cspit@charusat.ac.in +91-2697-265131

Information Security


Information Security Lab of IT department resides at lab no. 405-A 1st floor of CE/IT building.Information security is of critical importance in this generation of digital communication using telephone lines and computer networks. The objective of this laboratory is to provide students research opportunity on data transmission security and data recovery. Simultaneously, complexities associated with threat to security on data transmission are also studied.


Research facilities of this laboratory are open to M. Tech students in typical areas of cryptography, security management, and security testing. Many of its Projects : have been recognized by professional companies and also published in magazines and newspapers.


We envision combining and directing our cutting-edge research efforts to address the issues in all stages of secure system development. Our approach consists of three steps:

  1. Identification of security problems and their characteristics
  2. Solutions using cryptographic and non-cryptographic tools and protocols
  3. Cost-effective and convenient implementation.

Course Information

Resources and Configurations

Softwares

  • IT306.02 - Cryptography & Network Security
  • IT321 - Intelligent Systems
  • Number of Computers: 23
  • Operating System: Windows 10
  • Model: HP
  • Processor: Intel(R) Core(TM) i3-7100 CPU @ 3.90GHz, 3900 Mhz, 2 Core(s), 4 Logical Processor(s)
  • RAM:16GB
  • Storage:2TB HDD
  • Cisco Manageable Network Switch
  • Kali Linux OS
  • VMWare Virtual Box
  • Pycharm(python)
  • Adobe ACrobat Document
  • Notepad++
  • Netbeans(Java)
  • Microsoft Office

Publication


Sr. No. Publication
1 Amit Ganatra YP Kosta Gaurang Panchal, Parth Shah. Unleashing power of artificial intelligence for network intrusion detection problem. International Journal of Engineering Science and Technology, 2(10):5221-5230, 2010.
2 Parth Shah Devyani Panchal Gaurang Panchal, Amit Ganatra. Determination of over-learning and over hitting problem in back propagation neural network. International Journal on Soft Computing, 2(2):40-51,2011.
3 Parth Shah Krimit Shukla, Harshal Trivedi. Architecture for securing virtual instance in cloud. International Journal of Computer Science and Information Technologies, 3(3):4279-4282, 2012.
4 Amit P Ganatra Parth D Shah. Comparative study of data possession techniques for data storage as a service (dsaas). International Journal of Computer Applications, 80(4):38-42, 2013.
5 Amit Ganatra Parth Shah. Reliable and efficient distribution of multicast session key for de duplicated data in cloud computing. International Journal of Intelligent Engineering and Systems, 10(1):48-55, 2017.
6 Shaikh Amrin Parth Shah. Bb84 and identity based encryption (ibe) based a novel symmetric key distribution algorithm. In Fifth International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom 2013, 2013.
7 M. Patel Neha, M. Patel Narendra, M.I. Hasan, D. Shah Parth, and M. Patel Mayur. Improving hdfs write performance using efficient replica placement.
8 Parth Shah and Amit Ganatra. Improved data integrity proofs using additive homomorphic encryption for remote storage. Indian Journal of Science and Technology, 9(29), 2016.
9 Krupa Patel, Amit Thakkar, Chandni Shah, and Kamlesh Makvana. A novel supervised approach to detection of shilling attack in collaborative filtering based recommendation system. International Journal of Computer Science and Information Security, 14(4):208, 2016.

Contact Us

Address

Department of Information Technology
Charotar University of Science and Technology,
CHARUSAT Campus, Changa
Taluka: Petlad, Dist: Anand
Gujarat (India) 388 421

Phone Number

+91-2697-265131