Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sudip Mittal is active.

Publication


Featured researches published by Sudip Mittal.


ieee international conference on cloud engineering | 2016

Automatic Extraction of Metrics from SLAs for Cloud Service Management

Sudip Mittal; Karuna Pande Joshi; Claudia Pearce; Anupam Joshi

To effectively manage cloud based services, organizations need to continuously monitor the performance metrics listed in the Cloud service contracts. However, these legal documents, like Service Level Agreements (SLA) or privacy policy documents, are currently managed as plain text files meant principally for human consumption. Additionally, providers often define their own performance metrics for their services. These factors hinder the automation of SLA management and require manual effort to monitor the cloud service performance. We have significantly automated the process of extracting, managing and monitoring cloud SLA using natural language processing techniques and Semantic Web technologies. In this paper, we describe our technical approach and the ontology that we have developed to describe, manage, and reason about cloud SLAs. We also describe the prototype system that we have developed to automatically extract information from legal Terms of Service that are available on cloud provider websites.


advances in social networks analysis and mining | 2016

CyberTwitter: using Twitter to generate alerts for cybersecurity threats and vulnerabilities

Sudip Mittal; Prajit Kumar Das; Varish Mulwad; Anupam Joshi; Tim Finin

In order to secure vital personal and organizational system we require timely intelligence on cybersecurity threats and vulnerabilities. Intelligence about these threats is generally available in both overt and covert sources like the National Vulnerability Database, CERT alerts, blog posts, social media, and dark web resources. Intelligence updates about cybersecurity can be viewed as temporal events that a security analyst must keep up with so as to secure a computer system. We describe CyberTwitter, a system to discover and analyze cybersecurity intelligence on Twitter and serve as a OSINT (Open-source intelligence) source. We analyze real time information updates, in form of tweets, to extract intelligence about various possible threats. We use the Semantic Web RDF to represent the intelligence gathered and SWRL rules to reason over extracted intelligence to issue alerts for security analysts.


international conference on big data | 2015

Parallelizing natural language techniques for knowledge extraction from cloud service level agreements

Sudip Mittal; Karuna Pande Joshi; Claudia Pearce; Anupam Joshi

To efficiently utilize their cloud based services, consumers have to continuously monitor and manage the Service Level Agreements (SLA) that define the service performance measures. Currently this is still a time and labor intensive process since the SLAs are primarily stored as text documents. We have significantly automated the process of extracting, managing and monitoring cloud SLAs using natural language processing techniques and Semantic Web technologies. In this paper we describe our prototype system that uses a Hadoop cluster to extract knowledge from unstructured legal text documents. For this prototype we have considered publicly available SLA/terms of service documents of various cloud providers. We use established natural language processing techniques in parallel to speed up cloud legal knowledge base creation. Our system considerably speeds up knowledge base creation and can also be used in other domains that have unstructured data.


international conference on cloud computing | 2016

Streamlining Management of Multiple Cloud Services

Aditi Gupta; Sudip Mittal; Karuna Pande Joshi; Claudia Pearce; Anupam Joshi

With the increase in the number of cloud services and service providers, manual analysis of Service Level Agreements (SLA), comparison between different service offerings and conformance regulation has become a difficult task for customers. Cloud SLAs are policy documents describing the legal agreement between cloud providers and customers. SLA specifies the commitment of availability, performance of services, penalties associated with violations and procedure for customers to receive compensations in case of service disruptions. The aim of our research is to develop technology solutions for automated cloud service management using Semantic Web and Text Mining techniques. In this paper we discuss in detail the challenges in automating cloud services management and present our preliminary work in extraction of knowledge from SLAs of different cloud services. We extracted two types of information from the SLA documents which can be useful for end users. First, the relationship between the service commitment and financial credit. We represented this information by enhancing the existing Cloud service ontology proposed by us in our previous research. Second, we extracted rules in the form of obligations and permissions from SLAs using modal and deontic logic formalizations. For our analysis, we considered six publicly available SLA documents from different cloud computing service providers.


international conference on big data | 2016

Semantic approach to automating management of big data privacy policies

Karuna Pande Joshi; Aditi Gupta; Sudip Mittal; Claudia Pearce; Anupam Joshi; Tim Finin

Ensuring privacy of Big Data managed on the cloud is critical to ensure consumer confidence. Cloud providers publish privacy policy documents outlining the steps they take to ensure data and consumer privacy. These documents are available as large text documents that require manual effort and time to track and manage. We have developed a semantically rich ontology to describe the privacy policy documents and built a database of several policy documents as instances of this ontology. We next extracted rules from these policy documents based on deontic logic which can be used to automate management of data privacy. In this paper we describe our ontology in detail along with the results of our analysis of privacy policies of prominent cloud services.


