Indian Institute of Information Technology,Allahabad
(An Institute of National Importance by Act of Parliament)
A Centre of Excellence in Information Technology, Established by Ministry Of H.R.D., Govt Of India
Deoghat, Jhalwa, Allahabad-211012 (U.P.)

S.VENKATESAN (In Tamil: சு.வெங்கடேசன்)

Designation and Address      Assistant Professor
     Department of Information Technology
     Room Number : 4304
     Computer Centre - 2(CC-2)
     Indian Institute of Information Technology, Allahabad
     Deoghat, Jhalwa, Allahabad-211012 (U.P.)
     Ph. : + 91 532 2922138
     E-Mail : ,
     Associated with : Network Security & Cryptography (NSC) Lab

Education
  • Ph.D. - Mobile Agent Security from Department of Computer Science and Engineering at Anna University, Chennai,Tamilnadu, India in Feb. 2010. Thesis Advisor: Prof.C.Chellappan
  • M.Tech. - Computer Science and Engineering from Bharath Institute of Higher Education and Research University,Chennai, Tamilnadu, India in 2005.
  • B.Tech. - Computer Science and Engineering from Sri Manakula Vinayagar Engineering College affiliated with Pondicherry University, Pondicherry, India in 2003.
  • DCT - Diploma in Computer Technology from Adhiparasakthi Polytechnic, Tamilnadu, India in 2000.

Publications
International Journals
  1. Venkatesan S., Vladimir A. Oleshchuk, Chellappan C., and Sourabh Prakash (2016), "Analysis of Key Management Protocols for Social Networks", International Journal of Social Network Analysis and Mining, Vol.6, No.1, Article.3.Springer.
  2. Venkatesan S., Baskaran R., Chellappan C., Anurika Vaish and Dhavachelvan P.(2013), "Artificial Immune System based Mobile Agent Platform Protection", International Journal on Computer Standard and Interfaces,Elsevier Standards, Vol.35, No.4,pp.365-373.
  3. Venkatesan S., Saleem Basha M.S., Chellappan C., Anurika Vaish and Dhavachelvan.P (2013), " Analysis of accounting models to detect duplicate request in Web Service", Journal of King Saud University - Computer and Information Sciences,Elsevier Standards, Vol.25, No.1,pp.7-24.
  4. Venkatesan S., Chellappan C., Vengattaraman C., Dhavachelvan P. and Anurika Vaish (2010), 'Advanced Mobile Agent Security Models for Code Integrity and Malicious Availability Check', International Journal of Computer and Network Applications,Elsevier Standards, Vol No.33, pp.661-671.
  5. Venkatesan S., Chellappan C. and Dhavachelvan P.(2010), 'Performance analysis of mobile agent failure recovery in E-Service applications', International Journal on Computer Standard and Interfaces, Elsevier Standards, Vol.32,No.1-2,pp.38-43.
  6. Venkatesan S. and Chellappan C. (2009), 'Free Roaming Mobile Agent (FRoMA) Protection against Multiple Attacks', International Journal on Communication Networks and Distributed Systems, Inderscience Publishers, Vol. 3, No. 4, pp. 362-383.
  7. Venkatesan S. and Chellappan C. (2009), 'Generating Routing Table of Free-Roaming Mobile Agent (FRoMA) in Distributed Environment', International Journal on Computer standard and Interfaces, Elsevier Standards, Vol. 31, No. 2, pp. 428-436.
  8. Venkatesan S. and Chellappan C. (2008), 'Inaugurating Free-Roaming Mobile Agent (FRoMA) Based Secured e-Health Model', eHealth International Journal, Vol. 4, No. 1, pp. 14-19.
International Conferences
  1. Akansha Pandey, Ezhil S.Kalaimannan and Venkatesan.S (2015), 'An Information Diffusion Model to analyse the behavior of Online Social Network based Malwares', Proceedings of The 2015 International Conference on Computational Science and Computational Intelligence, Las Vegas, USA, pp.867-868.
  2. Preeti Yadav, Savita Gupta and Venkatesan.S (2014), 'Trust model for Privacy in Social Networking using Probablistic Determination', Proceedings of 4th International Conference on Recent Trends in Information Technology (ICRTIT 2014),Madras Institute of Technology, Anna University, Chennai. (Best Paper Award).
  3. Ragini, Parul Mehrotra and Venkatesan.S (2014), 'An efficient model for Privacy and Security in Mobile Cloud Computing',Proceedings of the 4th International Conference on Recent Trends in Information Technology (ICRTIT 2014), Madras Institute of Technology, Anna University, Chennai.
  4. Venkatesan S. and Abhishek Vaish. (2011), 'Multi-Agent based Dynamic Data Integrity protection in cloud computing', Proceedings of the International Conference on Advances in Communication, Network, and Computing- CNC 2011,Bangalore,Volume 142, part 1, pp. 76-82.
  5. Venkatesan S. and Chellappan C. (2008), 'Identifying the Split Personality of the Malicious Host in the Mobile Agent Environment', Proceedings of the 2008 IEEE International Conference on Intelligent Systems, Bulgaria, pp. 14-40 to 14-44.
  6. Venkatesan S. and Chellappan C. (2008), 'Protection of Mobile Agent Platform through Attack Identification Scanner (AIS) by Malicious Identification Police (MIP)', Proceedings of the IEEE International Conference on Emerging Trends in Engineering and Technology, (ICETET'2008), India, pp. 1228-1231.
  7. Venkatesan S. and Chellappan C. (2008), 'Protection of Malicious Host to Host Attack in the Free Roaming Mobile Agent (FRoMA) Environment', Proceedings of the ACM International Conference on Advances in Computing (ICAC 2008), India, pp. 1-4.
  8. Venkatesan S. and Chellappan C. (2007), 'Performance of Protecting Free Roaming Mobile agent against Multiple Colluded Attacks', Proceedings of the IEEE International Conference on Advances in Computer Vision and Information Technology(ACVIT'07), India, pp. 16-24.
  9. Venkatesan S. and Chellappan C. (2007), 'Protecting Free Roaming Mobile Agent against Multiple Colluded Truncation Attacks', ACM Proceedings of International Conference on Mobile Multimedia Communication(MobiMedia'07), Greece, pp. 293-297.
  10. Venkatesan S. and Chellappan C. (2007), 'Recovery model for Free Roaming Mobile Agent against Multiple Attacks', ACM Proceedings of International Conference on Mobile Multimedia Communication (MobiMedia'07), Greece, pp. 275-279.
  11. Venkatesan S. and Kalaivany A.N. (2006), 'Autonomous Scattered Firewall', Proceedings of 1st International Conference on Intelligent System and Control(ISCO'06), Coimbatore, India.
Book Chapters
  1. Venkatesan S. Chellappan C. Dhavachelvan P.(2012), 'Recovery of Ubiquitous Multimedia Content Discovery Mobile Agent', published in the book named Ubiquitous Multimedia and Mobile Agents: Models and Implementations, Editor: Susmit Bagchi IGI Global Publishing Service, USA.pp.215-231.
  2. Venkatesan S. Chellappan C. Anurika Vaish (2012), 'Mobile Agent based Multimedia Content Discovery', published in the book named Ubiquitous Multimedia and Mobile Agents: Models and Implementations, Editor: Susmit Bagchi, IGI Global Publishing Service, USA. pp.135-147.

