- Cloud Security, Decision Theory, Network Management, Service management, Production and Operations Management, Cloud Computing, and 64 moreFPGA based system design using VHDL, Brain Computer Interface, Distributed Computing, Grid Computing, Quality of Service, Mobile Ad-hoc Networks (MANETs), Green Cloud Computing, Cloud Computing Security, Bayesian Networks, Wireless Sensor Network, Verilog, Digital FPGA implementation, Human Resources Development, Autonomic Computing, Computer Networks, Medical Statistics and Informatics, Mobile Ad Hoc Networks, Middleware, P2p networks, Adaptive Modulation and Coding (AMC), Network, Identity management, QoS for Wireless Networks, Internet Routing Protocol, Security Management, Wireless Communications and Networking, Future Internet, Distributed System, Access To Information, Internet of Things, Case Study, Business Model, Tourism Planning, Internet of Things (IoT), Web Mining and Cloud Computing, Web usability, Intrusion Detection System, Information Technology, Electrical And Electronic Engineering, Delay Tolerant Networks, Pervasive Computing, Information Security, Intrusion Detection, Graphical Models, Network Security, Social Medicine, XML Schema, Signal Processing, Cognitive Radio Networks, Probabilistic Graphical Models, Load distribution, Philosophy of Computer Science, Wireless Networks (Computer Science), Mobile Services, Green Networking, The Internet of Things, Routing Protocol, Service Delivery, Embedded Systems, Self Management, Data Model, Global, Management System, and Bandwidth managementedit
- Carlos Becker Westphall is Full Professor (since 1993) in the Department of Informatics and Statistics at the Federal... moreCarlos Becker Westphall is Full Professor (since 1993) in the Department of Informatics and Statistics at the Federal University of Santa Catarina - Brazil, where he acts as the leader of the Network and Management Laboratory and also coordinates some projects funded by the Brazilian National Research Council (CNPq). Obtained a degree in Electrical Engineering in 1985 and a M.Sc. degree in Computer Science in 1988, both at the Federal University of Rio Grande do Sul, Brazil. Obtained a D.Sc. degree in Computer Science (Network Management) at the University of Toulouse (Université Toulouse III - Paul Sabatier), France, in 1991. He acted as a local group coordinator in the European MAX/ESPRIT II project which involved the Alcatel- TITN, British Telecom, HP, CSELT, SIRTI and NKT Companies. Awarded IARIA Fellow (award plaque), in 2011. Achievement award – tutorial at WorldComp 2013. Awarded – best paper of ICN 2013. IEEE Communications Society 20 years member (Certificate of Appreciation), in 2014.
Editorial board member of periodicals and technical program and/or organizing committee member of conferences. He was the founder of LANOMS. Since 1993 member of IFIP TC6 Working Group 6.6 (Management of Networks and Distributed Systems). Since 2003 member of the core team of the TMF UP (TeleManagement Forum Universities Program). Since 2008 Latin America - International Academy, Research, and Industry Association - IARIA Liaison Board Chair. Member 2004-2005 and 2006-2007 of IEEE ComSoc Membership Programs Development Board. From May 2000 to May 2005, he acted as "Secretary" of IEEE CNOM (Committee on Network Operation and Management). From May 2005 to May 2009, he acted as “Vice-Chair” of IEEE CNOM. Member of IEEE CNOM since 1994.edit
The growth of the Internet of Things (IoT) and computing applications creates a greater possibility of vulnerabilities, which malicious entities can use to cause damage. This makes special security techniques as intrusion detection... more
The growth of the Internet of Things (IoT) and computing applications creates a greater possibility of vulnerabilities, which malicious entities can use to cause damage. This makes special security techniques as intrusion detection mechanisms indispensable in modern computer systems. It is important to detect and identify the attack in a category so that specific countermeasures for the threat category are solved. However, most existing multiclass detection approaches have some weaknesses, mainly related to detecting specific categories of attacks and problems with false positives. This article addresses this research problem and advances state-of-the-art, bringing contributions to a two-stage detection architecture called DNNET-Ensemble, combining binary and multiclass detection. While the benign traffic can be quickly released on the first detection, the intrusive traffic can be subjected to a robust analysis approach without causing delay issues. Additionally, we propose the DNNET binary approach for the binary detection level, which can provide more accurate and faster binary detection. The proposed Hybrid Attribute Selection strategy can find an optimal subset of attributes through a wrapper method with a lower training cost due to pre-selection using a filter method. Furthermore, the proposed Soft-SMOTE improvement allows operating with a balanced dataset with a minor training time increase, even in scenarios where there are a large number of classes with a large imbalance among them. The results obtained in experiments with renowned intrusion datasets demonstrate that the approach can achieve superior detection rates and false positives performance compared to other state-of-the-art approaches.
