Academic Positions

  • Present 2012

    Director and Professor (CSE), Founder Director Microsoft Innovation Centre

    Sri Aurobindo Institute of Technology, Indore, MP

  • 2013 2012

    Visiting Faculty

    Indian Institute of Technology , Indore

  • 2012 2006

    Professor and Dean (R&D)

    Acropolis Institute of Technology and Research, Indore

  • 2006 2004

    Assistant Professor (Reader) and Head (CSE)

    Medicaps Institute of Technology and Management, Indore

  • 2004 1997

    Assistant Professor (Reader)

    Maharaja Ranjeet Singh College, Indore

  • 2000 1997

    Visiting Faculty

    DAVV , Indore

  • 1997 1995

    Assistant Professor

    M.B. Khalsa College, Indore

  • 1995 1990

    Assistant Professor

    I.K.D.C, Indore

Education & Training

  • Ph.D.

    Ph.D. in Computer Engineering

    Devi Ahilya Vishwavidyalaya, Indore

  • M.Tech

    Master of Technology

    Devi Ahilya Vishwavidyalaya, Indore

  • B.C.Ed.

    Batchalor of Computer Education

    Devi Ahilya Vishwavidyalaya, Indore

  • M.Sc.

    Master Of Science(Higher Maths)

    S.N College, Sager University, Khandwa

Honors, Awards and Grants

  • 2015
    Editor for Springer Advances in Intelligent Systems and Computing, Proceedings of the ICICT 2015
  • 2015-2017
    Member Bureau of Indian Standard (BIS) Govt. of India – Information Security
  • 2014-2016
    National Chairman Computer Society of India, Division IV Communication
  • 2014-2017
    Chairman, ACM (Rjasthan and Madhya Pradesh)
  • 2010-2011
    Chairman IEEE Computer Society Chapter, Bombay Section
  • 2011-2013
    Chairman IEEE MP Subsection
  • 2008-2009
    Secretary IEEE MP-Subsection
  • 2010-2011
    Vice Chairman cum Chairman Elect CSI, Indore Chapter, India
  • 2011-2012
    Chairman CSI Indore Chapter
  • 80285424
    SMIEEE (Senior Member of IEEE)

A survey on threats in routing security in manet for trust management using SMC protocols

D.K. Mishra, S. Joshi
Conference Papers Wireless and Optical Communications Networks (WOCN), 2012 Ninth International Conference on Date 20-22 Sept. 2012

Abstract

The Mobile ad hoc networks served as explanatory facts on various issues and challenges to learn threats in security of wireless data. This data is actually moves around various components of ad hoc network to perform various operations. The confliction comes when a data is associated with multiple components and reflects the different outputs inside the network. Then it vanish many legitimate operations and creates nuisance or misconduct with participating nodes. Trust overlay can describe respective policies to opt a node to communicate data inside a network. The applications of SMC protocols showed a great impact and useful derivations to compute the secure result at various levels. Further, the various frontiers of infrastructure less networks are in keen interest to serve better with minimal delay in transmission of packets. That means the probability of occurrences of packet drops can also be address with respect to various attacks and countermeasures. This work emphasizes on inside view in an ad hoc network to find and eliminate various security threats to rectify nuisance created by multi association of freely moving data.

Read More

Simulation of Collision Resistant Secure Sum Protocol

Samiksha Shukla, G. Sadashivappa, Durgesh Kumar Mishra
Journal PaperCryptography and Security

Abstract

secure multi-party computation is widely studied area in computer science. It is touching all most every aspect of human life. This paper demonstrates theoretical and experimental results of one of the secure multi-party computation protocols proposed by Shukla et al. implemented using visual C++. Data outflow probability is computed by changing parameters. At the end, time and space complexity is calculated using theoretical and experimental results.Read More

Secure Multiparty Computation: From Millionaires Problem to Anonymizer

Durgesh Kumar Mishra, Rashid Sheikh,Beerendra Kumarb
Journal Paper Information Security Journal: A Global Perspective Volume 20, Issue 1, 2011

