of Knowledge-Based Organizations (IJKBO) | 2018
Santosh Kumar Majhi; Sunil Kumar Dhal
Infrastructure as a service IaaS cloud supports flexible and agile execution of applications by creating virtualized execution environment namely, virtual machines VMs with on-demand infrastructural resources. In such environment, VM migration is used as a tool to facilitate system maintenance, load balancing and fault tolerance. The use of VM migration is to establish the portfolio of using dynamic and scalable infrastructure services offered by the service providers. In this paper, we study the VM migration process and investigate the potential faults which can occur during migration. Also, the state changes of a VM throughout its lifetime has been systematically analyzed and modeled as concurrent state machines. The potential faults are presented considering the live migration process of VM and accordingly VM state changes. In addition, a methodology for identifying the migration faults has been presented.
grid computing | 2014
Santosh Kumar Majhi; Padmalochan Bera
Cloud technology is becoming more and more popular in recent time. With the popularity of the Cloud Computing, Cloud security becomes a vital issue in the Cloud computing domain. Particularly, the new evolving threat to the enterprise cloud makes the firewall systems of enterprise cloud to slow down the operation. On the other hand, one of the central challenges to deploy, Cloud applications into the existing environment is to configure the Cloud firewalls. The state of art technology is to open the ports as many as required. Such firewall policy is so hazardous, and a more dynamic means of checking the firewall is called for. In this report, we offer a dynamic and dependable mechanism to adaptively control the firewall for enterprise cloud computing. Likewise, a conceptual design and its execution have been talked about.
Procedia Computer Science | 2016
Santosh Kumar Majhi; Ganesh Patra; Sunil Kumar Dhal
Procedia Computer Science | 2016
Santosh Kumar Majhi; Sunil Kumar Dhal
Journal of Industrial Information Integration | 2018
Rosy Pradhan; Santosh Kumar Majhi; Jatin Ku Pradhan; Bibhuti Bhusan Pati