Research Interests:
O Protocolo de transferência de arquivos (FTP) é muito bem definido, implementado e utilizado pelo mundo. Apesar disto, algumas situações ocorrem onde seria desejável ter uma forma mais simples, rápida, mas ainda confiável de transmitir... more
O Protocolo de transferência de arquivos (FTP) é muito bem definido, implementado e utilizado pelo mundo. Apesar disto, algumas situações ocorrem onde seria desejável ter uma forma mais simples, rápida, mas ainda confiável de transmitir informações entre cliente e servidor. Neste trabalho apresentamos uma situação real de um projeto de cartão convênio onde esta necessidade se faz presente. Estudamos o FTP e o Telnet e descrevemos implementação do Fast-TP (Fast Transmission Protocol). A seguir efetuamos testes comparativos entre o Fast-TP e o FTP tradicional. Finalmente apresentamos aspectos de segurança da implementação do Fast-TP.
Table of Contents Trust Model-based Secure Cooperative Sensing Techniques for Cognitive Radio Networks Deming Pang, Gang Hu, and Ming Xu 1 Customer Security Concerns in Cloud Computing Access Control in a Form of Active Queuing Management in Congested Network Environment A Review Study on Image D...more
a series of events dedicated to mobility-at-large, dealing with challenges raised by mobile services and applications considering user, device and service mobility. Users increasingly rely on devices in different mobile scenarios and... more
a series of events dedicated to mobility-at-large, dealing with challenges raised by mobile services and applications considering user, device and service mobility. Users increasingly rely on devices in different mobile scenarios and situations. "Everything is mobile", and mobility is now ubiquitous. Services are supported in mobile environments, through smart devices and enabling software. While there are well known mobile services, the extension to mobile communities and on-demand mobility requires appropriate mobile radios, middleware and interfacing. Mobility management becomes more complex, but is essential for every business. Mobile wireless communications, including vehicular technologies bring new requirements for ad hoc networking, topology control and interface standardization. We take here the opportunity to warmly thank all the members of the MOBILITY 2015 Technical Program Committee, as well as the numerous reviewers. The creation of such a broad and high qual...
Cloud computing offers benefits in terms of availability and cost, but transfers the responsibility of information security management for the cloud service provider. Thus the consumer loses control over the security of their information... more
Cloud computing offers benefits in terms of availability and cost, but transfers the responsibility of information security management for the cloud service provider. Thus the consumer loses control over the security of their information and services. This factor has prevented the migration to cloud computing in many businesses. This paper proposes a model where the cloud consumer can perform risk analysis on providers before and after contracting the service. The proposed model establishes the responsibilities of three actors: Consumer, Provider and Security Labs. The inclusion of actor Security Labs provides more credibility to risk analysis making the results more consistent for the consumer.
Research Interests:
Presentation · September 2017 DOI: 10.13140/RG.2.2.24990.64327/2 09/2017, Conference: VIII e-TIC (Encontro de Tecnologia do Instituto Federal Catarinense – Campus Camboriú), DOI: 10.13140/RG.2.2.24990.64327/2 Description Informações para... more
Presentation · September 2017 DOI: 10.13140/RG.2.2.24990.64327/2 09/2017, Conference: VIII e-TIC (Encontro de Tecnologia do Instituto Federal Catarinense – Campus Camboriú), DOI: 10.13140/RG.2.2.24990.64327/2 Description Informações para responder as seguintes perguntas: - Conceitue IoT (Internet das Coisas) e Segurança para IoT. - Comente sobre o ataque DDoS cuja a vítima foi a empresa Dyn, segundo divulgado no “theguardian” em 26/10/2016. - Cite e comente sobre alguns exemplos de aplicações de IoT. - Explique a interação entre IoT e Cloud (Fog e Edge). - Descreva os “OWASP IoT Top 10”.
Research Interests:
Autonomic Cloud Computing management requires a model to represent the elements into the managed computing process. This tutorial proposes an approach to model the load flow through abstract and concrete Cloud components. Our model has a... more
Autonomic Cloud Computing management requires a model to represent the elements into the managed computing process. This tutorial proposes an approach to model the load flow through abstract and concrete Cloud components. Our model has a formal mathematical background and is generic, in contrast with other proposals. It receives new Virtual Machines on the Cloud and organizes them by relocating their placements based on the Multiple-Objectives of the environment. These Objectives are represented by Rules, Qualifiers and Costs, which can be easily added, extended and prioritized. In contrast to existing solutions, that address specific objectives, our framework was devised to be objective-agnostic and easily extensible, which enables the implementation of new and generic prioritized elements. Our work proposes an autonomic intrusion response technique that uses a utility function to determine the best response to the attack providing self-healing properties to the environment. Cloud computing allows the use of resources and systems in thousands of providers. This paradigm can use federated identity management to control user's identification data, but it is essential to preserve privacy, while performing authentication and access control. This tutorial describes a model where the cloud consumer can perform risk analysis on providers before and after contracting the service. We motivate the use of risk-based access control in the cloud and present a framework for enforcing risk-based policies.
