Papers by kanchana Rajaram

International Journal of Web Services Research, Jul 1, 2014
A key challenge in B2B and B2C applications involving dynamic composition of workflow activities ... more A key challenge in B2B and B2C applications involving dynamic composition of workflow activities is to ensure their reliable execution, in view of frequent failures in the internet environment where a composed service is executed. Existing approaches for transactional coordination of composite web services, consider forward and backward recovery alone, in order to maintain consistency in the case of failures. However, while achieving reliable execution, service cancellability is important due to the predominance of long running processes in business applications and frequently changing user requirements and business policies. If the execution of a long running process is not cancelled in the case of a changed requirement, the completion of the process results in wastage of resources and the outcome may no longer be useful. Hence, a transactional coordination framework named as Tx-FAITH is proposed to handle the cancellation recovery under the external interruption and cancellation of transactions. Tx-FAITH considers hierarchically composed web services whose components are recursively nested to form a composition and adapts a coordination approach based on context information. The proposed coordination and recovery approach when tested with 200 simultaneous users and with a database size of 0.35 million records, incurs only 10 seconds to process a request.

Multimedia Tools and Applications
Biometric fingerprint verification and identification have been extensively used in real life app... more Biometric fingerprint verification and identification have been extensively used in real life applications as an authentication and access control mechanism. Newer contactless fingerprint scanning technology offers high convenience and hygiene, especially in the view of COVID-19. Attackers still challenge the biometric security offered by contactless scanners by illegitimate acquisition of the user's fingerprint through various spoofing methods. Therefore, detection of contactless fingerprint spoof is on the urge to protect the biometric security systems. The existing solutions to contactless fingerint spoof detection face the lacuna of considering limited fingerprint features leading to low spoof detection accuracy. In this study, this issue has been addressed and CLNet (Contact Less Network) approach is proposed to detect the spoofness in contactless fingerprints. The proposed CLNet is a deep neural network approach utilizing contactless fingerprint images followed by a transfer learning approach called SpoofDetNet which is based on the MobileNetV2 model. The motivation for the development of the SpoofDetNet is to create a spoof detection method viable for contactless fingerprint images as well as contact-based fingerprint images which stand strong among state-of-the-art models. We created a Spoofed-Contactless Adult Fingerprint (S-CLAF) dataset with live and spoof contactless fingerprint images. The CLNet approach was trained and tested on S-CLAF dataset and it achieved an accuracy of 99.07% across all spoofed materials. Furthermore, the proposed approach was tested using LivDet 2015 benchmark dataset and IIT Bombay touchless fingerprint dataset achieving accuracy of 98.32% and 99.38% respectively. It is evident from the experimental results that the proposed CLNet outperforms the state-of-the-art fingerprint spoof detection methods.
Specification of Transactional Requirements for Web Services using Recoverability
International Journal of Information Technology and Web Engineering, 2013
Emulation of IoT gateway for connecting sensor nodes in heterogenous networks
An Internet of Things (IoT) are ‘things’ that com-municate in different networks. An IoT gateway ... more An Internet of Things (IoT) are ‘things’ that com-municate in different networks. An IoT gateway which provides device connectivity and protocol translation is often expensive in case of small scale academic projects. In view of this, an Emulated IoT gateway is proposed that emulates the IoT gateway using a local computer in a cost effective way. The sensor data sent from sensor nodes connected in cellular network (GPRS), WiFi, RF, Bluetooth or in LAN using Ethernet are collected and successfully processed in cloud server.

Deriving reliable compositions using cancelable web services
ACM Sigsoft Software Engineering Notes, Feb 11, 2014
Reliability is one of the main challenges while composing web services. Due to the inherent heter... more Reliability is one of the main challenges while composing web services. Due to the inherent heterogeneity of web services, it is important to predict the behaviour of the overall composite service. Existing works that deal with reliable web service composition consider only three basic transactional properties such as pivot, retriable, and compensatable. When a service fails, its results can be ignored if it is pivot; it can be retried until it succeeds if it is retriable; or the previously completed services must be rolled back if they are compensatable, in order to achieve reliable execution. In general, business applications involve long running services. Service execution must be interrupted to adapt to dynamically changing user preferences since execution of the service to completion with the older requirements is no longer meaningful. Hence, service composition requires additional transactional support beyond the three transactional properties. To address this need, we introduce cancelable services and investigate the transactional properties of composite services that involve cancelable component services. The valid compositions, which result in a reliable execution are identified and formally verified.
PalmNet: A CNN Transfer Learning Approach for Recognition of Young Children Using Contactless Palmprints
Smart innovation, systems and technologies, 2022

