Piyush Harsh publications
Research Publications
Here are the list of papers that have already been published or have been accepted for publication:
Managing OVF applications under SLA constraints on Contrail Virtual Execution Platform
Yvon Jegou & Piyush Harsh & Roberto G. Cascella & Florian Dudouet & Christine Morin
DMTF SVM '12, Oct 26 2012, Las Vegas, USA.
Abstract
The move of users and organizations to Cloud computing will become possible when they will be able to exploit their own applications, applications and services provided by cloud providers as well as applications from third party providers in a trustful way on different cloud infrastructures. To reach this goal, standard application formats must be enabled on the cloud to avoid vendor-lockin, and guarantees concerning protection, performance and security supported.

This article describes the Contrail VEP component developed by the Contrail project. The VEP component is in charge of managing the whole life cycle of OVF distributed applications under Service Level Agreement rules on different infrastructure providers.
Using Open Standards for Interoperability - Issues, Solutions, and Challenges facing Cloud Computing
Piyush Harsh & Florian Dudouet & Roberto G. Cascella & Yvon Jegou & Christine Morin
DMTF SVM '12, Oct 26 2012, Las Vegas, USA.
Abstract
Virtualization offers several benefits for optimal resource utilization over traditional non-virtualized server farms. With improvements in internetworking technologies and increase in network bandwidth speeds, a new era of computing has been ushered in, that of grids and clouds. With several commercial cloud providers coming up, each with their own APIs, application description formats, and varying support for SLAs, vendor lock-in has become a serious issue for end users. This article attempts to describe the problem, issues, possible solutions and challenges in achieving cloud interoperability. These issues will be analyzed in the ambit of the European project Contrail that is trying to adopt open standards with available virtualization solutions to enhance users' trust in the clouds by attempting to prevent vendor lock-ins, supporting and enforcing SLAs together with adequate data protection for sensitive data.
Contrail: A reliable and trustworthy cloud platform
Roberto Cascella & Christine Morin & Piyush Harsh & Yvon Jegou
Proceedings of the 1st European Workshop on Dependable Cloud Computing, EWDCC '12, May 08-11 2012, Sibiu, Romania.
First few lines
The advent of cloud computing is a new opportunity for companies to rely on highly dynamic distributed infrastructures to offer services to their customers. While major companies might prefer to own the infrastructure to have full control on the data and applications, SMEs look with interest to cloud technology since they cannot afford the initial barrier cost to enter the market.
Contrail Virtual Execution Platform: Challenges in Being Part of a Large Federation
Piyush Harsh & Yvon Jegou & Roberto Cascella & Christina Morin
ServiceWave 2011, October 26 - 28 2011, Poznan Poland.
Abstract
Cloud computing is quickly defining the computing paradigm in the modern networked age. Users can run their large computations online using cloud services at a fraction of the cost compared to setting their own data centers. Clearly cloud computing offers many advantages, and yet many large organizations including governments, financial sector, and health care sector are reluctant
An Experimental Study and Analysis of Crowds Based Anonymity
Lokesh Kumar Bhoobalan & Piyush Harsh
ICOMP 2011, July 18 - 21 2011, Las Vegas USA.
Abstract
Crowds provides probable innocence in the face of large number of attackers. In this paper, we present the experimental results of the behavior of Crowds in a dense network. We begin by providing a brief description about Crowds followed by the experimental environment in which the simulations were carried out. We then present the results of our simulations and the inferences made out of them. We will also show that the obtained results match the predictions made by others.
Recovering from mDNS domain failures
Piyush Harsh & Richard Newman
ICOMP 2010, July 12 - 15 2010, Las Vegas USA.
Abstract
mDNS - a hierarchical multicast session directory service architecture, which has been recently submitted to IETF editorial board for publication under Best Current Practice (BCP) track, allows administrative domains to join the global hierarchy incrementally. The global structure dynamically adapts to the changing topology. This paper describes the various failure scenarios in the proposed IETF document and especially the scenario where a participating
Gray Networking - a step towards next generation computer networks
Piyush Harsh & Randy Chow & Richard Newman
ACM SIGAPP SAC 2010, March 22 - 26 2010, Crans-Montana Switzerland.
Abstract
Modern networks are very complex. It is highly desirable to reduce management complexity in next generation networks design. Researchers have been seeking inspiration in natural observations to help better manage the ever increasing complexity of modern networks. Bio-inspired and cognitive networks have shown tremendous promise towards better adapting networks to local stimuli intelligently, and to some extent without human intervention.
Mode Independent Session Directory Service Architecture
Piyush Harsh & Richard Newman
ACM SIGAPP SAC 2010, March 22 - 26 2010, Crans-Montana Switzerland.