Research Interests:
This paper proposes a flexible framework to im- prove the quality of Virtual Machine’s placements, in Clouds. It organises them by relocating the VMs based on the Multiple- Objectives of the environment. These Objectives are represented... more
This paper proposes a flexible framework to im- prove the quality of Virtual Machine’s placements, in Clouds. It organises them by relocating the VMs based on the Multiple- Objectives of the environment. These Objectives are represented by Rules, Qualifiers, and Costs, which can be extended and prioritised. Based on Evolutionary Searches, the framework theoretically guarantees the adoption of a better set of Place- ments. More specifically, it seeks the non-dominated solutions (Pareto’s Dominance concept) and compares then considering the implementation cost of the scenario and its benefits. In contrast to existing solutions that address specific objectives, our framework was devised to support many types of objectives and to be easily extensible, which enables the implementation of new and generic prioritised elements. Moreover, we conducted experiments using data from a real Cloud environment and show the flexibility of our approach and its scalability.
Research Interests:
Research Interests:
The Fifth International Conference on Mobile Services, Resources, and Users (MOBILITY 2015), held between June 21-26, 2015, in Brussels, Belgium, continued a series of events dedicated to mobility- at-large, dealing with challenges raised... more
The Fifth International Conference on Mobile Services, Resources, and Users (MOBILITY 2015), held between June 21-26, 2015, in Brussels, Belgium, continued a series of events dedicated to mobility- at-large, dealing with challenges raised by mobile services and applications considering user, device and service mobility. Users increasingly rely on devices in different mobile scenarios and situations. "Everything is mobile", and mobility is now ubiquitous. Services are supported in mobile environments, through smart devices and enabling software. While there are well known mobile services, the extension to mobile communities and on-demand mobility requires appropriate mobile radios, middleware and interfacing. Mobility management becomes more complex, but is essential for every business. Mobile wireless communications, including vehicular technologies bring new requirements for ad hoc networking, topology control and interface standardization. We take here the opportunity to warmly thank all the members of the MOBILITY 2015 Technical Program Committee, as well as the numerous reviewers. The creation of such a broad and high quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and efforts to contribute to MOBILITY 2015. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions. Also, this event could not have been a reality without the support of many individuals, organizations, and sponsors. We are grateful to the members of the MOBILITY 2015 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success. We hope that MOBILITY 2015 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the areas of mobile services, resources and users. We are convinced that the participants found the event useful and communications very open. We hope that Brussels, Belgium, provided a pleasant environment during the conference and everyone saved some time to enjoy the charm of the city.
Research Interests:
Composto de objetos físicos embutidos com eletrônica, software e sensores que permitem sensoriamento e controle remoto de objetos através de uma estrutura de rede. Facilita integração direta entre mundo físico e redes de comunicação.... more
Composto de objetos físicos embutidos com eletrônica, software e sensores que permitem sensoriamento e controle remoto de objetos através de uma estrutura de rede. Facilita integração direta entre mundo físico e redes de comunicação. Comunicação: any TIME, any THING, any PLACE . Segurança de IoT não é apenas segurança de dispositivos! Todos os elementos precisam ser considerados (ecossistema): O dispositivo IoT, A nuvem (cloud) / o nevoeiro (fog), A aplicação móvel, As interfaces de rede, O software, Uso da criptografia, Uso da autenticação (RFID, X.509, end. MAC), Segurança física, Autorização...
Research Interests:
—Due scale and dynamism of Cloud computing, there is a need for new tools and techniques for its management. This paper proposes an approach to model the load flow in cloud components using a double weighted Directed Acyclic Multigraphs.... more
—Due scale and dynamism of Cloud computing, there is a need for new tools and techniques for its management. This paper proposes an approach to model the load flow in cloud components using a double weighted Directed Acyclic Multigraphs. Such model enables the comparison, analysis and simulation of clouds, which assist the cloud management with the evaluation of modifications in the cloud structure and configuration. The existing solutions either do not have mathematical background, which hinders the comparison and production of structural variations in cloud models, or have the mathematical background, but are limited to a specific area (e.g. energy-efficiency), which does not provide the support the dynamic nature of clouds and to the different needs of the managers. Our model instead has a formal mathematical background and is generic. To this aim, we present its formalisation and algorithms that supports the load propagation and the states of services, systems, third-parties providers and resources, such as: computing, storage and networking. To demonstrate the applicability of our solution, we have implemented a software framework for modelling Infrastructure as a Service, and conducted numerical experiments with hypothetical loads.