International journal of engineering research and technology, Jul 30, 2018
Composition of web services is a prominent feature of Service Oriented Architecture, for implemen... more Composition of web services is a prominent feature of Service Oriented Architecture, for implementing business processes. Business processes may collaborate within or across organizations. During cross organizational collaborations, services are often heterogeneous thereby bringing challenges to composition. The two most popular types of web services are SOAP based web services and RESTful web services. Most of the existing solutions for service composition address SOAP based web services and RESTful web services separately. A few prior attempts to compose SOAP and RESTful web services together use semi automatic methods like converters which are inefficient. In this paper, "DyCSR" a dynamic composition technique for composing SOAP and RESTful web services has been proposed. The technique involves a middleware service that enables composition of SOAP and RESTful web services dynamically.
TxFlowGen: Generation of Failure Atomic transactional workflows for B2B applications

International Conference on Systems Engineering, Sep 8, 2013
Several companies and individuals are increasingly dependent on the electronic means to provide a... more Several companies and individuals are increasingly dependent on the electronic means to provide and consume services. A single service may not fulfil the requirement of a service consumer and hence, composition of web services which together satisfy the requirements is essential. In service provisioning, security attacks such as message alteration attack may happen at the service level or at the composition level. It is required to ensure secure data flow without information leaking through covert channels. Most of the existing works on web services security provide solutions for ensuring only confidentiality, client authorization, and integrity of information. Hence, it is proposed to design pluggable APIs that protect SOAP messages, from service based threats while accessing a service and during service composition. These APIs are generic in nature and can be installed on the server where the services are deployed. A generic API that protects the SOAP messages from message alteration attacks is proposed in this paper.
DLoader: Migration of Data from SQL to NoSQL Databases
Cognitive science and technology, 2023
A model for predicting resources for on-premise applications
Accurate prediction of resources is a cliallenging problem in any environment. Effective provisio... more Accurate prediction of resources is a cliallenging problem in any environment. Effective provisioning of resources for on-premise applications with varied performance requirements requires an accurate prediction of resources. Towards this objective, a prediction model, namely. Multilayer Perceptron has been proposed in this work. The prediction model is trained using a dataset generated from TPC-W benchmark based online application and tested for new requirements. Its prediction accuracy has been compared with that of two other prediction models such as Linear Regression and Support Vector Regression. The Multilayer perceptron model is found to exhibit a better accuracy of 91.8 percentage.

Tx-policy
In Web services paradigm, whenever a single service cannot meet the requirements of a user, many ... more In Web services paradigm, whenever a single service cannot meet the requirements of a user, many services need to be composed that can collectively satisfy the user expectations. Existing research focuses on service selection based solely on non-functional properties for composition, whenever there is more than one service provider who is offering services with similar functionality. However, the transaction behavioral aspects of a service, which ensure the reliability of a composite service has not been considered till now. Currently, the transactional properties cannot be represented as a part of service definition. To address this need, it is proposed to specify transactional properties using WS-Policy language and integrate it with the service definition. The transactional requirements of service consumer are matched with transactional policies of service providers and the correct set of services is selected for composition that will result in reliable execution. This approach is experimented with a case study of Scan Report Generation process in health care domain.

AOP based QoS monitoring of dynamic web service compositions
ABSTRACT Web services are the functions used to solve a specific task. Web service composition is... more ABSTRACT Web services are the functions used to solve a specific task. Web service composition is a process of combining the functionalities of web services in order to perform a complex task. QoS properties mutually agreed by consumer and developer and recorded in a Service Level Agreement (SLA) need to be monitored at runtime. Abiding by SLA determines whether to continue the usage of that service. Existing works monitor QoS properties of the web service compositions that are composed at design time itself. However, if the SLA is violated, an alternate service can be selected during runtime in a dynamic composition scenario. Hence, in this paper it is proposed to monitor QoS properties of compositions that are dynamically composed. Aspect Oriented Programming (AOP) based approach is adapted for monitoring and triggering alternate service composition, in case of SLA violations. The proposed approach is demonstrated for an application of Foreign exchange market that involves composing services at runtime.

