Bruhadeshwar Bezawada

School of Engineering Sciences

Dr. Bruhadeshwar Bezawada is an Associate Professor of Computer Sciences at MEC in the School of Engineering Sciences. He holds a Ph.D. in Computer Science and Engineering, Michigan State University, USA.

CAREER SUMMARY

  • 15 years of experience in performing top quality Network Security research in world class universities like Michigan State University (USA), International Institute of Information Technology, Hyderabad (India) and Nanjing University (China).
  • 30+ top-quality publications in world-renowned journals like IEEE Transactions and Elsevier, and in top-class conferences like ICNP, INFOCOM, NDSS, ESORICS, VLDB and ICDCS.
  • Performed research in cutting-edge areas like secure group communication, broadcast authentication, rewall optimization, cloud computing and sensor networks.
  • Developed state-of-the-art algorithms for privacy preserving search for rich querying in cloud computing. These solutions represent a signi cant development in this domain.
  • One of the 2 experts selected from India by CDAC and Ministry of Communication and Information Technology (MCIT) to represent India in the Indo-Myanmar Delegation for "First Indo-Myanmar Collaboration Workshop" as Cyber-security expert in 2012.
  • One of the 10 domain experts selected from India to represent India at "Indo-UK Workshop on Cybersecurity" in New Delhi in 2013.
  • One of three academic experts invited to the First Data Security Council of India (DSCI) meeting at NASSCOM, New Delhi, 2007.
  • Guided and mentored CDAC-Mohali on multiple projects of national importance on cybersecurity threats and defenses (since 2009).
  • Designed and implemented several cutting edge courses on Information Security at IIIT-H (2007-2014) under a project sponsored by Ministry of Communication and Information Technology (now DeiTy).
  • Executed research projects at the Computer Science and Technology Department, Nanjing University in the prestigious State Key Laboratory for Novel Software and Technology supported by the Government of China.
  • Delivered guest lectures at several national and international level technical events.

Contact: bru[at]mechyd.ac.in

PhD, Computer Science and Engineering, Michigan State University, USA, 2005
Thesis topic: Adaptive Key Management Algorithms for Secure Group Communication
M.S in Electrical and Computer Engineering, Michigan State University, USA, 2000
B.E (Distinction) in Electronics and Communications, Osmania University, India, 1998

RESEARCH INTERESTS

Major Focus: Network Security and Privacy
Provable and efficient privacy preserving techniques in strong adversarial models
Large scale biometric identification and verification for remote access systems
Security issues in Big Data domain

Research and Development Projects

1. (co-PI) "Ad-hoc Network Test-bed Project", funded by the Ministry of Communication and Information Technology, Government of India. The principal investigator of the project was Prof. Garimella Rama Murthy. The project involved setting up an experimental test-bed of wireless nodes that were connected in a peer-to-peer manner. The aim of the project was to study the mobility hand-o s in ad hoc networks and their impact on video/audio streaming applications.
2. "Distributed Honey Net Project at Center for Development of Advanced Computing", Mohali 2009-ongoing as Technical Consultant. I worked with R.K.Sehgal, Principal Engineer of the Cyber-security Division at CDAC Mohali. The work involved the design and implementation of a distributed honey pot system that was intended to collect and analyse malware and other malicious trac. I guided the project from inception and was instrumental in the design of the key components and the algorithms in these components. The project is ongoing and I visit their on-site facility on a periodic basis to review the progress.
3. "ISEA : Information Security, Education and Awareness Project", funded by the Ministry of Communication and Information Technology, Government of India. This is a institute wide project at the International Institute of Information Technology, India. The project pro vided grants to faculty to perform research in information security, support student stipends and travel support to reputed conferences.

