Brij B. Gupta

B. B. Gupta received his PhD degree from the Indian Institute of Technology Roorkee, India in the area of information security. He has published more than 50 research papers in international journals and conferences of high repute. He has visited several countries to present his research work. His biography has published in the Marquis Who’s Who in the World, 2012. At present, he is working as an Assistant Professor in the Department of Computer Engineering, National Institute of Technology Kurukshetra, India. His research interest includes information security, cyber security, cloud computing, web security, intrusion detection, computer networks and phishing.

Publications

Security, Privacy, and Forensics Issues in Big Data
Ramesh C. Joshi, Brij B. Gupta. © 2020. 456 pages.
With the proliferation of devices connected to the internet and connected to each other, the volume of data collected, stored, and processed is increasing every day, which brings...
Modern Principles, Practices, and Algorithms for Cloud Security
Brij B. Gupta. © 2020. 344 pages.
In today’s modern age of information, new technologies are quickly emerging and being deployed into the field of information technology. Cloud computing is a tool that has proven...
Malware Threat in Internet of Things and Its Mitigation Analysis
Shingo Yamaguchi, Brij Gupta. © 2020. 17 pages.
This chapter introduces malware's threat in the internet of things (IoT) and then analyzes the mitigation methods against the threat. In September 2016, Brian Krebs' web...
Handbook of Research on Intrusion Detection Systems
Brij B. Gupta, Srivathsan Srinivasagopalan. © 2020. 407 pages.
Businesses in today’s world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses...
Handbook of Research on Multimedia Cyber Security
Brij B. Gupta, Deepak Gupta. © 2020. 372 pages.
Because it makes the distribution and transmission of digital information much easier and more cost effective, multimedia has emerged as a top resource in the modern era. In...
Security Threats and Recent Countermeasures in Cloud Computing
Anupama Mishra, Neena Gupta, Brij B. Gupta. © 2020. 17 pages.
The cloud is an appealing innovation that has driven, in record time, an extraordinary interest. It is right now one of the busiest regions of research in IT, due to its...
Taxonomy of Payment Structures and Economic Incentive Schemes in Internet
Brij B. Gupta, Prachi Gulihar. © 2020. 17 pages.
Recently the study of economics of internet has emerged as an emerging field of study. The workstations being distributed across the network along with the users having varied...
Phishing Attack Detection using a Search Engine and Heuristics-based Technique
Brij B. Gupta, Ankit Kumar Jain. © 2020. 16 pages.
The language used in the textual content of the webpage is the barrier in most of the existing anti-phishing methods. Most of the existing anti-phishing methods can identify the...
A Comprehensive Survey on DDoS Attacks and Recent Defense Mechanisms
Brij B. Gupta, Amrita Dahiya, Chivesh Upneja, Aditi Garg, Ruby Choudhary. © 2020. 33 pages.
DDoS attack always takes advantage of structure of Internet and imbalance of resources between defender and attacker. DDoS attacks are driven by factors like interdependency of...
Auto Fill Security Solution Using Biometric Authentication for Fake Profile Detection in OSNs
Brij B. Gupta, Somya Ranjan Sahoo, Vaibhav Bhatia, Adil Arafat, Abhik Setia. © 2020. 26 pages.
This chapter discusses a model that allows the user to access social networking sites through login using smart phone-based biometric authentication. Currently, social networking...
An Attribute-Based Searchable Encryption Scheme for Non-Monotonic Access Structure
Mamta ­, Brij B. Gupta. © 2020. 21 pages.
Attribute based encryption (ABE) is a widely used technique with tremendous application in cloud computing because it provides fine-grained access control capability. Owing to...
Cloud Computing Security: Taxonomy of Issues, Challenges, Case Studies, and Solutions
Chhavi Chaturvedi, Brij B. Gupta. © 2020. 20 pages.
The applications and software using cloud computing as a base have significantly increased, and cloud computing is nowadays developed as a scalable and cost-effective technique....
Study of Smartcards Technology: Structure, Standards, Threats, Solutions, and Applications
Shaifali Narayan, Brij B. Gupta. © 2020. 16 pages.
