Qualification: 
Ph.D, M.Tech
Email: 
m_supriya@blr.amrita.edu

Dr. Supriya M. currently serves as Vice-Chairperson and Assistant Professor at the department of Computer Science, Amrita School of Engineering, Bengaluru. She has 20 years of teaching experience. She completed her B.E. (CSE) at Bharathiar University and acquired M.Tech (CSE) from Dr. M. G. R. University. She obtained her Ph.D in the year 2017 from Amrita Vishwa Vidyapeetham, Bengaluru. Her research interests include High performance computing, Cloud and Fog computing, Internet of Things, Machine Learning and Parallel algorithms. She has published papers in international journals and conferences. She is currently guiding scholars in the areas of Cloud, Fog and IoT. She is working with Amrita Vishwa Vidyapeetham, Bengaluru campus since 2004

Education

  • 2017: Ph. D. in Computer Science and Engineering
    Amrita Vishwa Vidyapeetham, Bengaluru
  • 2007: M. Tech. in Computer Science and Engineering
    Dr. M. G. R. University, Chennai
  • 1999: B. E. in Computer Science and Engineering
    Bharathiar University

Professional Appointments

Year Affiliation
Since 2009 Assistant Professor (SG)
Amrita Vishwa Vidyapeetham, Bengaluru
2004 – 2009 Senior Lecturer
Amrita Vishwa Vidyapeetham, Bengaluru
2002 – 2003 Lecturer
New Horizon College of Engineering, Bengaluru
1999 – 2002 Lecturer
Tamilnadu College of Engineering, Coimbatore

Research & Management Experience

  • Research Experience – 10 years

Major Research Interests

  • High performance computing
  • Cloud & Fog computing
  • Internet of Things
  • Machine Learning and Parallel algorithms

Membership in Professional Bodies

  • ACM Professional member since 2015

Projects

Publications

Publication Type: Conference Paper

Year of Publication Title

2021

A. U. Angitha and Dr. Supriya M., “Ranking of Educational Institutions Based on User Priorities Using Multi-criteria Decision-Making Methods”, in 2nd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing, Cham, 2021.[Abstract]


Educational institutions play a major role in transforming the values to the upcoming generations. In recent times, there is a steep increase in the number of students opting for various degrees, and one can also observe that the number of institutions offering these degrees is on the rise to cater the need of the younger generations. With the major growth of education sector, it is very essential to evaluate the educational institutions for their own betterment as well as to serve as a reference for choosing a particular institution. There exist a number of ranking systems that rank educational institutions based on a fixed set of parameters. However, there exists no such system that provides the rank of institutions based on user-defined preferences. This paper aims to implement a ranking system based on analytical hierarchy process and multi-criteria decision-making method PROMETHEE and ranks educational institutions based on various parameters weighed according to the user preferences. Such a ranking system helps the students and parents to filter out the institutions based on their requirements and find a suitable institution to cater their need.

More »»

2020

Dr. Supriya M., “Cloud Service Provider Selection using Non-Dominated Sorting Genetic Algorithm”, in 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI), 2020.

2020

Dr. Supriya M., “Ranking Internet Service Providers using Fuzzy Multi Criteria Decision Making Method”, in 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), 2020.[Abstract]


Internet service providers (ISPs) are companies that generally provide Internet-related services to customers in multiple forms. They can be classified as Access providers, Mailbox providers, Transit ISPs, Virtual ISPs, Free ISPs or Wireless ISPs. ISPs offer their services at variable costs and such offerings come with varied service levels. Different organizations and individuals pay for the acquired service or pay well in advance to acquire the same. The number of service providers grows day by day and each provider offers plenty of plans with many service levels to cater the need of different customers. Customers have to make a right selection so that they get the complete benefit out of it. The focus of this paper is to help customers to make a judicious choice using a hierarchical estimation framework. This framework uses various QoS based parameters to rank the currently available ISPs in the market using Fuzzy based Multi-criteria decision-making (MCDM) methods like Fuzzy-AHP and Fuzzy-TOPSIS.

More »»

2020

L. Kolasani and Dr. Supriya M., “Parallelized Heat Map Algorithm Using Multiple Cores”, in International Conference on Data Science, Machine Learning & Applications (ICDSMLA 2019), CMR Institute of Technology, Hyderabad, India , 2020.

