Qualification: 
Ph.D, M.E
p_prakash1@cb.amrita.edu

Dr. Prakash P. currently serves as Assistant Professor at the department of Computer Science and Engineering, Amrita School of Engineering, Coimbatore Campus. His areas of research include Cloud Computing, Automata Theory and Analysis of Algorithms. Dr. Prakash's broad areas of research interest are Cloud computing and Big data analytics. More specifically, his work involves in developing the algorithms or frameworks for the energy efficient in high performance computing. He is also exploring the integration and data analysis of Internet of Things (IoT) with cloud computing.

Educational Qualifications

PhD in Information and Communication Engineering Anna University, Chennai, India 2016
ME in Computer Science and Engineering Sri Sivasubramaniya Nadar (SSN) College of Engineering, Chennai, India 2005-2007
BE in Computer Science and Engineering Kongu Engineering College, Perundurai, Erode, Tamilnadu, India 1999-2003

Work Experiences

  • Assistant Professor, Department of Computer Science and Engineering at Amrita Vishwa Vidyapeetham, Coimbatore from June 2013 onwards.
  • Assistant Professor, Department of Computer Science and Engineering at Sri Krishna College of Engineering & Technology, Coimbatore during August 2009 to May 2013.
  • Programmer Analyst at Cognizant Technology Solutions LTD, Chennai from June 2007 to July 2009.
  • Lecturer at Kongu Engineering College from October 2003 to April 2005.

Teaching

  • Machine Leaning
  • Python Programming
  • Full Stack Development
  • Cloud Computing and Services
  • Big Data Analytics
  • Formal Language and Automata Theory
  • Computer Language Engineering
  • Object Oriented Programming

Awards and Recognition

  • Research Excellence Award by Amrita Vishwa Vidyapeetham
  • Microsoft Research Award worth of $5000 to explore the Azure Components
  • Solve-a-thon Winner at CII Teacher’s day Competition
  • Participated in India ML Hiring Hackathon 2019 and secured rank 364
  • Participated in AmExpert 2019 – Machine Learning Hackathon and secured rank 756
  • Participated in WNS Analytics Wizard 2019 and secured rank 513
  • "Distinguished Facilitator Award (Technical) – Inspire" Faculty award by Infosys technologies Bangalore 2015 and 2013.
  • Guided the team of Janani N. and Shiva Jegan R.D who won the "MCA best project award (2015)" at Amrita Vishwa Vidyapeetham.
  • One of Top 10 teams at "Amrita TBI innovation Challenge`2017", organized Amrita Technology Business Incubator.
  • "Star of the Month" award from Cognizant Technology Solutions for the month of April 2009 and November 2008.
  • Received "Silver Medal", from SSN College of engineering as recognition for securing rank in ME (CSE).
  • Acknowledged by Texas Instruments for the project guidance.
  • Appreciated by Confederation of Indian Industry (CII) for the active participation of Teacher’s day celebration events.

Invited Talks

  • Delivered a technical talk at Karpagam University, Coimbatore on "Hadoop: Easy way to do Big Data Analytics".
  • Technical talk at SNS College of Technology on "Web Technology".
  • Delivered a guest lecture at Sona College of Technology, Salem on "Computational Theory".
  • Guest Lecture on "CloudSIM - Packages for Cloud Computing" at Sri Krishna College of Engineering and Technology.
  • Technical Talk on "Cloud Computing" at STC College Pollachi .
  • Technical talk on "Cloud Simulation Tools" at Karpagam University.
  • Delivered a technical talk at Info Institute of Technology, Coimbatore on "Cloud Resource Management Concepts".
  • Delivered a guest lecture at Sona College of Technology, Salem on "Undecidability and complexity Problems"

Publications

Publication Type: Journal Article

Year of Publication Title

2020

D. T. and Dr. Prakash P, “Power Consumption Prediction in Cloud Data Center using Machine Learning”, International Journal of Electrical and Computer Engineering, vol. 10, no. 2, pp. 1524-1532, 2020.[Abstract]