Research Interests:
Summary: 1 - Cloud Computing Security Monitoring 2 - Federated Identity for Cloud Computing 3 - Risk Analysis for Cloud Computing 4 - Secure Internet of Things
Research Interests:
This article provides a real-time intrusion response system in order to reduce the consequences of the attacks in the Cloud Computing. Our work proposes an autonomic intrusion response technique that uses a utility function to determine... more
This article provides a real-time intrusion response system in order to reduce the consequences of the attacks in the Cloud Computing. Our work proposes an autonomic intrusion response technique that uses a utility function to determine the best response to the attack providing self-healing properties to the environment. To achieve this goal, we propose the Intrusion Response Autonomic System (IRAS), which is an autonomic intrusion response system, using Big Data techniques for data analysis.
at addressing recent research results and forecasting challenges on selected topics related to communications, computation, networks and technologies. Considering the importance of innovative topics in today's technology-driven... more
at addressing recent research results and forecasting challenges on selected topics related to communications, computation, networks and technologies. Considering the importance of innovative topics in today's technology-driven society, there is a paradigm shift in classical-by-now approaches, such as networking, communications, resource sharing, collaboration and telecommunications. Recent achievements demand rethinking available technologies and considering the emerging ones. The conference had the following tracks: Networking Mobility and Ubiquity Security, Trust, and Privacy We take here the opportunity to warmly thank all the members of the INNOV 2016 technical program committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors that dedicated much of their time and effort to contribute to INNOV 2016. We truly believe that, thanks to all t...
Quality of service is one of the major concerns in cloud computing. Virtual machines (VMs) balancing techniques can help reduce service degradation in cloud computing environments. Several works have presented cloud computing balance... more
Quality of service is one of the major concerns in cloud computing. Virtual machines (VMs) balancing techniques can help reduce service degradation in cloud computing environments. Several works have presented cloud computing balance techniques, however, only a few used the similarity between VMs and physical hosts to map VMs migrations. In addition, most proposals do not consider the size, dynamism, and heterogeneity of the cloud when developing a management technique. We present a cloud computing VMs balancing algorithm that uses the similarity between VMs and physical hosts to create the map of migrations. Furthermore, the proposal takes into account the size, dynamism, and heterogeneity of the cloud when mapping VMs migrations, thus the proposal is developed in a distributed fashion, enabling the processing of each cluster at a time. To evaluate the proposal, we used the Google cluster data set. Experiments demonstrate that the proposed technique can improve the balance of alloc...
Research Interests:
Dynamic federations allow users to access new service providers on demand. This dynamic access adds risks to personally identifiable information (PII) of users, since there are untrusted service providers. The federated identity... more
Dynamic federations allow users to access new service providers on demand. This dynamic access adds risks to personally identifiable information (PII) of users, since there are untrusted service providers. The federated identity management is essential to preserve privacy of users while performing authentication and access control in dynamic federations. This paper discusses characteristics to improve privacy in the dissemination of sensitive data of users in dynamic federations, proposing privacy scopes to be agreed in dynamic associations (federation time) among service providers and identity providers. A prototype of the dynamic federation and scopes agreement was developed using OpenID Connect. Keywords–Privacy; Dynamic Federation; OpenID Connect.
Research Interests:
Response to some questions: - What is IoT (Internet of Things) and Security for IoT? - Comment on the DDoS attack that the victim was the company Dyn, according to the "the guardian" reported on 26 Oct. 2016. - What the... more
Response to some questions: - What is IoT (Internet of Things) and Security for IoT? - Comment on the DDoS attack that the victim was the company Dyn, according to the "the guardian" reported on 26 Oct. 2016. - What the really popular Internet of Things applications are right now? And in the future? - What is (will be) the interaction between IoT and Cloud (Fog and Edge)? And about security? - What is the OWASP (OpenWebApplicationSecurity Project) Internet of Things Project? - How many “things” are currently connected on the Internet? How many will we have in 2020? - How many BILLION DOLLARS will be the potential socioeconomic impact of the Internet of Things on the productivity of the Brazilian economy and the improvement of public services by 2025? China? USA? Europe? - How much will you earn until 2025, out of these 200 BILLION DOLLARS, if you start investing now in the Internet of Things? - What are the characteristics of networks that will support the Internet of Things, leading to the Low Power Wide Area (LPWA)?
