Skip to main content

Research Repository

Advanced Search

All Outputs (13)

Footsteps in the fog: Certificateless fog-based access control (2022)
Journal Article
Frimpong, E., Michalas, A., & Ullah, A. (2022). Footsteps in the fog: Certificateless fog-based access control. Computers and Security, 121, Article 102866. https://doi.org/10.1016/j.cose.2022.102866

The proliferating adoption of the Internet of Things (IoT) paradigm has fuelled the need for more efficient and resilient access control solutions that aim to prevent unauthorized resource access. The majority of existing works in this field follow e... Read More about Footsteps in the fog: Certificateless fog-based access control.

Toward a reference architecture based science gateway framework with embedded e‐learning support (2022)
Journal Article
Pierantoni, G., Kiss, T., Bolotov, A., Kagialis, D., DesLauriers, J., Ullah, A., Chen, H., Fee, D. C. Y., Dang, H., Kovacs, J., Belehaki, A., Herekakis, T., Tsagouri, I., & Gesing, S. (2023). Toward a reference architecture based science gateway framework with embedded e‐learning support. Concurrency and Computation: Practice and Experience, 35(18), Article e6872. https://doi.org/10.1002/cpe.6872

Science gateways have been widely utilized by a large number of user communities to simplify access to complex distributed computing infrastructures. While science gateways are still becoming increasingly popular and the number of user communities is... Read More about Toward a reference architecture based science gateway framework with embedded e‐learning support.

MiCADO-Edge: Towards an Application-level Orchestrator for the Cloud-to-Edge Computing Continuum (2021)
Journal Article
Ullah, A., Dagdeviren, H., Ariyattu, R. C., DesLauriers, J., Kiss, T., & Bowden, J. (2021). MiCADO-Edge: Towards an Application-level Orchestrator for the Cloud-to-Edge Computing Continuum. Journal of Grid Computing, 19(4), Article 47. https://doi.org/10.1007/s10723-021-09589-5

Automated deployment and run-time management of microservices-based applications in cloud computing environments is relatively well studied with several mature solutions. However, managing such applications and tasks in the cloud-to-edge continuum is... Read More about MiCADO-Edge: Towards an Application-level Orchestrator for the Cloud-to-Edge Computing Continuum.

(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption (2021)
Presentation / Conference Contribution
Bakas, A., Michalas, A., & Ullah, A. (2020, November). (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption. Presented at Secure IT Systems 25th Nordic Conference, NordSec 2020, Online

Functional Encryption (FE) allows users who hold a specific secret key (known as the functional key) to learn a specific function of encrypted data whilst learning nothing about the content of the underlying data. Considering this functionality and t... Read More about (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption.

Cloud apps to‐go: Cloud portability with TOSCA and MiCADO (2020)
Journal Article
DesLauriers, J., Kiss, T., Ariyattu, R. C., Dang, H., Ullah, A., Bowden, J., Krefting, D., Pierantoni, G., & Terstyanszky, G. (2021). Cloud apps to‐go: Cloud portability with TOSCA and MiCADO. Concurrency and Computation: Practice and Experience, 33(19), Article e6093. https://doi.org/10.1002/cpe.6093

As cloud adoption increases, so do the number of available cloud service providers. Moving complex applications between clouds can be beneficial—or other times necessary—but achieving this so-called cloud portability is rarely straightforward. This a... Read More about Cloud apps to‐go: Cloud portability with TOSCA and MiCADO.

Attribute-Based Symmetric Searchable Encryption (2020)
Presentation / Conference Contribution
Dang, H., Ullah, A., Bakas, A., & Michalas, A. (2020). Attribute-Based Symmetric Searchable Encryption. In Applied Cryptography and Network Security Workshops (318-336). https://doi.org/10.1007/978-3-030-61638-0_18

Symmetric Searchable Encryption (SSE) is an encryption technique that allows users to search directly on their outsourced encrypted data while preserving the privacy of both the files and the queries. Unfortunately, majority of the SSE schemes allows... Read More about Attribute-Based Symmetric Searchable Encryption.

