Andrey Brito

Andrey Brito
Universidade Federal de Campina Grande (UFCG) | UFCG · Departamento de Sistemas e Computação (DSC)

About

88
Publications
11,277
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
645
Citations
Additional affiliations
March 2005 - October 2010
Technische Universität Dresden
Position
  • Research Assistant

Publications

Publications (88)
Conference Paper
Full-text available
This work proposes an energy physicalization for long-term sharing of Smart Campus data: Lumiphys. We designed Lumiphys to increase the community's awareness of the campus energy consumption inspired by previous examples of energy visualizations but based on criteria to ensure its durability, integration with the environment, and visual encoding fa...
Preprint
Full-text available
Trusted Execution Environments (TEEs), such as Intel Software Guard eXtensions (SGX), are considered as a promising approach to resolve security challenges in clouds. TEEs protect the confidentiality and integrity of application code and data even against privileged attackers with root and physical access by providing an isolated secure memory area...
Conference Paper
Apache Kafka has become a popular tool for building distributed systems. It supports a diversity of use cases that benefit from decoupled N-to-M communication such as publishing IoT data, decoupling and load-balancing microservices, and serve as a central hub for data in a distributed application. Nevertheless, Kafka's security is restricted to enc...
Conference Paper
Full-text available
Optimizing resource distribution in datacenters can achieve several economic benefits, including increasing energy efficiency, better workload performance , and higher levels of job acceptance. Although some studies propose strategies that increase resource utilization whilst meeting a certain QoS, there is a perspective yet to be exploited: the Se...
Article
Medical data processing has found a new dimension with the extensive use of machine-learning techniques to classify and extract features. Machine learning strongly benefits from computing accelerators. However, such accelerators are not easily available at hospital premises, although they can be easily found on public cloud infrastructures or resea...
Article
Full-text available
Abstract Cloud computing considerably reduces the costs of deploying applications through on-demand, automated and fine-granular allocation of resources. Even in private settings, cloud computing platforms enable agile and self-service management, which means that physical resources are shared more efficiently. Cloud computing considerably reduces...
Preprint
Full-text available
This paper presents our preliminary results with ABEONA, an edge-to-cloud architecture that allows migrating tasks from low-energy, resource-constrained devices on the edge up to the cloud. Our preliminary results on artificial and real world datasets show that it is possible to execute workloads in a more efficient manner energy-wise by scaling ho...
Conference Paper
The massive amount of information being generated nowadays results in the need for efficient data processing frameworks. For sensitive information, concerns also emerge regarding data integrity and confidentiality. To address such concerns, we present Asperathos, a configurable framework to automate the execution of batch applications in cloud envi...
Article
Full-text available
Marathon and Chronos are two popular Mesos frameworks widely used for deploying fault-tolerant services and periodic batch jobs. Marathon and Chronos provide mechanisms for horizontal elasticity, scaling up and down the number of job and service instances. Horizontal elasticity is appropriate when the problems that are solved are inherently paralle...
Article
Full-text available
In an increasingly connected world, a diversity of data is collected from the environment and its inhabitants. Because of the richness of the information, privacy becomes an important requirement. Although there are principles and rules, there is still a lack of methodologies to guide the integration of privacy guidelines into the development proce...
Conference Paper
In the late few years, cloud computing has been moving towards becoming the predominant infrastructure paradigm because of its scale economy advantages. Consequently, a great deal of sensitive and valuable information has begun to inhabit the cloud environment. At the current stage, a large amount of organizations is yet to step to the public cloud...
Article
Full-text available
Analysis of public transportation data in large cities is a challenging problem. Managing data ingestion, data storage, data quality enhancement, modelling and analysis requires intensive computing and a non-trivial amount of resources. In EUBra-BIGSEA (Europe–Brazil Collaboration of Big Data Scientific Research Through Cloud-Centric Applications)...
Conference Paper
Full-text available
A problem observed in cloud environments is the assurance of Quality of Service (QoS) in the execution of applications. In the context of batch applications, a common goal is ensuring deadline compliance. However, estimating the required amount of resources to assure execution deadline may be difficult and prone to un-derallocations or superallocat...
Conference Paper
The increasing urban population sets new demands for mobility solutions. The impacts of traffic congestions or inefficient transit connectivity directly affect public health (e.g. emissions and stress) and the city economy (e.g. deaths in road accidents, productivity, and commuting). In parallel, the advance of technology has made it easier to obta...
Conference Paper
Full-text available
This paper presents PUBSUB-SGX, a content-based publish-subscribe system that exploits trusted execution environments (TEEs), such as Intel SGX, to guarantee confidentiality and integrity of data as well as anonymity and privacy of publishers and subscribers. We describe the technical details of our Python implementation, as well as the required sy...
Conference Paper
In this paper, we present our approach for solving the DEBS Grand Challenge 2018. The challenge asks to provide a prediction for (i) a destination and the (ii) arrival time of ships in a streaming-fashion using Geo-spatial data in the maritime context. Novel aspects of our approach include the use of ensemble learning based on Random Forest, Gradie...
Preprint
Full-text available
The Internet of Things (IoT) field has gained much attention from industry and academia, being the main subject for numerous research and development projects. Frequently, the dense amount of generated data from IoT applications is sent to a cloud service, that is responsible for processing and storage. Many of these applications demand security an...
Conference Paper
Full-text available
The Internet of Things (IoT) field has gained much attention from industry and academia, being the main subject for numerous research and development projects. Frequently, the dense amount of generated data from IoT applications is sent to a cloud service, that is responsible for processing and storage. Many of these applications demand security an...
Conference Paper
Full-text available
Um grande desafio na concepção e operação de uma federação de provedores de computação na nuvem é a implementação de um modelo de negócio adequado que viabilize o funcionamento da federação. Modelos de negócio baseados em escambo foram propostos como uma forma barata e eficiente para mediar as transações entre os provedores que compõem a federação....
Article
Full-text available
The use of cloud computing has become common due to advantages such as low cost and sizing of computing resources according to demand. However, it also raises security and privacy concerns, because critical data – for example, in IoT applications – are stored and processed in the cloud. This paper proposes a software architecture that supports mult...
Conference Paper
In this paper we propose a data dissemination platform that supports data security and different privacy levels even when the platform and the data are hosted by untrusted infrastructures. The proposed system aims at enabling an application ecosystem that uses off-the-shelf trusted platforms (in this case, Intel SGX), so that users may allow or dis...
Conference Paper
Full-text available
Currently, detection of incidents related to cyber threats is considered a challenging task. The increasing number of threats in the network makes information security as a significant topic for discussion in the security community , conducting studies that propose or implement solutions for privacy and protection of users on the network. Despite t...
Conference Paper
Full-text available
Intel(R) Software Guard eXtensions (SGX) is a hardware-based technology for ensuring security of sensitive data from disclosure or modification that enables user-level applications to allocate protected areas of memory called enclaves. Such memory areas are cryptographically protected even from code running with higher privilege levels. This memory...
Conference Paper
Internet of Things (IoT) systems have aroused enthusiasm and concerns. Enthusiasm comes from their utilities in people daily life, and concerns may be associated with privacy issues. By using two IoT systems as case-studies, we examine users' privacy beliefs, concerns and attitudes. We focus on four major dimensions: the collection of personal data...
Article
Although cloud computing offers many advantages with regards to adaption of resources, we witness either a strong resistance or a very slow adoption to those new offerings. One reason for the resistance is that (i) many technologies such as stream processing systems still lack of appropriate mechanisms for elasticity in order to fully harness the p...
Conference Paper
Full-text available
Smart metering is an essential feature of smart grids, allowing residential customers to monitor and reduce electricity costs. Devices called smart meters allows residential customers to monitor and reduce electricity costs, promoting energy saving, demand management, and energy efficiency. However, monitoring a households' energy consumption throu...
Conference Paper
Data centers have been criticized for being heavy consumers of energy, accounting for a significant share of the world's total energy use. This is compounded by the fact that a large portion of the computational resources in data centers remains idle most of the time, while nevertheless consuming a great amount of energy even in an idle state. One...
Article
Full-text available
Smart meters read electric usage and enable power providers to collect detailed consumption data from consumers. Based on this data, power providers can perform and improve many services such as differential tariffs and load monitoring. However, these readings also gather personal information that can be intrusive and threaten consumers’ privacy. C...
Conference Paper
Full-text available
The use of cloud computing has become common due to advantages such as low cost and sizing of computing resources according to demand. However, there are concerns about security and privacy, because critical data -- especially in IoT applications -- are stored and processed in the cloud. This paper proposes a software architecture that supports mul...
Conference Paper
Full-text available
Smart energy meters grant to power providers the capability to perform many advanced services, and several countries already started to deploy them. However, data analysis can raise privacy issues by inferring daily activities and appliance usages of consumers. Hence, there is a crucial need to deal with the problem of consumers’ privacy in smart m...
Conference Paper
The main objective of this paper is to introduce and show some results concerning a novel form of indirect reciprocity, called transitive reciprocity, extending an incentive mechanism for cooperation in P2P systems based exclusively on direct reciprocity, called the Network of Favors. We define transitive indirect reciprocity and show with the aid...
Conference Paper
In this paper, we present our approach for solving the DEBS Grand Challenge 2016 using StreamMine3G, a distributed, highly scalable, elastic and fault tolerant event stream processing (ESP) system. We first provide an overview about StreamMine3G with regards to its programming model and architecture, followed by thorough description of the implemen...
