Dr. Dhiren R. Patel 

 

Professor & Chair of Computer Engineering NIT Surat, India – 395007

dhiren@coed.svnit.ac.in, dhiren29p@gmail.com

Contact Phone: +91-2612201595

Nationality: Indian

 

Education: 

B Tech Electronics, REC Surat, India

M Tech Computer Science & Engg, IIT Kanpur, India 

Ph D Computer Engineering, NIT Surat/NCST Mumbai, India

 

Academic details and Positions held:

 

Professor – Computer Engineering, NIT Surat, India (since 2005-)

Chair of the Computer Engineering Department, NIT Surat (2001-2007, 2014-)

Visiting Professor – CSE, IIT Gandhinagar, India – Full time (2009-2011)

Adjunct Professor – CSE, IIT Gandhinagar, Ahmedabad, India (2011-12)

Visiting Scientist – Cyber Security Research Group, City University London (2009-2013)

Visiting Researcher – Security Future Practice Research Group, BT Adastral Park (2012)

Research Advisor – C-DAC Mumbai, India (Cyber Security & CIP) (2011-14)

 

Member – India e-Authentication framework standards committee, Govt. of India (2014-)

Member – Technical Committee – Common Counselling to CFTIs, Govt. of India (2014-)

Member - National Core Committee of Security Awareness campaign of ISEA (Information Security Education & Awareness) Project, Govt. of India (2006-14)

Member - Project Review Steering Group – ISEA Project, Govt. of India (2006-14)

Advisor - CSO Forum India (Chief Information Security Officers – Banking/Telecom/ Insurance/ICT Governance) - (2011-13)

Member – PRSG for Bhartiya Automated Fingerprint Identity System, DIT Govt. of India (2009-12)

Member – UNDP/Nabard project of ICT in Financial Inclusion – IIM Ahmedabad (2011-12)

Member – Security Advisory Committee - State Bank of India (2008-09)

 

Courses teaching:                                                          

Fall: 

Information Security at B Tech IV Computer Engineering (Sem - VII)

Introduction to Computer Security at M Tech I Computer Engineering (Sem - I)

 

Spring:

Network and Systems Security at B Tech IV Computer Engineering (Sem - VIII) PKI and Trust Management at M Tech I Computer Engineering (Sem - II) 

 

Ph D supervision – 5 graduated, 4 ongoing

M. Tech. supervision – 18 completed, 1 ongoing                                                 

Publications Books:

1.      Dhiren Patel, Information Security: Theory and Practice, PHI - EEE, ISBN978-81-203-3351-2, published in 2008 (Reprinted in 2010)

2.      Editors – Theo Dimitrakos, Rajat Moona, Dhiren Patel, D. Harrison McKnight , Trust Management VI - Springer volume IFIP AICT 374, ISBN-978-3-64229852-3, published in 2012

3.      Dhiren Patel, Audun Josang, Public Key Infrastructures & Trust Management in Cloud, CRC Press Taylor & Francis, (writing under progress), expected Spring 2015 

       

Patents:

1.      Zia Saquib, Piyush Jain, Sharda Swain, Om Pal, Dhiren Patel, “Method to provide  A Secure Key Distribution Protocol For Constrained Environment,” National Patent, India, 2011.

2.      Dhiren Patel, Shimon Modi, “Method and System for Management and Optimization of Biometric System Performance”, US Provisional Patent Application, 2013.

             

International Journal Publications:

1.      Udai Pratap Rao, Dhiren R. Patel, “Incorporation of Application Specific Information for Recovery in Database from Malicious Transaction”, Information Security Journal: A Global Perspective, Taylor & Francis, Vol. 22, No. 1, pp. 3545, 2013. 

2.      Modi, Chirag; Patel, Dhiren; Borisaniya, Bhavesh; Patel, Avi; Rajarajan, Muttukrishnan “A survey on security issues and solutions at different layers of Cloud computing,” The Journal of Supercomputing, Springer, Vol. 63, No. 2, pp. 561-592, 2013. 