Web Services can be invoked from anywhere through internet without having enough knowledge about ... more Web Services can be invoked from anywhere through internet without having enough knowledge about the implementation details. In some cases, single service cannot accomplish user needs. One or more services must be composed which together satisfy the user needs. Therefore, security is the most important concern not only at single service level but also at composition level. Several attacks are possible on SOAP messages communicated among Web Services because of their standardized interfaces. Examples of Web Service attacks are oversize payload, SOAPAction spoofing, XML inj ection, WS-Addressing spoofing, etc. Most of the existing works provide solution to ensure basic security features of Web Services such as confidentiality, integrity, authentication, authorization, and non-repudiation. Very few of the existing works provide solutions such as schema validation and schema hardening for attacks on Web Services. But these solutions do not address and provide attack specific solutions for SOAP messages communicated between Web Service. Hence, it is proposed to provide solutions for two of the prevailing Web Service attacks. Since new types of Web Service attacks are evolving over time, the proposed security solutions are implemented as APls that are pluggable in any server where the Web Service is deployed.

Utilization based prediction model for resource provisioning
Resource provisioning refers to the selection, deployment and management of resources to ensure g... more Resource provisioning refers to the selection, deployment and management of resources to ensure guaranteed performance for the applications. Efficient resource provisioning is a challenging problem since it is dynamic in nature and requires supporting applications with different performance requirements. In order to provide adequate resources for applications with different requirements that must satisfy expected performance, it is required to predict correct set of resources. Towards this objective, a prediction model for resource provisioning has been developed in this work. The prediction model is trained by the dataset that is created using a benchmark e-Commerce application namely TPC-W that is deployed in Amazon EC2 environment. The experimental results show that the prediction model based on Linear regression exhibits 70 percentage of accuracy, Support Vector Regression shows 68 percentage of accuracy, whereas Multilayer perceptron exhibits 90 percentage of accuracy for the same dataset.

Monitoring flow of web services in dynamic composition using event calculus rules
Monitoring composition of web services is important to ensure provisioning of a valid business pr... more Monitoring composition of web services is important to ensure provisioning of a valid business process. Most of the existing works on service monitoring focused either on QoS violations or service interactions during execution of services that are statically composed. However, dynamic composition of services wherein the services are discovered and composed at runtime based on user requirements and outcome of previously composed services is significant for business applications with frequently changing user requirements and business policies. In such scenarios, the order in which the services are composed must be monitored to comply with business polices. Otherwise, the composition leads to incorrect and inconsistent results. To address this issue, a runtime monitoring framework is proposed in this paper that monitors composition order of services that are dynamically composed, validates it using predefined rules and initiates corrective actions in case of violations from rules. The web services and the rules for composition flow have been expressed as event calculus axioms that are useful in validating the composition order. The performance of the proposed framework has been assessed and it is found out that it introduces only a marginal overhead on turnaround time of the user request as compared to absence of monitoring.
Dynamic Transaction Aware Web Service Selection
International Journal of Cooperative Information Systems, Aug 14, 2014
IFIP Advances in Information and Communication Technology, 2020
The use of general descriptive names, registered names, trademarks, service marks, etc. in this p... more The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
IoT Based Crop-Field Monitoring and Precise Irrigation System Using Crop Water Requirement
IFIP Advances in Information and Communication Technology, 2020

Regular, 2020
Big data applications play an important role in real time data processing. Apache Spark is a data... more Big data applications play an important role in real time data processing. Apache Spark is a data processing framework with in-memory data engine that quickly processes large data sets. It can also distribute data processing tasks across multiple computers, either on its own or in tandem with other distributed computing tools. Spark’s in-memory processing cannot share data between the applications and hence, the RAM memory will be insufficient for storing petabytes of data. Alluxio is a virtual distributed storage system that leverages memory for data storage and provides faster access to data in different storage systems. Alluxio helps to speed up data intensive Spark applications, with various storage systems. In this work, the performance of applications on Spark as well as Spark running over Alluxio have been studied with respect to several storage formats such as Parquet, ORC, CSV, and JSON; and four types of queries from Star Schema Benchmark (SSB). A benchmark is evolved to s...
Uploads
Papers by kanchana Rajaram