Technical Program Committee Member

  • IEEE 4th International Conference on Future Internet of Things and Cloud, 2016
  • IEEE International Conference on Network Protocols, ICNP, 2014
  • ACM International Conference on Security of Information and Networks (SIN 2012-2016)
  • The 22nd Asia-Paci c Conference on Communications, Indonesia 2016
  • IEEE International Conference on Computer Communications and Networks, ICCCN, 2014
  • International Conference on Distributed Computing and Networking, ICDCN 2009, 2010 (Springer)
  • International Conference on Information Systems and Security, ICISS: 2006, 2009, 2010, 2011, 2012, 2013 (Springer)
  • International Workshop on Secure Networking and Forensic Computing (SNFC), in conjunction with IEEE ICC 2014
  • National Conference on Communication, NCC, India, 2010
  • Hack.in Conference conducted by IIT Kharagpur, India 2009
  • The Fourth International Symposium on Security in Computing and Communications (SSCC16), 2016 India
  • International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking (InfoSecHiComNet 2011, 2013) (Springer)

Reviewer

Journals

  • The Computer Journal, Oxford University Press
  • IEEE/ACM Transactions on Networking (TON)
  • IEEE Transactions on Dependable and Secure Computing (TDSC)
  • IEEE Transactions on Parallel and Distributed Computing (TPDS)
  • IEEE Transactions on Information Forensics and Security(TIFS)
  • IEEE Transactions on Computers (TC)
  • Elsevier Journal of Theoretical Computer Science (TCS)
  • Elsevier Journal of Parallel and Distributed Computing (JPDC)
  • Elsevier Journal of Computers and Security (JCS)
  • Elsevier Journal of Computer Communications (COMCOM)
  • Elsevier Journal Computers and Mathematics with Applications (CAMWA)
  • Elsevier Journal of Systems and Software
  • DRDO Defence Science Journal (DSJ)

Conferences

  • IEEE International Conference on Distributing Computing Systems ICDCS 2003 and 2005
  • ACM SenSys 2004
  • IEEE International Conference on Network Protocols, ICNP 2007, 2009, 2013
  • Symposium on Safety, Security and Stability (SSS) -2007, 2009
  • Several national conferences on Networking and Information Security

Representative Journal Publications (chronological order)

  1. Rui Li, Alex X. Liu, Liyan Wang and Bruhadeshwar Bezawada. "Fast and Scalable Range Query Processing with Strong Privacy Protection for Cloud Computing", in IEEE/ACM Transactions on Networking, 2015, in press.
  2. Fei Chen, Bruhadeshwar Bezawada and Alex X. Liu. "Privacy-preserving Cross-domain Network Reachability Quanti cation", in IEEE/ACM Transactions on Networking, 2014, in press.
  3. Fei Chen, Bruhadeshwar Bezawada and Alex X. Liu. "Cross-Domain Privacy-Preserving Cooperative Firewall Optimization", IEEE/ACM Transactions on Networking 21(3): 857-868 (2013).
  4. Bruhadeshwar Bezawada and Sandeep S. Kulkarni. "Balancing Revocation and Storage Trade-O s in Secure Group Communication", IEEE Transactions Dependable Secure Computing (TDSC) 8(1): 58-73 (2011).
  5. Bruhadeshwar Bezawada, Sandeep S. Kulkarni and Alex X. Liu. "Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough", IEEE Transactions on Parallel Distributed Systems 22(9): 1536-1549 (2011).
  6. Sandeep S. Kulkarni and Bruhadeshwar Bezawada. "Key-update distribution in secure group communication", Volume 33 , Issue 6 (April 2010), Pp, 689-705. 2010, Computer Communications (COMCOM), Elsevier (Butterworth-Heinemann, NY).
  7. Sandeep S. Kulkarni and Bruhadeshwar Bezawada. "Adaptive Rekeying for Secure Multicast", IEEE/IEICE Special issue on Communications: Transactions on Communications, volume E86-B, number 10, pages 2948-2956, October 2003.

Representative Conference Publications (chronological order)