Abstract
In this paper we describe architectural changes incorporated into mDNS (DNS aware Multicast Session Directory) that enable it to co-exist in both ASM and SSM multicast environments. mDNS is a distributed, global, scalable and hierarchical approach that allows multicast sessions to be searched based on multiple parameters including keywords,
Efficient Distributed Search for Multicast Session Keywords
Piyush Harsh & Richard Newman
ICOMP 2009, July 13 - 16 2009, Las Vegas USA.
Abstract
mDNS is a proposed DNS-aware, hierarchical, and scalable multicast session directory architecture that enables multicast session registration and makes them discoverable in real time. It supports domain-specific as well as global searches for candidate sessions. This paper improves mDNS global search algorithm and addresses various security and scalability concerns that
Using GeoSpatial session tagging for smart Multicast session discovery
Piyush Harsh & Richard Newman
ACM SIGAPP SAC 2009, March 8 - 12 2009, Honolulu - Hawaii USA.
Abstract
IP multicast is increasingly seen as efficient mode of live content distribution in the Internet to significantly large subscriber bases. Despite its numerous benefits over IP unicast, multicast has not seen widespread deployment over modern networks. Network complexity and session discovery issues have plagued IP multicast since its inception. The Internet research community is in general agreement to move over to SSM (Source Specific Multicast).

With IGMP v 3 (Internet Group Management Protocol) and SSM, the source discovery burden will rest with the end user. Channel discovery is one of the few stumbling blocks remaining to be solved for successful
mDNS - A Proposal for Hierarchical Multicast Session Directory Architecture
Piyush Harsh & Richard Newman
ICOMP 2008, July 14 - 17 2008, Las Vegas USA.
Abstract
Bandwidth in the Internet is constantly increasing. The last mile problem of the Internet has almost been solved. Multimedia has emerged as a dominant type of traffic on the Internet. Multicast is increasingly seen as the delivery vehicle of choice for multimedia streams. What has been the one true stumbling roadblock in widespread use of multicast is the lack of a convenient mechanism for multicast session discovery. This paper examines existing techniques that try to address this issue, highlighting
An Overlay solution to IP-Multicast Address Collision Prevention
Piyush Harsh & Richard Newman
IASTED EuroIMSA 2008, March 17-19 2008, Innsbruck Austria.
Abstract
Before multicast applications start transmitting content, they must choose a multicast channel on which to transmit. Unlike IP unicast addresses, multicast addresses normally are not long lived entities. Moreover many applications can choose to transmit data on the same channel. Every application that chooses to transmit data intended for receivers outside its own administrative domain must choose a globally scoped channel. Since most of globally scoped multicast channel addresses are not
Usability and Acceptance of UF-IBA, An Image Based Authentication System
Piyush Harsh & Richard Newman
IEEE ICCST 2007, October 8-11 2007, Ontario Canada.
Abstract
Text-based username-password systems have been traditionally used in authenticating users before allowing them access to online services. Psychological studies have shown users' inability to recall random sequences of alpha-numeric strings, which theoretically make the best passwords. Image-based authentication (IBA) systems show great promise in circumventing users' inherent weakness. This paper provides design details of a fully functional experimental IBA system deployed at the University of Florida's CISE department, exposes issues faced by the researchers regarding user acceptance, and suggests how to make such IBA systems more usable. This paper further provides key usability insights gained from analyzing the log files of users using the system over a period of more than two semesters.
Security Analysis of and proposal for Image based authentication
Richard Newman & Piyush Harsh & Prashant Jayaraman
IEEE ICCST 2005, October 11-14 2007, Gran de Canarias, Spain.
Abstract
Most human authentication systems have been text-based. Recent psychological studies show users' inability to recall random character sequences. Image-based authentication systems have shown promise in circumventing this problem. In addition, they are more intuitive and user-friendly. This paper presents and analyzes a user authentication technique using images that can be used in local as well as remote authentication. We also consider TEMPEST and other forms of attack.
Manuscripts Under Development
Here are the list of manuscripts that are under development or have been submitted and are under review:
Delivering on-demand multimedia using IP multicast
Piyush Harsh & Richard Newman
Target Congerence :: TBD
IETF RFC - A Hierarchical Multicast Session Directory Service Architecture
Piyush Harsh & Richard Newman
Target :: IETF Editorial Board
Submitted :: November 16, 2009, Expires :: May 20, 2010
Link to the submitted draft :: [IETF LINK]
Photographs: Top-Left Clockwise - Sunset at Waikiki beach, Hawaii; lighthouse in Honolulu; our bikes at Withlacoochee bike trail.