Abstract

In Secure Multiparty Computation (SMC), multiple parties perform joint computation over their private data inputs preserving the privacy of their individual inputs. This type of computation needs to provide correct result while keeping the individual input a secret. In today's scenario of tremendous growth of the Internet and large volumes of online transactions, the concept of data privacy and SMC has become a matter of great concern. People frequently need to perform joint computations for the sake of their mutual benefits, but they are also worried about confidentiality of their private data. This situation arises due to lack of trust among computing parties. For example, two banks may want to find some details of a customer but each of the banks may want to keep their sensitive database a secret or they may not want to disclose the customer's identity. The subject of SMC has evolved from earlier solutions of combinational logic circuits to the recent proposals of anonymity-enabled computation. In this paper, we put together the significant research that has been carried out. We propose new possibilities of problem discovery and its analysis. We put critical issues and challenges and the level of adaptation achieved before the researchers. We also provide some research proposals based on the literature survey. Read More

Reliability Analysis for Wireless Sensor Networks Considering Environmental Parameters Using MATLAB

Nitika Vats Doohan, Durgesh Kumar Mishra, Sanjeev Tokekar
Journal Paper Journal of Consumer Psychology, Volume 22, Issue 2, April 2012, Pages 191-194

Abstract

Although a substantial amount of research has examined the constructs of warmth and competence, far less has examined how these constructs develop and what benefits may accrue when warmth and competence are cultivated. Yet there are positive consequences, both emotional and behavioral, that are likely to occur when brands hold perceptions of both. In this paper, we shed light on when and how warmth and competence are jointly promoted in brands, and why these reputations matter.Read More

A Secured MultiParty Computational Protocol to Protect Cyber Space

Durgesh Kumar Mishra , Manohar Chandwanib
Journal PaperInformation Security Journal: A Global Perspective

Abstract

In this paper, we show how our secured multiparty computation (SMC) protocols protect the data of an organization during the war from the cyberspace war when a large number of defense units interact with one another, while hiding the identity and computations done by them. SMC is a problem of information security when large organizations interact with one another for huge data sharing and data exchange. It is quite possible that during sharing and exchange, the private data also get hacked. In order to protect and secure the private data, the protocols of SMC need to be deployed in the large computer networks on which the organizations work. The protocols work at the micro-level in terms of cryptography with which the data are encrypted and then shared, while allowing the keys to be used for sharable data while also keeping the keys untouched for private data. At the macro level, multilevel architectures are used for different types of security to be achieved. The computation part of the secured multiparty computation is based on the algorithmic complexity theory. The algorithms realize the protocols in such a way that it is tedious to break (decrypt) the keys to hack the private data. Read More

Strategic Game theory models and commercialization for Nano RFID systems

Arpit Ludhiyani, Rohit Pathak, Satyadhar Joshi, Durgesh Kumar Mishra
Conference Papers Wireless And Optical Communications Networks (WOCN), 2010 Seventh International Conference On Date 6-8 Sept. 2010

Abstract

Nanotechnology enabled RFID (Radio Frequency Identification) has been introduced in recent years but issues regarding their reliability, commerciability and application still needs to be resolved. The current market of Nano RFID is still in embryonic state which will be growing in the upcoming years if these issues are addressed. This paper explores the details of the commerciability of the Nano RFID System for various industrial applications. The formulation for Time for market and Game theoretical approach is modeled for Nano RFID systems. Nano RFID will be a very important tool and its application in Food, Bio and Banking explorations has been proposed in recent years which can be implemented using this proposal. Commercialization of Nano RFID system also depends on the knowledge and implementation of aspects such as device reliability of MEMS antenna and transponders. This idea has been derived from the earlier research done in MEMS reliability, multi scale modeling and modeling using HPC of the setup. Read More

Changing Neighbors k Secure Sum Protocol for Secure Multi Party Computation

Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra
Journal PaperCryptography and Security

Abstract

Secure sum computation of private data inputs is an important component of Secure Multi party Computation (SMC).In this paper we provide a protocol to compute the sum of individual data inputs with zero probability of data leakage. In our proposed protocol we break input of each party into number of segments and change the arrangement of the parties such that in each round of the computation the neighbors are changed. In this protocol it becomes impossible for semi honest parties to know the private data of some other party.