2019

R. Panwar and Dr. Supriya M., “Autonomic Resource Allocation Frameworks for Service-based Cloud Applications: A Survey”, in 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), Greater Noida, India, 2019.[Abstract]


Cloud is a collection of heterogeneous-computing resources that are presented to the users on the payment basis. Cloud and the associated resources are dynamic in nature. The provisioning of resources in such dynamic environment is one of the critical issues in the cloud. Various Quality of Service (QoS) parameters contribute to the provisioning of appropriate resources in the cloud. A right proportion of resource provisioning is necessary to improve the performance of the system. To mention, energy wastage and cost increase due to over-provisioning, while, under-provisioning may seem to effect Service Level Agreements (SLA) and Service Quality (QoS). Hence, the virtual resources should be allocated accordingly to fulfil the current dynamic demand of various applications. This paper presents a deeper survey on the various resource allocation frameworks for service-based cloud applications.

More »»

2019

M. Manideep, Thukaram, R., and Dr. Supriya M., “Smart Agriculture Farming with Image Capturing Module”, in 2019 Global Conference for Advancement in Technology (GCAT), Bangalore, India, 2019.[Abstract]


Agriculture is an important factor for the wellbeing of a country. Though India is not the largest agriculture nation in the world, it contributes a considerable amount to the world's agriculture production. But due to various factors, the growth rate is dropping in recent times. This is one of the main reasons for the need of development in the field of agriculture. With the recent technological improvements, the field of agriculture can be automated with the help of Internet of Things (IoT), Wireless Sensor Networks (WSN), Cloud Computing & Big Data Analysis. The current agriculture network systems do not match with the speed and thus the storage capacity of various other factors also come into play. For this to improve, the researchers suggest for Agriculture as a Service (AaaS) model which is basically an Application as a Service. IoT helps to share the data which can be processed using Big Data techniques by storing into a cloud. This is the modern approach to the Agricultural Networking System problem which will improve the Quality of Service (QoS). This paper focuses on building such a system with the camera module. This module helps to capture the images which can be used to analyze the type of leaf and if it is affected by any disease. The information regarding the same can be sent to the users' mobile using the GSM technology.

More »»

2019

KantamneniRaviteja and Dr. Supriya M., “IOT Based Agriculture Monitoring System”, in 3rd International Conference on Data Engineering and Communication Technology (ICDECT), 2019.

2018

N. Lohitha Kodumru and Dr. Supriya M., “Secure Data Storage in Cloud Using Cryptographic Algorithms”, in 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), Pune, India, 2018.[Abstract]


Cloud computing security refers to protection of data in cloud, its applications and the underlying infrastructure using some set of policies, controls and technologies. Information security or secure data storage, a part of cloud security aims to prevent unauthorized users to access the data and avoids destruction or modification of one's personal information. When one's data is taken to the cloud, lot of security concerns arises and assuring security for the data is still questionable. This paper proposes ways to secure data in cloud using strong cryptographic algorithms like RSA, AES and One Time Pad. Strong cryptographic algorithms are generally mature and unbreakable. Among the existing classical or modern algorithms, one-time pad is an unbreakable algorithm. This paper proposes combination of above three models and analyzes the algorithms by comparing them for storing the data in cloud. The analysis suggests the use of RSA and OTP with variations due to its less time complexity and space complexity.

More »»

2018

S. Kiran and Dr. Supriya M., “Cost Efficient Intelligent Vehicle Surveillance System”, in International Conference on Information and Communication Technology for Intelligent Systems, 2018.[Abstract]


The rapid development in the field of electronics, provide a secured environment for the human to live in. This paper introduces a model, “Intelligent Vehicle Surveillance System”, which is designed to reduce the risk involved in losing the vehicles and it also provides notification of occurrence of any accidents, which will reduce the rate of deaths in a very cost efficient manner. This paper introduces a tracking system which passes alert to the owner of the vehicle immediately regarding a theft or an accident of the vehicle with the precise location of the vehicle. There are different methods to identify and continuously track the location of remote vehicle. This proposed system has a single board GPS equipped with GSM and Arduino microcontroller attached in the vehicle. As the vehicle moves its location gets updated via SMS. User can provide real-time control, by sending messages, controlling the vehicle, changing direction as well as on and off. A Software attached would help to read, analyze, process and store the incoming SMS. This system finds its application in real time traffic monitoring. The current system will provide monitoring information from anywhere.

