Debasis Gountia

Debasis Gountia
  • M. Tech., IIT, Kharagpur
  • Professor (Assistant) at College of Engineering & Technolgy, Bhubaneswar

About

9
Publications
9,834
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
198
Citations
Current institution
College of Engineering & Technolgy, Bhubaneswar
Current position
  • Professor (Assistant)
Additional affiliations
January 2006 - October 2014
College of Engineering and Technology
Position
  • Professor (Assistant)

Publications

Publications (9)
Conference Paper
Full-text available
Internet of Things (IoT) has lots of attention in the last decade. The connected IoT devices are more than the total world population. Due to its low cost, easy to deploy, and simple to implement, application areas are large like smart city, smart home, smart transportation, environment monitoring, agriculture and many more. There exists some secur...
Conference Paper
Full-text available
Blockchain is the backbone technology behind crypto-currency and Bitcoin. By concept, Blockchain is a distributed database where transactions are recorded in an incorruptible and non-modifiable manner. Currently, Blockchain technology is envisioned as a powerful framework for open-access networks, decentralized information processing and sharing sy...
Conference Paper
Full-text available
Internet of Things (IoT) is excessively influencing our day to day lives in many domains be it small smart device like a smart-watch or large industrial enterprises. Thus, a number of different IoT based applications are developed and deployed for these sectors. An IoT system enables devices to communicate among each other without human assistance/...
Conference Paper
Full-text available
Internet of Things (IoT) as per estimated will connect 50 billion devices by 2020. Since its evolution, IoT technology provides lots of flexibility to develop and implement any application. Most of the application improves the human living standard and also makes life easy to access and monitoring the things in real time. Though there exist some se...
Conference Paper
Full-text available
Fog computing is decentralized scalable architecture where the fog nodes can join and leave the network arbitrary way. The IoT devices connected to the fog network can also have the connectivity issue. As all the fog nodes and IoT devices are connected in a distributed way it is hard to build a secure infrastructure in the absence of a trusted cent...
Article
Full-text available
In the Distributed Environment where shared resources are involved, we have basically two types of mechanism to allocate the shared resources: either by passing tokens or by having Request and Reply Messages. In the shared environment, a processor might fail (i.e. may crash which may lead to failure). This paper proposes a fault tolerant token base...
Article
Full-text available
Privacy preservation in data mining has been a popular and an important research area for more than a decade due to its vast spectrum of applications. A new class of data mining method called privacy preserving data mining algorithm has been developed. The aim of this algorithm is to protect the sensitive information in data from the large amount o...
Article
Full-text available
As the data storage challenge continues to grow for insurers and everyone else, one of the obvious solutions is cloud technology. Storing data on remote servers rather than in-house is definitely a money-saver, but in insurance circles, the worry has been that having critical data reside outside the physical and virtual walls of the insurance enter...
Article
In this paper, a new Disk Encompression (i.e., encryption with compression) with Tweaked Block Chaining mode (DETBC) has been proposed. DETBC is a modified of XTS i.e., Xor-Encrypt-Xor based Tweaked Code Book mode with CipherText Stealing. Unlike XTS, DETBC is faster, memory saving and is better resistant to the attacks. DETBC is characterized by i...

Network

Cited By