Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Santosh Kumar Majhi is active.

Publication


Featured researches published by Santosh Kumar Majhi.


grid computing | 2014

VM migration auction: Business oriented federation of cloud providers for scaling of application services

Santosh Kumar Majhi; Padmalochan Bera

One of the key indicators of leveraging Cloud Computing is the penetration of e-business among Cloud Service Providers(CSP). The cloud computing applications are being developed across various domains to enable easy and efficient access to the data and services remotely. There is a potential for CSPs in applying e-business technologies, especially in the migration process between virtual machines (VM) running in different hosts. It is to enable efficient computing, resource sharing and to provide a real time response. There is a need to integrate an auction (bidding) in the VM migration process by applying new business models in the cloud computing marketplace to ensure competitiveness among CSPs. This paper describes an effort to establish a novel bidding process for the VM migration process in Cloud environment for e-business. The Internet-based auction process has been developed by considering English and Dutch auction. Various components for VM auction (actors, relations, VM, and business model) are presented. The suitable architecture in the VM auction service and the required tools are described. The IDEF0 model has been used for the central functionality of the broker service. In this proposed approach, the objective is to make independent CSPs function in a co-operative manner to provide uninterrupted service to the users on their interest and preference.


advances in computing and communications | 2016

An authentication framework for securing virtual machine migration

Santosh Kumar Majhi; Sunil Kumar Dhal

Virtual Machine (VM) migration has recently received significant attention to address the issue of load balancing, system maintenance, intelligent energy management of the data center. However, the migration trust and security concerns still exist real in the placement of VM. In To resolve these challenging problems, we use the existing authentication schemes and also we propose an authentication framework as a basic and practical component of secure VM migration process. Especially, in the proposed framework, the physical machines (PM) which are distributed in diverse data centers can accomplish mutual authentication, launch the shared session key Diffie-Hellman exchange protocol, with the public session key between PMs and hash based authentications. In this work, a comprehensive security scrutiny shows that the anticipated framework can assure the desired security necessities of VM migration.


automated decision making for active cyber defense | 2015

A Security Enforcement Framework for Virtual Machine Migration Auction

Santosh Kumar Majhi; Padmalochan Bera

Virtual machine migration auction (VMMA) is a bidding process to select potential target cloud service providers (CSPs) for migration. It is realized as a single application running on top of the hypervisor, where the overall communication between the CSPs is done through the Internet, an insecure channel. Therefore, ensuring security along with performance satisfaction of the VMMA system is an important but challenging problem. This requires identification of various threats and development of security and systematic protection mechanism. In this paper, we present a security enforcement framework for VMMA system. The core element of our proposed framework identifies various potential threats and security constraints by investigating different interactions between participants in VMMA system. Then our framework extracts a set of formal security requirements based on the identified threats which enforces the security by using elliptic curve cryptography and bilinear pairing. Our approach will facilitate in designing and implementing strong security defense-in-depth against various threats to VMMA system in cloud computing platform.


Archive | 2019

A Hybrid Clustering Algorithm Based on Kmeans and Ant Lion Optimization

Santosh Kumar Majhi; Shubhra Biswal

Kmeans is one of the most-efficient hard-clustering algorithms. It has been successfully applied to a number of problems. However, the efficiency of kmeans is dependent on its initialization of cluster centres. Different swarm intelligence techniques are applied for clustering problem. In this work, we have considered Ant Lion Optimization (ALO) which is a stochastic global optimization models. In this work Kmeans has been integrated with ALO for optimal clustering. The statistical measures of different performance metrics has been calculated and compared. The proposed method performs preferably better than Kmeans and PSO-Kmeans in terms of sum of intracluster distances and F-measure.


International Journal of Knowledge-Based Organizations (IJKBO) | 2018

Queuing Analysis of Cloud Load Balancing Algorithms

Santosh Kumar Majhi; Shankho Subhra Pal; Shweta Bhuyan; Sunil Kumar Dhal

The emergence of cloud-computing and the apparent shift to this new paradigm has led to the creation of data centres that consist of hundreds of thousands of servers. The Cloud is a distributed system that helps share data and provides resources to the users. The data and the distributed resources are stored in the open environment. This paper presents a model of cloud load balancing using queuing and probability theory. A queuing cloud model is discussed with load balancing perspective. We present analysis for two servers and then extended it to n server. In addition, an optimal strategy is modelled for cloud load balancing. The analytical results are verified through numeric simulation.


International Journal of Knowledge-Based Organizations (IJKBO) | 2018

Formal Analysis of Virtual Machine Migration and Identification of Faults

Santosh Kumar Majhi; Sunil Kumar Dhal

Infrastructure as a service IaaS cloud supports flexible and agile execution of applications by creating virtualized execution environment namely, virtual machines VMs with on-demand infrastructural resources. In such environment, VM migration is used as a tool to facilitate system maintenance, load balancing and fault tolerance. The use of VM migration is to establish the portfolio of using dynamic and scalable infrastructure services offered by the service providers. In this paper, we study the VM migration process and investigate the potential faults which can occur during migration. Also, the state changes of a VM throughout its lifetime has been systematically analyzed and modeled as concurrent state machines. The potential faults are presented considering the live migration process of VM and accordingly VM state changes. In addition, a methodology for identifying the migration faults has been presented.


grid computing | 2014

Designing an adaptive firewall for enterprise cloud

Santosh Kumar Majhi; Padmalochan Bera

Cloud technology is becoming more and more popular in recent time. With the popularity of the Cloud Computing, Cloud security becomes a vital issue in the Cloud computing domain. Particularly, the new evolving threat to the enterprise cloud makes the firewall systems of enterprise cloud to slow down the operation. On the other hand, one of the central challenges to deploy, Cloud applications into the existing environment is to configure the Cloud firewalls. The state of art technology is to open the ports as many as required. Such firewall policy is so hazardous, and a more dynamic means of checking the firewall is called for. In this report, we offer a dynamic and dependable mechanism to adaptively control the firewall for enterprise cloud computing. Likewise, a conceptual design and its execution have been talked about.


Procedia Computer Science | 2016

Cyber Physical Systems & Public Utility in India

Santosh Kumar Majhi; Ganesh Patra; Sunil Kumar Dhal


Procedia Computer Science | 2016

A Study on Security Vulnerability on Cloud Platforms

Santosh Kumar Majhi; Sunil Kumar Dhal


Journal of Industrial Information Integration | 2018

Antlion optimizer tuned PID controller based on Bode ideal transfer function for automobile cruise control system

Rosy Pradhan; Santosh Kumar Majhi; Jatin Ku Pradhan; Bibhuti Bhusan Pati

Collaboration


Dive into the Santosh Kumar Majhi's collaboration.

Top Co-Authors

Avatar

Padmalochan Bera

Indian Institute of Technology Bhubaneswar

View shared research outputs
Top Co-Authors

Avatar

Bibhuti Bhusan Pati

Veer Surendra Sai University of Technology

View shared research outputs
Top Co-Authors

Avatar

Rosy Pradhan

Veer Surendra Sai University of Technology

View shared research outputs
Top Co-Authors

Avatar

Shubhra Biswal

Veer Surendra Sai University of Technology

View shared research outputs
Top Co-Authors

Avatar

D.B. Phatak

Indian Institute of Technology Bombay

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

M. Satpathy

Indian Institute of Technology Bhubaneswar

View shared research outputs
Top Co-Authors

Avatar

S. Kumar

National Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Ehab Al-Shaer

University of North Carolina at Charlotte

View shared research outputs
Researchain Logo
Decentralizing Knowledge