Indian Institute of Information Technology,Allahabad
(An Institute of National Importance by Act of Parliament)
A Centre of Excellence in Information Technology, Established by Ministry of Education, Govt. of India.
Deoghat, Jhalwa, Allahabad-211012 (U.P.)

S.VENKATESAN (In Tamil: சு.வெங்கடேசன்)

Take the pain and spread the happiness - Mahatma Gandhi
Resources:
1. Developed a simple MCQ Conduction and Evaluation web portal to support the online evaluation in this ongoing Covid'19 Pandemic. It has features such as random questions, random choices, more than one answer support, any number of choices support, option to remove the question after test, re-evaluate the question with new answer after the exam, etc. Interested can write to venkat@iiita.ac.in for free service and source code for educational purpose.
2. Web and Network Security practice manual for teaching purpose [Table of Contents]. Interested can write to me for the manual.
3. TrustSim: A trust and reputation model evaluation simulator. For more information and download code, please Visit.
Designation and Address      Associate Professor
     Department of Information Technology
     Room Number : 4304
     Computer Centre - 2(CC-2)
     Indian Institute of Information Technology, Allahabad
     Deoghat, Jhalwa, Allahabad-211012 (U.P.)
     Ph. : + 91 532 2922138
     E-Mail : ,
     Associated with : Network Security & Cryptography (NSC) Lab

Education
  • Ph.D. - Mobile Agent Security from Department of Computer Science and Engineering at Anna University, Chennai,Tamilnadu, India in Feb. 2010. Thesis Advisor: Prof.C.Chellappan
  • M.Tech. - Computer Science and Engineering from Bharath Institute of Higher Education and Research University,Chennai, Tamilnadu, India in 2005.
  • B.Tech. - Computer Science and Engineering from Sri Manakula Vinayagar Engineering College affiliated with Pondicherry University, Pondicherry, India in 2003.
  • DCT - Diploma in Computer Technology from Adhiparasakthi Polytechnic, Tamilnadu, India in 2000.

