Qualification: 
Ph.D, M.Tech
Email: 
m_supriya@blr.amrita.edu

Dr. Supriya M. currently serves as Assistant Professor at the department of Computer Science, Amrita School of Engineering, Bengaluru. She successfully defended her PhD in “Hierarchical Trust Estimation Framework for Infrastructure based Cloud Service Selection Using Fuzzy Multi-Objective Optimization Methods" under the guidance of Dr. K. Sangeeta. She has work experiences at New Horizon College of Engineering, Bengaluru and Tamilnadu College of Engineering, Coimbatore. Her research interests include Parallel/Distributed Computing, Cloud Computing and Algorithms.

Education

  • 2017: Ph. D.
    Amrita School of Engineering, Bengaluru
  • 2007: M.Tech. (CSE)
    Dr. MGR University, Chennai
  • 1999: B.Tech (CSE)
    Bharathiar University
     

Projects

Publications

Publication Type: Conference Paper

Year of Publication Publication Type Title

2017

Conference Paper

S. Pandey, Dr. Supriya M., and Shrivastava, A., “Data Classification Using Machine Learning Approach”, in 3rd International Symposium on Intelligent Systems Technologies and Applications (ISTA'17), , Manipal University, Karnataka , 2017.[Abstract]


Currently, Internet has numerous effects on our everyday lifecycle. Its significance as an intermediate for commercial transactions will develop exponentially throughout the next years. In terms of the engaged marketplace volume, the Business to Business region will hereby be the supreme exciting area. As the extensive usage of electronic business transactions increase, great volume of products information gets generated and managing such large information automatically becomes a challenging task. The accurate classification of such products to each of the existing classes also becomes an additional multifarious task. The catalog classification is an essential part for operative electronic business applications and classical machine learning problems. This paper presents a supervised Multinomial Naïve Bayes Classifier machine learning algorithm to classify product listings to anonymous marketplaces. If the existing products are classified under the master taxonomy, the task is to automatically categorize a new product into one of the existing categories. Our algorithm approach proposes a method to accurately classify the existing millions of products

More »»

2015

Conference Paper

Dr. Supriya M., Dr. K. Sangeeta Iyer, and Patra, G. K., “Comparison of AHP based and Fuzzy based mechanisms for ranking Cloud Computing services”, in Proceeding - 2015 International Conference on Computer, Control, Informatics and Its Applications: Emerging Trends in the Era of Internet of Things, IC3INA 2015, 2015, pp. 175-180.[Abstract]


Cloud Computing has emerged as a paradigm to deliver on demand resources to facilitate the customers with access to their infrastructure and applications as per their requirements on a subscription basis. An exponential increase in the number of cloud services in the past few years provides more options for customers to choose from. To assist customers in selecting a most trustworthy cloud provider, a unified trust evaluation framework is needed. Trust helps in the estimation of competency of a resource provider in completing a task thus enabling users to select the best resources in the heterogeneous cloud infrastructure. Trust estimates obtained using the AHP process exhibit a deviation for parameters that are not in direct proportion to the contributing attributes. Such deviation can be removed using the Fuzzy AHP model. In this paper, a Fuzzy AHP based hierarchical trust model has been proposed to rate the service providers and their various plans for infrastructure as a service. © 2015 IEEE.

More »»

2015

Conference Paper

and Dr. Supriya M., “Downlink Resource Management Scheme for Next Generation Wireless Networks with Rank Scheduling”, in SMART GRID Technologies, August 6-8, 2015, 2015.

2014

Conference Paper

S. Deepa and Dr. Supriya M., “Trust Management Schemes for Intrusion Detection Systems - A Survey”, in Proceedings of 6th IRF International Conference, Bangalore, India, 01st June, 2014. ISBN: 978-93-84209-24-7, 2014, vol. 2, pp. 39–43.

2014

Conference Paper

Dr. Supriya M., Sangeeta, K., and Patra, G. K., “Estimation of Trust Values for Varying Levels of Trustworthiness Based on Infrastructure As a Service”, in Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing, New York, NY, USA, 2014.

2014

Conference Paper

Dr. Supriya M., K, S., and , “Comparison of Trust Values using Triangular and Gaussian Fuzzy Membership Functions for Infrastructure as a Service”, in Proc. of Int. Conf. on Advances in Communication, Network, and Computing, 2014.