Research Interests:
This work provides the basis to understand and select Cloud Computing models applied for the development of IoT solutions using Low-Power Wide Area Network (LPWAN). Cloud Computing paradigm has transformed how the industry implement... more
This work provides the basis to understand and select Cloud Computing models applied for the development of IoT solutions using Low-Power Wide Area Network (LPWAN). Cloud Computing paradigm has transformed how the industry implement solution, through the commoditization of shared IT infrastructures. The advent of massive Internet of Things (IoT) and related workloads brings new challenges to this scenario demanding malleable configurations where the resources are distributed closer to data sources. We introduce an analysis of existing solution architectures, along with an illustrative case from where we derive the lessons, challenges, and opportunities of combining these technologies for a new generation of Cloudnative solutions.
Research Interests:
Research Interests:
We propose a flexible meta‐heuristic framework for virtual machine (VM) organisation, provisioning, and adaptation in the cloud domain, based on migration costs and environment constraints. Order@Cloud improves VM placements according to... more
We propose a flexible meta‐heuristic framework for virtual machine (VM) organisation, provisioning, and adaptation in the cloud domain, based on migration costs and environment constraints. Order@Cloud improves VM placements according to multiple objectives represented by rules, qualifiers, and improvement cost, which can be easily modified and extended. Order@Cloud theoretically guarantees the adoption of a better set of placements, after considering their costs and benefits, by prioritising the worst VM placements. While existing solutions address only specific objectives, our framework is objective‐agnostic and extensible, which enables the adoption and implementation of new policies and priorities. We conduct experiments using a real cloud environment data and discuss the framework's performance, flexibility, and optimality and provide insights on the challenges and benefits of deploying this framework.
Research Interests:
Internet of Things (IoT) is the connection of any object to the internet, to generate useful information about its own state or surrounding environment. IoT allows new products and services to be applied in different areas, such as smart... more
Internet of Things (IoT) is the connection of any object to the internet, to generate useful information about its own state or surrounding environment. IoT allows new products and services to be applied in different areas, such as smart cities, industry, smart homes, environment monitoring, smart cars, heath monitoring and others. Fog computing emerges to meet the Quality of Service requirements, of low latency real time IoT systems, that Cloud Computing cannot guarantee. This paper presents a Fire Alarm fog System, for a Smart Home, with the development of an IoT device hardware. A fog system is also developed with a website, that displays the sensor values, and the estimated battery life of the IoT device. Calculations were done with a variation of sleep-time of the IoT device, the results shows an increase of 2.5 times of battery lifespan.
Research Interests:
The authentication of restricted memory devices has major problems because memory consumption is high when applied with other protocols that have the purpose of mutual authentication. This article proposes an authentication model that... more
The authentication of restricted memory devices has major problems because memory consumption is high when applied with other protocols that have the purpose of mutual authentication. This article proposes an authentication model that validates mutually the parties in an Internet of Things environment applied in the context of Fog Computing. Through the hypothetic-deductive methodology, the deductions and hypotheses are presented for the formal proof of the new proposed method. The results achieved in the research show that the approach of the authentication mechanism is optimized, the prototype was validated in the AVISPA protocol evaluation tool and in a restricted memory controlled environment in a context of Fog Computing. However, this work is more appropriate in Fog Computing environments because there are no route changes as in Cloud Computing.
Research Interests:
Abstract In the Internet of Things (IoT) systems, information of various kinds is continuously captured, processed, and transmitted by systems generally interconnected by the Internet and distributed solutions. Attacks to capture... more
Abstract In the Internet of Things (IoT) systems, information of various kinds is continuously captured, processed, and transmitted by systems generally interconnected by the Internet and distributed solutions. Attacks to capture information and overload services are common. This fact makes security techniques indispensable in IoT environments. Intrusion detection is one of the vital security points, aimed at identifying attempted attacks. The characteristics of IoT devices make it impossible to apply these solutions in this environment. Also, the existing anomaly-based methods for multiclass detection do not present acceptable accuracy. We present an intrusion detection architecture that operates in the fog computing layer. It has two steps and aims to classify events into specific types of attacks or non-attacks, for the execution of countermeasures. Our work presents a relevant contribution to the state of the art in this aspect. We propose a hybrid binary classification method called DNN-kNN. It has high accuracy and recall rates and is ideal for composing the first level of the two-stage detection method of the presented architecture. The approach is based on Deep Neural Networks (DNN) and the k-Nearest Neighbor (kNN) algorithm. It was evaluated with the public databases NSL-KDD and CICIDS2017. We used the method of selecting attributes based on the rate of information gain. The approach proposed in this work obtained 99.77% accuracy for the NSL-KDD dataset and 99.85% accuracy for the CICIDS2017 dataset. The experimental results showed that the proposed hybrid approach was able to achieve greater precision about classic machine learning approaches and the recent advances in intrusion detection for IoT systems. In addition, the approach works with low overhead in terms of memory and processing costs.