The flourishing development of the cloud computing paradigm provides several services in the industrial business world. Power consumption by cloud data centers is one of the crucial issues for service providers in the domain of cloud computing. Pursuant to the rapid technology enhancements in cloud environments and data centers augmentations, power utilization in data centers is expected to grow unabated. A diverse set of numerous connected devices, engaged with the ubiquitous cloud, results in unprecedented power utilization by the data centers, accompanied by increased carbon footprints. Nearly a million physical machines (PM) are running all over the data centers, along with (5 – 6) million virtual machines (VM). In the next five years, the power needs of this domain are expected to spiral up to 5% of global power production. The virtual machine power consumption reduction impacts the diminishing of the PM’s power, however further changing in power consumption of data center year by year, to aid the cloud vendors using prediction methods. The sudden fluctuation in power utilization will cause power outage in the cloud data centers. This paper aims to forecast the VM power consumption with the help of regressive predictive analysis, one of the Machine Learning (ML) techniques. The potency of this approach to make better predictions of future value, using Multi-layer Perceptron (MLP) regressor which provides 91% of accuracy during the prediction process.

More »»

2019

Dr. Prakash P, Suresh, R., and Kumar, P. N. Dhinesh, “Smart City Video Surveillance using Fog Computing”, International Journal of Enterprise Network Management,Volume , vol. 10, no. 3/4, 2019.[Abstract]


Conventional video surveillance systems require infrastructure including expensive servers with capability to process images and store video recordings. These surveillance systems produce and need to store a huge amount of data and to execute in real time to detect safety events. The problems of the anti-social activities which gradually increasing across the country especially in the urban areas in recent times which lead to the need for technological innovations in the security and surveillance system. The proposed system is based on cloud computing. In this paper the application has been modelled and simulated using iFogSim. The results predicts that the fog-based model is more secured and efficient compared to cloud computing parameter energy consumption. The proposed system helps to increase the effectiveness of the intelligent agencies and thereby increase crime safety at public places.

More »»

2019

Y. S. V. Chandolu, Dharaa, C., and Dr. Prakash P, “Railway Gate System: Railway Gate Status Detection”, International Journal of Recent Technology and Engineering, vol. 7, pp. 523-525, 2019.[Abstract]


Since 1991,their hase been a ample growth in the transport system from 21 million to 142 million,so does the two wheeler private transport.the two wheeler transport had a growth from 14 million to 120 million.This constitutes a significant safety and environment concern. The Railway Crossing Gate Status Detection System is a simple but very useful project which detects whether the railway gate is open or closed at all times. Instead of being caught unaware whenever a railway gate is closed, this paper proposes a method of displaying the status of the gate, as it is at that time, on the cloud, thereby reducing the amount of traffic near the gates and the number of potential accidents that can occur.

More »»

2019

V. Sucharitha, Dr. Prakash P, and Dr. Ganesh Neelakanta Iyer, “Agrifog-a Fog Computing based IoT for Smart Agriculture”, International Journal of Recent Technology and Engineering, vol. 7, no. 6, pp. 210-217, 2019.[Abstract]


The smart agriculture or precision agriculture is contemplated to play a vital role in augmenting the various farming activities. IoT based farm management systems have emanated from the rapid expansion of connectivity. The smart agriculture or precision agriculture is contemplated to play a vital role in augmenting the various farming activities. The existing systems which are based on traditional cloud models are inadequate to handle the large amounts and variety of data generated by the IoT devices connected. In order to decrease the latency in aiding the real time decisions based on the data produced, it is essential to bring the data processing closer to the source of its production. This can be addressed by adopting the fog based models. An IoT-Fog based farm management system can be more competent in terms of optimal bandwidth utilization and low latency for real time decision making. The architecture of the proposed approach has been presented and elucidated. The AgriFog application has been modelled and simulated using iFogSim. The results substantiate the postulate that the fog based model of the farm management system is more efficient and preferable for adoption because of its support for effective scalability with better response time and reduced latency. © 2019, Blue Eyes Intelligence Engineering and Sciences Publication. All rights reserved.

