Dmitri Botvich

Waterford Institute of Technology, Waterford, Munster, Ireland

Are you Dmitri Botvich?

Claim your profile

Publications (113)30.09 Total impact

  • Source
    Ahmed M Elmisery, Seungmin Rho, Dmitri Botvich
    [Show abstract] [Hide abstract]
    ABSTRACT: Nowadays, it is crucial to preserve the privacy of end-users while utilizing a third-party recommender service within content distribution networks so as to maintain their satisfaction and trust in the offered services. The current business model for those recommender services is centered around the availability of users' personal data at their side whereas consumers have to trust that the recommender service providers will not use their data in a malicious way. With the increasing number of cases for privacy breaches of personal information, different countries and corporations have issued privacy laws and regulations to define the best practices for the protection of personal information. The data protection directive 95/46/EC and the privacy principles established by the Organization for Economic Cooperation and Development (OECD) are examples of such regulation frameworks. In this paper, we assert that utilizing third-party recommender services to generate accurate referrals are feasible, while preserving the privacy of the users' sensitive information which will be residing on a clear form only on his/her own device. As a result, each user who benefits from the third-party recommender service will have absolute control over what to release from his/her own preferences. To support this claim, we proposed a collaborative privacy middleware that executes a two stage concealment process within a distributed data collection protocol in order to attain this claim. Additionally, the proposed solution complies with one of the common privacy regulation frameworks for fair information practice in a natural and functional way -which is OECD privacy principles. The approach presented in this paper is easily integrated into the current business model as it is implemented using a middleware that runs at the end-users side and utilizes the social nature of content distribution services to implement a topological data collection protocol. We depicted how our middleware can be integrated into a scenario related to preserving the privacy of the users' data which is utilized by a third party recommendation service in order to generate accurate referrals for users of mobile jukebox services while maintaining their sensitive information at their own side. Our collaborative privacy framework induces a straightforward solution with accurate results which are beneficial to both users and service providers.
    Journal of Platform Technology. 03/2014;
  • Hisain Elshaafi, Dmitri Botvich
    [Show abstract] [Hide abstract]
    ABSTRACT: In service-oriented environments, service providers orchestrate distributed services from other providers to create new composite enterprise services. A component service can be invoked jointly by several distributed composite service providers. However, because a composite service is provided to the consumers as an integrated service, when failures or dissatisfaction of the consumers occurs, it is not possible to directly identify the untrustworthy component. In this paper, we describe a collaborative trustworthiness determination approach using optimisation that can provide a solution to selecting trustworthy component service constructs based on monitoring and consumer quality of experience reporting of existing composite services from peer providers.
    Security and Communication Networks 03/2014; · 0.43 Impact Factor
  • AhmedM. Elmisery, Seungmin Rho, Dmitri Botvich
    Multimedia Tools and Applications 01/2014; · 1.01 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: The internet is evolving into a full-scale distributed service platform, offering a plethora of services from communications to business, entertainment, social connectivity and much more. The range of services and applications offered is diversifying, with new applications constantly emerging. For example, utility-based computing (e.g. HPC and cloud computing) which relies heavily on data-centre resources. These services will be more dynamic and sophisticated, providing a range of complex capabilities, which puts further burden on data-centres, in terms of supporting and managing these services. At the same time, society is becoming acutely aware of the significant energy burden the communications industry, and in particular data-centres, are becoming. With these trends in mind we propose a biologically inspired service framework that supports services which can autonomously carry out management functions. We then apply this framework to address the emerging problem of a sustainable future internet by autonomously migrating services to greener locations.
    International Journal of Grid and Utility Computing 10/2013; 4(4):278 - 292.