More »»

2017

S. Pandey, Dr. Supriya M., and Shrivastava, A., “Aggregation algorithm to overcome data travel cost in MapReduce”, in 2017 International Conference on Computational Intelligence in Data Science(ICCIDS), Chennai, India, 2017.[Abstract]


MapReduce is one of the famous programming methods used by the developers and researchers for “big data”. MapReduce basically runs on Hadoop distributed framework and works efficiently to give better results for large data set. It uses two functional algorithms to process chunks of data. Map function collects the data from local Hadoop Distributed File System (HDFS) and further divides it into number of small chunks for parallel processing. Shuffling process sorts the intermediate results and sends the key and value pairs to the reducer phase. So, when the same key and value pairs are sent by the shuffler to the same reducer, a high volume of network blockage occurs which in turn impose a severe constraint on the processing of the data application. This paper proposes an aggregation algorithm to overcome such traffic in using MapReduce.

More »»

2017

O. Joshi, Bhargavi R. Upadhyay, and Dr. Supriya M., “Parallelized Advanced Rabin-Karp Algorithm for String Matching”, in 3rdInternational Conference On Computing, Communication, Control And Automation (ICCUBEA2017), Pune, 2017.

2017

K. S. L and Dr. Supriya M., “Siren Detection and Driver Assistance using Modified Minimum Mean Square Error Method”, in International Conference On Smart Technologies For Smart Nation (SmartTechCon2017), Reva University, Bengaluru, 2017.

2017

G. SaiTeja, M, D., Yathendra, N., and Dr. Supriya M., “Ranking of Internet Service Providers Considering Customer Priorities using Multiple Criteria Decision-Making Methods”, in International Conference On Smart Technologies For Smart Nation (SmartTechCon2017), Reva University, Bengaluru, 2017.

2017

S. Pandey, Dr. Supriya M., and Shrivastava, A., “Data Classification Using Machine Learning Approach”, in 3rd International Symposium on Intelligent Systems Technologies and Applications (ISTA'17), , Manipal University, Karnataka , 2017.[Abstract]


Currently, Internet has numerous effects on our everyday lifecycle. Its significance as an intermediate for commercial transactions will develop exponentially throughout the next years. In terms of the engaged marketplace volume, the Business to Business region will hereby be the supreme exciting area. As the extensive usage of electronic business transactions increase, great volume of products information gets generated and managing such large information automatically becomes a challenging task. The accurate classification of such products to each of the existing classes also becomes an additional multifarious task. The catalog classification is an essential part for operative electronic business applications and classical machine learning problems. This paper presents a supervised Multinomial Naïve Bayes Classifier machine learning algorithm to classify product listings to anonymous marketplaces. If the existing products are classified under the master taxonomy, the task is to automatically categorize a new product into one of the existing categories. Our algorithm approach proposes a method to accurately classify the existing millions of products

More »»

2015

Dr. Supriya M., Dr. K. Sangeeta Iyer, and Patra, G. K., “Trust Management for Large Distributed Systems”, in International Conference on Inter-Research-Institute Student Seminar (IRISS 2015), ACM India Annual Event at BITS, Goa, 2015.

2015

and Dr. Supriya M., “Downlink Resource Management Scheme for Next Generation Wireless Networks with Rank Scheduling”, in SMART GRID Technologies, August 6-8, 2015, 2015.

2015

Dr. Supriya M., Dr. K. Sangeeta Iyer, and Patra, G. K., “Comparison of AHP based and Fuzzy based mechanisms for ranking Cloud Computing services”, in Proceeding - 2015 International Conference on Computer, Control, Informatics and Its Applications: Emerging Trends in the Era of Internet of Things, IC3INA 2015, 2015, pp. 175-180.[Abstract]


Cloud Computing has emerged as a paradigm to deliver on demand resources to facilitate the customers with access to their infrastructure and applications as per their requirements on a subscription basis. An exponential increase in the number of cloud services in the past few years provides more options for customers to choose from. To assist customers in selecting a most trustworthy cloud provider, a unified trust evaluation framework is needed. Trust helps in the estimation of competency of a resource provider in completing a task thus enabling users to select the best resources in the heterogeneous cloud infrastructure. Trust estimates obtained using the AHP process exhibit a deviation for parameters that are not in direct proportion to the contributing attributes. Such deviation can be removed using the Fuzzy AHP model. In this paper, a Fuzzy AHP based hierarchical trust model has been proposed to rate the service providers and their various plans for infrastructure as a service. © 2015 IEEE.

More »»

2014

D. S. and Dr. Supriya M., “Trust Management Schemes for Intrusion Detection Systems - A Survey”, in International Conference on Electrical, Electronics, Mechanical and Computer Engineering (ICEEMCE 2014), Industrial Electronics and Electrical Engineers Forum (IEEE Forum), Bengaluru , 2014.