2013

Conference Paper

Dr. Supriya M., Sangeeta, Ka, and Patra, G. Kb, “Comparison of cloud service providers based on direct and recommended trust rating”, in 2013 IEEE International Conference on Electronics, Computing and Communication Technologies, CONECCT 2013, Bangalore, 2013.[Abstract]


Cloud computing provides many opportunities for enterprises by offering a range of computing services. In today's competitive environment, the service dynamism, elasticity, and choices offered by this highly scalable technology are too attractive for enterprises to ignore. These opportunities have opened up a new dimension of challenges by introducing a different type of trust scenario. Today, the problem of trusting cloud computing is of supreme concern for most enterprises. The diversity of cloud service offerings makes it necessary for customers to evaluate the service levels of different cloud providers in an objective way such that required quality, reliability or security of an application can be ensured. In this paper, a model for Trust Management based on Fuzzy Logic is used to compare the cloud service providers available in the market. © 2013 IEEE.

More »»

2011

Conference Paper

S. Ramesh Maniyath and Dr. Supriya M., “An Uncompressed Image Encryption Algorithm Based on DNA Sequences”, in Computer Science & Information Technology (CS & IT) - International Conference, 2011.[Abstract]


The rapid growth of the Internet and digitized content made image and video distribution simpler. Hence the need for image and video data protection is on the rise. In this paper, we propose a secure and computationally feasible image and video encryption/decryption algorithm based on DNA sequences. The main purpose of this algorithm is to reduce the big image encryption time. This algorithm is implemented by using the natural DNA sequences as main keys. The first part is the process of pixel scrambling. The original image is confused in the light of the scrambling sequence which is generated by the DNA sequence. The second part is the process of pixel replacement. The pixel gray values of the new image and the one of the three encryption templates generated by the other DNA sequence are XORed bit-by-bit in turn. The main scope of this paper is to propose an extension of this algorithm to videos and making it secure using modern Biological technology. A security analysis for the proposed system is performed and presented.

More »»

Publication Type: Journal Article

Year of Publication Publication Type Title

2016

Journal Article

Dr. Supriya M., Sangeeta, Ka, and Patra, G. Kb, “Trustworthy cloud service provider selection using multi criteria decision making methods”, Engineering Letters, vol. 24, pp. 1-10, 2016.[Abstract]


Cloud Computing is a specialized form of Distributed computing in which the resources such as storage, processors, memory etc. are completely abstracted from the consumer. The number of Cloud Service Providers (CSPs) who offer computing as a service has increased in recent times and often the customers need to interact with unknown service providers to carry out transactions. In such an open and anonymous environments, trust helps to build consumer confidence and provides a reliable environment for them. A trust based ranking system could also help them to choose between the services as per their requirement. In this paper, multi criteria decision making methods have been used to rank the service providers based on their infrastructure parameters. A combination of analytic and fuzzy method gives a better trust estimate as compared to an analytic method alone. © 2016, Newswood Ltd. All rights reserved.

More »»

2016

Journal Article

Dr. Supriya M., Sangeeta, K., and , “A Fuzzy based Hierarchical Trust Framework to rate the Cloud Service Providers based on Infrastructure Facilities”, International Journal of Performability Engineering, vol. 12, pp. 55–62, 2016.[Abstract]


Cloud Computing has emerged as a paradigm to deliver on demand resources such as infrastructure and applications to customers as per their requirements on a subscription basis. Due to an exponential increase in the number of service providers, customers need a basis to make a judicious choice of a cloud offering. Thus to assist customers in selecting a most trustworthy cloud provider, a unified trust evaluation framework is needed. In this paper, a hierarchical trust model has been proposed to rate the service providers and their various plans for infrastructure as a service. Such a trust ranking mechanism will help the consumers to compare and rank alternative service providers based on their requirements. More »»

2016

Journal Article

Bhargavi R. Upadhyay, Jayan, A. Nair Anand, and Dr. Supriya M., “Performance Analysis of Modified RC4 Cryptographic Algorithm using number of cores in Parallel Execution”, International journal of control theory and application, vol. 9, pp. 225-231, 2016.[Abstract]


In this network-based computing era,software applications are playing a major role. With this role,the cryptography of these algorithm is also of a much concern. Cryptographic algorithms are complex and can consume lot of time and hence, it can benefit from parallelism. But parallelism is not that simple, as sometimes it is not possible to convert the whole algorithm into a parallel one. So in this paper we are proposing a modified RC4 algorithm which can be made fully parallel. This modified algorithm is compared with other cryptographic algorithms i.e., AES, DES and RSA for its speed and time complexity.This algorithm is also implemented in Cuda, MPI and OpenMP and the results are compared.