1. Bruhadeshwar Bezawada, Alex X. Liu, Bargav Jayaraman, Ann L. Wang and Rui Li. "Privacy Preserving String Matching for Cloud Computing'', in the proceedings of the 35th IEEE International Conference on Distributed Computing Systems (ICDCS), Ohio,USA, 2015. (Acceptance rate: 70/543 - 13%)
2. Rui Li, Alex X. Liu, Liyan Wang and Bruhadeshwar Bezawada. "Fast Range Query Processing with Strong Privacy Protection for Cloud Computing", in the 40th International Conference on Very Large Databases (VLDB), Sep 1-5, Hawaii, USA 2015, (also in PVLDB Endowment Vol.7 No.14)
3. Fei Chen, Bruhadeshwar Bezawada, Alex X. Liu. "Privacy-preserving Cross-domain Network Reachability Quanti cation" in the IEEE International Conference on Network Protocols (ICNP), BC, Vancouver, CA, 2011 (Acceptance: 13%).
4. Fei Chen, Bruhadeshwar Bezawada and Alex X. Liu. "A cross-domain privacy-preserving protocol for cooperative rewall optimization" in the IEEE annual conference on Computer Communications and Networks (INFOCOM), April 2011, Shanghai, China, pp: 2903-2911 (Acceptance rate: 16%).
5. Bruhadeshwar Bezawada, Sandeep S. Kulkarni and Alex X. Liu. "Symmetric Key Approaches to Securing BGP A Little Bit Trust is Enough" in the 13th European Symposium on Research in Computer Security (ESORICS), Malaga, Spain, October, 2008 (Acceptance rate: 20%).
6. Sandeep S.Kulkarni and Bruhadeshwar Bezawada. "A Family of Collusion Resistant Protocols for Instantiating Security", in Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), Boston, Massachussetts. November, 2005 (Acceptance rate: 20%).
7. Sandeep S.Kulkarni and Bruhadeshwar Bezawada. "Rekeying and Storage Cost for Multiple User Revocation", In Proceedings of The 12th Annual Network and Distributed System Security Symposium (NDSS), San Diego, California, February 2005 Organized by the Internet Society www.isoc.org (Acceptance rate: 16%).

Other Journal Publications

1. Chunyong Yin, Bruhadeshwar Bezawada, Alex X. Liu and Liyan Wang. "Towards Accu-rate Node Based Detection of P2P Botnets", accepted to Journal of Communication and Networks (JCN), ISSN: 1229-2370, 2016. (accepted but publication delayed)
2. Ashok Kumar Das and Bruhadeshwar Bezawada. "An Improved and E ective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine", Information System Journal of Medical Systems, Springer US, 2013, Vol.37, pp1-17. Page 3
3. Sandeep A. Thorat, Amit K. Khandelwal, Bruhadeshwar Bezawada and Kishore Kothapalli. "Anomalous Packet Detection using Partitioned Payload", Journal of Information Assurance and Security Volume 3, Issue 3, September 2008.

Other Conference and Workshop Publications

1. Amir R. Khakpour, Alex X. Liu, and Bruhadeshwar Bezawada. Automated Reachability Troubleshooting for Large Enterprise Networks (Extended Abstract), in Proceedings of the 36th IEEE International Conference on Distributed Computing Systems (ICDCS), Antibes Juan-les-Pins, France, June 2016.Acceptance rate: 68/386 = 17.6% (accepted but not presented)
2. Zheng Qin, Lu Ou, Bruhadeshwar Bezawada, Xingchen Huang, Sisi Peng, Fei Chen and Keqin Li. "Privacy-Preserving Optimization of Cross-domain Firewalls with Dynamic Rule Updates", in the 24th IEEE International Conference on Computer Communications and Networks (ICCCN), 2015, Las Vegas, USA, (Acceptance: 25%) (Not presented due to visa issues and does not appear in proceedings)
3. Krishna Chaitanya Tekicharla, Venkatesh Choppella and Bruhadeshwar Bezawada. "CORP: A Browser Policy to Mitigate Web In ltration Attacks", 10th International Conference on Information Systems Security (ICISS 2014), Hyderabad, India, 2014 (Acceptance: 30%)
4. Ashok Kumar Das and Bruhadeshwar Bezawada. "A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks", IEEE Advanced Information Networking and Applications Conference Workshops 2013: 291-296.
5. Pruthvi Reddy Sabbu, Ganugula Umadevi, Kannan Srinathan and Bruhadeshwar Bezawada. "An Oblivious Image Retrieval Protocol", in IEEE Advanced Information Networking and Applications Conference Workshops Biopolis, Singapore, March 2011: 349-354.
6. Bruhadeshwar Bezawada, Kishore Kothapalli and Indira Radhika Pulla. "A Fully Dynamic and Self-Stabilizing TDMA Scheme for Wireless Ad-hoc Networks", in the IEEE Advanced Information Networking and Applications Conference (AINA), Perth, Australia, April, 2010: 511-518.
7. Ravi Shankar Varma, Bruhadeshwar Bezawada and G. Rama Murthy. "A Light-weight Token Passing Algorithm for Energy Efficient Data Dissemination in Resource Constrained Networks", in the 12th International Symposium on Wireless Personal MultiMedia Communications (WPMC), Sendai, Japan, Sep 7-10, 2009.
8. Sreekanth Malladi, Bruhadeshwar Bezawada and Kishore Kothapalli. "Automatic analysis of distance bounding protocols", in Workshop on Foundations of Computer Security, Los Angeles, CA, August 2009 (held in conjunction with Logic in Computer Science, 2009, No Proceedings).
9. Bruhadeshwar Bezawada, Kishore Kothapalli, M.Divya and M. Poornima. "Routing Protocol Security using Symmetric Key Based Techniques", in the IEEE Availability, Reliability and Security Symposium 2009, Fukuoka, Japan. (Acceptance 25%).
10. Bruhadeshwar Bezawada, Kishore Kothapalli and M. Sreedeepya. "Reducing the cost of Session Key Establishment", in the IEEE Availability, Reliability and Security Symposium 2009, Fukuoka, Japan. (Acceptance 25%) Cited in US Patent US 8,032,742, B2, Dated Oct 4, 2011.
11. Sai Sathyanarayan, Pankaj Kohli, and Bruhadeshwar Bezawada. "Signature Generation and Detection of Malware Families", in 13th Australasian Conference on Information Security and Privacy (ACISP), Wollongong, Australia, July 2008 (Acceptance 20%).
12. Pankaj Kohli and Bruhadeshwar Bezawada. "FormatShield: A Binary Rewriting Defense Against Format String Attacks", in 13th Australasian Conference on Information Security and Privacy (ACISP), Wollongong, Australia, July 2008 (Acceptance 20%).
13. Amit Khandelwal, Sandeep Thorat, Kishore Kothapalli and Bruhadeshwar Bezawada. Payload Content Based Network Anomaly Detection", in IEEE International Conference on Applications of Digital Information and Web Technologies VSB- Technical University of Ostrava, Czech Republic (ICADIWT), August 2008. Page 4
14. Bruhadeshwar Bezawada and Kishore Kothapalli. "A Family of Collusion Resistant Protocols for Authentication", in the International Conference on Distributed Computing and Networking (ICDCN 2008), Kolkata, India, Jan 2008 (Acceptance 25%).
15. Bruhadeshwar Bezawada and Sandeep S.Kulkarni. "User Revocation in Secure Adhoc Networks", In Proceedings of the 2nd International Conference on Distributed Computing and Internet Technology (ICDCIT), Bhubaneswar, India, December 2005 (LNCS) (Acceptance 25%).
16. Sandeep S. Kulkarni and Bruhadeshwar Bezawada. "Distributing Key Updates in Secure Dynamic Groups", In Proceedings of the First International Conference on Distributed Computing and Internet Technology(ICDCIT), Bhubaneswar, India, December 2004 (LNCS) (Acceptance 20%).
17. Sandeep S. Kulkarni and Bruhadeshwar, Bezawada. "Critical Path in Secure Multicast for Dynamic Groups", In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS) Workshops, Vienna, Austria, July 2002.

Tutorials and Technical Reports

1. Tutorial Titled "Security Issues in Wireless Technologies and Challenges" at the Inter- national Conference on Information Systems and Security, ICISS, Hyderabad, India 2009
2. Sandeep S. Kulkarni and Bruhadeshwar Bezawada and Mohamed Gouda, "Optimal Key Distribution for Secure Communication". Michigan State University MSU-CSE-07-189,TR.
3. Bruhadeshwar Bezawada and Sandeep S. Kulkarni, "An Optimal Symmetric Secret Distribution of Star Networks". Michigan State University MSU-CSE-07-196 TR.
4. Sandeep S. Kulkarni and Bruhadeshwar Bezawada and Mohamed Gouda, "Secure Authenticated Broadcast Communication in Fully Connected Networks", Michigan State University MSU-CSE-08-10, TR.

