- Cloud Computing, Energy Efficiency, Resource Management, Load Balancing, Security, Trust, Virtualization
- Mobile and Wireless Communications, Ad-hoc Networks, Sensor Networks, Pervasive Computing, Ubiquitous Computing, Cellular Networks
- Network Security, Static Analysis, Behavioral Analysis, Anomaly Detection, IDS, DDoS detection, etc
|2010||On Going||Assistant Professor||IIT Roorkee|
|1997||2010||Various Positions||Different Engineering Colleges|
|• Travel Grant of Rs. 1.89 Lakhs awarded by Department of Science and Technology (DST)||IIT Roorkee||2015|
|• Best Presentation Award for the poster in TechSym 2014, IIT Kharagpur.||IIT Roorkee||2014|
|• Best Paper Award for the paper in ICISP – 2013, Bangalore.||IIT Roorkee||2013|
|• IBM Shared University Research Award.||IIT Roorkee||2013|
|• Travel Grant of Rs. 25,000 awarded by Computer Society of India (CSI)||IIT Roorkee||2015|
|• University 4th Rank in Master’s Course in Physics. Received Merit Scholarship||Kakatiya University, Warangal||1995|
|• Best Teacher Award recipient at KITS, Singapur, Karimnagar, A.P., India||KITSS||2000|
|• Institute funded SUR Award of Rs. 4000/- on “Leaf Image Processing” project||IIT Roorkee||2014|
|Ph.D||Computer Science and Engineering||Osmania University Hyderabad||2010|
|M. Sc||Physics and Specialization in Electronics||Kakatiya University Warangal||1995|
|M. Tech.||Computer Science and Engineering||Osmania University Hyderabad||2003|
|2016||On Going||Member, IAPC||IIT Roorkee|
|2016||On Going||Member, DAPC||IIT Roorkee|
|2013||On Going||OC, HPC Lab||IIT Roorkee|
|2015||On Going||OC, M.Tech||IIT Roorkee|
|2016||2016||Co-Coordinator, Cognizance 2016||IIT Roorkee|
|2013||2015||Member, DAC||IIT Roorkee|
|2013||2015||OC Time Tables||IIT Roorkee|
|2013||2015||OC, Computer_Lab_II||IIT Roorkee|
|2013||2015||OC, Exams||IIT Roorkee|
|2013||2017||Staff Advisor, WebDesign, Hobbies Club||IIT Roorkee|
|2012||2014||Member, Board of UG Studies||JNTU Anantapur|
|2011||2013||Member, DRC||IIT Roorkee|
|Energy Efficient Multimedia Cloud Services for Mobile Devices||IBM||2013|
|Delivering Secured and Energy Efficient Multimedia streaming services anywhere and anytime for Mobil||RaiTel||2014|
|Information Security Education and Awareness (ISEA)||DIETY||2015|
- IEEE, Member
- ACM, Member
- Academic Discussion Group, OpenPower Foundation, Associate Member
- DMTF (Cloud Management, Academic Alliance), Member
- CSI, Member - Life
- IETE, Member - Life
- ISTE, Member - Life
|Title||Course Code||Class Name||Semester|
|Cloud Computing||CS-520||M.Tech I Year||Spring|
|Advanced Computer Networks||EC-555||M.Tech I Year||Autumn|
|Operating Systems||EC-353||B.Tech III Year||Autumn|
|Topic||Scholar Name||Status of PHD||Registration Year|
|Mobile Cloud Computing||Dr. Anuradha Ravi||A||2011|
|Image Processing in Mobile Computing||Dr. Shitala Prasad||A||2011|
|Network Security||Dr. Shree Garg||A||2010|
|Cloud Security||Dr. Prachi Deshpande||A||2012|
|Cloud Management||Ms. Indu Saini||O||2010|
|Mobile Security||Mr. Anshul Arora||O||2014|
|Cloud Security||Mr. Vikas Chouhan||O||2014|
|IoT and Cloud||Mr. Ajay Chaudhary||O||2014|
|Cloud and High Performance Computing||Mr. Animesh Kuity||O||2014|
|Institute Visited||Purpose of Visit||Date|
|University at Albany, State University of New York (SUNY), USA.||Delivered a Guest Talk on "Energy Efficiency and Seamless Service Provisioning in Mobile Cloud Computing"||19/10/2017|
|International Supercomputing Conference - High Performance (ISC-2017), Frankfurt, Germany||Research Paper Presentation and Academic Discussion Group Meeting.||18/06/2017|
|IEEE MASS 2017, Orlando, USA||To present a research paper and attend a steering committee meeting.||22/10/2017|
|Florida International University, Miami, USA||Research Meeting||25/10/2017|
|Seoul National University (SNU), Seoul, South Korea||Research Meeting||09/02/2012|
|IBM Research Labs, Austin, Texas, USA||Academic Discussion Group Meeting and IBM Research Labs Visit. Also, Attending Supercomputing (SC) conference.||15/11/2015|
|Middlesex University, London, UK||Research Meeting||08/09/2014|
|National Institute of Standards and Technology (NIST), Gaithersburg, USA||Paper Presentation||18/06/2013|
REFEREED RESEARCH PUBLICATIONS
List of Journal Publications
[J1] S. Prasad, S. K. Peddoju, and D. Ghosh, "An adaptive plant leaf mobile informatics using RSSC," Multimedia Tools and Applications, vol. 76, pp. 21339-21363, 2017.
