Skip to main content

Research Repository

Advanced Search

Outputs (16)

Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology (2024)
Journal Article
Khan, M. S., Ahmad, J., Al-Dubai, A., Pitropakis, N., Ghaleb, B., Ullah, A., Khan, M. A., & Buchanan, W. J. (online). Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology. IEEE Transactions on Consumer Electronics, https://doi.org/10.1109/tce.2024.3415411

The rapid advancement in consumer technology has led to an exponential increase in the connected devices, resulting in an enormous and continuous flow of data, particularly the image data. This data needs to be processed, managed, and secured efficie... Read More about Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology.

YASF: A Vendor-Agnostic Framework for Serverless Computing (2023)
Presentation / Conference Contribution
Giacomini, M., & Ullah, A. (2023, April). YASF: A Vendor-Agnostic Framework for Serverless Computing. Presented at 13th International Conference on Cloud Computing and Services Science, Prague, Czech Republic

The serverless execution model allows application developers to deploy their software using tiny functions with zero administration, no handling of resource provisioning, monitoring and scaling. Due to such advantages, the serverless model emerged as... Read More about YASF: A Vendor-Agnostic Framework for Serverless Computing.

Orchestration in the Cloud-to-Things compute continuum: taxonomy, survey and future directions (2023)
Journal Article
Ullah, A., Kiss, T., Kovács, J., Tusa, F., Deslauriers, J., Dagdeviren, H., Arjun, R., & Hamzeh, H. (in press). Orchestration in the Cloud-to-Things compute continuum: taxonomy, survey and future directions. Journal of cloud computing: advances, systems and applications, 12, https://doi.org/10.1186/s13677-023-00516-5

IoT systems are becoming an essential part of our environment. Smart cities, smart manufacturing, augmented reality, and self-driving cars are just some examples of the wide range of domains, where the applicability of such systems have been increasi... Read More about Orchestration in the Cloud-to-Things compute continuum: taxonomy, survey and future directions.

Footsteps in the fog: Certificateless fog-based access control (2022)
Journal Article
Frimpong, E., Michalas, A., & Ullah, A. (2022). Footsteps in the fog: Certificateless fog-based access control. Computers and Security, 121, Article 102866. https://doi.org/10.1016/j.cose.2022.102866

The proliferating adoption of the Internet of Things (IoT) paradigm has fuelled the need for more efficient and resilient access control solutions that aim to prevent unauthorized resource access. The majority of existing works in this field follow e... Read More about Footsteps in the fog: Certificateless fog-based access control.

Toward a reference architecture based science gateway framework with embedded e‐learning support (2022)
Journal Article
Pierantoni, G., Kiss, T., Bolotov, A., Kagialis, D., DesLauriers, J., Ullah, A., Chen, H., Fee, D. C. Y., Dang, H., Kovacs, J., Belehaki, A., Herekakis, T., Tsagouri, I., & Gesing, S. (2023). Toward a reference architecture based science gateway framework with embedded e‐learning support. Concurrency and Computation: Practice and Experience, 35(18), Article e6872. https://doi.org/10.1002/cpe.6872

Science gateways have been widely utilized by a large number of user communities to simplify access to complex distributed computing infrastructures. While science gateways are still becoming increasingly popular and the number of user communities is... Read More about Toward a reference architecture based science gateway framework with embedded e‐learning support.

MiCADO-Edge: Towards an Application-level Orchestrator for the Cloud-to-Edge Computing Continuum (2021)
Journal Article
Ullah, A., Dagdeviren, H., Ariyattu, R. C., DesLauriers, J., Kiss, T., & Bowden, J. (2021). MiCADO-Edge: Towards an Application-level Orchestrator for the Cloud-to-Edge Computing Continuum. Journal of Grid Computing, 19(4), Article 47. https://doi.org/10.1007/s10723-021-09589-5

Automated deployment and run-time management of microservices-based applications in cloud computing environments is relatively well studied with several mature solutions. However, managing such applications and tasks in the cloud-to-edge continuum is... Read More about MiCADO-Edge: Towards an Application-level Orchestrator for the Cloud-to-Edge Computing Continuum.

(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption (2021)
Presentation / Conference Contribution
Bakas, A., Michalas, A., & Ullah, A. (2020, November). (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption. Presented at Secure IT Systems 25th Nordic Conference, NordSec 2020, Online

Functional Encryption (FE) allows users who hold a specific secret key (known as the functional key) to learn a specific function of encrypted data whilst learning nothing about the content of the underlying data. Considering this functionality and t... Read More about (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption.

Cloud apps to‐go: Cloud portability with TOSCA and MiCADO (2020)
Journal Article
DesLauriers, J., Kiss, T., Ariyattu, R. C., Dang, H., Ullah, A., Bowden, J., Krefting, D., Pierantoni, G., & Terstyanszky, G. (2021). Cloud apps to‐go: Cloud portability with TOSCA and MiCADO. Concurrency and Computation: Practice and Experience, 33(19), Article e6093. https://doi.org/10.1002/cpe.6093

As cloud adoption increases, so do the number of available cloud service providers. Moving complex applications between clouds can be beneficial—or other times necessary—but achieving this so-called cloud portability is rarely straightforward. This a... Read More about Cloud apps to‐go: Cloud portability with TOSCA and MiCADO.

Attribute-Based Symmetric Searchable Encryption (2020)
Presentation / Conference Contribution
Dang, H., Ullah, A., Bakas, A., & Michalas, A. (2020). Attribute-Based Symmetric Searchable Encryption. In Applied Cryptography and Network Security Workshops (318-336). https://doi.org/10.1007/978-3-030-61638-0_18

Symmetric Searchable Encryption (SSE) is an encryption technique that allows users to search directly on their outsourced encrypted data while preserving the privacy of both the files and the queries. Unfortunately, majority of the SSE schemes allows... Read More about Attribute-Based Symmetric Searchable Encryption.

Design and evaluation of a biologically-inspired cloud elasticity framework (2020)
Journal Article
Ullah, A., Li, J., & Hussain, A. (2020). Design and evaluation of a biologically-inspired cloud elasticity framework. Cluster Computing, 23, 3095-3117. https://doi.org/10.1007/s10586-020-03073-7

The elasticity in cloud is essential to the effective management of computational resources as it enables readjustment at runtime to meet application demands. Over the years, researchers and practitioners have proposed many auto-scaling solutions usi... Read More about Design and evaluation of a biologically-inspired cloud elasticity framework.