Research Interests:
Research Interests:
Research Interests:
Due to constant workload growth, the infrastructure used to support cloud computing (CC) environments increases in size and complexity. As a consequence of that, human administrators are not able to monitor, analyze, plan and execute... more
Due to constant workload growth, the infrastructure used to support cloud computing (CC) environments increases in size and complexity. As a consequence of that, human administrators are not able to monitor, analyze, plan and execute actions upon the environment, seeking goals such as the environment optimization and service level agreements fulfillment. This proposal provides an autonomic framework to create virtual machines migrations and heuristics to select hosts to be activated or deactivated when needed. Moreover, the framework proposed in this paper works in a distributed way using multi-agent systems concepts. We provide an architecture to deal with the size, heterogeneity and dynamism of CC environments. Further, our proposal was added to the CloudStack platform as a plug-in for validation and experimentation.
Research Interests:
Research Interests:
Cloud computing allows the use of resources and systems in thousands of providers. This paradigm can use federated identity management to control user's identification data, but it is essential to preserve privacy, while performing... more
Cloud computing allows the use of resources and systems in thousands of providers. This paradigm can use federated identity management to control user's identification data, but it is essential to preserve privacy, while performing authentication and access control. This article discusses necessary characteristics to improve privacy in the dissemination of sensitive data of users in federated cloud computing paradigm. We plan to identify and use privacy techniques in identity management systems used in cloud. Users' attributes should have associated policies to minimize release of data exchanged in the process. It is also necessary to deal with privacy in interactions between authentication and authorization processes. This paper presents an approach to address the issues involving privacy around the personally identifiable information. The proposed model allows control of users' PII, provides some choices to assist users in data dissemination during the interaction and provides guarantees using user preferences on the SP side.
Research Interests:
Nidaa A. Abbas, University of Babylon, Iraq Ryma Abassi, Higher School of Communication of Tunis / Sup'Com, Tunisia Javier M. Aguiar Pérez, Universidad de Valladolid, Spain Rui LA Aguiar, University of Aveiro, Portugal Ali H.... more
Nidaa A. Abbas, University of Babylon, Iraq Ryma Abassi, Higher School of Communication of Tunis / Sup'Com, Tunisia Javier M. Aguiar Pérez, Universidad de Valladolid, Spain Rui LA Aguiar, University of Aveiro, Portugal Ali H. Al-Bayatti, De Montfort University - Leicester, UK Ali Amer, Saudi Telecom Company - Riyadh, Saudi Arabia Pedro A. Aranda Gutiérrez, Telefónica I+D - Madrid, Spain Tulin Atmaca, TELECOM SudParis, France Michael Bauer, The University of Western Ontario - London, Canada Dominic Battré, TU-Berlin, Germany Micah Beck, ...
The new concept of proactive network management aims at identifying the existing troubles in advance to any performance degradation, as well as providing support for future decision-making actions. Within this context, a proposal for... more
The new concept of proactive network management aims at identifying the existing troubles in advance to any performance degradation, as well as providing support for future decision-making actions. Within this context, a proposal for performance evaluation applying the proactive concepts is here introduced. Moreover, theoretical and practical aspects emphasize the importance of the approach in question. In addition, simulation facilities
Research Interests:
Research Interests:
Due to the scale and dynamism of cloud computing, there is a need for new tools and techniques for its management. This paper proposes an approach to quantitative modelling of cloud components' behaviour, using double weighted... more
Due to the scale and dynamism of cloud computing, there is a need for new tools and techniques for its management. This paper proposes an approach to quantitative modelling of cloud components' behaviour, using double weighted Directed Acyclic Multigraphs (DAM) through the different abstraction levels of components. With this formalism, it is possible to analyse load propagation and its effects on the cloud elements from an Anything as a Service (xAAS) perspective. Such model enables the comparison, analysis and simulation of clouds, which assist the cloud management with the evaluation of modifications in the cloud structure and configuration. The existing solutions either do not have mathematical background, which hinders the comparison and production of structural variations in cloud models, or have the mathematical background, but are limited to a specific area (e.g., energy-efficiency), which does not provide support to the dynamic nature of clouds and to the different need...