3.      Jadav, Khyati B; Vania, Jignesh; Patel, Dhiren R; “A Survey on Association Rule Hiding Methods,” International Journal of Computer Applications, Vol. 82, No. 13, 2013. 

4.      Chirag. N. Modi, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, and Rajarajan Muttukrishnan , “A Survey of Intrusion Detection Techniques in Cloud”, Elsevier Journal of Network and Computer Applications(JNCA), 2012.

5.      Hiren Patel, Dhiren Patel, “Achieving Secure Cloud Data Storage without using of Trusted Third Party Auditor: A Review,” International Journal of Computer Applications, Vol. 57, No. 6, 2012. 

6.      Udai Pratap Rao, Dhiren R. Patel, “Design and Implementation of Database Intrusion Detection System for Security in Database”, International Journal of Computer Applications, Volume 35 - Number 9, pp. 32-40, Published by Foundation of Computer Science, New York, USA, 2011. 

7.      Saquib, Zia; Patel, Dhiren; Rajarajan, M; “A configurable and efficient keymanagement scheme for SCADA communication networks,” International Journal of Research and Reviews in Information Security and Privacy (IJRRISP), Vol. 1, No. 2, 2011. 

8.      Patel, Hiren B; Patel, Dhiren R; "Cloud Computing: Issues, Opportunities And Challenges” in International Journal of Engineering and Social Science, Vol. 1, No. 2, pp 64-75, Dec 2011. 

9.      Patel, Hiren B; Patel, Dhiren R; “A Review on Various Security Issues and Approaches in Cloud Computing,” in the International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC), pp. 59-68, Vol.1, No. 2, Dec 2011.

10.  Devesh Jinwala, Dhiren Patel, Sankita Patel, K S Dasgupta. “Optimizing the Replay Protection at the Link Layer Security Framework in Wireless Sensor Networks.” In: IAENG International Journal of Computer Science, International Association of Engineers Publication, Hong Kong, 2010. 

11.  Udai Pratap Rao, G. J. Sahani, Dhiren R. Patel, “Detection of Malicious Activity in Role Based Access Control (RBAC) Enabled Databases,” International Journal of Information Assurance and Security, pp. 611-617, Volume 5, Issue 6, USA, ISSN 1554-1010, 2010. 

12.  Modi, Chirag, Rao Udai Pratap, Patel Dhiren, “An Efficient Solution for Privacy Preserving Association Rule Mining using Unknowns,” International Journal of Computer and Network Security, pp 79-85, Vol. 2, No. 5, ISSN 2076-273, Austria Viena, May 2010. 

13.  Saxena, Anupam; Pal, Om; Saquib, Zia; Patel, Dhiren; “Customized PKI for SCADA system Network,” International Journal of Advanced Networking & Applications, Vol. 1, No. 5, pp. 282-289, 2010.

14.  Shah, Deven; Vyas, Vaibhav; Vyas, Vishal; Patel, Dhiren; “Global SOA Architectural Style-SOA for End Users,” Journal of Algorithms & Computational Technology, Vol. 4, No. 4, pp. 555-574, 2010. 

15.  Limkar, Suresh; Patel, Dhiren; “Geographically Secured SSL-VPN Using GPS,” International Journal of Computer Applications, Vol. 6, No. 10, pp. 21-24, 2010. International Journal of Computer Applications

16.  Shah, Deven; Mangal, Ashish; Agarwal, Mayank; Mehra, Mahendra; Patel, Dhiren; “Mitigating DoS Using Handlers for Global SOA,” Journal of Algorithms & Computational Technology, Vol. 4, No. 4, pp. 381-394, 2010.

17.  Khuba S., Patel D., “Realization of Semantic Atom Blog,” Journal of Computing NY, Volume 1, Issue 1, pp 34-38, ISSN: 2151-9617, 2009 

18.  Shah Deven,Patel Dhiren, “Architecture Framework Proposal for Dynamic and Ubiquitous Security in Global SOA”, International Journal of Computer Science & Applications (IJCSA)’s special issue on Advanced Grid and Parallel Computing, Vol.6, No.1, pp 40-52, ISSN 0972-9038, 2009 

19.  Jinwala D., Dasgupta K., Patel Dhiren, “FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks”; Journal of Information Assurance and Security, Vol 4, pp 582-603, ISSN 1554-1010, 2009 

20.  Patel, Hiren B; Patel, Dhiren R; “Performance Analysis of BGP Security Proposals,” International Journal of Recent Trends in Engineering, Vol. 2, pp. 187189, 2009. 

21.  Jinwala, Devesh C; Patel, Dhiren R; Dasgupta, Kankar S; “Investigating and Analyzing the Light-weight ciphers for Wireless Sensor Networks,” INFOCOMP Journal of Computer Science, Vol. 8, No. 2, pp. 39-50, 2009. 

22.  Patel Dhiren; “Maintaining Authentication and Anonymity of Voters in Verifiable e-Voting System,” ADIT Journal of Engg. Dec 2008 

23.  Jinwala D., Patel D., Das Gupta K.; “A survey of the security issues in Wireless Sensor Networks,” ADIT Journal of Engineering, India, ISSN0973 3663, pp. 1729, 2006 

 

International Conference Publications:

1.      Gaur, Manoj Singh; Patel, Dhiren; Saini, Anil; “Insecurities within browser: issues and challenges,” In Proceedings of the 6th International Conference on Security of Information and Networks (SIN '13), Turkey, pp. 458-458, 2013. ACM 

2.      C. Modi and D. Patel, “A Novel Hybrid-Network Intrusion Detection System (HNIDS) in Cloud Computing”, IEEE Symposium on Computational Intelligence for Communication Systems and Networks (IEEE CIComms 2013), Singapore, April 2013. 

3.      C. Modi and D. Patel, “Detection of DoS/DDoS Attacks in Cloud Computing”, 4th international conference on Intelligent systems, Modelling and Simulation (ISMS2013, Bangkok), 2013. 

4.      C. N. Modi, D. R. Patel, A. Patel and M. Rajarajan, “Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing”,  2nd International Conference on Communication, Computing and Security (ICCCS- 2012, Rourkela), Elsevier procedia technology, Vol. 6, No. 0, 2012, pp. 905 – 912. 

5.      C. N. Modi, D. R. Patel, A. Patel, and R. Muttukrishnan, “Bayesian Classifier and SNORT based Network Intrusion Detection System in Cloud Computing”, International conference on Computing, Communication and Networking technologies (ICCCNT 2012, Coimbatore), IEEE, 2012. 

6.      C. Modi, D. Patel, B. Borisanya, A. Patel and M. Rajarajan, “A Novel Framework for Intrusion Detection in Cloud”, 5th International Conference on Security of Information and Networks (SIN 2012, Jaipur), ACM, 2012. 

7.      Bhavesh Borisaniya, Avi Patel, Dhiren Patel, and Hiren Patel, “Incorporating Honeypot for Intrusion Detection in Cloud Infrastructure”, in Trust Management VI, Springer IFIP AICT 374,  pp. 84-96,  May 2012 

8.      Contractor D., Patel D, “Trust Management Framework for Attenuation of Application Layer DDoS Attack in Cloud Computing,” in Trust Management VI, Springer IFIP AICT  374, pp. 201-208, 2012. 

9.      Hiren Patel, Dhiren Patel, Bhavesh Borisaniya,  Avi Patel, “Data Storage Security Model for Cloud Computing,” Proceedings of CNC 2012, Springer – July 2012.  10 Patel, Hiren; Patel, Dhiren; “A Review of Approaches to Achieve Data Storage Correctness in Cloud Computing Using Trusted Third Party Auditor,” International Symposium on Cloud and Services Computing (ISCOS), pp. 84-87, 2012. IEEE 

10.  Rao, Udai Pratap; Patel, Dhiren R; Vikani, Punitkumar M; “Relational Database Watermarking for Ownership Protection,” Procedia Technology, pp. 988-995, 2012. Elsevier

11.  Gurubani, Jitendra B; Thakkar, Harsh; Patel, Dhiren R; “Improvements over extended LMAP+: RFID authentication protocol,” Trust Management VI, pp. 225231, 2012. Springer 

12.  Li, Fei; Weerasinghe, Dasun; Patel, Dhiren; Rajarajan, Muttukrishnan; “An UserCentric Attribute Based Access Control Model for Ubuquitous Environments," Mobile Computing Applications and Services, pp. 361-367, Hongkong, 2012. Springer 

13.  Contractor, Dipen; Patel, Dhiren R; “Trust Management Framework for Attenuation of Application Layer DDoS Attack in Cloud Computing,” Trust Management VI, pp. 201-208, 2012. Springer

14.  Patel, Ashish C; Rao, Udai Pratap; Patel, Dhiren R; “Privacy preserving association rules in unsecured distributed environment using cryptography," 2012 Third International Conference on Computing Communication & Networking Technologies (ICCCNT), 2012. IEEE 

15.  U P Rao, Dhiren Patel, “Database Security Architecture for Detection of Malicious Transactions in Database”, Int’l Conference on Security and Management-SAM11, Las Vegas - July 2011. 

16.  Parmar, Anita A; Rao, Udai Pratap; Patel, Dhiren R; “Blocking based approach for classification Rule hiding to Preserve the Privacy in Database," International Symposium on Computer Science and Society (ISCCS), pp. 323-326, 2011. IEEE 

17.  Muttukrishnan Rajarajan, Patel Dhiren, Saritha Arunkumar, Weerasinghe Dasun, “Data access control in ubiquitous environments using P3P”,  NPSec2010, Kyoto, October 2010. 

18.  Modi Chirag,  Rao U P, Patel Dhiren, “Elliptic Curve Cryptography Based Mining of Privacy Preserving Association Rules in Unsecured Distributed Environment”, International Conference on Advances in Communication, Network, and Computing, India, Oct 2010. 

19.  Bhavesh Borisaniya, Avi Patel, Reema Patel,, Dhiren Patel, “Network-based Intrusion Detection in Eucalyptus Private Cloud”,  International Conference on Advances in Communication, Network, and Computing, India, Oct 2010. 

20.  Reema Patel, Bhavesh Borisaniya, Avi Patel, Dhiren Patel, Muttukrishanan Raj, Andrea Zisman, “Comparative analysis of formal model checking tools for security protocol verification”,  The Third International Conference on Network Security & Applications (CNSA 2010), India, Springer, vol. CCIS 89, pp. 152163, 2010. 

21.  Modi, Chirag N; Rao, Udai Pratap; Patel, Dhiren R; “Maintaining privacy and data quality in privacy preserving association rule mining," Computing Communication and Networking Technologies (ICCCNT), pp. 1-6, 2010. IEEE 

22.  Patel, Reema; Borisaniya, Bhavesh; Patel, Avi; Patel, Dhiren; Rajarajan, Muttukrishnan; Zisman, Andrea; “Comparative analysis of formal model checking tools for security protocol verification,” Recent Trends in Network Security and Applications, pp. 152-163, 2010. Springer 

23.  Modi, Chirag; Rao, Udai Pratap; Patel, Dhiren R; “A Survey on Preserving Privacy for Sensitive Association Rules in Databases,” Information Processing and Management, pp. 538-544, 2010. Springer 

24.  Modi, Chirag; Rao, Udai Pratap; Patel, Dhiren R; “An Efficient Approach for Preventing Disclosure of Sensitive Association Rules in Databases,” IKE, pp. 303309, 2010. IKE 

25.  Rao, Udai Pratap; Sahani, GJ; Patel, Dhiren R; “Machine learning proposed approach for detecting database intrusions in RBAC enabled databases,” 2010 International Conference on Computing Communication and Networking Technologies (ICCCNT), 2010. IEEE 

26.  Rao, Udai Pratap; Jethava, Gordhan B; Patel, Dhiren R; “Database Intrusion Detection Approach to Enhance Database Security System," Proceedings of the 2010 International Conference on Advances in Communication Network and Computing, pp. 205-208, 2010. IEEE Computer Society

27.  Arunkumar, S; Raghavendra, A; Weerasinghe, D; Patel, D; Rajarajan, M; “Policy extension for data access control," 2010 6th IEEE Workshop on Secure Network Protocols (NPSec), pp. 55-60, Kyoto, Japan 2010, IEEE 

28.  Pal, Om; Saiwan, Sharda; Jain, Peeyush; Saquib, Zia; Patel, Dhiren; “Cryptographic key management for SCADA system: An architectural framework,” Advances in Computing, Control, Telecommunication Technologies, pp. 169-174, 2009. IEEE 

29.  Jinwala, Devesh; Patel, Dhiren; Patel, Sankita; Dasgupta, Kankar S; “Replay protection at the link layer security in wireless sensor networks," WRI World Congress on Computer Science and Information Engineering, pp. 160-165, 2009. IEEE 

30.  Shah, Deven; Mangal, Ashish; Agarwal, Mayank; Mehra, Mahendra; Dave, Tushar; Patel, Dhiren; “Protecting Global SOA from DoS and Other Security Threats,” Advances in Information Security and Assurance, pp. 652-661, 2009. Springer 

31.  Jinwala, Devesh; Patel, Dhiren; Dasgupta, Kankar; “Optimizing the block cipher and modes of operations overhead at the link layer security framework in the wireless sensor networks,” Information Systems Security, pp. 258-272, 2008. Springer 

32.  Nimisha Patel, Rajan Patel, Dr. Dhiren Patel; “Packet Sniffing: Network Wiretapping”, Proceedings of IEEE International Advance Computing Conference (IACC 2009), India, March 2009 

33.  Rajan Patel, Nimisha Patel, Dr. Dhiren Patel; “Next Generation of AutoID: Applying RFID Technology”, Proceedings of IEEE International Advance Computing Conference (IACC 2009), India, March 2009 

34.  Shah Deven, Patel Dhiren; “Dynamic and Ubiquitous Security Architecture for Global SOA,” The Second International Conference on Mobile Ubiquitous Computing, pp. 482-487, 2008. IEEE. 

35.  Jinwala, Devesh C; Patel, Dhiren R; Dasgupta, Kankar S; “Optimizing the Block Cipher Resource Overhead at the Link Layer Security Framework in the Wireless Sensor Networks,” Proceedings of the World Congress on Engineering, 2008.

36.  Patel Dhiren, Tiwari P, “Fighting AntiHoneypot Technology using Autonomous Honeypots”,  International Cryptology Workshop & Conference – Cryptology 2008, Kuala Lumpur, Malaysia, June 2008.

37.  Dhiren Patel,Deven Shah, “Universal Handler for SOA Security Strategies,” International Conference on IT’07, W.B., India, 2007. 

38.  Jinwala, Devesh C; Patel, Dhiren; Dasgupta, KS; “Affordable security in networked wireless sensors: threats and challenges,” CSI Kolkota, 2006. 

39.  Patel Dhiren, “New One-way Compression Function for Cryptographic Hash Applications,” MCCCC2006 conference, WSU, Wichita, USA, 2006. 

40.  Jinwala D., Patel D., Das Gupta K., “Analysis of the Security overhead in Link Layer Security Architecture on a Tiny Micro-threaded Environment for Wireless Networked Sensors”, International Conference On Information Security and Computer Forensics ISCF-2006, Chennai, India, 2006.

41.  Patel Dhiren, “Low Cost e-Voting Protocol for Institute Elections, International Conference on Information Security,” ICIS 2005, Pondicherry, India, 2005 

42.  Patel Dhiren R.; “A Simple On-line Voting Scheme,” 15th International Conference on Computer Communication (ICCC 2002), pp. 591-600,2002

43.  Patel Dhiren; Ramani S.; “Secure Internet Voting Protocol”, Information Security Solutions Europe ISSE2001, London, 2001 

 

Course/Seminar/Workshop conducted as Coordinator/Principal Resource Person

 

Sr. No.

Title

Duration

1.

STTP (Short Term Trining Programme) on Cloud Computing

March 2014

2.

STTP – Strengthening Cyber Security

June 2013

3.

Tutorial - Critical Infrastructure Protection tutorial at C-DAC Mumbai (with City University London)

Sept 2012

4.

TREC workshop - (for EU Project Optimis) at City University London

July 2012

5.

IFIPTM 2012 The 6th IFIP WG 11.11 International Conference on "Trust Management", at NIT Surat

May 2012

6.

Workshop on "REASON - RagE Against the SOcial Network"(IFIPTM 2012), at NIT Surat

May 2012

7.

Tutorial “Building Trust in Cloud” (IFIPTM2012), at NIT Surat (with Theo Dimitrakos of BT UK)

May 2012

8.

IFIP WG11.11 "Winter School on Trust Management in ICT" at NIT Surat

February 2012 

9.

Ph D Colloquium (CSE) at CSI-2011, Ahemdabad, India

Dec 2011

10.

International Workshop on “Large scale Biometric Identity Management Systems”, Mumbai

January 2011

11.

Indo-UK Workshop on “Critical National Infrastructure Protection”, Mumbai, 

May 2010

12.

Conference ISDF2009 at City University London

September 2009

13.

9th National Workshop on "Cryptology", at NIT Surat

August 2009

14.

AICTE STTP on "Cyber Security" at NIT Surat, 

January 2009

15.

Workshop on "Security & Soft Computing", at NIT Surat

March 2007

16.

ISEA STTP on "Information Security", at NIT Surat 

March 2007

17.

ISEA / TEQIP Workshop on "Cyber Security and Design of Campus Network", at NIT Surat

August 2005

 

 

Expert Lectures delivered

 

Sr. No.

Title/Place

Year

1.              

Securing Cloud Computing, @InfoSec 2014 Hyderabad

Jan 2014

2.              

Cloud Security: Challenges and Opportunities, City University London,  UK

Oct 2013

3.              

Multimedia Authorship Theft: Detection and Prevention, Edinburgh University, Scotland, UK

Sept 2013

4.              

Hybrid Network Intrusion Detection System in Cloud, Singapore

April 2013

5.              

Building Trust in Cloud – TREC Workshop – City University London

July 2012

6.              

Building Trust in Cloud(IFIPTM 2012), at NIT Surat

May 2012

7.              

Cloud   Security: Challenges and Opportunities – PRL Ahmedabad, India 

December 2011

8.              

Scada Security and Critical Infrastructure Protection, Mumbai 

September 2012

9.              

Remote Infrastructure Management   TeleLogix - Dubai 

Oct 2010

10.          

Cloud Computing -- Bahrain Internet Society, Bahrain

Apr 2010

11.          

Security Challenges to Cloud Computing -- City University London

Jan 2010

12.          

Classical Cryptography to Modern Information Security Techniques – CMU Qatar  

Oct 2009

13.          

Security Research Challenges –  University of Plymouth/RHUL/BT Ipswich UK  

Sept 2009

14.          

Cryptology: Moving Forward; Primitives for Secure System – City University London

Sept 2009

15.          

Fighting Anti-Honeypot Technology - Kuala Lumpur, Malaysia

June 2008

16.          

Ethical Hacking and Trustworthy Computing - Hewlett Packard Labs, PaloAlto, USA

Oct 2006

 

 

References:

1.      Dr. Sudhir Jain, Director, IIT Gandhinagar, Ahmedabad, India

2.      Dr. Rajat Moona, Director General C-DAC India & Professor of CSE, IIT Kanpur, India