Invited Talks
  1. Title: Vulnerabilities in Network Protocols
    TEQIP-II Sponsored National Workshop On Advanced VLSI, Signal processing and Communication network (AVSC-2014), MNNIT, Allahabad, 2014.
  2. Title: Security Vulnerabilities in the Network Protocols,Improved services and Bitcoin Technique
    Five Days National Workshop on Emerging Trends in Communication & Information Technology (COMMIT'17), SHUATS, Allahabad, Jan-Feb 2017.
  3. Title: Blockchain: Goethereum Implementation Perspective
    Invited Talk at Department of Computer Science and Engineering, IIT-Kanpur, 11th March 2017.
  4. Title: Blockchain: Goethereum Implementation Perspective
    Invited Talk at IEEE Computer Society of India Symposium, IIIT - Allahabad, 18th March 2017.

Experience
  1. Research: 2.2 Years in Collaborative Directed Basic research on Smart and Secure Environment (SSE) project funded by National Technical Research Organization (NTRO), New Delhi as Research/Scientific Associate.
  2. Teaching: 9 Years.

Software Development
  1. Digital Display Content Copying Protection for Smart and Secure Environment project funded by National Technical Research Organization, New Delhi
  2. Online Examination System for Smart and Secure Environment project funded by National Technical Research Organization, New Delhi.
  3. Elective and Project Registration Portal for IIIT-Allahabad students.
  4. Online Program (C, C++, Java, Python and Perl) evaluation tool.
Courses Teaching

      Course Site

Research Interest
  1. Mobile Agent Security
  2. Cryptography
  3. Blockchain
  4. Cloud Computing and Social Network Privacy
Research Team
  1. Mr. Saurabh Prakash
    Research Scholar
    Research Area: Privacy preservation in cloud stored data
  2. Mrs.Jaya Singh
    Research Scholar
    Research Area: Big Data Security
  3. Ms.Sumouli
    M.Tech (IS)[2015]
    Thesis Title: Lattice based Fully Homomorphic Public Key Cryptosystem on Smaller Key [completed]
Professional Membership
  1. Institute of Electrical and Electronics Engineers (IEEE)
  2. Association for Computing Machinery (ACM)
  3. Cryptology Research Society of India (CRSI)
Project
  1. Institute one time seed money
    Electronic Medical Record Management System using Blockchain Technology
    Approximate Cost: Rs.10 lakhs
Papers Reviewed in
  1. IEEE transaction on System, Man and Cybernetics: Part C.
  2. International Journal of Network and Applications (Elsevier).
  3. International Journal of Applied Mathematics and Computation (Elsevier).
  4. International Journal on NETNOMICS: Economic Research and Electronic Networking (Springer).
IIIT-A HOME

Greetings and Thanks to my Parents, Professors and Friends