Qualification: 
Ph.D, M.Tech
m_supriya@blr.amrita.edu

Dr. Supriya M. currently serves as Assistant Professor at the department of Computer Science, Amrita School of Engineering, Bengaluru. She successfully defended her PhD in “Hierarchical Trust Estimation Framework for Infrastructure based Cloud Service Selection Using Fuzzy Multi-Objective Optimization Methods" under the guidance of Dr. K. Sangeeta. She has work experiences at New Horizon College of Engineering, Bengaluru and Tamilnadu College of Engineering, Coimbatore. Her research interests include Parallel/Distributed Computing, Cloud Computing and Algorithms.

Education

  • 2017: Ph. D.
    Amrita School of Engineering, Bengaluru
  • 2007: M.Tech. (CSE)
    Dr. MGR University, Chennai
  • 1999: B.Tech (CSE)
    Bharathiar University
     

Projects

Publications

Publication Type: Conference Paper

Year of Publication Publication Type Title

2017

Conference Paper

S. Pandey, Dr. Supriya M., and Shrivastava, A., “Data Classification Using Machine Learning Approach”, in 3rd International Symposium on Intelligent Systems Technologies and Applications (ISTA'17), , Manipal University, Karnataka , 2017.[Abstract]


Currently, Internet has numerous effects on our everyday lifecycle. Its significance as an intermediate for commercial transactions will develop exponentially throughout the next years. In terms of the engaged marketplace volume, the Business to Business region will hereby be the supreme exciting area. As the extensive usage of electronic business transactions increase, great volume of products information gets generated and managing such large information automatically becomes a challenging task. The accurate classification of such products to each of the existing classes also becomes an additional multifarious task. The catalog classification is an essential part for operative electronic business applications and classical machine learning problems. This paper presents a supervised Multinomial Naïve Bayes Classifier machine learning algorithm to classify product listings to anonymous marketplaces. If the existing products are classified under the master taxonomy, the task is to automatically categorize a new product into one of the existing categories. Our algorithm approach proposes a method to accurately classify the existing millions of products

More »»

2017

Conference Paper

G. SaiTeja, M, D., Yathendra, N., and Dr. Supriya M., “Ranking of Internet Service Providers Considering Customer Priorities using Multiple Criteria Decision-Making Methods”, in International Conference On Smart Technologies For Smart Nation (SmartTechCon2017), Reva University, Bengaluru, 2017.

2017

Conference Paper

K. S. L and Dr. Supriya M., “Siren Detection and Driver Assistance using Modified Minimum Mean Square Error Method”, in International Conference On Smart Technologies For Smart Nation (SmartTechCon2017), Reva University, Bengaluru, 2017.

2017

Conference Paper

O. Joshi, Bhargavi R. Upadhyay, and Dr. Supriya M., “Parallelized Advanced Rabin-Karp Algorithm for String Matching”, in 3rdInternational Conference On Computing, Communication, Control And Automation (ICCUBEA2017), Pune, 2017.

2017

Conference Paper

S. Pandey, Dr. Supriya M., and Shrivastava, A., “Aggregation algorithm to overcome data travel cost in MapReduce”, in 2017 International Conference on Computational Intelligence in Data Science(ICCIDS), Chennai, India, 2017.[Abstract]


MapReduce is one of the famous programming methods used by the developers and researchers for “big data”. MapReduce basically runs on Hadoop distributed framework and works efficiently to give better results for large data set. It uses two functional algorithms to process chunks of data. Map function collects the data from local Hadoop Distributed File System (HDFS) and further divides it into number of small chunks for parallel processing. Shuffling process sorts the intermediate results and sends the key and value pairs to the reducer phase. So, when the same key and value pairs are sent by the shuffler to the same reducer, a high volume of network blockage occurs which in turn impose a severe constraint on the processing of the data application. This paper proposes an aggregation algorithm to overcome such traffic in using MapReduce.

