Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where T. Vengattaraman is active.

Publication


Featured researches published by T. Vengattaraman.


Expert Systems With Applications | 2011

An application perspective evaluation of multi-agent system in versatile environments

T. Vengattaraman; S. Abiramy; P. Dhavachelvan; R. Baskaran

Multi-agent systems (MAS) based computing is the most appropriate paradigm for the problem domain, where data, control, expertise or resources are distributed and also it is interesting to the user only if the technologies address the issues of interest to the user. The MAS has the hypothesis that the agent based computing offers better approach to manage the complex systems and process. They are large-scale systems and collaborate with one another to achieve their functions in a highly modular and flexible way. In this point of view, the work presented in this paper is an enhanced attempt to validate the MAS based on application perspective. As a test-bed, a distributed MAS for software testing is constructed such that to provide a hybrid testing environment based on variety of agents, which possibly incorporate several testing techniques. The developed framework is validated on two perspectives namely, efficiency of the application domain, i.e. software testing using MAS and efficiency of the proposed framework. The validation of the later case has been carried out on two conditions: regular working environment and exceptional working environment. The second type of validation provided the guidelines for implementing proper exception handling mechanism in the enhanced MAS, which is being developed for software testing Purpose.


ACITY (1) | 2012

MSRCC - Mitigation of Security Risks in Cloud Computing

D. Chandramohan; T. Vengattaraman; M. S. S. Basha; P. Dhavachelvan

Cloud computing represents the latest phase in the evolution of Internet-based computing. In spite of the attractive properties it provides, security and privacy issues loom large for cloud computing. In this paper, we concentrate on the security threats involved in cloud by providing an Authenticated Key Exchange Protocol (AKExP). In this protocol, we make use of the identity management scheme and symmetric key encryption algorithm so that unauthorized users cannot get access to the sensitive data stored in the cloud. This proposed approach minimizes the computation cost and communication cost when compared with another authentication protocol, Identity-based Authentication Protocol. This paper provides an efficient and secure way to authenticate the user in the cloud both by the owner and cloud service provider.


ieee india conference | 2012

HPPC-Hierarchical Petri-Net based Privacy nominal model approach for Cloud

D. Chandramohan; T. Vengattaraman; P. Dhavachelvan

This paper focusing on the data collected ubiquitously and conserved by cloud providers are assured that, the clients and users can assess that information globally as per their versatility, where as the cloud providers should gave some limited transparency policy to maintain clients secrecy. Usually the private data collected by the service providers can be shared with in their other platforms. Highest risk of data exposure occurs for cloud providers due to the breach of clients secrecy. In cloud architecture privacy policies and its standards is one of the main issues of cloud computing. Many researchers have been vigorously working in these issues. We studied these researchers work, frontward us to propose HPBP (Hierarchical Petri-net based Privacy nominal model for Cloud) architecture. Our proposed model facilitates clients, to have an augment trust on cloud providers as a pledge to maintain their high secrecy. The privacy of the proposed technique is analyzed briefly.


international conference on heterogeneous networking for quality, reliability, security and robustness | 2013

A Privacy Preserving Representation for Web Service Communicators’ in the Cloud

D. Chandramohan; T. Vengattaraman; D. Rajaguru; R. Baskaran; P. Dhavachelvan

The present paper focuses on maintaining one’s data secrecy in cloud storage area and it may depend on their privacy policy and standards. The effectiveness and efficiency of preserved data from different cloud providers should maintain the integrity of original data stored in it. In the era of could computing, stored information’s value, proficiency and optimization of data retrieving spotlights the importance of maintaining cloud users data, privacy, identity, reliability and maintainability it may vary for different Cloud providers (CP). Giant CP ensures their user proprietary information’s are sustained more secretly using cloud technologies. During third party cloud services and exodus between inter cloud providers may lead to data portability privacy issue. More remarkable event in this case, even the cloud providers don’t have implication about the information and records where it’s stored and maintained in their own cloud. This is one of the obligatory research issue in cloud computing. We came frontward by proposing (EMPPC) an Evolutionary model based privacy Preserving technique and try to hold user’s, to have trust in providers for maintaining their confidentiality in cloud. This proposal helps the CR (Cloud Requester and Users) to mark trust on their proprietary information and data’s stored in cloud.


