Ramya U. M. currently serves as Assistant Professor at Department of Computer Science and Engineering, School of Engineering, Coimbatore Campus. Her areas of research include Grid Computing and Cloud Computing.


Publication Type: Journal Article

Year of Publication Title


Ramya U. M., Vasista, G. L. K., Jhansi, E., and P. Bharadwaj, S., “Effective storage and search optimization in cloud”, International Journal of Applied Engineering Research, vol. 10, pp. 25967-25976, 2015.[Abstract]

With the advent of Cloud computing as a dominant computing platform, data owners are provoked to handle complex and sensitive data by moving data from local sites to public cloud which provides great flexibility and low cost. For providing data discretion and privacy, unlike traditional data usage based on plaintext keyword search, sensitive data have to be encrypted before outsourcing. Thus, enabling searchable encryption service is of preeminent importance. Having the large number of data users and documents in cloud, it is necessary for the search service to provide optimal search with single keyword query and effective document retrieval based on relevance score of keywords. Related works on privacy preserving searchable encryption focus on single keyword search, Fuzzy keyword search or Boolean keyword search with or without similarity ranking. Cloud handles huge set of documents. When a cloud user posts a query to the cloud, it is known that the user would be retrieved with both relevant and irrelevant documents with which the user has to post-process the documents and sort out to get the relevant documents. This whole process is cumbersome to the user. In this paper, an architecture which provides an optimal search over encrypted cloud data has been proposed which allows the user to retrieve only relevant documents with respect to the query keyword. Elliptic Curve Cryptography (ECC) algorithm has been used for encryption of documents thereby securing the documents and Diffie-Hellman algorithm to check for authentication of key exchange. We have used inverted index to index each document. After the relevant documents are retrieved, we then rank each document based on TF-IDF scoring and provide the top K retrievals to the users. © Research India Publications.

More »»


Ramya U. M., Jagathish, B., Kamalakannan, K., Prashanth, S., V. Saranya, S. Chandra, and Subathra, K., “Intrusion detection system in VoIP”, International Journal of Applied Engineering Research, vol. 9, pp. 1347-1357, 2014.[Abstract]

Voice over IP (VoIP) systems is a popular technology for transmitting voice traffic over IP networks in the 3G world. VoIP is an efficient mode of communication; on a smaller scale it can also be a useful solution for businesses looking to trim their telephone expenses. In spite of its advantages, it is subjected to different kinds of intrusions. There have been enormous strides made in the field of intrusion detection systems (IDS) for different components of the information technology infrastructure. VoIP systems pose several new challenges to the existing IDS. We introduce Cross-Layer Mechanism and a fresh Intrusion Detection system which can be extended to other Intrusion Detection Systems. This system requires aggregation of protocols and is very efficient for VoIP systems because they involve multiple protocols and several attacks are based on sequences that cross protocol boundaries. Since VoIP systems use multiple application layer protocols, horizontal cross-protocol correlation is required. The architecture of the system proposed monitors all incoming network traffic and is classified into events. The events can potentially have state information and encapsulate information from multiple packets. The protocols used are SIP for call management and RTP for real-time audio data transfer. And our main concentration would be on Denial-Of-Service attacks. More »»

Faculty Research Interest: