Skip to main content

Research Repository

Advanced Search

Outputs (13)

Footsteps in the fog: Certificateless fog-based access control (2022)
Journal Article
Frimpong, E., Michalas, A., & Ullah, A. (2022). Footsteps in the fog: Certificateless fog-based access control. Computers and Security, 121, Article 102866. https://doi.org/10.1016/j.cose.2022.102866

The proliferating adoption of the Internet of Things (IoT) paradigm has fuelled the need for more efficient and resilient access control solutions that aim to prevent unauthorized resource access. The majority of existing works in this field follow e... Read More about Footsteps in the fog: Certificateless fog-based access control.

Toward a reference architecture based science gateway framework with embedded e‐learning support (2022)
Journal Article
Pierantoni, G., Kiss, T., Bolotov, A., Kagialis, D., DesLauriers, J., Ullah, A., …Gesing, S. (2023). Toward a reference architecture based science gateway framework with embedded e‐learning support. Concurrency and Computation: Practice and Experience, 35(18), Article e6872. https://doi.org/10.1002/cpe.6872

Science gateways have been widely utilized by a large number of user communities to simplify access to complex distributed computing infrastructures. While science gateways are still becoming increasingly popular and the number of user communities is... Read More about Toward a reference architecture based science gateway framework with embedded e‐learning support.

MiCADO-Edge: Towards an Application-level Orchestrator for the Cloud-to-Edge Computing Continuum (2021)
Journal Article
Ullah, A., Dagdeviren, H., Ariyattu, R. C., DesLauriers, J., Kiss, T., & Bowden, J. (2021). MiCADO-Edge: Towards an Application-level Orchestrator for the Cloud-to-Edge Computing Continuum. Journal of Grid Computing, 19(4), Article 47. https://doi.org/10.1007/s10723-021-09589-5

Automated deployment and run-time management of microservices-based applications in cloud computing environments is relatively well studied with several mature solutions. However, managing such applications and tasks in the cloud-to-edge continuum is... Read More about MiCADO-Edge: Towards an Application-level Orchestrator for the Cloud-to-Edge Computing Continuum.

(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption (2021)
Conference Proceeding
Bakas, A., Michalas, A., & Ullah, A. (2021). (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption. In Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event, November 23--24, 2020, Proceedings 25 (111-126). https://doi.org/10.1007/978-3-030-70852-8_7

Functional Encryption (FE) allows users who hold a specific secret key (known as the functional key) to learn a specific function of encrypted data whilst learning nothing about the content of the underlying data. Considering this functionality and t... Read More about (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption.

Cloud apps to‐go: Cloud portability with TOSCA and MiCADO (2020)
Journal Article
DesLauriers, J., Kiss, T., Ariyattu, R. C., Dang, H., Ullah, A., Bowden, J., …Terstyanszky, G. (2021). Cloud apps to‐go: Cloud portability with TOSCA and MiCADO. Concurrency and Computation: Practice and Experience, 33(19), Article e6093. https://doi.org/10.1002/cpe.6093

As cloud adoption increases, so do the number of available cloud service providers. Moving complex applications between clouds can be beneficial—or other times necessary—but achieving this so-called cloud portability is rarely straightforward. This a... Read More about Cloud apps to‐go: Cloud portability with TOSCA and MiCADO.

Attribute-Based Symmetric Searchable Encryption (2020)
Conference Proceeding
Dang, H., Ullah, A., Bakas, A., & Michalas, A. (2020). Attribute-Based Symmetric Searchable Encryption. In Applied Cryptography and Network Security Workshops (318-336). https://doi.org/10.1007/978-3-030-61638-0_18

Symmetric Searchable Encryption (SSE) is an encryption technique that allows users to search directly on their outsourced encrypted data while preserving the privacy of both the files and the queries. Unfortunately, majority of the SSE schemes allows... Read More about Attribute-Based Symmetric Searchable Encryption.

Design and evaluation of a biologically-inspired cloud elasticity framework (2020)
Journal Article
Ullah, A., Li, J., & Hussain, A. (2020). Design and evaluation of a biologically-inspired cloud elasticity framework. Cluster Computing, 23, 3095-3117. https://doi.org/10.1007/s10586-020-03073-7

The elasticity in cloud is essential to the effective management of computational resources as it enables readjustment at runtime to meet application demands. Over the years, researchers and practitioners have proposed many auto-scaling solutions usi... Read More about Design and evaluation of a biologically-inspired cloud elasticity framework.

Towards workload-aware cloud resource provisioning using a multi-controller fuzzy switching approach (2018)
Journal Article
Ullah, A., Li, J., & Hussain, A. (2018). Towards workload-aware cloud resource provisioning using a multi-controller fuzzy switching approach. International Journal of High Performance Computing and Networking, 12(1), 13-25. https://doi.org/10.1504/IJHPCN.2018.093838

Elasticity enables cloud customers to enrich their applications to dynamically adjust underlying cloud resources. Over the past, a plethora of techniques have been introduced to implement elasticity. Control theory is one such technique that offers a... Read More about Towards workload-aware cloud resource provisioning using a multi-controller fuzzy switching approach.

A control theoretical view of cloud elasticity: taxonomy, survey and challenges (2018)
Journal Article
Ullah, A., Li, J., Shen, Y., & Hussain, A. (2018). A control theoretical view of cloud elasticity: taxonomy, survey and challenges. Cluster Computing, 21(4), 1735-1764. https://doi.org/10.1007/s10586-018-2807-6

The lucrative features of cloud computing such as pay-as-you-go pricing model and dynamic resource provisioning (elasticity) attract clients to host their applications over the cloud to save up-front capital expenditure and to reduce the operational... Read More about A control theoretical view of cloud elasticity: taxonomy, survey and challenges.

Genetic optimization of fuzzy membership functions for cloud resource provisioning (2017)
Conference Proceeding
Ullah, A., Li, J., Hussain, A., & Shen, Y. (2017). Genetic optimization of fuzzy membership functions for cloud resource provisioning. . https://doi.org/10.1109/SSCI.2016.7850088

The successful usage of fuzzy systems can be seen in many application domains owing to their capabilities to model complex systems by exploiting knowledge of domain experts. Their accuracy and performance are, however, primarily dependent on the desi... Read More about Genetic optimization of fuzzy membership functions for cloud resource provisioning.