More »»

2015

Conference Paper

Dr. Supriya M., Dr. K. Sangeeta Iyer, and Patra, G. K., “Comparison of AHP based and Fuzzy based mechanisms for ranking Cloud Computing services”, in Proceeding - 2015 International Conference on Computer, Control, Informatics and Its Applications: Emerging Trends in the Era of Internet of Things, IC3INA 2015, 2015, pp. 175-180.[Abstract]


Cloud Computing has emerged as a paradigm to deliver on demand resources to facilitate the customers with access to their infrastructure and applications as per their requirements on a subscription basis. An exponential increase in the number of cloud services in the past few years provides more options for customers to choose from. To assist customers in selecting a most trustworthy cloud provider, a unified trust evaluation framework is needed. Trust helps in the estimation of competency of a resource provider in completing a task thus enabling users to select the best resources in the heterogeneous cloud infrastructure. Trust estimates obtained using the AHP process exhibit a deviation for parameters that are not in direct proportion to the contributing attributes. Such deviation can be removed using the Fuzzy AHP model. In this paper, a Fuzzy AHP based hierarchical trust model has been proposed to rate the service providers and their various plans for infrastructure as a service. © 2015 IEEE.

More »»

2015

Conference Paper

and Dr. Supriya M., “Downlink Resource Management Scheme for Next Generation Wireless Networks with Rank Scheduling”, in SMART GRID Technologies, August 6-8, 2015, 2015.

2015

Conference Paper

Dr. Supriya M., Dr. K. Sangeeta Iyer, and Patra, G. K., “Trust Management for Large Distributed Systems”, in International Conference on Inter-Research-Institute Student Seminar (IRISS 2015), ACM India Annual Event at BITS, Goa, 2015.

2014

Conference Paper

Dr. Supriya M., Sangeeta, K., and Patra, G. K., “Estimation of Trust Values for Varying Levels of Trustworthiness Based on Infrastructure As a Service”, in Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing, New York, NY, USA, 2014.

2014

Conference Paper

A. S. and Dr. Supriya M., “Schemes for Providing Routing Security in MANET - A Survey”, in International Conference on Recent Innovations in Electrical, Electronics, Computer and Mechanical Engineering (ICRIEECME 2014), Bengaluru, 2014, vol. 2, pp. 99–103.

2014

Conference Paper

Dr. Supriya M., K, S., and , “Comparison of Trust Values using Triangular and Gaussian Fuzzy Membership Functions for Infrastructure as a Service”, in International Conference on ‘Advances in Communication, Network and Computing, CNC 2014, Chennai, 2014.[Abstract]


Cloud computing has emerged as a paradigm to deliver on demand resources to enable the customers with access to their infrastructure and application services on a subscription basis. In recent times, increasing number of people carry out variety of different activities on the cloud. Two important issues that arise in cloud computing relate to storing and securing data, and monitoring the use of the cloud by the service providers. Trust helps to build this consumer confidence in such open and often anonymous environments. It provides a reliable environment for customers or businesses to carry out transactions with cloud providers. The amount of trust that the trusting agent has in the trusted agent is measured by a Trustworthiness scale. Trustworthiness is determined by the trust levels specified as numeric or non-numeric values. Trust is one of the most fuzzy, dynamic and complex concepts in both social and business relationships. In this paper, a hierarchical trust model has been used to compare the trust values of various cloud service providers for five levels of trustworthiness using triangular and Gaussian fuzzy membership functions based on Infrastructure as a Service.

More »»

2014

Conference Paper

D. S. and Dr. Supriya M., “Trust Management Schemes for Intrusion Detection Systems - A Survey”, in International Conference on Electrical, Electronics, Mechanical and Computer Engineering (ICEEMCE 2014), Industrial Electronics and Electrical Engineers Forum (IEEE Forum), Bengaluru , 2014.

2013

Conference Paper

Dr. Supriya M., Dr. K. Sangeeta Iyer, and Patra, G. Kb, “Comparison of cloud service providers based on direct and recommended trust rating”, in 2013 IEEE International Conference on Electronics, Computing and Communication Technologies, CONECCT 2013, IEEE Bengaluru Section at World Trade Center, Bangalore, 2013.[Abstract]


Cloud computing provides many opportunities for enterprises by offering a range of computing services. In today's competitive environment, the service dynamism, elasticity, and choices offered by this highly scalable technology are too attractive for enterprises to ignore. These opportunities have opened up a new dimension of challenges by introducing a different type of trust scenario. Today, the problem of trusting cloud computing is of supreme concern for most enterprises. The diversity of cloud service offerings makes it necessary for customers to evaluate the service levels of different cloud providers in an objective way such that required quality, reliability or security of an application can be ensured. In this paper, a model for Trust Management based on Fuzzy Logic is used to compare the cloud service providers available in the market. © 2013 IEEE.

