Dr. Divyakant T Meva
Gujarat Technological University, MCA, Faculty Member
- Biometrics, Computer Science, Information Technology, Network Security, Steganography, Fingerprint Recognition, and 17 morePrivacy, WSN (Wireless sensor network), Image Processing, Cloud Computing, Pattern Recognition, Digital Image Processing, Face Recognition, Fingerprint Matching, Face Detection, Minutiae Matching, Comparative Testing, Core Point, Face Recognition Toolbox, Face Recognition Demo, Artificial Intelligence, Data Mining, and Computer Visionedit
- I am research oriented person and want to work with people who can share their knowledge and experience.edit
Internet users and its usage have grown almost exponentially during last decade. Most of the web applications contain both private(sensitive) and public information in theircorresponding database that brings the security of private... more
Internet users and its usage have grown almost exponentially during last decade. Most of the web applications contain both private(sensitive) and public information in theircorresponding database that brings the security of private information on the forefront of the challenge of this domain. Cyber criminals can attempt to stealor tamperwith private information from these insecure or vulnerable web applications by exploiting. In this paper, we have analyzed different approaches of web application security used in current practices since their development such as secure coding, Web Application firewall, vulnerability assessment and penetration testing. In addition, we have also discussed various approachesand repositories which support vulnerability assessment and penetration testing processes.
Research Interests:
Blockchain is one of the latest trends in Information Technology domain. It has changed a way of thinking for IT professional. Companies are focusing on implementation of blockchain with their services to ensure security and reliability.... more
Blockchain is one of the latest trends in Information Technology domain. It has changed a way of thinking for IT professional. Companies are focusing on implementation of blockchain with their services to ensure security and reliability. Still they are facing challenges and issues for development and implementation of blockchain based services. This paper discusses those issues and challenges to be considered in development and implementation.
Research Interests:
With the increased usage of cloud computing, there is a need to address the security issues also. No. of techniques have been proposed and is there in use. Still there are few problems related to authentication in cloud environment. This... more
With the increased usage of cloud computing, there is a need to address the security issues also. No. of techniques have been proposed and is there in use. Still there are few problems related to authentication in cloud environment. This paper throws a light on such problems and their solution with the use of Biometric techniques. I. INTRODUCTION In the era of internet, it is required to maintain security of the resources as well as transaction of data online. In the current era of internet, we are still using password authentication mechanism for authentication and authorization of the user. But it is required to have more robust and more secure mechanism. Another problem with password mechanism is to remember many accounts on the internet and also remembering password of each. Instead of that we can go for biometric authentication for internet user authentication services. Till this date, biometric services are being used for personal verification in organizations as server based or standalone systems. But in the emerging era of cloud computing, it needs to be implemented, so that we can have more processing capabilities with increasing number of users and more system storage capabilities and can maintain unique identity of the users. If we consider the example of UID – Aadhaar card, behind which the objective is to maintain single identity proof of the Indian national, they also require to store fingerprints data of all the users as well as facial database. The same database can be used by different authorities of Indian Government for various legal purposes.
Research Interests:
Managing the location information is the most important aspect in Cellular Networks. This is even more important when the user is in moving condition (mobile). In today's world with the invention of latest mobile devices, the mobile... more
Managing the location information is the most important aspect in Cellular Networks. This is even more important when the user is in moving condition (mobile). In today's world with the invention of latest mobile devices, the mobile device is not just a medium for communication but it is a replacement of the whole office. A person can read / write mails, do social networking, merchant transactions and a lot more through mobile devices. To handle all this tasks effective Location management in cellular communication is 100% needed. If the location of the user is not known then it will be difficult to perform call / sms / mobile data / other transactions with the cellular phone. Study of various location update strategies also covered in this paper. Algorithm for finding best location update strategy among all available strategies. Algorithm and simulation results given for Dynamic Time Based Location Update Strategy.
Research Interests:
The term cloud computing is a relatively recent vintage. In the year of 2008, this term came in popularity. Since then, this term has emerged a lot within short span of time. As it is known fact of IT industry that every emerging... more
The term cloud computing is a relatively recent vintage. In the year of 2008, this term came in popularity. Since
then, this term has emerged a lot within short span of time. As it is known fact of IT industry that every emerging
technology brings some issues and challenges, this is also true for Cloud Computing Environment. In this paper,
authors have tried to throw some light on above said topic especially on SaaS.
then, this term has emerged a lot within short span of time. As it is known fact of IT industry that every emerging
technology brings some issues and challenges, this is also true for Cloud Computing Environment. In this paper,
authors have tried to throw some light on above said topic especially on SaaS.
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Biometrics is becoming necessity for security issues in Information Technology trend. Authentication and authorization purposes can be served efficiently and effectively with biometric techniques. But sometimes unimodal biometric systems... more
Biometrics is becoming necessity for security issues in Information Technology trend. Authentication and authorization purposes can be served efficiently and effectively with biometric techniques. But sometimes unimodal biometric systems (systems using one biometric trait) may not serve purpose because of various reasons. Mutibiometric systems resolve the issues which cannot be addressed using unimodal biometric systems. The author has presented comparison of various multibiometric systems in this paper.