2014

Dr. Supriya M., K, S., and , “Comparison of Trust Values using Triangular and Gaussian Fuzzy Membership Functions for Infrastructure as a Service”, in International Conference on ‘Advances in Communication, Network and Computing, CNC 2014, Chennai, 2014.[Abstract]


Cloud computing has emerged as a paradigm to deliver on demand resources to enable the customers with access to their infrastructure and application services on a subscription basis. In recent times, increasing number of people carry out variety of different activities on the cloud. Two important issues that arise in cloud computing relate to storing and securing data, and monitoring the use of the cloud by the service providers. Trust helps to build this consumer confidence in such open and often anonymous environments. It provides a reliable environment for customers or businesses to carry out transactions with cloud providers. The amount of trust that the trusting agent has in the trusted agent is measured by a Trustworthiness scale. Trustworthiness is determined by the trust levels specified as numeric or non-numeric values. Trust is one of the most fuzzy, dynamic and complex concepts in both social and business relationships. In this paper, a hierarchical trust model has been used to compare the trust values of various cloud service providers for five levels of trustworthiness using triangular and Gaussian fuzzy membership functions based on Infrastructure as a Service.

More »»

2014

A. S. and Dr. Supriya M., “Schemes for Providing Routing Security in MANET - A Survey”, in International Conference on Recent Innovations in Electrical, Electronics, Computer and Mechanical Engineering (ICRIEECME 2014), Bengaluru, 2014, vol. 2, pp. 99–103.

2014

Dr. Supriya M., Sangeeta, K., and Patra, G. K., “Estimation of Trust Values for Varying Levels of Trustworthiness Based on Infrastructure As a Service”, in Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing, New York, NY, USA, 2014.

2013

Dr. Supriya M., Dr. K. Sangeeta Iyer, and Patra, G. Kb, “Comparison of cloud service providers based on direct and recommended trust rating”, in 2013 IEEE International Conference on Electronics, Computing and Communication Technologies, CONECCT 2013, IEEE Bengaluru Section at World Trade Center, Bangalore, 2013.[Abstract]


Cloud computing provides many opportunities for enterprises by offering a range of computing services. In today's competitive environment, the service dynamism, elasticity, and choices offered by this highly scalable technology are too attractive for enterprises to ignore. These opportunities have opened up a new dimension of challenges by introducing a different type of trust scenario. Today, the problem of trusting cloud computing is of supreme concern for most enterprises. The diversity of cloud service offerings makes it necessary for customers to evaluate the service levels of different cloud providers in an objective way such that required quality, reliability or security of an application can be ensured. In this paper, a model for Trust Management based on Fuzzy Logic is used to compare the cloud service providers available in the market. © 2013 IEEE.

More »»

2011

S. Ramesh Maniyath and Dr. Supriya M., “An Uncompressed Image Encryption Algorithm Based on DNA Sequences”, in Computer Science & Information Technology (CS & IT) - International Conference, Chennai, 2011.[Abstract]


The rapid growth of the Internet and digitized content made image and video distribution simpler. Hence the need for image and video data protection is on the rise. In this paper, we propose a secure and computationally feasible image and video encryption/decryption algorithm based on DNA sequences. The main purpose of this algorithm is to reduce the big image encryption time. This algorithm is implemented by using the natural DNA sequences as main keys. The first part is the process of pixel scrambling. The original image is confused in the light of the scrambling sequence which is generated by the DNA sequence. The second part is the process of pixel replacement. The pixel gray values of the new image and the one of the three encryption templates generated by the other DNA sequence are XORed bit-by-bit in turn. The main scope of this paper is to propose an extension of this algorithm to videos and making it secure using modern Biological technology. A security analysis for the proposed system is performed and presented.

More »»

Publication Type: Conference Proceedings

Year of Publication Title

2020

M. Samyuktha and Dr. Supriya M., “Automation of Admission Enquiry Process Through Chatbot–-A Feedback-Enabled Learning System”, International Conference on Communication, Computing and Electronics Systems: Proceedings of ICCCES 2019. Springer Singapore, Singapore, pp. 193–201, 2020.[Abstract]


Chatbots are existing since few years and recently it has started acquiring popularity. Earlier to chatbots, people use help desk as the enquiring medium and hence people working at help desks have to work all the days and answer all the questions. Most of the queries are repetitive in nature and answers are given from a structured database. In order to reduce the effort of humans, we can have a chatbot deployed for the same activity. This work focuses on a chatbot which has been developed to provide a faster human-like interaction for admission enquiry system. The chatbot is capable of handling negative or irrelevant scenarios and responds to the queries in faster manner. Decision making by the chatbot on choosing the right set of sentences is done using LSA algorithm and cosine similarity. In addition to answering, the chatbot also maintains data of questions which is not being answered. This data can be used for future analysis for retrieval-based system. The chatbot also takes the feedback from the customers and this data can be analyzed using the feedback category report generated by the chatbot using LDA algorithm