More »»

2018

R. Suresh and Dr. Prakash P, “Deep Learning based Image Classification on Amazon Web Service”, Journal of Advanced Research in Dynamical and Control Systems, vol. 10, pp. 1000-1003, 2018.[Abstract]


Cloud Computing offers large scalable computing and storage, data sharing, on-demand anytime and anywhere access to resources and applications. Image classification is one of the most imminent which shows potential applications in computer vision. Deep learning performs a multi-layer processing with accuracy performance CNN performed much better. In this paper, a secure image classification service on top of Amazon cloud service is designed which stores them in a cloud storage system in an efficient and secure way. This paper implies a Convolution Neural Network (CNN) model to perform classification of images that achieves a high accuracy score.

More »»

2017

Dr. Prakash P, Darshaun, K. G., Yaazhlene, P., Ganesh, M. V., and Vasudha, B., “Fog Computing: Issues, Challenges and Future Directions”, International Journal of Electrical and Computer Engineering, vol. 7, pp. 3669-3673, 2017.[Abstract]


In Cloud Computing, all the processing of the data collected by the node is done in the central server. This involves a lot of time as data has to be transferred from the node to central server before the processing of data can be done in the server. Also it is not practical to stream terabytes of data from the node to the cloud and back. To overcome these disadvantages, an extension of cloud computing, known as fog computing, is introduced. In this, the processing of data is done completely in the node if the data does not require higher computing power and is done partially if the data requires high computing power, after which the data is transferred to the central server for the remaining computations. This greatly reduces the time involved in the process and is more efficient as the central server is not overloaded. Fog is quite useful in geographically dispersed areas where connectivity can be irregular. The ideal use case requires intelligence near the edge where ultra-low latency is critical, and is promised by fog computing. The concepts of cloud computing and fog computing will be explored and their features will be contrasted to understand which is more efficient and better suited for realtime application.

More »»

2017

S. Arun, Chandrasekaran, A., and Dr. Prakash P, “CSIS: Cloud service identification system”, International Journal of Electrical and Computer Engineering, vol. 7, no. 1, pp. 513-520, 2017.[Abstract]


To meet the need of the computational power, most of the users may go for a cloud based services for its scalability, flexibility and reliability. Cloud services have become an integral part of IT and analytical enterprises. Owing to increase in necessity of commercial cloud products being readily available, it has become extremely difficult for users to identify suitable cloud services. This paper proposes the recommender system precisely designed for the discovery of cloud services. Though there is an exponential increase in demand for cloud services, the amount of research done in this particular field is abysmal. Cloud Service Identification System (CSIS) crawls through Internet, identifies cloud services and stores them in a database. The user's search query is processed and recommends cloud services accurately. Copyright © 2017 Institute of Advanced Engineering and Science. All rights reserved.

More »»

2016

A. Kumar, Sathasivam, C., and Dr. Prakash P, “Virtual machine placement in cloud computing Environment”, Indian Journal of Science and Technology, vol. 9, no. 29, 2016.[Abstract]