[J2] S. Prasad, P. S. Kumar, and D. Ghosh, "An efficient low vision plant leaf shape identification system for smart phones," Multimedia Tools and Applications, vol. 76, pp. 6915-6939, 2017.
[J3] S. Garg, S. K. Peddoju, and A. K. Sarje, "Network-based detection of Android malicious apps," International Journal of Information Security, vol. 16, pp. 385-400, 2017.
[J4] S. Prasad, S. K. Peddoju, and D. Ghosh, "Multi-resolution mobile vision system for plant leaf disease diagnosis," Signal, Image and Video Processing, vol. 10, pp. 379-388, 2016.
[J5] S. Garg, S. K. Peddoju, and A. K. Sarje, "Scalable P2P bot detection system based on network data stream," Peer-to-Peer Networking and Applications, vol. 9, pp. 1209-1225, 2016.
[J6] P. Deshpande, S. Sharma, S. K. Peddoju, and A. Abraham, "Security and service assurance issues in Cloud environment," International Journal of System Assurance Engineering and Management, pp. 1-14, 2016.
[J7] S. Sharma, U. S. Tim, S. Gadia, J. Wong, R. Shandilya, and S. K. Peddoju, "Classification and comparison of NoSQL big data models," International Journal of Big Data Intelligence, vol. 2, pp. 201-221, 2015.
[J8] A. Ravi and S. K. Peddoju, "Handoff strategy for improving energy efficiency and cloud service availability for mobile devices," Wireless Personal Communications, vol. 81, pp. 101-132, 2015.
[J9] P. Deshpande, S. Sharma, S. K. Peddoju, and A. Abraham, "Efficient multimedia data storage in cloud environment," Informatica, vol. 39, p. 431, 2015.
[J10] K. Bhanot, S. K. Peddoju, and T. Bhardwaj, "A model to find optimal percentage of training and testing data for efficient ECG analysis using neural network," International Journal of System Assurance Engineering and Management, pp. 1-6, 2015.
[J11] P. Deshpande, S. Sharma, S. Peddoju, and S. Junaid, "HIDS: A host based intrusion detection system for cloud computing environment," International Journal of System Assurance Engineering and Management, pp. 1-10, 2014.
List of Conference Publications
[C1] M. Santra, S. K. Peddoju, A. K. Bhattacharjee, and A. Khan, "Design and Analysis of a Modified Remote Attestation Protocol," in 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, 2017, pp. pp. 578-585. (Tier-1 Conference)
[C2] A. Ravi and S. K. Peddoju, "Energy-Service Trade-Off Model for Mobile Cloud Computing," in 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2017, pp. 616-621. (Tier-2 Conference)
[C3] V. Mahajan and S. K. Peddoju, "Deployment of Intrusion Detection System in Cloud: A Performance-Based Study," in Trustcom/BigDataSE/ICESS, 2017 IEEE, 2017, pp. 1103-1108. (Tier-1 Conference)
[C4] A. Kuity and S. K. Peddoju, "Performance Evaluation of Container-Based High Performance Computing Ecosystem Using OpenPOWER," in International Conference on High Performance Computing, 2017, pp. 290-308. (Tier-2 Conference)
[C5] A. Chaudhary, S. K. Peddoju, and K. Kadarla, "Study of Internet-of-Things Messaging Protocols Used for Exchanging Data with External Sources," in 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2017, pp. 666-671. (Tier-2 Conference)
[C6] A. Arora and S. K. Peddoju, "Minimizing Network Traffic Features for Android Mobile Malware Detection," in Proceedings of the 18th International Conference on Distributed Computing and Networking, 2017, p. 32. (Tier-2 Conference)
[C7] S. Prasad, S. K. Peddoju, and D. Ghosh, "Mask Region Grow segmentation algorithm for low-computing devices," in Communication (NCC), 2016 Twenty Second National Conference on, 2016, pp. 1-6. (Tier-2 Conference)
[C8] P. Deshpande, S. Sharma, and S. K. Peddoju, "Data Storage Security in Cloud Paradigm," in Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2016, pp. 247-259. (IIT Roorkee)
[C9] A. Sharma and S. K. Peddoju, "Response time based load balancing in cloud computing," in Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2014 International Conference on, 2014, pp. 1287-1293.
[C10] A. Ravi and S. K. Peddoju, "Mobility managed energy efficient Android mobile devices using cloudlet," in Students' Technology Symposium (TechSym), 2014 IEEE, 2014, pp. 402-407. (IIT Kharagpur) (Best Presentation Award)
[C11] S. Prasad, S. K. Peddoju, and D. Ghosh, "Mobile Mixed Reality Based Damage Level Estimation of Diseased Plant Leaf," in Next Generation Mobile Apps, Services and Technologies (NGMAST), 2014 Eighth International Conference on, 2014, pp. 72-77.