More »»

2016

P. Kochar and Dr. Supriya M., “Vehicle Speed Control Using Zigbee and GPS”, Smart Trends in Information Technology and Computer Communications: First International Conference, SmartCom 2016, Jaipur, India, August 6–7, 2016, Revised Selected Papers. Springer Singapore, Singapore, pp. 847–854, 2016.[Abstract]


With the current population and growing number of vehicles on road, speed control has become an important requirement due to the increased number of accidents reported in our day-to-day life. Measures like traffic management, improving quality of road infrastructure and safer vehicles can prevent the road accidents. Though there are many technologies available for speed management of a vehicle, practical implementation of each is to some extent is not up to satisfactory level. This paper discusses a speed monitoring and control system that can provide safer environment in critical zones like schools, colleges etc. The proposed method uses Zigbee and GPS for the speed control and which is also cost effective and can be fixed easily on vehicles. More »»

Publication Type: Journal Article

Year of Publication Title

2020

K. Raviteja and Dr. Supriya M., “Greenhouse Monitoring System Based on Internet of Things”, International Conference on Communication, Computing and Electronics Systems: Proceedings of ICCCES 2019, pp. 581–591, 2020.[Abstract]


In the recent times, IoT is playing a major role in the development of agriculture. Due to the enormous growth of IoT, smart farming is becoming an emerging concept as IoT is capable enough to provide information about the agriculture fields. This work focuses on greenhouses which can be used in growing plants under certain circumstances. Such plant life can be monitored on a regular basis so as to increase the yield with high quality and quantity. This paper aims to provide farmers with an IoT-based Web application for monitoring the agriculture fields and its conditions. With the arrival of open supply Arduino Uno boards beside low-cost wet sensors, it is feasible to make devices that monitor various sensors like temperature/humidity sensor, soil moisture sensor, ultrasonic sensor, PIR sensor, pressure sensor, and light level sensor for consequently irrigating the fields when required.

More »»

2020

A. Dayanand Naik and Dr. Supriya M., “Classification of Indian Classical Dance Images using Convolution Neural Network”, 2020 International Conference on Communication and Signal Processing (ICCSP), pp. 1245-1249, 2020.[Abstract]


Indian classical dance is the combination of gesture of all the body parts. It has varied forms and is generally a combination of single hand mudra, double hand mudra, leg alignment, hip movement, eye movement, facial expression, and leg posture. Each dance form has unique gesture, using which, they can be classified. The costumes worn by dancers are also unique. This work proposes the identification and classification of Indian Classical Dance images using Deep Learning Convolution Neural Network (CNN). This work uses the dataset consisting of five dance classes namely Bharatanatyam, Odissi, Kathak, Kathakali, Yakshagana, the images of which are collected from the internet using Google Crawler. This system can be used for automated dance quizzes and can be used by anyone to find out how well he/she is familiar with the variety of dance forms in India given its varied postures and styles

More »»

2016

Bhargavi R. Upadhyay, Jayan, A. Nair Anand, and Dr. Supriya M., “Performance Analysis of Modified RC4 Cryptographic Algorithm using number of cores in Parallel Execution”, International journal of control theory and application, vol. 9, pp. 225-231, 2016.[Abstract]


In this network-based computing era,software applications are playing a major role. With this role,the cryptography of these algorithm is also of a much concern. Cryptographic algorithms are complex and can consume lot of time and hence, it can benefit from parallelism. But parallelism is not that simple, as sometimes it is not possible to convert the whole algorithm into a parallel one. So in this paper we are proposing a modified RC4 algorithm which can be made fully parallel. This modified algorithm is compared with other cryptographic algorithms i.e., AES, DES and RSA for its speed and time complexity.This algorithm is also implemented in Cuda, MPI and OpenMP and the results are compared.

