Amjad Ullah

Amjad Ullah
Edinburgh Napier University · School of Computing

Doctor of Philosophy

About

20
Publications
1,926
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
179
Citations
Introduction

Publications

Publications (20)
Article
The rapid advancement in consumer technology has led to an exponential increase in the connected devices, resulting in an enormous and continuous flow of data, particularly the image data. This data needs to be processed, managed, and secured efficiently, especially in the quantum-enabled consumer technology era. This paper, in this regards, presen...
Article
Full-text available
IoT systems are becoming an essential part of our environment. Smart cities, smart manufacturing, augmented reality, and self-driving cars are just some examples of the wide range of domains, where the applicability of such systems have been increasing rapidly. These IoT use cases often require simultaneous access to geographically distributed arra...
Preprint
Full-text available
IoT systems are becoming an essential part of our environment. Smart cities, smart manufacturing, augmented reality, and self-driving cars are just some examples of the wide range of domains, where the applicability of such systems has been increasing rapidly. These IoT use cases often require simultaneous access to geographically distributed array...
Article
The proliferating adoption of the Internet of Things (IoT) paradigm has fuelled the need for more efficient and resilient access control solutions that aim to prevent unauthorized resource access. The majority of existing works in this field follow either a centralized approach (i.e. cloud-based) or an architecture where the IoT devices are respons...
Article
Science gateways have been widely utilized by a large number of user communities to simplify access to complex distributed computing infrastructures. While science gateways are still becoming increasingly popular and the number of user communities is growing, the fast and efficient creation of new science gateways and the flexibility to deploy thes...
Article
Full-text available
Automated deployment and run-time management of microservices-based applications in cloud computing environments is relatively well studied with several mature solutions. However, managing such applications and tasks in the cloud-to-edge continuum is far from trivial, with no robust, production-level solutions currently available. This paper presen...
Chapter
Functional Encryption (FE) allows users who hold a specific secret key (known as the functional key) to learn a specific function of encrypted data whilst learning nothing about the content of the underlying data. Considering this functionality and the fact that the field of FE is still in its infancy, we sought a route to apply this potent tool to...
Article
Full-text available
The elasticity in cloud is essential to the effective management of computational resources as it enables readjustment at runtime to meet application demands. Over the years, researchers and practitioners have proposed many auto-scaling solutions using versatile techniques ranging from simple if-then-else based rules to sophisticated optimisation,...
Chapter
Symmetric Searchable Encryption (SSE) is an encryption technique that allows users to search directly on their outsourced encrypted data while preserving the privacy of both the files and the queries. Unfortunately, majority of the SSE schemes allows users to either decrypt the whole ciphertext or nothing at all. In this paper, we propose a novel s...
Article
Full-text available
The lucrative features of cloud computing such as pay-as-you-go pricing model and dynamic resource provisioning (elasticity) attract clients to host their applications over the cloud to save up-front capital expenditure and to reduce the operational cost of the system. However, the efficient management of hired computational resources is a challeng...
Article
Elasticity enables cloud customers to enrich their applications to dynamically adjust underlying cloud resources. Over the past, a plethora of techniques have been introduced to implement elasticity. Control theory is one such technique that offers a systematic method to design feedback controllers to perform elasticity. Many of the available such...
Conference Paper
The successful usage of fuzzy systems can be seen in many application domains owing to their capabilities to model complex systems by exploiting knowledge of domain experts. Their accuracy and performance are, however, primarily dependent on the design of its membership functions and control rules. The commonly employed technique to design membersh...
Article
Full-text available
Cloud elasticity augments applications to dynamically adapt to changes in demand by acquiring or releasing computational resources on the fly. Recently, we developed a framework for cloud elasticity utilizing multiple feedback controllers simultaneously, wherein, each controller determines the scaling action with different intensity, and the select...
Conference Paper
The systems deployed over cloud are subject to unpredictable workload conditions that vary from time to time, e.g. an ecommerce website may face higher workloads than normal during festivals or promotional schemes. In order to maintain the performance of such systems, an efficient elastic resource provisioning strategy is required. However, providi...

Network

Cited By