International Journal of Modeling, Simulation, and Scientific Computing | 2014

FEWSS — FRAMEWORK TO EVALUATE THE SERVICE SUITABILITY AND PRIVACY IN A DISTRIBUTED WEB SERVICE ENVIRONMENT

D. Chandramohan; T. Vengattaraman; P. Dhavachelvan; R. Baskaran; V. S. K. Venkatachalapathy

This paper focuses on addressing the problem of web service monitoring by evaluating its suitability and privacy in a distributed web service environment (DWS). The need for web services monitoring and evaluation is necessary because the quantity and quality of retrieved web services generally does not fulfill the demands or requirements of the web service requesters. In the literature, many authors proposed suitable solutions for checking the quality of web service in an ad hoc scenario but there is no available testbed for this purpose. In this work, it is proposed to develop a framework as a testbed for evaluating the web service for its suitability and privacy. In order to verify, the retrieved web services fulfill the demands and requirements of the requester in a DWS environment. The Framework to Evaluate the Web Service Suitability (FEWSS) supports service providers in modeling the services with testbed and to design service behavior to comply the service suitability. It generates run-time instances of web services, clients requests, service registries and other entities in order to emulate realistic SOA environments. By generating a real testbed, our approach assists in runtime test for provider system/services. Particular focus has been put on the privacy policy extensibility to allow the service providers and users in a complex environment. FEWSS also provides an intuitive interface for testing all services under SOA control.


ieee international conference on high performance computing data and analytics | 2013

A novel framework to prevent privacy breach in cloud data storage area service

D. Chandramohan; T. Vengattaraman; D. Rajaguru; R. Baskaran; P. Dhavachelvan

The present paper focuses on user data privacy invasion and it is more important in cloud data storage. Numerous approaches and techniques have proposed so for, to preserve the cloud user privacy. This paper introduces a layered framework for preserving secrecy of cloud user and preventing digital data loss, using onion privacy layer, garlic privacy layer. This layered framework prevents the confidential information by multiple encryption of onion and garlic privacy preserving layered approach.


ieee international conference on high performance computing data and analytics | 2013

Hybrid authentication technique to preserve user privacy and protection as an end point lock for the cloud service digital information

D. Chandramohan; T. Vengattaraman; D. Rajaguru; R. Baskaran; P. Dhavachelvan

This paper presents a new approach for privacy preserving of user data and publishing in cloud storage area. Hybrid authentication technique overcomes the limitations of attackers and general intruders and preserves better utilization of users confidential data by providing access only to authorized persons. In this proposed technique it is illustrated how this technique used to prevent user secret data attributes kept in digital cloud storage environment. Moreover the proposed system shows a better data privacy preserving utility by users and handling sensitive data during vulnerable attempts and attacks to the cloud storage area.


ieee international advance computing conference | 2013

Minimizing the makespan using Hybrid algorithm for cloud computing

R. Raju; R.G. Babukarthik; D. Chandramohan; P. Dhavachelvan; T. Vengattaraman


ieee international conference on high performance computing data and analytics | 2014

A Generic Privacy Breach Preventing Methodology for Cloud Based Web Service

S. R. Murugaiyan; D. Chandramohan; T. Vengattaraman; P. Dhavachelvan


Egyptian Informatics Journal | 2015

A multi-agent approach: To preserve user information privacy for a pervasive and ubiquitous environment

D. Chandramohan; Dananjayan Sathian; Dayalan Rajaguru; T. Vengattaraman; P. Dhavachelvan

Collaboration


Dive into the T. Vengattaraman's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

D. Rajaguru

Perunthalaivar Kamarajar Institute of Engineering and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

S. R. Murugaiyan

Manonmaniam Sundaranar University

View shared research outputs
Researchain Logo
Decentralizing Knowledge