Search
Now showing items 1-10 of 20
A finite state hidden markov model for predicting multistage attacks in cloud systems
(
IEEE
, 2014 , Conference Paper)
Cloud computing significantly increased the security threats because intruders can exploit the large amount of cloud resources for their attacks. However, most of the current security technologies do not provide early ...
Energy-efficient cloud resource management
(
IEEE
, 2014 , Conference Paper)
We propose a resource management framework that reduces energy consumption in cloud data centers. The proposed framework predicts the number of virtual machine requests along with their amounts of CPU and memory resources, ...
Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
Maintainability and easy-to-customisation are some quality properties that most application software in software-as-a-service (SaaS) should posses. These quality attributes are the pre requisite for most application software ...
A secure client-side framework for protecting the privacy of health data stored on the cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
In the past decade, Cloud-Computing emerged as a new computing concept with a distributed nature using virtual network and systems. Many businesses rely on this technology to keep their systems running but concerns are ...
Learning predictive autoscaling policies for cloud-hosted microservices using trace-driven modeling
(
IEEE Computer Society
, 2019 , Conference Paper)
Autoscaling methods are important to ensure response time guarantees for cloud-hosted microservices. Most of the existing state-of-the-art autoscaling methods use rule-based reactive policies with static thresholds defined ...
Using block cipher for confidentiality of images in cloud-based systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ...
A cost-aware model for risk mitigation in Cloud computing systems
(
IEEE Computer Society
, 2016 , Conference Paper)
Security is an important element in Cloud computing. Intruders may exploit clouds for their advantage. This paper presents a cost-aware model for risk mitigation in cloud computing systems. The proposed model is integrated ...
Joint resource scheduling and peak power shaving for cloud data centers with distributed Uninterruptible power Supply
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
The grid company enforces high penalties for the peak power demands of cloud data centers. These high penalties result in high electricity bill that can be avoided by relying on the servers' Uninterruptible Power Supply ...
QoE-Aware Resource Allocation for Crowdsourced Live Streaming: A Machine Learning Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Driven by the tremendous technological advancement of personal devices and the prevalence of wireless mobile network accesses, the world has witnessed an explosion in crowdsourced live streaming. Ensuring a better viewers ...
Online assignment and placement of cloud task requests with heterogeneous requirements
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Managing cloud resources in a way that reduces the consumed energy while also meeting clients demands is a challenging task. In this paper, we propose an energy-aware resource allocation framework that: i) places the ...