More »»

2016

Dr. Supriya M., Sangeeta, K., and , “A Fuzzy based Hierarchical Trust Framework to rate the Cloud Service Providers based on Infrastructure Facilities”, International Journal of Performability Engineering, vol. 12, pp. 55–62, 2016.[Abstract]


Cloud Computing has emerged as a paradigm to deliver on demand resources such as infrastructure and applications to customers as per their requirements on a subscription basis. Due to an exponential increase in the number of service providers, customers need a basis to make a judicious choice of a cloud offering. Thus to assist customers in selecting a most trustworthy cloud provider, a unified trust evaluation framework is needed. In this paper, a hierarchical trust model has been proposed to rate the service providers and their various plans for infrastructure as a service. Such a trust ranking mechanism will help the consumers to compare and rank alternative service providers based on their requirements. More »»

2016

Dr. Supriya M., Sangeeta, Ka, and Patra, G. Kb, “Trustworthy cloud service provider selection using multi criteria decision making methods”, Engineering Letters, vol. 24, pp. 1-10, 2016.[Abstract]


Cloud Computing is a specialized form of Distributed computing in which the resources such as storage, processors, memory etc. are completely abstracted from the consumer. The number of Cloud Service Providers (CSPs) who offer computing as a service has increased in recent times and often the customers need to interact with unknown service providers to carry out transactions. In such an open and anonymous environments, trust helps to build consumer confidence and provides a reliable environment for them. A trust based ranking system could also help them to choose between the services as per their requirement. In this paper, multi criteria decision making methods have been used to rank the service providers based on their infrastructure parameters. A combination of analytic and fuzzy method gives a better trust estimate as compared to an analytic method alone. © 2016, Newswood Ltd. All rights reserved.

More »»

2015

B. Meghana and Dr. Supriya M., “A Novel Technique Against Selfish Node Attacks”, International Journal of Applied Engineering Research, vol. 10, pp. 10685–10695, 2015.

2014

A. C.S. and Dr. Supriya M., “Schemes for Providing Routing Security in Manet – A Survey”, International Journal of Advanced Computational Engineering and Networking. , vol. 2, no. 8, pp. 99-103 , 2014.

2014

D. S. and Dr. Supriya M., “Trust Management Schemes for Intrusion Detection Systems -A Survey”, International Journal of Advanced Computational Engineering and Networking, vol. 2, pp. 39-43, 2014.

2014

Dr. Supriya M., Dr. K. Sangeeta Iyer, and Patr, G. K., “Hierarchical Trust Model to Rate Cloud Service Providers based on Infrastructure as a Service”, Hierarchical Trust Model to Rate Cloud Service Providers based on Infrastructure as a Service , vol. 5, no. 3, pp. 1102-1111, 2014.[Abstract]


In large scale distributed systems like cloud computing, customers need to interact with unknown service providers to carry out tasks or transactions. The ability to reason about and assess the possible risks in carrying out such transactions is necessary for providing a safe and trustworthy environment. Cooperative characteristics of distributed computing systems enforce a proper and secure trust management to be in place to minimize the risks posed by different malicious agents. Trust is the estimation of competency of a resource provider in completing a task based on dependability, security, ability and availability in the context of distributed environment. It enables users to select the best resources in the heterogeneous cloud infrastructure. In this paper, a hierarchical trust model has been proposed to manage the trust and to rate the service providers and their various plans based on IaaS in cloud computing environment.

More »»

2012

Dr. Supriya M., K, S., J, V. L., and , “Estimating Trust Value for Cloud Service Providers using Fuzzy Logic”, International Journal of Computer Applications, vol. 48, pp. 28–34, 2012.[Abstract]


Cloud computing has garnered popular support in a relatively short span of time. It is a new method of delivering the distributed resources over internet. It reduces capital expenditure as well as operational expenditure. The number of cloud service providers (CSPs) who provide computing as a utility has increased exponentially in the past few years, providing more options for the customers to choose from. In this paper a model for Trust Management based on Fuzzy Logic has been developed, which can help consumers make an informed choice towards selecting the appropriate CSP as per their requirement. More »»

Publication Type: Presentation

Year of Publication Title

2016

Dr. Supriya M., Sangeeta, K., and Patra, G. K., “Trusted Cloud Storage for Big Data (Poster)”, 7th International Summer School on Information Security and Protection (ISSISP 2016). Amrita Vishwa Vidyapeetham in Bengaluru, 2016.

2015

Dr. Supriya M., Sangeeta, K., and Patra, G. K., “Trust Management for Large Distributed Systems based on Infrastructure as a Service”, Inter-Research-Institute Student Seminar (IRISS 2015) . ACM India Annual Event at BITS, Goa, 2015.