Conference Paper
In this paper, we present our approach for solving the DEBS Grand Challenge 2015 using StreamMine3G, a distributed, highly scalable, elastic and fault tolerant ESP system. We first provide an overview about the system architecture of StreamMine3G followed by a thorough description of our implementation for the two queries that provide continuously...
Conference Paper
Full-text available
An important cloud federation enabler is the development of suitable business models, which has so far received relatively little attention from investigators. Few efforts have been dedicated to investigation of business models for enabling cloud federations, especially with regard to distribution issues, in which centralized solutions are usually...
Conference Paper
Full-text available
Provedores privados de computação na nuvem poderiam obter considerável benefício mútuo ao operar suas infraestruturas de forma federada. Tal operação permite que a demanda excedente de um provedor possa ser atendida por outros provedores que estejam experimentando uma baixa demanda naquele mesmo instante. Neste trabalho, propomos a utilização de um...
Conference Paper
Full-text available
Power providers have started replacing traditional electricity meters for Smart Meters, which can transmit current power consumption levels to the provider within short intervals. Based on this data, power providers can perform and improve many service activities such as differential tariffs and load predictions. However, this also threatens consum...
Conference Paper
Full-text available
As natural resources have become scarce and more costly throughout the past years, efficient resource management techniques such as smart grids have gained increasing importance. Smart grids enable an efficient power grid through the usage of information technologies. For example, demand forecasting based on energy consumption data provided by smar...
Conference Paper
Full-text available
A drawback of the Viola and Jones framework for object detection in digital images is the large amount of time needed to train the underlying cascade classifiers. In this paper, we propose a novel hybrid approach for parallelizing that framework. The approach employs message passing among computers and multi-threading in the processor cores, hence...
Conference Paper
Full-text available
In this paper, we present our approach on solving the DEBS Grand Challenge using StreamMine3G, a distributed, highly scalable, elastic and fault tolerant ESP system. We will provide an overview about the system architecture of Stream-Mine3G and implementation details of an application aimed at consumption prediction and outlier detection. Using our...
Article
Click stream analysis is a common approach for analyzing customer behavior during the navigation through e-commerce or social network sites. Performing such an analysis in real-time opens up new business opportunities as well as increases revenues as recommendations can be generated on the fly making a previously unknown product to the potential cu...
Conference Paper
Full-text available
With a Smart Metering infrastructure, there are many motivations for power providers to collect high-resolution data of energy usage from consumers. However, this collection implies very detailed information about the energy consumption of consumers being monitored. Consequently, a serious issue needs to be addressed: how to preserve the privacy of...
Article
The foundation of cloud computing is to leverage virtualised physical computing resources by offering them on demand as elastic infrastructure services. Processing, storage and networking resources can thus be perceived and traded comparable to existing utility services. A restriction of conventional infrastructure services is the missing flexibili...
Conference Paper
From the perspective of a typical cloud user, clouds are a source of unlimited computational resources that can be contracted as needed. As a consequence, users are relieved from the task of planning the capacity of their infrastructure. In practice, the problem of capacity planning has simply shifted from the cloud users to the cloud providers. Th...
Conference Paper
In this paper, we present StreamMine3G One Click, a web based application relieving users from the burden of the complex installation and setup process of Event Stream Processing (ESP) systems such as StreamMine3G in cloud environments. Using StreamMine3G One Click, users just upload their application logic and choose their favorite cloud provider...
Article
Full-text available
Virtual machine images and instances (VMs) in cloud computing centres are typically designed as isolation containers for applications, databases and networking functions. In order to build complex distributed applications, multiple virtual machines must be connected, orchestrated and combined with platform and infrastructure services from the hosti...
Conference Paper
This paper proposes a new policy for dynamic frequency scaling: productivity-aware frequency scaling (PAFS). PAFS aims at optimizing energy consumptions while still satisfying performance requirements of a given application. In contrast to the commonly-used on demand frequency scaling, PAFS may keep the processor in a power save state even in high...
Conference Paper
The on-demand provisioning of computing and storage resources and the corresponding pay-as-you-go billing have made cloud computing a popular paradigm to achieve a high technological utility. While most use cases can adequately be covered by the offers of existing public cloud providers, the granularity in provisioning and pricing is not high enoug...
Conference Paper
Full-text available
Cloud computing infrastructure services encompass temporally, spatially and structurally coarse-grained access to computing resources. This prevents a genuine pay-per-use model for the consumer and effectively leads to over-reservation and inadequate tariffs especially for short-term, small-scale computations. We propose an economically motivated c...