Objectives: Hardware virtualization is an evolving technology, because it has the potential to facilitate the consolidation of multiple workloads on a single physical host directly through cloud. We introduce the First-Last algorithm to minimize energy consumption and migration. Methods: The problem is treated as an instance of bin packing algorithm which focuses on saving energy. However the overloading of active hosts and the resultant migration are the drawbacks of this approach. This algorithm was tested on a set of heterogeneous virtual machines which have demands in both single and multi-dimension and came either statically or dynamically to the server. Findings: The virtual machine placement problem can be treated as a bin packing problem, wherein the physical machines/hosts are the bins and the virtual machines are the objects. It can then be solved through various approaches such as first fit, best fit, next fit et cetera. Using the first fit algorithm, the virtual machine is placed into the first active host which can accommodate it. If none of the active hosts satisfy the VM's demand, then a new host is made active. In the best fit method, all the active hosts are checked first and then the host which would suffer minimum resource wastage upon VM placement is chosen. Next fit algorithm places the VM in the last/most recently activated host. While first fit is best suited for optimal performance, best fit keeps the least number of hosts active, thereby saving energy but at the cost of performance since migration overhead increases. Next fit approach would fail unless the virtual machines have been arranged in the increasing order of their demands. The firstlast algorithm that we introduce balances on energy consumption as well as performance by reducing migration. It also reduces the time complexity to a certain extent. Applications: The algorithm has a comparatively lower time complexity than the existing virtual machine placement algorithms. It also reduces the energy consumption as well as migration to a certain extent.

More »»

2015

T. B. Stanley, S. Krishnan, M., and Dr. Prakash P, “A security framework for internet of things (Iot) authentication using certificates”, International Journal of Applied Engineering Research, vol. 10, no. 12, pp. 30337-30344, 2015.[Abstract]


As more number of devices are connected to internet day by day, directly or indirectly for different needs like monitoring, management, automation and so on. Number of devices connected to internet is more than the number of people connected to it. Among the devices that are connected to the internet, most of the devices are used for communication and collection of data in real time. Providing security for devices over the internet is becoming challenging task since data processing is in real time. In this paper, we introduce a new cost effective framework using a private Certificate Authority (CA) to detect these rogue devices trying to connect to the web server and then to prevent them from connecting to the web server. We use MAC address with certificates for authenticating a device. Our proposed security framework improves the security by detecting and preventing the rouge devices in Internet of Things (IoT). Most number of attacks are reduced by identifying and restricting the rouge devices in the network.

More »»

2015

Dr. Shriram K Vasudevan, Dr. Prakash P, P.b, S., and S.a, S., “A study on SONET and SDH with their defects in optical network”, Indian Journal of Science and Technology, vol. 8, no. 29, 2015.[Abstract]


Background Objectives: Data transmission over a communication channel, should provide important facilities to be added, including data framing, error checking and to manage the channel. Methods/Stastical Analysis: This is a complete review paper and theoretically we intend to explain the basics of SONET / SDH, Architecture, Bit rates, Netowork configurations etc. All these are standardised and approved by ANSI. Conclusion: One would get to know what Synchronous Optical Network / Synchronous Digital Hierarchy (SONET/SDH) is all about and how exactly are they used through this paper. Also, the merits and de-merits are completely analysed.

More »»

2015

N. Janani, Jegan, R. D. Shiva, and Dr. Prakash P, “Optimization of virtual machine placement in cloud environment using genetic algorithm”, Research Journal of Applied Sciences, Engineering and Technology, vol. 10, no. 3, pp. 274-287, 2015.[Abstract]


The current trend in the computing era is cloud computing, which helps in providing seamless service to the user, but optimizing the utilization of the available resources and an efficient placement of the virtual machines are not so significant in the existing phenomena. Virtual machines are software computers that act as the key feature in providing services to the existing physical machine. VM placement is the process of mapping the virtual machine requests or images to the physical machines, according to the availability of resources in these hosts. Hence in this study, we have studied on various methods in which the placement are being done and have proposed an idea which, treats the available pool of physical resources as each knapsacks, which are solved using genetic algorithm, to get an optimal placement. Starting with this aspect, we enhanced the solution by considering multiple and multidimensional parameters in the virtual machine request, so that the migration of the virtual machines will be reduced and hence power-saving. © Maxwell Scientific Organization, 2015.