Smart cards have gained popularity in many domains by providing different facilities in every domain. Such cards are beneficial for storing credentials and access information....
Defending Multimedia Content Embedded in Online Social Networks (OSNs) Using Digital Watermarking
Brij B. Gupta, Somya Rajan Sahoo, Prashant Chugh, Vijay Iota, Anupam Shukla. © 2020. 24 pages.
In global internet usage, increasing multimedia message, which includes video, audio, images, and text documents, on the web raised a lot of consequences related to copyright....
An Economic Incentive-Based Risk Transfer Approach for Defending Against DDoS Attacks
Amrita Dahiya, Brij B. Gupta. © 2020. 25 pages.
Volumetric DDoS attacks are continued to be an immense threat to e-commerce and other online businesses from the last decade as attackers have much resources to amplify scale and...
Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags
Aakanksha Tewari, Brij B. Gupta. © 2020. 15 pages.
Internet of Things (IoT) is playing more and more important roles in our daily lives in the last decade. It can be a part of traditional machine or equipment to daily household...
Handbook of Research on Cloud Computing and Big Data Applications in IoT
B. B. Gupta, Dharma P. Agrawal. © 2019. 609 pages.
Today, cloud computing, big data, and the internet of things (IoT) are becoming indubitable parts of modern information and communication systems. They cover not only information...
A Framework for Preserving the Privacy of Online Users Against XSS Worms on Online Social Network
Pooja Chaudhary, B. B. Gupta, Shashank Gupta. © 2019. 27 pages.
This article presents a hybrid framework i.e. OXSSD (Online Social Network-Based XSS-Defender) that explores cross-site scripting (XSS) attack vectors at the vulnerable points in...
Feature Based Approach for Detection of Smishing Messages in the Mobile Environment
Ankit Kumar Jain, B. B. Gupta. © 2019. 19 pages.
Smishing is a security attack that is performed by sending a fake message intending to steal personal credentials of mobile users. Nowadays, smishing attack becomes popular due...
ISEkFT: An IBE-Based Searchable Encryption Scheme With k-Keyword Fuzzy Search Trapdoor
Mamta, Brij B. Gupta, Syed Taqi Ali. © 2019. 21 pages.
Public-key encryption with keyword search (PEKS) is a well-known technique which allows searching on encrypted data using the public key system. However, this technique suffers...
Dynamic Policy Attribute Based Encryption and its Application in Generic Construction of Multi-Keyword Search
Mamta, Brij B. Gupta, Syed Taqi Ali. © 2019. 23 pages.
Attribute based encryption (ABE) is an encryption technique which provides a good solution to the security issues in the cloud environment. Through ABE, a data owner can achieve...
Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud
B. B. Gupta, Shashank Gupta, Pooja Chaudhary. © 2017. 31 pages.
This article presents a cloud-based framework that thwarts the DOM-based XSS vulnerabilities caused due to the injection of advanced HTML5 attack vectors in the HTML5 web...
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
Brij Gupta, Dharma P. Agrawal, Shingo Yamaguchi. © 2016. 589 pages.
Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed...
International Journal of Cloud Applications and Computing (IJCAC)
B. B. Gupta, Dharma P. Agrawal. Est. 2011.
The International Journal of Cloud Applications and Computing (IJCAC) is a peer-reviewed journal that focuses on and publishes research on all aspects of Cloud Computing...
International Journal of Software Science and Computational Intelligence (IJSSCI)
Brij Gupta, Andrew W.H. Ip. Est. 2009.
The latest developments in computer science, theoretical software engineering, cognitive science, cognitive informatics, intelligence science, and the crystallization of...
International Journal of Information Technology and Web Engineering (IJITWE)
Ghazi I. Alkhatib. Est. 2006.
Organizations are continuously overwhelmed by a variety of new information technologies; many are Web-based. These new technologies are capitalizing on the widespread use of...
Journal of Organizational and End User Computing (JOEUC)
Sang-Bing Tsai. Est. 1989.
The Journal of Organizational and End User Computing (JOEUC) , which has been published for more than 30 years, provides high impact research in all areas of organizational and...