Design and evaluation of a biologically-inspired cloud elasticity framework (2020)
Journal Article
Ullah, A., Li, J., & Hussain, A. (2020). Design and evaluation of a biologically-inspired cloud elasticity framework. Cluster Computing, 23, 3095-3117. https://doi.org/10.1007/s10586-020-03073-7

The elasticity in cloud is essential to the effective management of computational resources as it enables readjustment at runtime to meet application demands. Over the years, researchers and practitioners have proposed many auto-scaling solutions usi... Read More about Design and evaluation of a biologically-inspired cloud elasticity framework.

Towards workload-aware cloud resource provisioning using a multi-controller fuzzy switching approach (2018)
Journal Article
Ullah, A., Li, J., & Hussain, A. (2018). Towards workload-aware cloud resource provisioning using a multi-controller fuzzy switching approach. International Journal of High Performance Computing and Networking, 12(1), 13-25. https://doi.org/10.1504/IJHPCN.2018.093838

Elasticity enables cloud customers to enrich their applications to dynamically adjust underlying cloud resources. Over the past, a plethora of techniques have been introduced to implement elasticity. Control theory is one such technique that offers a... Read More about Towards workload-aware cloud resource provisioning using a multi-controller fuzzy switching approach.

A control theoretical view of cloud elasticity: taxonomy, survey and challenges (2018)
Journal Article
Ullah, A., Li, J., Shen, Y., & Hussain, A. (2018). A control theoretical view of cloud elasticity: taxonomy, survey and challenges. Cluster Computing, 21(4), 1735-1764. https://doi.org/10.1007/s10586-018-2807-6

The lucrative features of cloud computing such as pay-as-you-go pricing model and dynamic resource provisioning (elasticity) attract clients to host their applications over the cloud to save up-front capital expenditure and to reduce the operational... Read More about A control theoretical view of cloud elasticity: taxonomy, survey and challenges.

Genetic optimization of fuzzy membership functions for cloud resource provisioning (2017)
Presentation / Conference Contribution
Ullah, A., Li, J., Hussain, A., & Shen, Y. (2017). Genetic optimization of fuzzy membership functions for cloud resource provisioning. . https://doi.org/10.1109/SSCI.2016.7850088

The successful usage of fuzzy systems can be seen in many application domains owing to their capabilities to model complex systems by exploiting knowledge of domain experts. Their accuracy and performance are, however, primarily dependent on the desi... Read More about Genetic optimization of fuzzy membership functions for cloud resource provisioning.

Towards workload-aware fine-grained control over cloud resources: student research abstract (2016)
Presentation / Conference Contribution
Ullah, A. (2016, April). Towards workload-aware fine-grained control over cloud resources: student research abstract. Paper presented at SAC 2016: Symposium on Applied Computing, Pisa, Italy

The systems deployed over cloud are subject to unpredictable workload conditions that vary from time to time, e.g. an ecommerce website may face higher workloads than normal during festivals or promotional schemes. In order to maintain the performanc... Read More about Towards workload-aware fine-grained control over cloud resources: student research abstract.

Towards a Biologically Inspired Soft Switching Approach for Cloud Resource Provisioning (2016)
Journal Article
Ullah, A., Li, J., Hussain, A., & Yang, E. (2016). Towards a Biologically Inspired Soft Switching Approach for Cloud Resource Provisioning. Cognitive Computation, 8(5), 992-1005. https://doi.org/10.1007/s12559-016-9391-y

Cloud elasticity augments applications to dynamically adapt to changes in demand by acquiring or releasing computational resources on the fly. Recently, we developed a framework for cloud elasticity utilizing multiple feedback controllers simultaneou... Read More about Towards a Biologically Inspired Soft Switching Approach for Cloud Resource Provisioning.

Survival vs. revenue: modelling and reasoning on population dynamics (WIP) (2013)
Presentation / Conference Contribution
Bracciali, A., Caravagna, G., & Ullah, A. (2013). Survival vs. revenue: modelling and reasoning on population dynamics (WIP). In DEVS 13: Proceedings of the Symposium on Theory of Modeling & Simulation - DEVS Integrative M&S Symposium

We report on modelling a population dynamics problem by means of stochastic quantitative analysis. We are interested in the tension between survival of the population and revenue that can be obtained by its exploitation, and in showing how the chosen... Read More about Survival vs. revenue: modelling and reasoning on population dynamics (WIP).