More »»

2014

V. Sucharitha, Subash, S. R., and Dr. Prakash P, “Visualization of Big Data: Its tools and challenges”, International Journal of Applied Engineering Research, vol. 9, no. 18, pp. 5277-5290, 2014.[Abstract]


The rapid development of the heterogeneous networking and social websites is leading to the exponential growth in the amount of the data. To examine the bulky amount of data, from concealed patterns and unidentified correlations, the big data analysts require visualization tools. The visualization tools help in gaining insight about the data. The volume of big data is huge with multiple dimensions. To efficiently manage the large volumes of data, we face many difficulties. In this paper, a survey about big data visualization, its tools and its challenges is done. Various tools and hurdles in big data visualization are discussed. © Research India Publications.

More »»

2014

, ,, Dr. Prakash P, and Shriram, K. V., “An Enhanced and Efficient Security Using Steganography”, International Journal of Applied Engineering Research, vol. 9, no. 10, pp. 1411-1417, 2014.[Abstract]


In this fast paced world, electronic communication has become one of the significant media that connects different parts of the world. As a result, security has become an issue where it is increasingly susceptible to eavesdropping and malicious interventions. The need to solve this problem has led to the development of steganography schemes. Steganography which is different from cryptography is a tool for privacy and security. Steganography is a powerful technique that provides a high level of security, particularly when it is combined with encryption. Cryptography involves converting a message text into an unreadable cipher while steganography works by hiding messages in inconspicuous objects that are then sent to the intended recipient. Digital Watermarking is a technology which provides authentication and copywrite protection for multimedia contents over the internet and is basically used for intellectual property protection. In this project we propose an advanced system of encrypting data that combines the features of cryptography, digital watermarking and steganography along with multimedia data hiding. Thus even if steganography fails, the message cannot be recovered because a cryptography technique is used as well. This system provides authentication, imperceptibility, robustness and security with high PSNR (Peak Signal to Noise Ratio) value and less MSE (Mean Square Error) value. © Research India Publications.

More »»

2014

G. Mounika, Rahmyashree, R., Dr. Prakash P, Vasudevan, S. K., and Suresh, C., “Cannier and intelligent office environment: An interesting attempt”, International Journal of Applied Engineering Research, vol. 9, no. 18, pp. 4825-4836, 2014.[Abstract]


Technology has developed to such an extent that it has induced smartness to even a normal, inanimate object. This smartness is needed to decrease human effort. As the effort taken by the humans, have certainly reduced, they switched from being hard workers, to smart workers. Therefore, home and office automation has been made easy, by not only in facilitating better transfer of information, but also encouraging time management. To make life simple, automating some of the day to day appliances; such as lights, fans, TVs, curtain etc... supplements quality and harmony. The vision behind Smart environment is, to incorporate various services, with the help of a common communication system. Smart environment focuses on well-being of the users, by allowing them to follow their activities, effortlessly. It also initiates an opportunity to use this system at offices also. Profile setting for a room is carried out automatically. Energy conservation is promoted by executing instructions as to switch off appliances in the room, when not in use. This is done through the PIR sensor. This arrangement is highly secure, intelligent and serves the purpose. Communication is enabled through email, using popular encryption standards. More »»

2014

S. Jegan D., Dr. Shriram K Vasudevan, K., A., Dr. Prakash P, S., S., and V., G., “Cloud Computing: A Technical Gawk”, International Journal of Applied Engineering Research, vol. 9, no. 14, pp. 2539-2554, 2014.[Abstract]


As we all know, running a business application is far too expensive. To maintain your business to have a long run, organization require power, work force, network, bandwidth, server, many complicated software, too expensive hardware and stream of experts to maintain them. Hence maintaining a business is a very tedious task especially in terms of costs. Scalability has. © Research India Publications.

