Sukhpal Singh Gill

Sukhpal Singh Gill
Queen Mary, University of London | QMUL · School of Electronic Engineering and Computer Science

PhD
Lecturer in Cloud Computing

About

139
Publications
402,308
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,864
Citations
Introduction
Dr. Sukhpal Singh Gill is a Lecturer (Assistant Professor) in Cloud Computing at School of Electronic Engineering and Computer Science (EECS), Queen Mary University of London (QMUL), UK. Prior to this, Dr. Gill has held positions as a Research Associate at the School of Computing and Communications, Lancaster University, UK and also as a Postdoctoral Research Fellow at the Cloud Computing and Distributed Systems (CLOUDS) Laboratory, School of Computing and Information Systems, The University of Melbourne, Australia. Dr. Gill was a research visitor at Monash University, University of Manitoba and Imperial College London.
Additional affiliations
September 2019 - present
Queen Mary, University of London
Position
  • Lecturer
September 2018 - August 2019
Lancaster University
Position
  • Research Associate
July 2017 - August 2018
University of Melbourne
Position
  • PostDoc Position
Education
July 2011 - July 2013
Thapar University
Field of study
  • Software Engineering

Publications

Publications (139)
Article
Full-text available
Cloud computing plays a critical role in modern society and enables a range of applications from infrastructure to social media. Such system must cope with varying load and evolving usage reflecting societies’ interaction and dependency on automated computing systems whilst satisfying Quality of Service (QoS) guarantees. Enabling these systems are...
Article
Full-text available
Serverless computing has become an important cloud model delivering service to users based on the amount of resources consumed by the Internet of Things (IoT) applications. Edge computing can be utilized for Serverless computing to process small or deadline oriented jobs efficiently at edge devices helping to reduce latency. Furthermore, security a...
Article
Full-text available
Autonomic computing investigates how systems can achieve (user) specified “control” outcomes on their own, without the intervention of a human operator. Autonomic computing fundamentals have been substantially influenced by those of control theory for closed and open-loop systems. In practice, complex systems may exhibit a number of concurrent and...
Chapter
Full-text available
The advancements in the use of Internet of Things (IoT) devices is increasing continuously and generating huge amounts of data in a fast manner. Cloud computing is an important paradigm which processes and manages user data effectively. Further, fog and edge computing paradigms are introduced to improve user service by reducing latency and response...
Preprint
Full-text available
Climate change has become one of the biggest global problems increasingly compromising the Earth's habitability. Recent developments such as the extraordinary heat waves in California & Canada, and the devastating floods in Germany point to the role of climate change in the ever-increasing frequency of extreme weather. Numerical modelling of the we...
Book
Full-text available
Quantum computing is a field in which advanced technologies like quantum communication, artificial intelligence, and machine learning can be used to secure and speed up connectivity using quantum computers, quantum drones, or quantum satellites. This book serve as a foundation for researchers and scientists in this field. Future technologies, such...
Article
The compute-intensive and latency-sensitive Internet of Things (IoT) applications need to utilise the services from various computing paradigms, but they are facing many challenges such as large value of latency, energy and network bandwidth. To analyse and understand these challenges, we designed a performance evaluation benchmark which integrates...
Article
Full-text available
With the emergence of COVID-19, smart healthcare, the Internet of Medical Things, and big data-driven medical applications have become even more important. The biomedical data produced is highly confidential and private. Unfortunately, conventional health systems cannot support such a colossal amount of biomedical data. Hence, data is typically sto...
Book
Full-text available
Publisher: The book will be published in Springer Book Series, which is indexed in Scopus etc. Theme : In recent times, advancements to blockchain and quantum technologies are widely discussed on various platforms. These technologies and their integration with other useful technologies of recent times have created numerous applications and abilitie...
Article
This paper proposes IoT-based an enterprise health information system called IoTPulse to predict alcohol addiction providing real-time data using machine-learning in fog computing environment. We used data from 300 alcohol addicts from Punjab (India) as a case study to train machine-learning models. The performance of IoTPulse is compared against e...
Article
This paper proposes a novel lightweight security-enabled distributed software-defined drone network (SDDN) for traffic monitoring. Security of drone/Unmanned Aerial Vehicles (UAV) communication and data exchange is ensured through lightweight key generation and encryption/decryption algorithm. A hybrid (static and dynamic) OpenMP/MPI-based distribu...
Preprint
Traditional and lightweight cryptography primitives and protocols are insecure against quantum attacks. Thus, a real-time application using traditional or lightweight cryptography primitives and protocols does not ensure full-proof security. Post-quantum Cryptography is important for the Internet of Things (IoT) due to its security against Quantum...