Publication Type: Book Chapter

Year of Publication Title

2016

P. Pillai and Dr. Supriya M., “Real Time CO2 Monitoring and Alert System Based on Wireless Sensor Networks”, in Intelligent Systems Technologies and Applications: Volume 2, S. Berretti, Thampi, S. M., and Dasgupta, S., Eds. Cham: Springer International Publishing, 2016, pp. 91–103.[Abstract]


Carbon Dioxide (CO2) is an inevitable part in atmosphere for the existence of life on the Earth. But if increased beyond a certain limit it is harmful as it is the major cause for global warming. The only effective way to fight this is to store CO2 away from the atmosphere for a long time. This is achieved by using Carbon Dioxide Capture and Storage (CCS). But one major concern that arises when CO2 is stored in large quantities is it’s leakage from reservoir. An online CO2 emission monitoring and alert system is developed in order to monitor the leakage of CO2 in real time in CCS, try to reduce the leakage up to a controllable level and to give alert to the consent person, if the CO2 leakage goes beyond an uncontrollable limit. The data is stored in real time for further analysis. Advantages of wireless sensor networks are exploited in order to precisely sense the CO2 concentration. More »»

Poster Presentation

  1. Presented the Research work titled “Trust Management for Large Distributed Systems based on Infrastructure as a Service” authored Supriya M., K. Sangeeta, and G. K. Patra, as a Poster at Inter-Research-Institute Student Seminar (IRISS 2015) collocated with ACM India Annual Event at BITS, Goa between 5th and 7th Feb 2015.
  2. Poster titled “Trusted Cloud Storage for Big Data” authored Supriya M., K. Sangeeta, and G. K. Patra, was presented at 7th International Summer School on Information Security and Protection (ISSISP 2016), hosted by Amrita University in Bengaluru on Aug 6, 2016. This poster won a free pass to NASSCOM-DSCI Annual Information Security Summit-2016 (Annual Flagship Event) conducted by DSCI New Delhi.

Research Grants Received

Year Funding Agency Title of the Project Investigators Status
2015 VGST-SPiCE Online Monitoring for Geological CO2 Storage and Leakage based on Wireless Sensor Networks PI: Dr. Supriya M. Co-PI: Parvathi Pillai (M.Tech - Embedded Systems) Completed

Keynote Addresses/Invited Talks/Panel Memberships

  • Webinar on “Data Science and Security Challenges” Presented a session at Webinar Series on “Insights in Computer Science” hosted by Department of CSE, Amrita School of Engineering, Bengaluru in the month of May 2020.
  • Guest Lecture on “Undecidable Problems in Computational Theory” Presented at Mahendra College of Engineering, Tamilnadu in the month of August 2019.

Courses Taught

  • Design and Analysis of Algorithms
  • Machine Learning
  • Theory of Computation
  • Parallel and Distributed Computing
  • Foundations of Data Science
  • Distributed Computing
  • Cloud Computing and Services
  • Advanced Operating Systems
  • Real Time Systems
  • Structure and Interpretation of Computer Programs
  • Formal Languages and Automata
  • Data Structures
  • Compiler Optimization Techniques and Design
  • Embedded Systems Programming
  • Advanced Algorithms and Analysis
  • Operating Systems
  • Operating System Internals
  • Computer Programming
  • Computer Networks
  • Principles of Compiler Design
  • System Software & Operating Systems
  • Object Oriented Programming

Student Guidance

Undergraduate Students

Sl. No. Name of the Student(s) Topic Status – Ongoing/Completed Year of Completion
1 G Vamsi Krishna, Rahul Kota, K Nikhil Secure and Efficient Information Retrieval in Cloud Completed 2020
2 Sai Praveen K, Hemanth Chowdary, Janardhan Reddy Product Rating using User Reviews Completed 2020
3 Khandavilli Balanjaneya Phani Ticketing GUI development using Sabre Scribe and Sabre Web Services Completed (Internship) 2020
4 Raghul Thukaram, Munnangi Manideep, Patlori Rajashekar Reddy IOT based Agriculture as a Cloud and Bigdata Service Completed 2019
5 Indla Raghuram, Vajja Alekhya Three-Dimensional Tag Cloud Visualization for Intelligent Tourism Completed 2018
6 Vaddiparti Surya Sagar AR Integrated Warehouse Management Completed (Internship) 2018
7 M. Dheeraj, G. Sai Teja,  N. Yathendra Trustworthy Internet Service Provider Selection using Multi Criteria Decision Making Methods Completed 2017