Publications
International Journals
  1. Venkatesan Subramanian, Kalaivany Karthikeyan and Pallapa Venkataram (2022), "A Concept Map based Teaching of Compiler Design for Undergraduate Students", published in EAI Endorsed Transactions on e-Learning, Vol.8, No.1.
  2. Nitish Andola, Sourabh Prakash, Vijay Kumar Yadav, Raghav, S. Venkatesan and Shekhar Verma (2022), "A Secure Searchable Encryption Scheme for Cloud using Hash based Indexing", Journal of Computer and System Sciences, Vol,126, pp. 119-137,Elsevier.
  3. Jaya Singh, Ayush Sinha, Priyanka Goli, Venkatesan Subramanian, Sandeep Kumar Shukla and Om Prakash Vyas (2021), "Insider Attack Mitigation in a Smart Metering Infrastructure using Reputation Score and Blockchain Technology", International Journal of Information Security, Springer.
  4. Venkatesan S., Vladimir A. Oleshchuk, Chellappan C., and Sourabh Prakash (2016), "Analysis of Key Management Protocols for Social Networks", International Journal of Social Network Analysis and Mining, Vol.6, No.1, Article.3.Springer.
  5. Venkatesan S., Baskaran R., Chellappan C., Anurika Vaish and Dhavachelvan P.(2013), "Artificial Immune System based Mobile Agent Platform Protection", International Journal on Computer Standard and Interfaces, Elsevier Standards, Vol.35, No.4,pp.365-373.
  6. Venkatesan S., Saleem Basha M.S., Chellappan C., Anurika Vaish and Dhavachelvan.P (2013), " Analysis of accounting models to detect duplicate request in Web Service", Journal of King Saud University - Computer and Information Sciences, Elsevier Standards, Vol.25, No.1,pp.7-24.
  7. Venkatesan S., Chellappan C., Vengattaraman C., Dhavachelvan P. and Anurika Vaish (2010), 'Advanced Mobile Agent Security Models for Code Integrity and Malicious Availability Check', International Journal of Computer and Network Applications,Elsevier Standards, Vol No.33, pp.661-671.
  8. Venkatesan S., Chellappan C. and Dhavachelvan P.(2010), 'Performance analysis of mobile agent failure recovery in E-Service applications', International Journal on Computer Standard and Interfaces, Elsevier Standards, Vol.32,No.1-2,pp.38-43.
  9. Venkatesan S. and Chellappan C. (2009), 'Free Roaming Mobile Agent (FRoMA) Protection against Multiple Attacks', International Journal on Communication Networks and Distributed Systems, Inderscience Publishers, Vol. 3, No. 4, pp. 362-383.
  10. Venkatesan S. and Chellappan C. (2009), 'Generating Routing Table of Free-Roaming Mobile Agent in Distributed Environment', International Journal on Computer standard and Interfaces, Elsevier Standards, Vol. 31, No. 2, pp. 428-436.
  11. Venkatesan S. and Chellappan C. (2008), 'Inaugurating Free-Roaming Mobile Agent (FRoMA) Based Secured e-Health Model', eHealth International Journal, Vol. 4, No. 1, pp. 14-19.
International Conferences
  1. S. Venkatesan, Sandeep Kumar Shukla and Yuvaraj Rajendra (2022), 'TrustSim: A Decentralized Reputation and Trust Model Simulator' accepted to publish in the Fourth International Conference on Blockchain Computing and Applications (BCCA 2022).
  2. Yuvaraj Rajendra, Sachin Sahu, Venkatesan Subramanian and Sandeep Kumar Shukla (2021), 'A Storage Efficient Blockchain Model for Constrained Applications', published in the proceedings of The Third IEEE International Conference on Blockchain Computing and Applications (BCCA2021), Tartu, Estonia, pp. 73-80. [Online]
  3. Venkatesan Subramanian, Yuvaraj Rajendra, Shubham Sahai and Sandeep Kumar Shukla (2020), 'Decentralized Device Authentication Model Using the Trust Score and Blockchain Technology for Dynamic Networks' published in the proceedings of the 3rd IEEE Blockchain Conference, Greece. [Online]
  4. Venkatesan S et al. (2019), 'Simplification of Compiler Design Course Teaching using Concept Maps', Proceedings of 7th International Conference on Information Technology in Education (ICITE 2019), Sydney, Australia, pp.91-102.
  5. Akansha Pandey, Ezhil S.Kalaimannan and Venkatesan.S (2015), 'An Information Diffusion Model to analyse the behavior of Online Social Network based Malwares', Proceedings of The 2015 International Conference on Computational Science and Computational Intelligence, Las Vegas, USA, pp.867-868.
  6. Preeti Yadav, Savita Gupta and Venkatesan.S (2014), 'Trust model for Privacy in Social Networking using Probablistic Determination', Proceedings of 4th International Conference on Recent Trends in Information Technology (ICRTIT 2014),Madras Institute of Technology, Anna University, Chennai. (Best Paper Award).
  7. Ragini, Parul Mehrotra and Venkatesan.S (2014), 'An efficient model for Privacy and Security in Mobile Cloud Computing',Proceedings of the 4th International Conference on Recent Trends in Information Technology (ICRTIT 2014), Madras Institute of Technology, Anna University, Chennai.
  8. Venkatesan S. and Abhishek Vaish. (2011), 'Multi-Agent based Dynamic Data Integrity protection in cloud computing', Proceedings of the International Conference on Advances in Communication, Network, and Computing- CNC 2011,Bangalore,Volume 142, part 1, pp. 76-82.
  9. Venkatesan S. and Chellappan C. (2008), 'Identifying the Split Personality of the Malicious Host in the Mobile Agent Environment', Proceedings of the 2008 IEEE International Conference on Intelligent Systems, Bulgaria, pp. 14-40 to 14-44.
  10. Venkatesan S. and Chellappan C. (2008), 'Protection of Mobile Agent Platform through Attack Identification Scanner (AIS) by Malicious Identification Police (MIP)', Proceedings of the IEEE International Conference on Emerging Trends in Engineering and Technology, (ICETET'2008), India, pp. 1228-1231.
  11. Venkatesan S. and Chellappan C. (2008), 'Protection of Malicious Host to Host Attack in the Free Roaming Mobile Agent (FRoMA) Environment', Proceedings of the ACM International Conference on Advances in Computing (ICAC 2008), India, pp. 1-4.
  12. Venkatesan S. and Chellappan C. (2007), 'Performance of Protecting Free Roaming Mobile agent against Multiple Colluded Attacks', Proceedings of the IEEE International Conference on Advances in Computer Vision and Information Technology(ACVIT'07), India, pp. 16-24.
  13. Venkatesan S. and Chellappan C. (2007), 'Protecting Free Roaming Mobile Agent against Multiple Colluded Truncation Attacks', ACM Proceedings of International Conference on Mobile Multimedia Communication(MobiMedia'07), Greece, pp. 293-297.
  14. Venkatesan S. and Chellappan C. (2007), 'Recovery model for Free Roaming Mobile Agent against Multiple Attacks', ACM Proceedings of International Conference on Mobile Multimedia Communication (MobiMedia'07), Greece, pp. 275-279.
  15. Venkatesan S. and Kalaivany A.N. (2006), 'Autonomous Scattered Firewall', Proceedings of 1st International Conference on Intelligent System and Control(ISCO'06), Coimbatore, India.
Book Chapters
  1. Venkatesan Subramanian, Shubham Sahai, Sandeep Kumar Shukla and Jaya Singh, 'Secure and Decentralized Management of Health Records' is accepted to publish in the Edited Book entitled 'Applications of Blockchain in Healthcare'. This Edited Book will be published in the book series of Springer entitled 'Studies in Big Data'.
  2. Venkatesan S. Chellappan C. Dhavachelvan P.(2012), 'Recovery of Ubiquitous Multimedia Content Discovery Mobile Agent', published in the book named Ubiquitous Multimedia and Mobile Agents: Models and Implementations, Editor: Susmit Bagchi IGI Global Publishing Service, USA.pp.215-231.
  3. Venkatesan S. Chellappan C. Anurika Vaish (2012), 'Mobile Agent based Multimedia Content Discovery', published in the book named Ubiquitous Multimedia and Mobile Agents: Models and Implementations, Editor: Susmit Bagchi, IGI Global Publishing Service, USA. pp.135-147.
Workshop
  1. S.Venkatesan, Shubham Sahai Srivastava and Sandeep Kumar Shukla (2017), "Decentralized Authentication for IoT Devices using the Blockchain", accepted to present in the 2nd Advanced Workshop on Blockchain: Technology, Applications, Challenges, organized by ISRDC, IIT Bombay, India.