More »»

2015

Journal Article

B. Meghana and Dr. Supriya M., “A Novel Technique Against Selfish Node Attacks”, International Journal of Applied Engineering Research, vol. 10, pp. 10685–10695, 2015.

2014

Journal Article

Dr. Supriya M., K, S., and , “Hierarchical Trust Model to Rate Cloud Service Providers based on Infrastructure as a Service”, Int.J.Computer Technology & Applications, vol. 5, pp. 1102–1111, 2014.

2014

Journal Article

and Dr. Supriya M., “Schemes for providing Routing Security in MANET - A Survey”, International Journal of Advanced Computational Engineering and Networking, ISSN: 2320-2106, vol. 2, pp. 99–103, 2014.

2012

Journal Article

Dr. Supriya M., K, S., J, V. L., and , “Estimating Trust Value for Cloud Service Providers using Fuzzy Logic”, International Journal of Computer Applications, vol. 48, pp. 28–34, 2012.[Abstract]


Cloud computing has garnered popular support in a relatively short span of time. It is a new method of delivering the distributed resources over internet. It reduces capital expenditure as well as operational expenditure. The number of cloud service providers (CSPs) who provide computing as a utility has increased exponentially in the past few years, providing more options for the customers to choose from. In this paper a model for Trust Management based on Fuzzy Logic has been developed, which can help consumers make an informed choice towards selecting the appropriate CSP as per their requirement. More »»

Publication Type: Book Chapter

Year of Publication Publication Type Title

2016

Book Chapter

P. Pillai and Dr. Supriya M., “Real Time CO2 Monitoring and Alert System Based on Wireless Sensor Networks”, in Intelligent Systems Technologies and Applications: Volume 2, S. Berretti, Thampi, S. M., and Dasgupta, S. Cham: Springer International Publishing, 2016, pp. 91–103.[Abstract]


Carbon Dioxide (CO2) is an inevitable part in atmosphere for the existence of life on the Earth. But if increased beyond a certain limit it is harmful as it is the major cause for global warming. The only effective way to fight this is to store CO2 away from the atmosphere for a long time. This is achieved by using Carbon Dioxide Capture and Storage (CCS). But one major concern that arises when CO2 is stored in large quantities is it’s leakage from reservoir. An online CO2 emission monitoring and alert system is developed in order to monitor the leakage of CO2 in real time in CCS, try to reduce the leakage up to a controllable level and to give alert to the consent person, if the CO2 leakage goes beyond an uncontrollable limit. The data is stored in real time for further analysis. Advantages of wireless sensor networks are exploited in order to precisely sense the CO2 concentration. More »»

Publication Type: Conference Proceedings

Year of Publication Publication Type Title

2016

Conference Proceedings

P. Kochar and Dr. Supriya M., “Vehicle Speed Control Using Zigbee and GPS”, Smart Trends in Information Technology and Computer Communications: First International Conference, SmartCom 2016, Jaipur, India, August 6–7, 2016, Revised Selected Papers. Springer Singapore, Singapore, pp. 847–854, 2016.[Abstract]


With the current population and growing number of vehicles on road, speed control has become an important requirement due to the increased number of accidents reported in our day-to-day life. Measures like traffic management, improving quality of road infrastructure and safer vehicles can prevent the road accidents. Though there are many technologies available for speed management of a vehicle, practical implementation of each is to some extent is not up to satisfactory level. This paper discusses a speed monitoring and control system that can provide safer environment in critical zones like schools, colleges etc. The proposed method uses Zigbee and GPS for the speed control and which is also cost effective and can be fixed easily on vehicles. More »»

Publication Type: Presentation

Year of Publication Publication Type Title

2016

Presentation

Dr. Supriya M., Sangeeta, K., and Patra, G. K., “Trusted Cloud Storage for Big Data (Poster)”, 7th International Summer School on Information Security and Protection (ISSISP 2016). Amrita Vishwa Vidyapeetham in Bengaluru, 2016.

2015

Presentation

Dr. Supriya M., Sangeeta, K., and Patra, G. K., “Trust Management for Large Distributed Systems based on Infrastructure as a Service”, Inter-Research-Institute Student Seminar (IRISS 2015) . ACM India Annual Event at BITS, Goa, 2015.

Faculty Research Interest: 
207
PROGRAMS
OFFERED
5
AMRITA
CAMPUSES
15
CONSTITUENT
SCHOOLS
A
GRADE BY
NAAC, MHRD
9th
RANK(INDIA):
NIRF 2017
150+
INTERNATIONAL
PARTNERS