  • Source
    Dataset: DysonAHP
    Hans Maassen, Dmitri Botvich
  • Ahmed M. Elmisery, Dmitri Botvich
    [Show abstract] [Hide abstract]
    ABSTRACT: This work presents our efforts to design an agent based middleware that enables the end-users to use IPTV content recommender services without revealing their sensitive preference data to the service provider or any third party involved in this process. The proposed middleware (called AMPR) preserves users’ privacy when using the recommender service and permits private sharing of data among different users in the network. The proposed solution relies on a distributed multi-agent architecture involving local agents running on the end-user set up box to implement a two stage concealment process based on user role in order to conceal the local preference data of end-users when they decide to participate in recommendation process. Moreover, AMPR allows the end-users to use P3P policies exchange language (APPEL) for specifying their privacy preferences for the data extracted from their profiles, while the recommender service uses platform for privacy preferences (P3P) policies for specifying their data usage practices. AMPR executes the first stage locally at the end user side but the second stage is done at remote nodes that can be donated by multiple non-colluding end users that we will call super-peers Elmisery and Botvich (2011a, b, c); or third parties mash-up service Elmisery A, Botvich (2011a, b). Participants submit their locally obfuscated profiles anonymously to their local super-peer who collect and mix these preference data from multiple participants. The super-peer invokes AMPR to perform global perturbation process on the aggregated preference data to ensure a complete concealment of user’s profiles. Then, it anonymously submits these aggregated profiles to a third party content recommender service to generate referrals without breaching participants’ privacy. In this paper, we also provide an IPTV network scenario and experimentation results. Our results and analysis shows that our two-stage concealment process not only protect the users’ privacy, but also can maintain the recommendation accuracy
    Multimedia Tools and Applications 05/2013; 64(2). · 1.01 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: While there have been considerable advances in the modelling of 802.11's MAC layer in recent years, 802.11 with finite buffer space is considered difficult to analyse. In this paper, we study the impact of finite buffers' effect on the 802.11 performance, in view of the requirements of interactive applications sensitive to delay and packet loss. Using both state-of-the art and simplified queueing models, we identify a surprising result. Specifically, we find that increased buffering throughout an 802.11 network will not only incur delay, but may actually increase the packet loss experienced by stations. By means of numerical analysis and simulations we show that this non-monotonic behaviour arises because of the contention-based nature of the medium access protocol, whose performance is closely related to the traffic load and the buffer size. Finally, we discuss on protocol and buffer tuning towards eliminating such undesirable effect.
    Proceedings of International Workshop on Wireless Access Flexibility (WiFlex), Edited by Bianchi, Giuseppe and Lyakhov, Andrey and Khorov, Evgeny, 01/2013: pages 37-48; Springer Berlin Heidelberg.
  • Lei Shi, B. Butler, D. Botvich, B. Jennings
    [Show abstract] [Hide abstract]
    ABSTRACT: We study the problem of optimising the provisioning of collections of virtual machines (VMs) having different placement constraints (e.g., security and anti-collocation) and characteristics (e.g., memory and disk capacity), given a set of physical machines (PMs) with known specifications, in order to achieve the objective of maximising an IaaS cloud provider's revenue. We propose two approaches. The first is based on the formulation of the problem as an integer linear programming (ILP) problem, the solution to which provides an optimal VM placement. The second approach is a heuristic based on classifying the requests into different categories and satisfying the constraints in a particular order using a first lit decreasing (FFD) algorithm for multi-dimensional vector bin packing problem. Given a model of VM placement constraints, offered resources and requests with multiple VM types, both approaches devise a placement plan in a way that maximizes revenue, having due regard both to customer requirements and PM capacities. We evaluate the relative performance of the solutions by means of numerical experiments. The results suggest the optimal solution is not practical for medium to large problems, but it is encouraging that the placement plans of the heuristic are close to those of the optimal solution for smaller problem sizes. We use the heuristic to generate results for large scale placement problems; experiments suggest that it is practical in terms of its runtime efficiency and can provide an effective means of online VM-to-PM mapping.
    Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on; 01/2013
  • Hisain Elshaafi, Dmitri Botvich
    International Journal of Convergence (JoC). 01/2013; 4(1):31-37.
  • [Show abstract] [Hide abstract]
    ABSTRACT: Enzyme-based logical gates have been proposed as an alternative to conventional semiconductor gates in order to support computing at the nano-scale for nano-devices. In particular, certain enzyme-based implementations of AND, OR and NOT gates were proposed for further composing enzyme-based circuits for various Boolean functions. However, inputs and outputs of these gates are presented by different chemical species, and this results in potential incompatibility between gates. Therefore, opposite to conventional semiconductor gates not just any pair of enzyme-based logical gates may be used consequently in a circuit. This significantly complicates circuit creation and raises the question of the existence of an enzyme-based circuit for a generic Boolean function. This paper addresses the issue while providing its formal mathematical description together with an algorithm for enzyme-based circuit design.