A Modified ck-Secure Sum Protocol for Multi-Party Computation

Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra
Journal Paper Cryptography and Security

Abstract

Secure Multi-Party Computation (SMC) allows multiple parties to compute some function of their inputs without disclosing the actual inputs to one another. Secure sum computation is an easily understood example and the component of the various SMC solutions. Secure sum computation allows parties to compute the sum of their individual inputs without disclosing the inputs to one another. In this paper, we propose a modified version of our ck-Secure Sum protocol with more security when a group of the computing parties conspire to know the data of some party.Read More

A Distributed k-Secure Sum Protocol for Secure Multi-Party Computations

Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra
Journal PaperCryptography and Security

Abstract

Secure sum computation of private data inputs is an interesting example of Secure Multiparty Computation (SMC) which has attracted many researchers to devise secure protocols with lower probability of data leakage. In this paper, we provide a novel protocol to compute the sum of individual data inputs with zero probability of data leakage when two neighbor parties collude to know the data of a middle party. We break the data block of each party into number of segments and redistribute the segments among parties before the computation. These entire steps create a scenario in which it becomes impossible for semi honest parties to know the private data of some other party.Read More

Classification Rule Mining for Object Oriented Databases: A Brief Review

Ajita Satheesh, Durgesh Kumar Mishra, Ravindra Patel
Journal PaperComputational Intelligence, Communication Systems and Networks, International Conference on (2009)

Abstract

Data mining is the discovery of knowledge and useful information from the data stored in large databases. The classification of large data sets is an important problem in data mining. Most data mining algorithms cannot be applied to complex object databases unless it is converted into a single flat table. Much valuable information especially the linkages between objects could be lost by conversion of such databases into a single table. As object-oriented data models embody rich data structures and semantics in the construction of complex databases, such as complex data objects, class hierarchies, property inheritance and methods, etc. So it is important to extend the area of study from relational database systems to object-oriented database systems and investigate the mechanisms for knowledge discovery in object-oriented databases. This paper presents a brief review of some of the significant researches available in the literature for object-oriented data mining. Read More

A Secure Multi-Party Computation Protocol for Malicious Computation Prevention for preserving privacy during Data Mining

Durgesh Kumar Mishra, Neha Koria, Nikhil Kapoor, Ravish Bahety
Journal PaperCryptography and Security

Abstract

Secure Multi-Party Computation (SMC) allows parties with similar background to compute results upon their private data, minimizing the threat of disclosure. The exponential increase in sensitive data that needs to be passed upon networked computers and the stupendous growth of internet has precipitated vast opportunities for cooperative computation, where parties come together to facilitate computations and draw out conclusions that are mutually beneficial; at the same time aspiring to keep their private data secure. These computations are generally required to be done between competitors, who are obviously weary of each-others intentions. SMC caters not only to the needs of such parties but also provides plausible solutions to individual organizations for problems like privacy-preserving database query, privacy-preserving scientific computations, privacy-preserving intrusion detection and privacy-preserving data mining. This paper is an extension to a previously proposed protocol Encrytpo_Random, which presented a plain sailing yet effective approach to SMC and also put forward an aptly crafted architecture, whereby such an efficient protocol, involving the parties that have come forward for joint-computations and the third party who undertakes such computations, can be developed. Through this extended work an attempt has been made to further strengthen the existing protocol thus paving the way for a more secure multi-party computational process. Read More

Privacy Preserving k Secure Sum Protocol

Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra
Journal PaperCryptography and Security

Abstract

Secure Multiparty Computation (SMC) allows parties to know the result of cooperative computation while preserving privacy of individual data. Secure sum computation is an important application of SMC. In our proposed protocols parties are allowed to compute the sum while keeping their individual data secret with increased computation complexity for hacking individual data. In this paper the data of individual party is broken into a fixed number of segments. For increasing the complexity we have used the randomization technique with segmentation. Read More

Multi-Agent Model using Secure Multi-Party Computing in e-Governance

Durgesh Kumar Mishra, Samiksha Shukla
Journal Paper Multiagent Systems

Abstract

Information management and retrieval of all the citizen occurs in almost all the public service functions. Electronic Government system is an emerging trend in India through which efforts are made to strive maximum safety and security. Various solutions for this have been proposed like Shibboleth, Public Key Infrastructure, Smart Cards and Light Weight Directory Access Protocols. Still, none of these guarantee 100 percent security. Efforts are being made to provide common national identity solution to various diverse Government identity cards. In this paper, we discuss issues related to these solutions.