Invited Talks
  1. Title: Vulnerabilities in Network Protocols
    TEQIP-II Sponsored National Workshop On Advanced VLSI, Signal processing and Communication network (AVSC-2014), MNNIT, Allahabad, 2014.
  2. Title: Security Vulnerabilities in the Network Protocols,Improved services and Bitcoin Technique
    Five Days National Workshop on Emerging Trends in Communication & Information Technology (COMMIT'17), SHUATS, Allahabad, Jan-Feb 2017.
  3. Title: Blockchain: Goethereum Implementation Perspective
    Invited Talk at Department of Computer Science and Engineering, IIT-Kanpur, 11th March 2017.
  4. Title: Blockchain: Goethereum Implementation Perspective
    Invited Talk at IEEE Computer Society of India Symposium, IIIT - Allahabad, 18th March 2017.
  5. Title: Blockchain and its Applications
    Invited Talk at Webinar-20, Series-22 organized by Computer Society of India, Allahabad Chapter, 13th September 2020.
  6. Title: Secure eHealth Record Management System using the Blockchain Technology
    Research and Invited Talk at DST-UKIERI Virtual workshop on Adversarial Cyber Security, Jointly organized by Indian Institute of Technology (IIT) Mandi, in collaboration with London Metropolitan University and Centre for Multidisciplinary Innovation and Collaboration (C-MRiC), 24th September 2020.
  7. Title: Cyber Security: Attack Surface, Trends and Expansion
    Invited Talk at IEEE UP Section Webinar Series, 18th July 2021.
  8. Title: Cyber Security and Blockchain
    Talk in AICTE ATAL FDP on Cyber Security for Internet of Things organized by PDPM Indian Institute of Information Technology, Design & Manufacturing (IIITDM) Jabalpur, 25th June 2021.
  9. Title: Blockchain for Smart Metering Infrastructure
    Talk in AICTE ATAL FDP on IoT Applications with Blockchain Techniques organized by National Institute of Technology Meghalaya, India, 19th July 2021.
  10. Titles: "Introduction to Blockchain", "IOTA", "Decentralized Authentication Scheme Using Blockchain Technology", "Storage Constraint Free Blockchain", "Security Risk in Machine Learning"
    Talk in the Hetergeneous Data Analytics Applications with Special Reference to Deep Learning Models and Blockchain Technologies for Applications in Digital Mobility jointly organized by IIIT Allahabad and Hof University of Applied Sciences. Venue: Hof University of Applied Sciences, Hof, Germany, 04th to 07th July 2022.