Conference Paper
As the concept of the Internet of Things (IoT) has gained attraction, we are seeing an increase in the number of smart homes equipped with Internet-capable devices (such as smart door locks, disaster detectors, and sweeping robots). As a result of the volume of data generated by these connected devices, storage space may be limited, and network con...
Article
The global pandemic has forced lecturers and academics to transform how computer science is taught. Discover how innovative technology and techniques are being used during lectures that can now reach an international audience.
Article
COVID‐19 vaccines have a limited supply, and there is a huge gap between supply and demand, leading to disproportionate administration. One of the main conditions on which balanced and optimal vaccine distribution depends are the health conditions of the vaccine recipients. Vaccine administration of front‐line workers, the elderly, and those with d...
Conference Paper
Artificial intelligence (AI)-based studies have been carried out recently for the early detection of COVID-19. The goal is to prevent the spread of the disease and the number of fatal cases. In AI-based COVID-19 diagnostic studies, the integrity of the data is critical to obtain reliable results. In this paper, we propose a Blockchain-based framewo...
Conference Paper
Over the last decade, there has been a gradual increase in the number of learners on Computer Science-based programmes, which in turn has led to a situation where educators have been teaching large classes. This is a challenge, as it can be difficult for educators to provide personalised support for each learner. The pandemic has only exasperated t...
Conference Paper
The application of the Internet of Things (IoT) and Artificial Intelligence (AI) in healthcare is an emerging domain. In Healthcare applications, relying on both IoT and AI requires paying attention to latency, responsiveness and management of data loads. Most of the healthcare applications are based on Cloud computing and use Cloud platforms such...
Preprint
Full-text available
Cloud computing has been regarded as a successful paradigm for IT industry by providing benefits for both service providers and customers. In spite of the advantages, cloud computing also suffers from distinct challenges, and one of them is the inefficient resource provisioning for dynamic workloads. Accurate workload predictions for cloud computin...
Preprint
Full-text available
Autonomic computing investigates how systems can achieve (user) specified control outcomes on their own, without the intervention of a human operator. Autonomic computing fundamentals have been substantially influenced by those of control theory for closed and open-loop systems. In practice, complex systems may exhibit a number of concurrent and in...
Article
In the context of the global health crisis of 2020, the tendency of many people to self-diagnose at home virtually, prior to any physical interaction with medical professionals, has been increased. Existing self-diagnosis systems include those accessible via the Internet, which involve entering one’s symptoms. Several other methods do exist, for ex...
Article
It is possible to develop intelligent and self‐adaptive application on the edge nodes with rapid increase in computational capability of Internet of Things (IoT) devices. With the rapid growth of cloud technologies, the demand for hybrid architecture with cloud and IoT has also been boosted as well. To satisfy the critical and comprehensive require...
Book
Full-text available
Autonomous and Connected Heavy Vehicle Technology presents the fundamentals, definitions, technologies, standards and future developments of autonomous and connected heavy vehicles. This book provides insights into various issues pertaining to heavy vehicle technology and helps users develop solutions towards autonomous, connected, cognitive soluti...
Chapter
Autonomous Vehicles have a bigger role in the future. In a real-life application, an autonomous vehicle can be used by a passenger to reach its destination autonomously with necessary maneuverings. The autonomous vehicle includes multiple computing devices which can be easily operated by users using input buttons. Thus, communicating requests from...
Article
Full-text available
Technology providers heavily exploit the usage of edge‐cloud data centers (ECDCs) to meet user demand while the ECDCs are large energy consumers. Concerning the decrease of the energy expenditure of ECDCs, task placement is one of the most prominent solutions for effective allocation and consolidation of such tasks onto physical machine (PM). Such...
Preprint
Full-text available
Quantum computing is an emerging paradigm with the potential to offer significant computational advantage over conventional classical computing by exploiting quantum-mechanical principles such as entanglement and superposition. It is anticipated that this computational advantage of quantum computing will help to solve many complex and computational...
Chapter
The next generation Internet of Things (IoT) applications are offering multiple services and run in a distributed heterogeneous environment. In such applications, Quality of Service (QoS) requirements are in jeopardy when the computing operations are only outsourced to the public cloud. For IoT applications, a comprehensive framework that supports...
Article
Since the Covid-19 pandemic, we have seen a surge of retail investors that now can easily trade anywhere in the world with just a smartphone. Social media groups such as Reddit's WallStreetBets have almost put a few hedge funds close to bankruptcy by driving GameStop share prices to the sky. In this work, we propose a framework called GRAPES which...
Article
Heart disease kills more people around the world than any other disease, and it is one of the leading causes of death in the UK, triggering up to 74,000 deaths per year. An essential part in the prevention of deaths by heart disease and thus heart disease itself is the analysis of biomedical markers to determine the risk of a person developing hear...
Article
Full-text available
Fog computing has become adaptable and also as a promising infrastructure for providing elastic resources at the edge of the network. Fog computing reduces the transmission latency and consumption of bandwidth while processing the incoming requests from various Internet of Things (IoT) devices. Moreover, fog computing can support and facilitate geo...
Article
Traditional and lightweight cryptography primitives and protocols are insecure against quantum attacks. Thus, a real‐time application using traditional or lightweight cryptography primitives and protocols does not ensure full‐proof security. Post‐quantum cryptography is important for the internet of things (IoT) due to its security against quantum...
Article
Cloud federations offer numerous advantages such as improved resilience, improved performance, and the prevention of vendor lock-in. In order to function efficiently, however, they must be supported by automated solutions to deploy cloud resources securely and efficiently. In particular, a system which allows virtual machine (VM) migration from one...
Article
Full-text available
A common performance problem in large-scale cloud systems is dealing with straggler tasks that are slow running instances which increase the overall response time. Such tasks impact the system's QoS and the SLA. There is a need for automatic straggler detection and mitigation mechanisms that execute jobs without violating the SLA. Prior work typica...
Chapter
In the modern era of Information Technology, a combined solution framework integrating Wireless Sensor Network (WSN), Internet of Things (IoT), cloud and edge computing, data analytics, and other related technologies are explored and the newest proposals for its probable implementation in the arena of farming is stated in this chapter. Briefing Mob...
Preprint
Full-text available
Modern large-scale computing systems distribute jobs into multiple smaller tasks which execute in parallel to accelerate job completion rates and reduce energy consumption. However, a common performance problem in such systems is dealing with straggler tasks that are slow running instances that increase the overall response time. Such tasks can sig...
Preprint
Full-text available
The worldwide adoption of cloud data centers (CDCs) has given rise to the ubiquitous demand for hosting application services on the cloud. Further, contemporary data-intensive industries have seen a sharp upsurge in the resource requirements of modern applications. This has led to the provisioning of an increased number of cloud servers, giving ris...
Preprint
Full-text available
The advancements in the use of Internet of Things (IoT) devices is increasing continuously and generating huge amounts of data in a fast manner. Cloud computing is an important paradigm which processes and manages user data effectively. Further, fog and edge computing paradigms are introduced to improve user service by reducing latency and response...
Poster
Full-text available
Serverless Computing is a paradigm shift in distributed computing. Recently, many companies rely on serverless computing for their product application development and deployment, marketing analysis and customer relationship without investing excess on infrastructure development and maintenance. This book aims to bring single point of resources for...
Article
Full-text available
Distributed systems have been an active field of research for over 60 years, and has played a crucial role in computer science, enabling the invention of the Internet that underpins all facets of modern life. Through technological advancements and their changing role in society, distributed systems have undergone a perpetual evolution, with each ch...
Preprint
Full-text available
Accurate short range weather forecasting has significant implications for various sectors. Machine learning based approaches, e.g., deep learning, have gained popularity in this domain where the existing numerical weather prediction (NWP) models still have modest skill after a few days. Here we use a ConvLSTM network to develop a deep learning mode...
Article
Full-text available
As data of COVID-19 patients is increasing, the new framework is required to secure the data collected from various Internet of Things (IoT) devices and predict the trend of disease to reduce its spreading. This article proposes a security and privacy-based lightweight framework called iFaaSBus, which uses the concept of IoT, Machine Learning (ML),...
Article
Full-text available
With the modern advancements in Deep Learning architectures, and abundant research consistently being put forward in areas such as computer vision, natural language processing and forecasting. Models are becoming complicated and datasets are growing exponentially in size demanding high performing and faster computing machines from researchers and e...
Preprint
Full-text available
The formation of precipitation in state-of-the-art weather and climate models is an important process. The understanding of its relationship with other variables can lead to endless benefits, particularly for the world's monsoon regions dependent on rainfall as a support for livelihood. Various factors play a crucial role in the formation of rainfa...
Article
Full-text available
The elasticity characteristic of cloud services attracts application providers to deploy applications in a cloud environment. The scalability feature of cloud computing gives the facility to application providers to dynamically provision the computing power and storage capacity from cloud data centers. The consolidation of services to few active se...
Chapter
Cloud computing utilizes thousands of Cloud Data Centres (CDC) and fulfils the demand of end-users dynamically using new technologies and paradigms such as Industry 4.0 and Internet of Things (IoT). With the emergence of Industry 4.0, the quality of cloud service has increased; however, CDC consumes a large amount of energy and produces a huge quan...
Article
Full-text available
There has been rapid development in the number of Internet of Things (IoT) connected nodes and devices in our daily life in recent times. With this increase in the number of devices, fog computing has become a well-established paradigm to optimize various key Quality of Service (QoS) requirements such as latency, bandwidth limitation, response time...
Article
In cloud computing environments, when a client wants to access any resources, hardware components, or application services, he needs to get a subscription for the same from service providers. The usages of each client are monitored over a network by service providers and later on user will be charged for the services used. Cloud service provider is...
Preprint
Full-text available
In the world of Information Technology, new computing paradigms, driven by requirements of different classes of problems and applications, emerge rapidly. These new computing paradigms pose many new research challenges. Researchers from different disciplines are working together to develop innovative solutions addressing them. In newer research are...
Preprint
Full-text available
Global lockdowns in response to the COVID-19 pandemic have led to changes in the anthropogenic activities resulting in perceivable air quality improvements. Although several recent studies have analyzed these changes over different regions of the globe, these analyses have been constrained due to the usage of station based data which is mostly limi...
Article
Full-text available
Teaching and research are the two sides of a coin; both are very important for an academician. As per the current demand of the modern education system, teaching and research would be helpful to build a long and sustainable career in academics. To move ahead smoothly, there is a necessity to carry out research on whatever an academician is teaching...
Conference Paper
Full-text available
Born from a need for a pure "pay-per-use" model and highly scalable platform, the "Serverless" paradigm emerged and has the potential to become a dominant way of building cloud applications. Although it was originally designed for cloud environments, Serverless is finding its position in the Edge Computing landscape, aiming to bring computational r...
Article
The assets in Industry 4.0 are categorised into physical, virtual and human. The innovation and popularisation of ubiquitous computing enhance the usage of smart devices: RFID tags, QR codes, LoRa tags, etc. for assets identification and tracking. The generated data from Industrial Internet of Things (IIoT) eases information visibility and process...
Chapter
Full-text available
In the past decades the trend for vehicle technologies was more focused on passenger based vehicles. However, in recent years the development and enhancement for heavy vehicle technologies that include heavy freight vehicles and commercial truck vehicles has got specific attention. In this book, the primary objective is to address the various issue...
Article
Full-text available
Cloud computing has recently emerged as an important service to manage applications efficiently over the Internet. Various cloud providers offer pay per use cloud services that requires Quality of Service (QoS) management to efficiently monitor and measure the delivered services through Internet of Things (IoT) and thus needs to follow Service Leve...
Article
Full-text available
Cloud computing systems are splitting compute- and data-intensive jobs into smaller tasks to execute them in a parallel manner using clusters to improve execution time. However, such systems at increasing scale are exposed to stragglers, whereby abnormally slow running tasks executing within a job substantially affect job performance completion. Su...
Article
With the rapid increase in the usage areas of Internet of Things (IoT) devices, it brings challenges such as security and privacy. One way to ensure these in IoT-based systems is user authentication. Until today, user authentication is provided by traditional methods such as pin and token based. But traditional methods have challenges such as forgo...
Article
In India, traditional learning approaches in universities follow passive learning and instruction‐based studies. The demand for evidence‐based instructional and interactive active learning processes increases with the advancement in technology. To improve the quality of teaching and student performance, Laureate International University network has...
Article
Full-text available
Cloud computing is becoming a profitable technology because of it offers cost-effective IT solutions globally. A well-designed task scheduling algorithm ensures the optimal utilization of clouds resources and reducing execution time dynamically. This research paper deals with the task scheduling of inter-dependent subtasks on unrelated parallel com...
Preprint
Full-text available
Coronavirus disease (COVID-19) is an infectious disease caused by a newly discovered coronavirus. It is similar to influenza viruses and raises concerns through alarming levels of spread and severity resulting in an ongoing pandemic world-wide. Within five months (by May 2020), it infected 5.89 million persons world-wide and over 357 thousand have...
Article
Full-text available
Optimization is an inseparable part of Cloud computing, particularly with the emergence of Fog and Edge paradigms. Not only these emerging paradigms demand reevaluating cloud-native optimizations and exploring Fog and Edge-based solutions, but also the objectives require significant shift from considering only latency to energy, security, reliabili...
Article
Full-text available
Preventing failures in Cloud Data Centers (CDCs) due to high temperatures is a key challenge. Such centers have so many servers that it is very difficult to efficiently keep their temperature under control. To help address this issue, we propose an artificial intelligence (AI) based automatic scheduling method that creates a thermal profile of CDC...
Article
Full-text available
There is an abundant expansion in the race of technology, specifically in the production of data, because of the smart devices, such as mobile phones, smart cards, sensors, and Internet of Things (IoT). Smart phones and devices have undergone an enormous evolution in a way that they can be used. More and more new applications, such as face recognit...
Article
Cloud computing has emerged as a dominant platform for computing for the foreseeable future. A key factor in the adoption of this technology is its security and reliability. Here, this article addresses a key challenge which is the secure allocation of resources. The authors propose a security-based resource allocation model for execution of cloud...