    Nano Communication Networks 09/2012; 3(3):168–174.
  • Hisain Elshaafi, Jimmy Mcgibney, Dmitri Botvich
    Proc. 9th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2012); 09/2012
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Wireless body area networks (WBAN) provide a tremendous opportunity for remote health monitoring. However, engineering WBAN health monitoring systems encounters a number of challenges including efficient WBAN monitoring information extraction, dynamically fine tuning the monitoring process to suit the quality of data, and to allow the translation of high-level requirements of medical officers to low-level sensor reconfiguration. This paper addresses these challenges, by proposing an architecture that allows virtual groups to be formed between devices of patients, nurses, and doctors in order to enable remote analysis of WBAN data. Group formation and modification is performed with respect to patients' conditions and medical officers' requirements, which could be easily adjusted through high-level policies. We also propose, a new metric called the Quality of Health Monitoring, which allows medical officers to provide feedback on the quality of WBAN data received. The WBAN data gathered are transmitted to the virtual group members through an underlying environmental sensor network. The proposed approach is evaluated through a series of simulation.
    IEEE transactions on bio-medical engineering 07/2012; 59(11):3238-46. · 2.15 Impact Factor
  • Dmitri Botvich
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper presents an approach to monitoring and predicting the trustworthiness of services that are assembled from component services. In service compositions the number of component services that need to be aggregated may be large and dynamically changing. Additionally, the component services may vary in their importance to the value of the composite service and in their trustworthiness and resource capacity. Service compositions require the capability to dynamically adapt to changes that may occur at runtime. Those changes can occur in supply and demand, in the environment or in the component services' properties and behaviour. Service composers need to be able to respond swiftly to changed trustworthiness requirements and capabilities of service compositions, where those changes may not be easily predictable. With the availability of alternatives providing the same functionality as those already integrated in a composition, service composers can take advantage of this by replacing degrading or unsatisfactory components.
    Proceedings of the 2012 IEEE Symposium on Computers and Communications (ISCC); 07/2012
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Wireless Body Area Network (WBAN) in recent years have received significant attention, due to their potential for increasing efficiency in healthcare monitoring. Typical sensors used for WBAN are low powered single transceiver devices utilizing a single channel for transmission at the Medium Access Control (MAC) layer. However, performance of these devices usually degrades when the density of sensors increases. One approach to counter this performance degradation is to exploit multiple channels at the MAC layer, where optimal usage of the channels is achieved through cooperation between the sensor nodes. In this paper we propose a cooperative WBAN environment that supports multi-hop transmission through cooperation involving both environmental sensors and WBAN nodes. Our solution extends the cooperation at the MAC layer to a cross-layered gradient based routing solution that allows interaction between WBAN and environmental sensors in order to ensure data delivery from WBANs to a distant gateway. Extensive simulations for healthcare scenarios have been performed to validate the cooperation at the MAC layer, as well as the cross-layered gradient based routing. Comparisons to other cooperative multi-channel MAC and routing solutions have shown the overall performance improvement of the proposed approach evaluated in terms of packet loss, power consumption and delay.
    IEEE Transactions on Consumer Electronics 05/2012; 58(2):284-292. · 1.09 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: As Internet data centers (IDCs) have been increasing in scale and complexity, they are currently a significant source of energy consumption and CO2 emission. This paper proposes and evaluates a new framework to operate a federation of IDCs in a "green" way. The proposed framework, called Green Monster, dynamically moves services (i.e., workload) across IDCs for increasing renewable energy consumption while maintaining their performance. It makes decisions of service migration and placement with an evolutionary multiobjective optimization algorithm (EMOA) that evolves a set of solution candidates through global and local search processes. The proposed EMOA seeks the Pareto-optimal solutions by balancing the trade-offs among conflicting optimization objectives such as renewable energy consumption, cooling energy consumption and response time performance.
    01/2012;
  • Ahmed M Elmisery, Dmitri Botvich
    Security and Privacy in Mobile Information and Communication Systems, 01/2012: pages 64-75; Springer Berlin Heidelberg.
