Search
Now showing items 1-10 of 18
A finite state hidden markov model for predicting multistage attacks in cloud systems
(
IEEE
, 2014 , Conference Paper)
Cloud computing significantly increased the security threats because intruders can exploit the large amount of cloud resources for their attacks. However, most of the current security technologies do not provide early ...
Energy-efficient cloud resource management
(
IEEE
, 2014 , Conference Paper)
We propose a resource management framework that reduces energy consumption in cloud data centers. The proposed framework predicts the number of virtual machine requests along with their amounts of CPU and memory resources, ...
Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
Maintainability and easy-to-customisation are some quality properties that most application software in software-as-a-service (SaaS) should posses. These quality attributes are the pre requisite for most application software ...
Learning predictive autoscaling policies for cloud-hosted microservices using trace-driven modeling
(
IEEE Computer Society
, 2019 , Conference Paper)
Autoscaling methods are important to ensure response time guarantees for cloud-hosted microservices. Most of the existing state-of-the-art autoscaling methods use rule-based reactive policies with static thresholds defined ...
Using block cipher for confidentiality of images in cloud-based systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ...
A cost-aware model for risk mitigation in Cloud computing systems
(
IEEE Computer Society
, 2016 , Conference Paper)
Security is an important element in Cloud computing. Intruders may exploit clouds for their advantage. This paper presents a cost-aware model for risk mitigation in cloud computing systems. The proposed model is integrated ...
QoE-Aware Resource Allocation for Crowdsourced Live Streaming: A Machine Learning Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Driven by the tremendous technological advancement of personal devices and the prevalence of wireless mobile network accesses, the world has witnessed an explosion in crowdsourced live streaming. Ensuring a better viewers ...
Online assignment and placement of cloud task requests with heterogeneous requirements
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Managing cloud resources in a way that reduces the consumed energy while also meeting clients demands is a challenging task. In this paper, we propose an energy-aware resource allocation framework that: i) places the ...
Haddle: A framework for investigating data leakage attacks in hadoop
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Nowadays Hadoop is popular among businesses and individuals for its low costs, convenience, and fast speed. However, this also makes it the goal of data leakage attacks as sensitive data stored with an HDFS infrastructure ...
Auditing cloud service level agreement on VM CPU speed
(
IEEE Computer Society
, 2014 , Conference Paper)
In this paper, we present a novel scheme for auditing Service Level Agreement (SLA) in a semi-trusted or untrusted cloud. A SLA is a contract formed between a cloud service provider (CSP)and a user which specifies, in ...