Research Interests:
In policy-based management, service providers want to enforce fine-grained policies for their resources and services. Besides the assurance of digital identity, service providers usually need personal data for evaluation of access control... more
In policy-based management, service providers want to enforce fine-grained policies for their resources and services. Besides the assurance of digital identity, service providers usually need personal data for evaluation of access control policies. The disclosure of personal data, also known as Personally Identifiable Information (PII), could represent a privacy breach. This paper proposes an architecture that allows an individual to obtain services without the need of releasing all personal attributes. The architecture achieves that outcome evaluating the targeted policy in the domain of the identity provider, that is, policies are sent from service providers to identity providers to be evaluated, without the need of releasing some PIIs to the service provider side. We also present an implementation of a prototype using XACML 3.0 for fine-grained authorization and OpenID Connect for identity management. The prototype was evaluated through an use case representing an hypothetical sc...
Research Interests:
This work presents the use of artificial intelligence (AI) techniques for aiding in the improvement of the performance of a high-speed networks management system. An intelligent agent is responsible for collect information and compare... more
This work presents the use of artificial intelligence (AI) techniques for aiding in the improvement of the performance of a high-speed networks management system. An intelligent agent is responsible for collect information and compare these information with a database that contains parameters for each information type in order to detect facts which identify proactively the possible existence of a problem. Such detection is conducted by means of AI techniques making possible proactive actions and, as such, may prevent the occurrence of problems.
Research Interests: Telecommunications Engineering, Artificial Intelligence, Computational Intelligence, Telecommunications, Computer Networks, and 15 moreElectronics & Telecommunication Engineering, Telecommunication, Network Management, Artificial General Intelligence, Computer Networking and Telecommunication, Proactive Management, Data Communication and Computer Networks, Formal Specification, Artifitial Intelligence, Artificial Intelligence And Techniques, Telecommunication Engineering, asynchronous Transfer Mode, Computer Networks and Communications, Computer Management, and Implementing Artificial Intelligence for Simulating and Optimizing
Research Interests:
High performance computing and communications is a key enabling technology to improve cutting-edge research performance and capabilities, especially when addressing large and complex problems with tight timing schedules. Building high... more
High performance computing and communications is a key enabling technology to improve cutting-edge research performance and capabilities, especially when addressing large and complex problems with tight timing schedules. Building high performance and efficient computing and communications systems can be addressed at multiple platform layers such as computer architecture, software, hardware, language and compiler design, embedded systems, and networking. The special issue on ‘High performance computing and communications’ will target a wide spectrum of the state-of-the-art as well as emerging topics pertaining to high performance computing, computer communications, new computing paradigms, and so on. After a careful review, six eminent papers are selected from a good number of quality submissions received. A detailed overview of the selected works is given below.
The first paper, ‘An energy-efficient data transfer strategy with link rate control for cloud’, proposes a novel energy-efficient data transfer strategy called LRCDT. By scheduling bandwidth in a link rate controlled fashion, LRCDT intends to reduce the
Copyright © 2015 Inderscience Enterprises Ltd.
334 G. Duan and C.B. Westphall
energy consumption specifically for data transfer that does not require the maximum transfer speed.
In the second paper, ‘Adaptive call admission control scheme with optimal resource allocation for multi-class cellular networks’, a new adaptive call admission control scheme is proposed for allocating bandwidth optimally as well as provisioning QoS to the mobile users so far as practicable.
The third paper, ‘A SLA-based cloud resource provisioning optimisation mechanism for multi-tenant applications’, proposes a service level agreements (SLA)-based resource provisioning optimisation mechanism for multi-tenant applications. The mechanism divides the tenants’ SLA into SLA constraints, and maps each SLA constraint to the corresponding service.
In the fourth paper, ‘Optimal VM placement in data centres with architectural and resource constraints’, authors take into consideration of data-centre architecture, inter-virtual machine (VM) traffic pattern, and resource capacity of physical machines (PMs) to propose a low-complexity heuristic algorithm to solve the VM placement problem.
In the fifth paper, ‘Optimising MPI tree-based communication for NUMA architectures’, the authors treat a multi-core node as a heterogeneous unit and optimise the performance of MPI scatter/gather communications by scheduling messages according to topology information. The proposed solution is to modify the fastest edge first heuristic by taking into account how many messages can be sent in parallel between cores on different processors without impeding the bandwidth.
The last paper, ‘Dynamic MPI parallel task scheduling based on a master-worker pattern in cloud computing’, proposes a dynamic parallel task scheduling method by employing a master-worker model on a real-world engineering application executed on the Azure cloud. The main idea is to schedule tasks on cloud compute resources depending on the actual workload of each process instead of static-scheduled load.
We would like to express our great appreciation to all reviewers for their time and contributions, and offering good advice or recommendations, we also thank the authors for their devoted efforts, experience, and insights into these important topics. We wish that this issue will be available resource for your work.