  • [Show abstract] [Hide abstract]
    ABSTRACT: There is growing awareness of the need to protect digital resources and services in both corporate and home ICT scenarios. Meanwhile, communication tools tailored for corporations are blurring the line between communication mechanisms and (near) real-time resource sharing. The resulting requirement for near real-time policy-based access control is technically challenging. In a corporate domain, such access control mechanisms must be unobtrusive and comply with strict security objectives. Thus policy evaluation performance needs to be considered while addressing traditional security concerns. This paper discusses policy system design principles that motivate a novel Policy Decision Point (PDP) implementation and associated policy language. These principles are consistent with recent web development techniques designed to improve performance and scalability. Given a modern web development stack comprising a language (Javascript), a framework (Node.js) and a database management system (Redis), the proposition is that significant performance gains can be made. Our performance experiments suggest this is the case when, through various design iterations, our prototype PDP implementation is compared with an established, Java/XACML-based access control PDP implementation. The experiments presented in this paper suggest that newer technologies offer better performance. The analysis suggests that this is because they offer a more efficient data representation and make better use of computing resources.
    Policies for Distributed Systems and Networks (POLICY), 2012 IEEE International Symposium on; 01/2012
  • H. Elshaafi, J. McGibney, D. Botvich
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper presents an approach to monitoring and predicting the trustworthiness of services that are assembled from component services. In service compositions the number of component services that need to be aggregated may be large and dynamically changing. Additionally, the component services may vary in their importance to the value of the composite service and in their trustworthiness and resource capacity. Service compositions require the capability to dynamically adapt to changes that may occur at runtime. Those changes can occur in supply and demand, in the environment or in the component services' properties and behaviour. Service composers need to be able to respond swiftly to changed trustworthiness requirements and capabilities of service compositions, where those changes may not be easily predictable. With the availability of alternatives providing the same functionality as those already integrated in a composition, service composers can take advantage of this by replacing degrading or unsatisfactory components.
    Computers and Communications (ISCC), 2012 IEEE Symposium on; 01/2012
  • Source
    Alan Davy, Brendan Jennings, Dmitri Botvich
    [Show abstract] [Hide abstract]
    ABSTRACT: In this article we present QoSPlan—a measurement based framework for preparing information relevant to Quality of Service (QoS)-aware IP network planning, which aims at reducing a core operational expenditure for the network operator. QoSPlan is designed to reduce the cost of deployment and maintenance of network monitoring systems. The process involves analysis of pre-existing accounting data to estimate a network-wide traffic matrix. Part of this estimation process relates to the generalization of QoS-related effective bandwidth coefficients taken from traffic analyzed on the network. We offer recommendations on how to appropriately realize QoSPlan to maximize its accuracy and effectiveness when applied to different network traffic scenarios. This is achieved through a thorough sensitivity analysis of the methods proposed using real traffic scenarios and indicative network topologies. We also provide an economic analysis of the deployment and maintenance costs associated with QoSPlan in comparison to a direct measurement approach, demonstrating cost savings of up to 60 % given different topology sizes.
    Journal of Network and Systems Management 01/2012; · 0.43 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: There has been much research activity recently in relation to the optimal placement of virtual machines (VMs) on physical servers. Usually the objective is to consolidate the VMs on servers for energy-saving purposes in a cloud environment. In this paper, we study the problem of optimizing the allocation of VMs having different placement constraints (e.g., security and anti-collocation) and characteristics (e.g., memory and disk capacity), given a set of physical hosts with known specifications, in order to achieve the objective of maximizing the cloud provider's revenue. This is an important resource allocation problem in data centers. Our approach is based on the formulation of the problem as an integer linear programming (ILP) problem. The ILP model produces an optimal placement for VMs with different placement constraints. Given a model of VM placement constraints, offered resources and required VM sets, the model devises a plan to allocate VMs to servers in a way that maximizes revenue, having due regard both to customer requirements and server capacities. The performance of the algorithms is evaluated by means of numerical experiments. Experiments suggest that this model and its associated solution strategy is practical for the offline development of VM-to-server allocation plans given a typical mix of customer demands for virtualized computing resources in small or medium data centers.
    ICT and Energy Efficiency and Workshop on Information Theory and Security (CIICT 2012), Symposium on; 01/2012