Conference Organized

  • 26-28 July2013

    IEEE Conference

    As conference General Chair, Organized an IEEE 10th International Conference on Wireless and Optical Communication Network, 26-28 July 2013 at Bhopal.

  • 20-22 Sep2012

    IEEE Conference

    As conference General Chair, Organized an IEEE 9th International Conference on Wireless and Optical Communication Network, 20-22 Sep 2012 at Indore in association with IIT Indore and SAIT Indore.

  • 5-7 Sep2012

    CSI Conference

    As conference Organizing Chair, Organized CSI 6th International Conference on Software Engineering, 5-7 Sep 2012 at Indore in association with IEEE and DAVV Indore.

  • 23-25 Nov2007

    IEEE Conference

    As conference Co-Chair, Organized an IEEE 3rd Asian Himalaya Conference on Internet 23-25 Nov 2012 at Kathmandu NEPAL in association Nepal Institute of Technology Nepal.

  • 09-10 Oct2012

    Conference

    As conference Convener, Organized an First National Conference on Technological Research in Electrical and Electronics, 09-10 Oct 2012 at SAIT Indore.

  • 26–29 Dec2008

    IEEE Conference

    As conference convener, Organizing an IEEE 4th International Conference on Wireless Communication & Sensor Network, on 26 – 29th Dec 2008. This conference is Jointly organized by Acropolis Institute of Technology and research, IIIT-Allahabad, IET-DAVV-Indore and IEEE MP-Subsection.

  • 23–24 Nov2009

    Conference

    As Program committee Chair, Organized a National Conference on Software Engineering and Information Security on 23rd – 24th November 2009 at Acropolis Institute of Technology and Research, Indore, MP, India.

  • 23–24 Dec2010

    Conference

    As Program committee Chair, Organized a National Conference on Software Engineering and Information Security on 23rd – 24th December 2010 at Acropolis Institute of Technology and Research, Indore, MP, India.

  • 6-7 July2009

    8th European Conference

    As Member of the program committee in 8th European Conference on Information Warfare and Security Military Academy, Lisbon & the University of Minho, Braga, Portugal. 6-7 July 2009

  • 24–28 May2010

    IEEE International conference

    As Member of the program committee in IEEE International conference ASM2010, at KotakinaBalu, Malaysia on 24th – 28th May 2010.

  • 24–28 May2010

    IEEE International conference

    As Member of the program committee in IEEE International conference ASM2010, at KotakinaBalu, Malaysia on 24th – 28th May 2010.

Workshop Organized

  • 14th June 2008

    IEEE Workshop

    A One day IEEE workshop on “Open Source and Application” is organized on 14th June 2008 Jointly by Acropolis Institute of Technology and Research-Indore, IET-DAVV-Indore and and IEEE MP-Subsection at International Institute Professional Studies DAVV Indore.

  • 8th Aug 2008

    IEEE Workshop

    A Two day IEEE Workshop on “Introduction to MATLAB and Simulink” on 7-8th Aug 2008 at Acropolis Institute of Technology and Research, Indore.

  • 20thNov 2008

    Ethical hacking

    Workshop on “Ethical hacking” by International Speaker “Ankit Fadia” on 20th Nov 2007 at Acropolis Institute of Technology and Research, Indore.

  • 8th Sep 2007

    Research Methodology

    Workshop on “Research Methodology” on 8th Sep 2007 at Acropolis Institute of Technology and Research, Indore.

  • 5-6 Dec 2008

    workshop

    Attended a workshop on E-Resource Management with INDEST-AICTE user meet in conjunction with Twenty fifth National Convention and conference of SIS (SIS 2008) on Role of the librarian in 21st century, Organized by Indian Institute of Management, Indore, 5-6 Dec 2008.

At My Office

You can find me at my office located at Sri Aurobindo Institute of Technology, SAIMS Campus, Indore-Ujjain Highway, Near MR-10 crossing, Indore, Madhya Pradesh 453111

I am at my office every day from 10:00 am to 05:00 pm

At Microsoft Innovation Center

You can find me at my Microsoft Innovation Center located at 4th floor Sri Aurobindo Institute of Technology, SAIMS Campus, Indore-Ujjain Highway, Near MR-10 crossing, Indore, Madhya Pradesh 453111

I am at my office every day from from 10:00 am to 05:00 pm