Experience
  1. Research: 2.2 Years in Collaborative Directed Basic research on Smart and Secure Environment (SSE) project funded by National Technical Research Organization (NTRO), New Delhi as Research/Scientific Associate.
  2. Teaching: 13 Years.

Software Development
  1. Digital Display Content Copying Protection for Smart and Secure Environment project funded by National Technical Research Organization, New Delhi
  2. Online Examination System for Smart and Secure Environment project funded by National Technical Research Organization, New Delhi.
  3. Elective and Project Registration Portal for IIIT-Allahabad students.
  4. Online Program (C, C++, Java, Python and Perl) evaluation tool.
  5. MCQ Conduction and Evaluation web portal to support the online evaluation.

Research Tool/Simulators
  1. TrustSim: A Decentralized Reputation and Trust Model Simulator
Courses Teaching

      Course Site

Research Interest
  1. Mobile Agent Security
  2. Applied Cryptography
  3. Blockchain
  4. Cloud Computing and Social Network Privacy
Research Team
  1. Dr. Saurabh Prakash
    PhD
    Thesis Title: A Privacy Preserving Framework for Data Storage and Retrieval on the Cloud [Completed]
  2. Mrs.Jaya Singh
    Research Scholar
    Research Area: Big Data Security
  3. Mr. Yuvaraj Rajendra
    M.Tech - PhD
    Research Area: Decentralized Dynamic Network
Professional Membership
  1. Institute of Electrical and Electronics Engineers (IEEE)
  2. Association for Computing Machinery (ACM)
  3. Cryptology Research Society of India (CRSI)
Project
  1. Institute one time seed money
    Electronic Medical Record Management System using Blockchain Technology
    Cost: Approximate Rs.10 lakhs
    Role: Principal Investigator
    Duration : 1 year [From May 2017]
    Status: Completed.
  2. Department of Science & Technology - ICPS
    Development of Secure IoT Communication using the Blockchain Technology
    Recommended Cost: ~Rs.36 lakhs
    Role: Principal Investigator
    Duration: 3 years from August 2019
  3. Department of Science & Technology - Indo-Norway Collobarative Project
    Cyber-Physical Security in Energy Infrastructure of Smart Cities (CPSEC)
    Recommended Cost: Approximate Rs.36 lakhs
    Role: Co-PI
    Duration: 3 Years from October 2018.
  4. DST-C3i Hub, IIT Kanpur
    IoT Security Project - Development of Security Audit Framework for Secure IoT Network
    Recommended Cost: Approximate Rs.274.25 lakhs
    Role: PI
    Duration: 5 Years from March 2021.
Papers Reviewed in
  1. IEEE transaction on System, Man and Cybernetics: Part C.
  2. International Journal of Network and Applications (Elsevier).
  3. International Journal of Applied Mathematics and Computation (Elsevier).
  4. International Journal on NETNOMICS: Economic Research and Electronic Networking (Springer).
Recognition
  1. Associate Fellow, C3iHub, IIT Kanpur [For the period 2022-2023].
IIIT-A HOME

Greetings and Thanks to my Parents, Professors and Friends