Postgraduate Students

Sl. No. Name of the Student(s) Topic Status – Ongoing/Completed Year of Completion
1 Jyothi C Decentralized Application (DApp) for Microfinance using a Block Chain Network Ongoing 2021
2 Vambara Tejesh Object Detection and Instance Segmentation using Mask R-CNN Ongoing 2021
3 Jyothi C. Abstractive Text Summarization using Long Short-Term Memory Networks Completed 2020
4 Vambara Tejesh Solving Vehicle Routing Problem Based on Pickup and Delivery Completed 2020
5 Ashwini Dayanand Naik Dance Image Classification using CNN and Geometric CNN Completed 2020
6 Angitha A. U. Ranking Educational Institutions using Multi-Criteria Decision Making Methods Completed 2020
7 Kantamneni Raviteja IOT based Agriculture Monitoring System Completed 2019
8 Lahari Kolasani Parallelized Heat Map Algorithm using Map Reduce Completed 2019
9 Samyuktha M Automation of Admission Enquiry Process through Chatbot Completed 2019
10 Kodumuru Nagasai Lohitha Secure Data Storage in Cloud using RSA and OTP Algorithms Completed 2018
11 Pasupulety Latha Author Identification in Social Networks Completed 2018
12 Kodumuru Nagasai Lohitha Analysis, Visualization, Correlation and Predictive Analysis on Air Pollution Data Completed 2018
13 Pasupulety Latha Recommendation System with Automated Web usage Data Mining by Classification and MCDM Methods Completed 2018
14 Shekhar Pandey Aggregate Algorithm to overcome Data Travel cost in Mapreduce Completed 2017
15 Kiran S. L. Siren Detection and Driver Assistance using Modified Minimum Mean Square Error Method Completed 2017
16 Kiran S. L. Intelligent Vehicle Surveillance System Completed 2017
17 Shekhar Pandey Optimize Parallel Data Access in Bigdata Processing Completed 2017
18 Pallavi Kochar RFID based Automatic Speed Limit Control System Completed 2016
19 Livina Jaya Shankar Downlink Resource Management Scheme for Next Generation Wireless Networks with Rank Scheduling Completed 2015
20 Parvathy Pillai Online Monitoring and Alert System for CO2 Storage and Leakage based on WSN Completed 2015
21 Bommisetty Meghana A Framework to Detect Selfish Nodes in MANET using Trust Mechanism Completed 2015
22 Deepa S. Hierarchical Trust Management for WSN’s and its Applications Completed 2014
23 Anu C. S. Trust based Routing Mechanism in MANET: Design and Implementation Completed 2014
24 Anu C. S. Data forwarding of real-time mobile target tracking in WSNs Completed 2014
25 Deepa S. A Secure Intrusion Detection System for MANETs Completed 2014
26 Arunima Vijayan CTrust-Trust Management in Cyclic Mobile Adhoc N/W’s Completed 2013
27 Richu Sreedevi Design and Implementation of TARF – A Trust Aware Routing Framework for WSNs Completed 2013
28 Richu Sreedevi A Security Management Architecture for Supporting Routing Services on WANETs Completed 2013
29 Arunima Vijayan FACES: Friend based Adhoc Routing using Challenges to Establish Security in MANET Systems Completed 2013
30 Sandhya S. Trust Management in P2P Systems using Fuzzy Set Theory Completed 2012
31 Venkataramana L. J. A Trust Management Model in Cloud Computing using Fuzzy Logic Completed 2012
32 Sreebha B. Group based Trust Management Scheme for Clustered WSNs Completed 2012
33 Sandhya S. Trust Management in P2P Systems Completed 2012
34 Sreebha B. Key Pre-distribution Schemes for Establishing Pairwise Keys Completed 2012
35 Venkataramana L. J. Interpretative Parallel Computing in C Completed 2012
36 Shima Maniyath Image Encryption Algorithm based on DNA Sequences for Big Images Completed 2011
37 Deepthi C. Key Exchange using Genetic Neural Cryptography Completed 2011
38 Amrutha R. Public Crypto Systems based on Chaotic Chebyshev Polynomials Completed 2011

Research Scholars

Sl. No. Name of the Student(s) Topic Status – Ongoing/Completed Year of Completion
1 Ms. Shinu M. R. Resource Provisioning in Fog Ongoing NA
2 Ms. Niharika Panda Optimal Configuration Selection for IoT Ongoing NA
3 Ms. Reena Panwar Autonomic Resource Provisioning Framework for Cloudlet Enabled WSN Applications Ongoing NA
4 Ms. Sreevidya B. Design and Development of an Energy Efficient Multi-layer Security Model for Secure Data Transmission over Wireless Sensor Networks Ongoing NA
5 Ms. Megha Sharma Computational Intelligence for Remote Sensing Data Ongoing NA
6 Mr. Niranjan D. K. Security in Embedded IoT Applications Ongoing NA
Faculty Research Interest: