Raid Hussein

Raid Hussein
University of Southampton · Department of Electronics and Computer Science (ECS)

PhD candidate

About

9
Publications
6,599
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
110
Citations
Citations since 2016
9 Research Items
110 Citations
20162017201820192020202120220510152025
20162017201820192020202120220510152025
20162017201820192020202120220510152025
20162017201820192020202120220510152025

Publications

Publications (9)
Chapter
Full-text available
In the last few years, the cloud computing paradigm experienced a considerable growth, making it the de-facto technology fuelling almost all major online services. At the same time, the concept of Internet of Things has started to gain mainstream traction with the promise to usher a new era of pervasive sensing using a weave of numerous inter-conne...
Chapter
Full-text available
Any organisation using the internet to conduct business is vulnerable to violation of security. Currently security in most organizations relates to protection of data and the management of their business information systems. Hence, security is often defined as the protection of information, the system, and hardware; that use, store and relocates th...
Article
Full-text available
The Internet of Things (IoT) has spread into multiple dimensions that incorporate different physical and virtual things. These things are connected together using different communication technologies to provide unlimited services. These services help not only to improve the quality of our daily lives, but also to provide a communication platform fo...
Article
Full-text available
The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction...
Article
Full-text available
The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction...
Conference Paper
Full-text available
Many have argued that cloud computing is one of the fastest growing and most transformative technologies in the history of computing. It has radically changed the way in which information technologies can manage, access, deliver and create services. It has also brought numerous benefits to end-users and organizations. However, this rapid growth in...
Chapter
Full-text available
Any organisation using the internet to conduct business is vulnerable to violation of security. Currently security in most organizations relates to protection of data and the management of their business information systems. Hence, security is often de?ned as the protection of information, the system, and hardware; that use, store and relocates tha...

Network

Cited By

Projects

Project (1)
Project
There is a number of security and privacy issues at different layer in cloud computing architecture. Among the security issues, the ones in virtualization layer need to be considered. Virtualization is a significant component for cloud as it helps the cloud to deliver its services. The virtual machine(VM) image sharing is the most significant and it might affect the security of the cloud as it is the template used to initialize a new VM as shown in figure1.The aim of this study is to secure the shared VM image in cloud computing.