The first paper, ‘An energy-efficient data transfer strategy with link rate control for cloud’, proposes a novel energy-efficient data transfer strategy called LRCDT. By scheduling bandwidth in a link rate controlled fashion, LRCDT intends to reduce the
Copyright © 2015 Inderscience Enterprises Ltd.
334 G. Duan and C.B. Westphall
energy consumption specifically for data transfer that does not require the maximum transfer speed.
In the second paper, ‘Adaptive call admission control scheme with optimal resource allocation for multi-class cellular networks’, a new adaptive call admission control scheme is proposed for allocating bandwidth optimally as well as provisioning QoS to the mobile users so far as practicable.
The third paper, ‘A SLA-based cloud resource provisioning optimisation mechanism for multi-tenant applications’, proposes a service level agreements (SLA)-based resource provisioning optimisation mechanism for multi-tenant applications. The mechanism divides the tenants’ SLA into SLA constraints, and maps each SLA constraint to the corresponding service.
In the fourth paper, ‘Optimal VM placement in data centres with architectural and resource constraints’, authors take into consideration of data-centre architecture, inter-virtual machine (VM) traffic pattern, and resource capacity of physical machines (PMs) to propose a low-complexity heuristic algorithm to solve the VM placement problem.
In the fifth paper, ‘Optimising MPI tree-based communication for NUMA architectures’, the authors treat a multi-core node as a heterogeneous unit and optimise the performance of MPI scatter/gather communications by scheduling messages according to topology information. The proposed solution is to modify the fastest edge first heuristic by taking into account how many messages can be sent in parallel between cores on different processors without impeding the bandwidth.
The last paper, ‘Dynamic MPI parallel task scheduling based on a master-worker pattern in cloud computing’, proposes a dynamic parallel task scheduling method by employing a master-worker model on a real-world engineering application executed on the Azure cloud. The main idea is to schedule tasks on cloud compute resources depending on the actual workload of each process instead of static-scheduled load.
We would like to express our great appreciation to all reviewers for their time and contributions, and offering good advice or recommendations, we also thank the authors for their devoted efforts, experience, and insights into these important topics. We wish that this issue will be available resource for your work.
Research Interests:
The Fifteenth International Conference on Networks (ICN 2016), held between February 21- 25, 2016 in Lisbon, Portugal continued a series of events focusing on the advances in the field of networks. ICN 2016 welcomed technical papers... more
The Fifteenth International Conference on Networks (ICN 2016), held between February 21- 25, 2016 in Lisbon, Portugal continued a series of events focusing on the advances in the field of networks.
ICN 2016 welcomed technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions, short papers on work in progress, and panel proposals.
The conference had the following tracks:
Performance evaluation, tools, simulation
Communications security, reliability, availability
Software Defined Networks and Network Functions Virtualization
Internet of Things, cellular cognitive networks
The conference also featured the following symposium:
• SOFTNETWORKING 2016, The International Symposium on Advances in Software Defined Networking and Network Functions Virtualization
We take here the opportunity to warmly thank all the members of the ICN 2016 technical program committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors that dedicated much of their time and effort to contribute to ICN 2016. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
Also, this event could not have been a reality without the support of many individuals, organizations and sponsors. We also gratefully thank the members of the ICN 2016 organizing committee for their help in handling the logistics and for their work that made this professional meeting a success.
We hope ICN 2016 was a successful international forum for the exchange of ideas and results between academia and industry and to promote further progress in the field of networks. We also hope that Lisbon, Portugal, provided a pleasant environment during the conference and everyone saved some time to enjoy the beauty of the city.
ICN 2016 welcomed technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions, short papers on work in progress, and panel proposals.
The conference had the following tracks:
Performance evaluation, tools, simulation
Communications security, reliability, availability
Software Defined Networks and Network Functions Virtualization
Internet of Things, cellular cognitive networks
The conference also featured the following symposium:
• SOFTNETWORKING 2016, The International Symposium on Advances in Software Defined Networking and Network Functions Virtualization
We take here the opportunity to warmly thank all the members of the ICN 2016 technical program committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors that dedicated much of their time and effort to contribute to ICN 2016. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions.
Also, this event could not have been a reality without the support of many individuals, organizations and sponsors. We also gratefully thank the members of the ICN 2016 organizing committee for their help in handling the logistics and for their work that made this professional meeting a success.
We hope ICN 2016 was a successful international forum for the exchange of ideas and results between academia and industry and to promote further progress in the field of networks. We also hope that Lisbon, Portugal, provided a pleasant environment during the conference and everyone saved some time to enjoy the beauty of the city.