More »»

2014

A. Baskar, V., S. K., and Dr. Prakash P, “Advanced investigation and comparative study of graphics processing unit-queries countered”, Research Journal of Applied Sciences, Engineering and Technology, vol. 8, no. 15, pp. 1766-1771, 2014.[Abstract]


GPU, Graphics Processing Unit, is the buzz word ruling the market these days. What is that and how has it gained that much importance is what to be answered in this research work. The study has been constructed with full attention paid towards answering the following question. What is a GPU? How is it different from a CPU? How good/bad it is computationally when comparing to CPU? Can GPU replace CPU, or it is a day dream? How significant is arrival of APU (Accelerated Processing Unit) in market? What tools are needed to make GPU work? What are the improvement/focus areas for GPU to stand in the market? All the above questions are discussed and answered well in this study with relevant explanations. © Maxwell Scientific Organization, 2014.

More »»

2014

A. Baskar, Vasudevan, S. K., Dr. Prakash P, and Suresh, C., “Ergodesk-desktop ergonomics using the new quadratic search algorithm”, Research Journal of Applied Sciences, Engineering and Technology, vol. 8, no. 15, pp. 1762-1765, 2014.[Abstract]


Ergonomics is nothing but the rules governing the workplace. ErgoDesk is the ultimate drug-free way to look after your spine and health. This research provides an interesting and realistic solution towards achieving the goal maintaining good health. Physical stress at the work environment can reduce efficiency of the individuals at work. Ergonomics is described as the rules to be adapted by one, at work environment. The main focus of ergonomics is to reduce the physical stress caused by factors like improper body mechanics, repetitive motor movements, static positions, vibrations, lighting and impact or contact with objects. Henceforth, through this paper, we present a distinct tool called the "ERGODESK", which could be useful for monitoring a computer user's posture and activities. In this study, we present a real time feedback system for detecting people and their postures and generating summaries of postures and activities over a specified period of time. The system runs reliably on different people and under any lighting. The fundamental challenge, to detect the change in user's posture most accurately in the least time, has been analysed and a solution in form of new Quadratic Search Algorithm has been proposed. The system captures an image of the user at regular intervals of time, carries out certain pre-processing steps and then checks for a change in user's posture by comparing it with a reference image acquired previously in series of steps as per the New Quadratic Search algorithm. Then the user is notified about the change of his ergonomic posture.

More »»

2013

K. Velusamy, Venkitaramanan, D., Vasudevan, S. K., Dr. Prakash P, and Arumugam, B., “Internet of things in cloud”, Journal of Engineering and Applied Sciences, vol. 8, no. 9, pp. 304- 313, 2013.[Abstract]


The daily lives are more integrated into networks of wireless sensors and smart surroundings for its health, safety and comfort applications. From smart homes to smart office environments, these wireless sensor networks are used to increase the individuals comfort. Internet of things relies on networks to create an omnipotent sensor based network and device control measures based on IP addressing. Cloud computing when integrated with the internet of things can provide added ultra-technical value. Aggregating various resources and tailoring it into things like semantics paves way for the evolution of cloud of things (COD). Arduino, the open source programmable microcontroller device that can sense and interact with the environment with wired and wireless connectivity to the internet plays a major role in this study. This intelligent system communicates directly with the appliances which are IP assigned to the cloud database such that the user accounts have the accurate control over the registered appliances and totally reduces human intervention. In this proposed study, researchers put forward, the methods for the implementation of a low cost internet of things on cloud using Arduino. Also, this study proposes a Smart Energy Management System (SEMs), that will make use of internet of things with >1 type of wireless communication technique based on the requirement to collect energy information from the users and communicate it to the cloud server and saves energy efficiently.