[C12] S. Prasad, S. K. Peddoju, and D. Ghosh, "Energy efficient mobile vision system for plant leaf disease identification," in Wireless Communications and Networking Conference (WCNC), 2014 IEEE, 2014, pp. 3314-3319. (Tier-2 Conference)
[C13] M. H. Kumar and S. K. Peddoju, "Energy efficient task scheduling for parallel workflows in cloud environment," in Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2014 International Conference on, 2014, pp. 1298-1303.
[C14] G. Garkoti, S. K. Peddoju, and R. Balasubramanian, "Detection of insider attacks in cloud based e-healthcare environment," in Information Technology (ICIT), 2014 International Conference on, 2014, pp. 195-200.
[C15] S. Garg, A. K. Sarje, and S. K. Peddoju, "Improved detection of P2P botnets through network behavior analysis," in International Conference on Security in Computer Networks and Distributed Systems, 2014, pp. 334-345.
[C16] S. Garg, A. Sarje, and S. Peddoju, "Network traffic analysis of zeroaccess bot," in The ASE International Conference on Cyber Security, Stanford University, 2014.
[C17] P. Deshpande, S. Sharma, and S. Peddoju, "Implementation of a private cloud: a case study," in Proceedings of the Third International Conference on Soft Computing for Problem Solving, 2014, pp. 635-647.
[C18] A. Arora, S. Garg, and S. K. Peddoju, "Malware detection using network traffic analysis in android based mobile devices," in Next generation mobile apps, services and technologies (NGMAST), 2014 eighth international conference on, 2014, pp. 66-71.
[C19] T. Sen and S. K. Peddoju, "Hierarchal identity based socket for datacenters," in Software Security and Reliability-Companion (SERE-C), 2013 IEEE 7th International Conference on, 2013, pp. 63-67.
[C20] A. Ravi and S. K. Peddoju, "Energy efficient seamless service provisioning in mobile cloud computing," in Service Oriented System Engineering (SOSE), 2013 IEEE 7th International Symposium on, 2013, pp. 463-471.
[C21] S. Prasad, S. K. Peddoju, and D. Ghosh, "Mobile plant species classification: a low computational approach," in Image Information Processing (ICIIP), 2013 IEEE Second International Conference on, 2013, pp. 405-409.
[C22] S. Prasad, S. K. Peddoju, and D. Ghosh, "Unsupervised resolution independent based natural plant leaf disease segmentation approach for mobile devices," in Proceedings of the 5th IBM Collaborative Academia Research Exchange Workshop, 2013, p. 11.
[C23] S. Prasad, S. K. Peddoju, and D. Ghosh, "Mobile augmented reality based interactive teaching & learning system with low computation approach," in Computational Intelligence in Control and Automation (CICA), 2013 IEEE Symposium on, 2013, pp. 97-103.
[C24] A. Mehta, S. Prasad, and S. K. Peddoju, "Improved Connected Region Based Approach for Extraction of Principal Lines from Palm Images," in Proceedings of Elsevier International Conference of Image and Signal Processing, 2013, pp. 104-111. (Best Paper Award)
[C25] A. Jain, M. Mishra, S. K. Peddoju, and N. Jain, "Energy efficient computing-green cloud computing," in Energy Efficient Technologies for Sustainability (ICEETS), 2013 International Conference on, 2013, pp. 978-982.
[C26] S. Garg, A. K. Singh, A. K. Sarje, and S. K. Peddoju, "Behaviour analysis of machine learning algorithms for detecting P2P botnets," in Advanced computing technologies (ICACT), 2013 15th international conference on, 2013, pp. 1-4.
[C27] P. Deshpande, S. Sharma, and S. K. Peddoju, "Deploying a private cloud? Go through the errors first," in Conference on Communication and Control Systems(CACCS-2013)-2013, Deharadun-India, 2013.
[C28] V. Chouhan and S. K. Peddoju, "Hierarchical storage technique for maintaining hop-count to prevent DDoS attack in cloud computing," in Proceedings of International Conference on Advances in Computing, 2013, pp. 511-518.
[C29] H. Verma, D. Toshniwal, and S. K. Peddoju, "Distributed frequent itemset mining framework for incremental data using MPI-style WSRF services," in Proceedings of the International Conference on Advances in Computing, Communications and Informatics, 2012, pp. 74-81.
[C30] S. Prasad, A. Prakash, S. K. Peddoju, and D. Ghosh, "Control of computer process using image processing and computer vision for low-processing devices," in Proceedings of the International Conference on Advances in Computing, Communications and Informatics, 2012, pp. 1169-1174.
[C31] A. Kuity and S. K. Peddoju, "Advanced Reservation based SLA for Resource negotiations in Grid Scheduling," in Proc. of the Intl. Conf. on Advances in Computer, Electronics and Electrical Engineering, 2012.
List of Books Authored/Edited
[B1] Chintan Bhatt, S.K. Peddoju, "Cloud Computing Systems and Applications in Healthcare," in IGI Publisher, 2017.
[B2] Prachi Deshpande, S. C. Sharma, S. K. Peddoju, "Security and Storage Issues in the Cloud Environment," Springer Nature, 2018 (In Press)