More »»

2011

Conference Paper

S. Ramesh Maniyath and Dr. Supriya M., “An Uncompressed Image Encryption Algorithm Based on DNA Sequences”, in Computer Science & Information Technology (CS & IT) - International Conference, Chennai, 2011.[Abstract]


The rapid growth of the Internet and digitized content made image and video distribution simpler. Hence the need for image and video data protection is on the rise. In this paper, we propose a secure and computationally feasible image and video encryption/decryption algorithm based on DNA sequences. The main purpose of this algorithm is to reduce the big image encryption time. This algorithm is implemented by using the natural DNA sequences as main keys. The first part is the process of pixel scrambling. The original image is confused in the light of the scrambling sequence which is generated by the DNA sequence. The second part is the process of pixel replacement. The pixel gray values of the new image and the one of the three encryption templates generated by the other DNA sequence are XORed bit-by-bit in turn. The main scope of this paper is to propose an extension of this algorithm to videos and making it secure using modern Biological technology. A security analysis for the proposed system is performed and presented.

More »»

Publication Type: Journal Article

Year of Publication Publication Type Title

2016

Journal Article

Dr. Supriya M., Sangeeta, Ka, and Patra, G. Kb, “Trustworthy cloud service provider selection using multi criteria decision making methods”, Engineering Letters, vol. 24, pp. 1-10, 2016.[Abstract]


Cloud Computing is a specialized form of Distributed computing in which the resources such as storage, processors, memory etc. are completely abstracted from the consumer. The number of Cloud Service Providers (CSPs) who offer computing as a service has increased in recent times and often the customers need to interact with unknown service providers to carry out transactions. In such an open and anonymous environments, trust helps to build consumer confidence and provides a reliable environment for them. A trust based ranking system could also help them to choose between the services as per their requirement. In this paper, multi criteria decision making methods have been used to rank the service providers based on their infrastructure parameters. A combination of analytic and fuzzy method gives a better trust estimate as compared to an analytic method alone. © 2016, Newswood Ltd. All rights reserved.

More »»

2016

Journal Article

Dr. Supriya M., Sangeeta, K., and , “A Fuzzy based Hierarchical Trust Framework to rate the Cloud Service Providers based on Infrastructure Facilities”, International Journal of Performability Engineering, vol. 12, pp. 55–62, 2016.[Abstract]


Cloud Computing has emerged as a paradigm to deliver on demand resources such as infrastructure and applications to customers as per their requirements on a subscription basis. Due to an exponential increase in the number of service providers, customers need a basis to make a judicious choice of a cloud offering. Thus to assist customers in selecting a most trustworthy cloud provider, a unified trust evaluation framework is needed. In this paper, a hierarchical trust model has been proposed to rate the service providers and their various plans for infrastructure as a service. Such a trust ranking mechanism will help the consumers to compare and rank alternative service providers based on their requirements. More »»

2016

Journal Article

Bhargavi R. Upadhyay, Jayan, A. Nair Anand, and Dr. Supriya M., “Performance Analysis of Modified RC4 Cryptographic Algorithm using number of cores in Parallel Execution”, International journal of control theory and application, vol. 9, pp. 225-231, 2016.[Abstract]


In this network-based computing era,software applications are playing a major role. With this role,the cryptography of these algorithm is also of a much concern. Cryptographic algorithms are complex and can consume lot of time and hence, it can benefit from parallelism. But parallelism is not that simple, as sometimes it is not possible to convert the whole algorithm into a parallel one. So in this paper we are proposing a modified RC4 algorithm which can be made fully parallel. This modified algorithm is compared with other cryptographic algorithms i.e., AES, DES and RSA for its speed and time complexity.This algorithm is also implemented in Cuda, MPI and OpenMP and the results are compared.

More »»

2015

Journal Article

B. Meghana and Dr. Supriya M., “A Novel Technique Against Selfish Node Attacks”, International Journal of Applied Engineering Research, vol. 10, pp. 10685–10695, 2015.

2014

Journal Article

Dr. Supriya M., Dr. K. Sangeeta Iyer, and Patr, G. K., “Hierarchical Trust Model to Rate Cloud Service Providers based on Infrastructure as a Service”, Hierarchical Trust Model to Rate Cloud Service Providers based on Infrastructure as a Service , vol. 5, no. 3, pp. 1102-1111, 2014.[Abstract]


In large scale distributed systems like cloud computing, customers need to interact with unknown service providers to carry out tasks or transactions. The ability to reason about and assess the possible risks in carrying out such transactions is necessary for providing a safe and trustworthy environment. Cooperative characteristics of distributed computing systems enforce a proper and secure trust management to be in place to minimize the risks posed by different malicious agents. Trust is the estimation of competency of a resource provider in completing a task based on dependability, security, ability and availability in the context of distributed environment. It enables users to select the best resources in the heterogeneous cloud infrastructure. In this paper, a hierarchical trust model has been proposed to manage the trust and to rate the service providers and their various plans based on IaaS in cloud computing environment.

More »»

2014

Journal Article

D. S. and Dr. Supriya M., “Trust Management Schemes for Intrusion Detection Systems -A Survey”, International Journal of Advanced Computational Engineering and Networking, vol. 2, pp. 39-43, 2014.

2012

Journal Article

Dr. Supriya M., K, S., J, V. L., and , “Estimating Trust Value for Cloud Service Providers using Fuzzy Logic”, International Journal of Computer Applications, vol. 48, pp. 28–34, 2012.[Abstract]


Cloud computing has garnered popular support in a relatively short span of time. It is a new method of delivering the distributed resources over internet. It reduces capital expenditure as well as operational expenditure. The number of cloud service providers (CSPs) who provide computing as a utility has increased exponentially in the past few years, providing more options for the customers to choose from. In this paper a model for Trust Management based on Fuzzy Logic has been developed, which can help consumers make an informed choice towards selecting the appropriate CSP as per their requirement. More »»

Publication Type: Book Chapter

Year of Publication Publication Type Title

2016

Book Chapter

P. Pillai and Dr. Supriya M., “Real Time CO2 Monitoring and Alert System Based on Wireless Sensor Networks”, in Intelligent Systems Technologies and Applications: Volume 2, S. Berretti, Thampi, S. M., and Dasgupta, S. Cham: Springer International Publishing, 2016, pp. 91–103.[Abstract]


Carbon Dioxide (CO2) is an inevitable part in atmosphere for the existence of life on the Earth. But if increased beyond a certain limit it is harmful as it is the major cause for global warming. The only effective way to fight this is to store CO2 away from the atmosphere for a long time. This is achieved by using Carbon Dioxide Capture and Storage (CCS). But one major concern that arises when CO2 is stored in large quantities is it’s leakage from reservoir. An online CO2 emission monitoring and alert system is developed in order to monitor the leakage of CO2 in real time in CCS, try to reduce the leakage up to a controllable level and to give alert to the consent person, if the CO2 leakage goes beyond an uncontrollable limit. The data is stored in real time for further analysis. Advantages of wireless sensor networks are exploited in order to precisely sense the CO2 concentration. More »»

Publication Type: Conference Proceedings

Year of Publication Publication Type Title

2016

Conference Proceedings

P. Kochar and Dr. Supriya M., “Vehicle Speed Control Using Zigbee and GPS”, Smart Trends in Information Technology and Computer Communications: First International Conference, SmartCom 2016, Jaipur, India, August 6–7, 2016, Revised Selected Papers. Springer Singapore, Singapore, pp. 847–854, 2016.[Abstract]


With the current population and growing number of vehicles on road, speed control has become an important requirement due to the increased number of accidents reported in our day-to-day life. Measures like traffic management, improving quality of road infrastructure and safer vehicles can prevent the road accidents. Though there are many technologies available for speed management of a vehicle, practical implementation of each is to some extent is not up to satisfactory level. This paper discusses a speed monitoring and control system that can provide safer environment in critical zones like schools, colleges etc. The proposed method uses Zigbee and GPS for the speed control and which is also cost effective and can be fixed easily on vehicles. More »»

Publication Type: Presentation

Year of Publication Publication Type Title

2016

Presentation

Dr. Supriya M., Sangeeta, K., and Patra, G. K., “Trusted Cloud Storage for Big Data (Poster)”, 7th International Summer School on Information Security and Protection (ISSISP 2016). Amrita Vishwa Vidyapeetham in Bengaluru, 2016.

2015

Presentation

Dr. Supriya M., Sangeeta, K., and Patra, G. K., “Trust Management for Large Distributed Systems based on Infrastructure as a Service”, Inter-Research-Institute Student Seminar (IRISS 2015) . ACM India Annual Event at BITS, Goa, 2015.

Faculty Research Interest: 
207
PROGRAMS
OFFERED
5
AMRITA
CAMPUSES
15
CONSTITUENT
SCHOOLS
A
GRADE BY
NAAC, MHRD
8th
RANK(INDIA):
NIRF 2018
150+
INTERNATIONAL
PARTNERS