More »»

2013

K. R. Kawshik, Vasudevan, S. K., Dr. Prakash P, and Gunasekaran, K., “An analysis and study on software health management of aircraft and other automobiles”, International Journal of Applied Engineering Research, vol. 8, no. 15, pp. 1815-1822, 2013.[Abstract]


What do we aim at is, the first point to be made clear. Simple, this paper should give an insight of what SHM (software health management) is all about? Also care has been taken in such a way that the benefits, implementation and architecture details and points of concern are all covered. There are very few papers available in this area, which made the project and study very interesting. Firstly, this mechanism is dealt with respect to an aircraft. So all the information summarized in this paper are in relevance with aircraft. But, the same can be extended to other automobiles as well. Almost everyone loves to travel in a sophisticated medium. Say, an Aircraft Airbus A380. It is very comfortable, fast and finally people inside should feel that they are secured and they will reach the destination safely. Same is the case with any automobile even. If a BMW car is bought, safety is the most important attribute to be listened into. If it is less expensive and not secured, then buyer would not spend for killing himself. Point is simple. Security and safety is so important and it carries a lot of weightage. This paper is aimed at improving safety aspects of an aircraft. The idea can be extended to any automobile as well. © Research India Publications.

More »»

Publication Type: Conference Proceedings

Year of Publication Title

2017

P. D. Bharathi, Dr. Prakash P, and M.V.K. Kiran, “Energy Efficient Strategy for Task Allocation and VM Placement in Cloud Environment”, 2017 Innovations in Power and Advanced Computing Technologies (i-PACT). pp. 1-6, 2017.[Abstract]


The prominent technology that drives the industry now-a-days is cloud computing. The growth of cloud computing has resulted in the setup of large number of data centers around the world. The data centers consume more power making it source for the carbon dioxide emission. The cloud computing allows users to utilize and access resources from the data centers when they demand rather than owning it. Load balancing is challenging when the workload is dynamic. A two level scheduling is proposed for load balancing taking into consideration the energy efficiency, power consumption and effective resource utilization satisfying the Quality of Service (QoS) service for the consumers with reduced SLA violation. In the first level of scheduling main focus is on the Task scheduling to VMs in which the technique of genetic algorithm and particle swarm optimization (PSO) is combined, a hybrid approach. The second level includes the placement of Virtual Machines to suitable Physical Machines by using Power aware best-fit algorithm in which the number of active servers are reduced and energy consumption is reduced. The paper focuses on study of load balancing and VM placement techniques.

More »»

2017

P. D. Bharathi, Dr. Prakash P, and , “Virtual machine placement strategies in cloud computing”, 2017 Innovations in Power and Advanced Computing Technologies (i-PACT). pp. 1-7, 2017.[Abstract]


The prominent technology that drives the industry now-a-days is cloud computing. The growth of cloud computing has resulted in the setup of large number of data centers around the world. The data centers consume more power making it source for the carbon dioxide emission and a major contributor to greenhouse effect. This led to the deployment of virtualization. Infrastructure as a Service is one of the important services offered by cloud computing that allows virtualization and hardware to get virtualized by creating many instances of Virtual Machine (VM) on a single Physical Machine (PM) and helps in improving utilization of resources. VM consolidation includes method of choosing the more appropriate algorithm for migration of VM's and placement of VMs to the most suitable host. VM placement is a part of VM migration. The effective placement of VM is aimed to improve performance, resource utilization and reduce the energy consumption in data centers without SLA violation. This paper aims to focus on various VM placement schemes.

More »»

2015

K. S. Sangeetha and Dr. Prakash P, “Big data and cloud: a survey”, Advances in Intelligent Systems and Computing (AISC Springer), vol. 325. pp. 773-778, 2015.[Abstract]


Today, the world has become closer due to the development of Internet. More people communicate via Internet, and the volume of data to be handled also grows. Nowadays, we talk about peta- and zettabytes of data and this volume of data needs to be processed and analyzed further which had led to the research field of big data storage and analysis. Cloud computing is another emerging area in which the services such as infrastructure, storage, and software are provided to the consumers on demand basis. In this paper, we discuss about the big data, cloud computing, and how big data are handled in cloud computing environment.

More »»

2015

Dr. Prakash P, Kousalya, G., Dr. Shriram K Vasudevan, and Sangeetha, K. S., “Green Algorithm for Virtualized Cloud Systems to Optimize the EnergyConsumption”, Advances in Intelligent Systems and Computing (AISC Springer), vol. 324. Springer, pp. 701–707, 2015.[Abstract]


In recent days, most of the cloud users request data center in the cloud environment by applying an exhaustive data-centric workflows which leads to the major energy consumption. The major energy breaks out from the data center and makes way to CO2 emission which impacts the global warming. In this paper, we introduce optimized energy utilization in deployment and forecast (OEUDF) for data-intensive workflows in virtualized cloud systems which help to reduce the energy in the cloud workflow environment. In this approach, initially, we compute the optimal data-accessing energy path (ODEP) which helps us to deploy and configure the virtual machines; secondly, it computes the rank, according to that it will schedule the workflow activities in the cloud environment. If any unscheduled activities are in the submission pool, then OEUDF finds the suitable virtual machine and reconfigures the data center by minimizing the energy utilization. The experiment result indicates that the proposed algorithm gradually reduces the energy consumption.

More »»

2014

Dr. Prakash P, Kousalya, G., Dr. Shriram K Vasudevan, and Rangaraju, K. K., “Hardware Based Distributive Power Migration and Management Algorithm for Cloud Environment”, In Proceedings of The 8th FTRA International Conference on Multimedia and Ubiquitous Engineering (MUE 2014), Lecture Notes in Electrical Engineering (LNEE), vol. 308. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 83–89, 2014.[Abstract]


In cloud computing setup of computers power consumption among the distributed computers needs to be minimal with every server running increases the power cost by an average of 50w-100w. A real time implementation of an algorithm to minimize the power consumed in a setup of a parent computer a PIC microprocessor and connected servers is needed to manage the unwanted waste in energy. The usual traditional scheduler doesn’t meet the requirements. We program the Microcontroller to implement our algorithm which ensured that minimum number of servers run for a given numbers of virtual machines. The Distributive Power Migration & Management Algorithm for Cloud Environment that uses the resources in an effective and efficient manner ensuring minimal use of power. The proposed algorithm performs computation more efficiently in a scalable cloud computing environment. The results indicate that the algorithm reduces up to 28% of the power consumption to execute services.

More »»

Publication Type: Book Chapter

Year of Publication Title

2016

S. Priyadharshini, Nivetha, D., Anjalikumari, T., and Dr. Prakash P, “Mobile controlled door locking system with two-factor authentication”, in Advances in Intelligent Systems and Computing (AISC Springer), vol. 398, Springer, 2016, pp. 133- 139.[Abstract]


In spite of the availability of digital password lockers and advanced door locks, hacking the lock code by an unauthorized person has become a plain-sailing task. Thus, the main goal of this paper is to design a highly advanced and secured home security system using mobile technology, video messaging, and electronic technology with two-factor authentication. The designed system directly communicates to the owner of the house when someone arrives at his door-step by sending a video along with a notification message. The owner sends a one-time password to the visitor’s mobile for him to enter in the keypad placed near the door.

More »»

2016

K. K., S., D., and Dr. Prakash P, “A Study on Security Issues in Cloud Computing”, in Advances in Intelligent Systems and Computing (AISC Springer), vol. 398, 2016, pp. 167-175.[Abstract]


Cloud computing focuses on maximizing the effectiveness of shared resources. It is also cost-effective, flexible, quick data storage, and is one of the most successful services in the internet. Cloud services are often outsourced to a third party, increasing the security threats. They are also delivered through the traditional network protocols and so a threat to the protocols is a threat to the cloud as well. In this paper, the major security issues are analyzed and sufficient countermeasures are provided, in order to minimize the security threats concerning cloud computing.

More »»

Scopus Author ID: 55971770300

ORCID: 0000-0001-9215-6122