  • University Professor Aug 2015-present, K.L.University, Guntur, India
  • Visiting Research Scholar Sep'13-Oct 2015 Department of Computer Science and Technology, Nanjing University, Jiangsu, China.
  • Assistant Professor Nov'05-January `14, Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Gachibowli, Hyderabad India.
  • Graduate Research Assistant Jan'01 to Oct'05, Software Engineering and Network Systems (SENS) Laboratory, Dept. of Computer Science, Michigan State University, East Lansing, USA.
  • Web Application Developer May'99 to Dec'00 Eli Broad College of Business, Michigan State University, East Lansing, USA.
  • Lead Teaching Assistant Aug'98 to May'99, Graduate Teaching Assistant for CSE 101, Dept. of Computer Science and Engineering, Michigan State University, East Lansing, USA.

Conferences Organized

  • Was instrumental in bidding and major organization of the 10th International Conference on Distributed Computing and Networking, ICDCN in 2009. Was responsible for most of the aspects such as funding proposals, nancial transactions, registration details, local logistics and part of the technical program committee as well.
  • Was part of the organizing committee of the 32nd Foundations of Software Technology and Theoretical Computer Science (FSTTCS) in 2012. Was responsible for the registration process and local logistics.
  • Part of the workshops organizing committee of the 20th International Joint Conference on Arti cial Intelligence (IJCAI) 2007. Responsible for multi-media coverage.

Important Conferences Attended

  • International Conference on Distributed Computing and Internet Technology (ICDCIT 2004, 2005 and 2008), Bhubaneswar, India
  • 12th Annual Network and Distributed Systems Security Symposium (NDSS) 2005, San Diego, USA
  • 25th IEEE International Conference on Distributed Computing Systems (ICDCS) 2005, Ohio, USA
  • 14th USENIX Security Symposium, Baltimore, USA 2005 (Received Student Travel Grant from USENIX to attend)
  • 20th International Joint Conference on Arti cial Intelligence (IJCAI), 2007, Hyderabad, India
  • International Conference on Distributed Computing and Networking (2008, 2009), (Kolkata, Hyderabad) India
  • 13th European Symposium on Research in Computer Security (ESORICS) 2008, (Received Faculty Travel Grant from ISEA Travel Fund from MCIT)
  • International Conference on Information Systems Security (2008, 2014) in Hyderabad, India
  • 11th International Conference on Cryptology (INDOCRYPT) 2011 in Hyderabad, India
  • 5th ACM Conference on Security of Information and Networks (SIN) 2012 (Invited Session Chair) in Jaipur, India

Notable Guest Lectures Delivered in Information Security

  • Hunan University of Humanities, Science and Technology, Loudi, P.R.China, September 2014, Invited Distinguished Lecture Series.
  • Indian Institute of Technology (IIT), Roorkee, 2013 in Workshop on Cyber Security and Challenges.
  • Osmania University, Hyderabad, India 2012 in Workshop on Cloud Computing and Technologies.
  • National Institute of Technology, Warangal, India 2008.
  • Jawaharlal Nehru Technological University, Hyderabad, India, 2007, 2008.
  • College of Engineering, Pune, India 2010, in Emerging Trends in Network Security.

Students Supervised

Master of Science by Research Students At IIIT Hyderabad, India

1. Rishabh Kaushal : 2006-2008. Thesis: Parametric analysis of Wireless Performance
2. Siddharth Goud : 2006-2008. Thesis: QoS Service Models for Wireless Networks
3. Sai Sathyanarayan : 2006-2009. Thesis: Signature Generation and Detection of Families of Malware
4. Pankaj Kohli : 2006-2009. Thesis: Format String Attacks and Defenses
5. Manish Sharma : 2007-2010. Thesis: Timing-based Detection for DNS Spoofing Attacks
6. Krishna Chaitanya Tekicherla (co-supervised with Prof.Venkatesh Choppella) : 2012-2015. Thesis: Browser Enabled Defenses for Cross-origin Attacks (under submission)
7. Pruthvi Reddy : 2010-2015. Thesis: Oblivious Transfer of Images
8. Bargav Jayaraman : 2012-2015. Thesis: Privacy Preserving Pattern Matching Over Cloud Storage

Master of Science At Nanjing University, China (co-supervision with Prof. Alex X. Liu)

1. Xiao Jiang Liang: 2013-2015. Thesis: A Template Approach to Group Key Establishment in Ad-hoc Networks

Ph.D Students

1. D.Raman, 2011-2016 (ABD). Topic: Information Flow Tracking Approach for Malware Detection and Securing Web Applications (part-time, JNTU, Hyderabad)

Top