Qualification: 
Ph.D, MSc
k_sangeeta@blr.amrita.edu

Dr. K. Sangeeta Iyer currently serves as Associate Professor at department of Computer Science,Amrita School of Engineering.

Publications

Publication Type: Conference Paper

Year of Publication Publication Type Title

2017

Conference Paper

S. Sahoo and Dr. K. Sangeeta Iyer, “Analysis and Comaparison of Various Compression Methods Used for storing Massive Geodata objects”, in International Conference on Computational Intelligence in Data Science, ICCIDS 2017 , 2017.

2017

Conference Paper

A. Ravali and Dr. K. Sangeeta Iyer, “On the reduction of large sparse matrices”, in International Conference on Computational Intelligence in Data Science, ICCIDS 2017 , 2017.

2017

Conference Paper

V. N and Dr. K. Sangeeta Iyer, “An IOT based Network Man-agement System for Enterprise Network ”, in International Conference on Computational Intelligence in Data Science, ICCIDS 2017, 2017.

2015

Conference Paper

Dr. Supriya M., Dr. K. Sangeeta Iyer, and Patra, G. K., “Comparison of AHP based and Fuzzy based mechanisms for ranking Cloud Computing services”, in Proceeding - 2015 International Conference on Computer, Control, Informatics and Its Applications: Emerging Trends in the Era of Internet of Things, IC3INA 2015, 2015, pp. 175-180.[Abstract]


Cloud Computing has emerged as a paradigm to deliver on demand resources to facilitate the customers with access to their infrastructure and applications as per their requirements on a subscription basis. An exponential increase in the number of cloud services in the past few years provides more options for customers to choose from. To assist customers in selecting a most trustworthy cloud provider, a unified trust evaluation framework is needed. Trust helps in the estimation of competency of a resource provider in completing a task thus enabling users to select the best resources in the heterogeneous cloud infrastructure. Trust estimates obtained using the AHP process exhibit a deviation for parameters that are not in direct proportion to the contributing attributes. Such deviation can be removed using the Fuzzy AHP model. In this paper, a Fuzzy AHP based hierarchical trust model has been proposed to rate the service providers and their various plans for infrastructure as a service. © 2015 IEEE.

More »»

2015

Conference Paper

S .Santhanalakshmi, Dr. K. Sangeeta Iyer, and Patra, G. K., “Design and Analysis of Cryptographic Protocols using Computational Intelligence Techniques”, in International Conference on Inter-Research-Institute Student Seminar (IRISS 2015) , ACM India Annual Event at BITS, Goa, 2015.

2015

Conference Paper

Dr. Supriya M., Dr. K. Sangeeta Iyer, and Patra, G. K., “Trust Management for Large Distributed Systems”, in International Conference on Inter-Research-Institute Student Seminar (IRISS 2015), ACM India Annual Event at BITS, Goa, 2015.

2014

Conference Paper

A. A. T. Innocent and Dr. K. Sangeeta Iyer, “Secure two-party computation with AES-128: Generic approach and exploiting specific properties of functions approach”, in The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014), Bangalore, India, 2014.[Abstract]


Introduced by Yao in early 1980s, secure computation is being one among the major area of research interest among cryptologists. In three decades of its growth, secure computation which can be called as two-party computation, or multiparty computation depending on the number of parties involved has experienced vast diversities. Research has been carried out by exploiting specific properties of functionalities and generic approach to achieve efficient practical secure computation protocols. This paper compares the above two approaches for secure two-party computation of AES-128.

More »»

2013

Conference Paper

Dr. Supriya M., Dr. K. Sangeeta Iyer, and Patra, G. Kb, “Comparison of cloud service providers based on direct and recommended trust rating”, in 2013 IEEE International Conference on Electronics, Computing and Communication Technologies, CONECCT 2013, IEEE Bengaluru Section at World Trade Center, Bangalore, 2013.[Abstract]


Cloud computing provides many opportunities for enterprises by offering a range of computing services. In today's competitive environment, the service dynamism, elasticity, and choices offered by this highly scalable technology are too attractive for enterprises to ignore. These opportunities have opened up a new dimension of challenges by introducing a different type of trust scenario. Today, the problem of trusting cloud computing is of supreme concern for most enterprises. The diversity of cloud service offerings makes it necessary for customers to evaluate the service levels of different cloud providers in an objective way such that required quality, reliability or security of an application can be ensured. In this paper, a model for Trust Management based on Fuzzy Logic is used to compare the cloud service providers available in the market. © 2013 IEEE.

More »»

Publication Type: Journal Article

Year of Publication Publication Type Title

2014

Journal Article

S .Santhanalakshmi, Dr. K. Sangeeta Iyer, and Patra, G. K., “Secure Key Stream Generation using Computational Intelligence Techniques”, Int. Journal Computer Technology & Applications, Month and Year of Publication, , vol. 5, pp. 967-972, 2014.

2014

Journal Article

Dr. Supriya M., Dr. K. Sangeeta Iyer, and Patr, G. K., “Hierarchical Trust Model to Rate Cloud Service Providers based on Infrastructure as a Service”, Hierarchical Trust Model to Rate Cloud Service Providers based on Infrastructure as a Service , vol. 5, no. 3, pp. 1102-1111, 2014.[Abstract]


In large scale distributed systems like cloud computing, customers need to interact with unknown service providers to carry out tasks or transactions. The ability to reason about and assess the possible risks in carrying out such transactions is necessary for providing a safe and trustworthy environment. Cooperative characteristics of distributed computing systems enforce a proper and secure trust management to be in place to minimize the risks posed by different malicious agents. Trust is the estimation of competency of a resource provider in completing a task based on dependability, security, ability and availability in the context of distributed environment. It enables users to select the best resources in the heterogeneous cloud infrastructure. In this paper, a hierarchical trust model has been proposed to manage the trust and to rate the service providers and their various plans based on IaaS in cloud computing environment.

More »»

207
PROGRAMS
OFFERED
6
AMRITA
CAMPUSES
15
CONSTITUENT
SCHOOLS
A
GRADE BY
NAAC, MHRD
8th
RANK(INDIA):
NIRF 2018
150+
INTERNATIONAL
PARTNERS