ieee sarnoff symposium | 2016

Using semantic technologies to mine vehicular context for security

Sandeep Nair Narayanan; Sudip Mittal; Anupam Joshi

The number of sensors, actuators and electronic control units present in cars have increased in the last few years. The Internet-of-Things (IoT) model has transformed modern vehicles into a co-engineered interacting network of physical and computational components. Vehicles have become a complex cyber-physical system where context detection has become a challenge. In this paper, we present a rule based approach for context detection in vehicles. We also discuss various attack surfaces and vulnerabilities in vehicular IoT. We propose a system which collects data from the CAN bus and uses it to generate SWRL rules. We then reason over these rules to mine vehicular context. We also showcase a few use-cases as examples where our system can detect if a vehicle is in an unsafe/anomalous state.


arXiv: Artificial Intelligence | 2015

Using Data Analytics to Detect Anomalous States in Vehicles

Sandeep Nair Narayanan; Sudip Mittal; Anupam Joshi

Vehicles are becoming more and more connected, this opens up a larger attack surface which not only affects the passengers inside vehicles, but also people around them. These vulnerabilities exist because modern systems are built on the comparatively less secure and old CAN bus framework which lacks even basic authentication. Since a new protocol can only help future vehicles and not older vehicles, our approach tries to solve the issue as a data analytics problem and use machine learning techniques to secure cars. We develop a Hidden Markov Model to detect anomalous states from real data collected from vehicles. Using this model, while a vehicle is in operation, we are able to detect and issue alerts. Our model could be integrated as a plug-n-play device in all new and old cars.


web science | 2017

Generating Digital Twin Models using Knowledge Graphs for Industrial Production Lines

Agniva Banerjee; Raka Dalal; Sudip Mittal; Karuna Pande Joshi

Digital Twin models are computerized clones of physical assets that can be used for in-depth analysis. Industrial production lines tend to have multiple sensors to generate near real-time status information for production. Industrial Internet of Things datasets are difficult to analyze and infer valuable insights such as points of failure, estimated overhead. etc. In this paper we introduce a simple way of formalizing knowledge as digital twin models coming from sensors in industrial production lines. We present a way on to extract and infer knowledge from large scale production line data, and enhance manufacturing process management with reasoning capabilities, by introducing a semantic query mechanism. Our system primarily utilizes a graph-based query language equivalent to conjunctive queries and has been enriched with inference rules.


international conference on cloud computing | 2017

A Question and Answering System for Management of Cloud Service Level Agreements

Sudip Mittal; Aditi Gupta; Karuna Pande Joshi; Claudia Pearce; Anupam Joshi

One of the key challenges faced by consumers is to efficiently manage and monitor the quality of cloud services. To manage service performance, consumers have to validate rules embedded in cloud legal contracts, such as Service Level Agreements (SLA) and Privacy Policies, that are available as text documents. Currently this analysis requires significant time and manual labor and is thus inefficient. We propose a cognitive assistant that can be used to manage cloud legal documents by automatically extracting knowledge (terms, rules, constraints) from them and reasoning over it to validate service performance. In this paper, we present this Question and Answering (Q&A) system that can be used to analyze and obtain information from the SLA documents. We have created a knowledgebase of Cloud SLAs from various providers which forms the underlying repository of our Q&A system. We utilized techniques from natural language processing and semantic web (RDF, SPARQL and Fuseki server) to build our framework. We also present sample queries on how a consumer can compute metrics such as service credit.


2017 IEEE International Conference on Edge Computing (EDGE) | 2017

Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage

Maithilee P Joshi; Sudip Mittal; Karuna Pande Joshi; Tim Finin

Securing their critical documents on the cloud from data threats is a major challenge faced by organizations today. Controlling and limiting access to such documents requires a robust and trustworthy access control mechanism. In this paper, we propose a semantically rich access control system that employs an access broker module to evaluate access decisions based on rules generated using the organizations confidentiality policies. The proposed system analyzes the multi-valued attributes of the user making the request and the requested document that is stored on a cloud service platform, before making an access decision. Furthermore, our system guarantees an end-to-end oblivious data transaction between the organization and the cloud service provider using oblivious storage techniques. Thus, an organization can use our system to secure their documents as well as obscure their access pattern details from an untrusted cloud service provider.

Collaboration


Dive into the Sudip Mittal's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Tim Finin

University of Maryland

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Aditi Gupta

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Raka Dalal

University of Maryland

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge