Computing and Information Systems - Research Publications

Permanent URI for this collection

Search Results

Now showing 1 - 10 of 160
  • Item
    Thumbnail Image
    Secure Data Storage and Sharing Techniques for Data Protection in Cloud Environments: A Systematic Review, Analysis, and Future Directions
    Gupta, I ; Singh, AK ; Lee, C-N ; Buyya, R (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2022-01-01)
  • Item
    Thumbnail Image
    Artificial Intelligence Applications and Self-Learning 6G Networks for Smart Cities Digital Ecosystems: Taxonomy, Challenges, and Future Directions.
    Ismail, L ; Buyya, R (MDPI AG, 2022-08-01)
    The recent upsurge of smart cities' applications and their building blocks in terms of the Internet of Things (IoT), Artificial Intelligence (AI), federated and distributed learning, big data analytics, blockchain, and edge-cloud computing has urged the design of the upcoming 6G network generation, due to their stringent requirements in terms of the quality of services (QoS), availability, and dependability to satisfy a Service-Level-Agreement (SLA) for the end users. Industries and academia have started to design 6G networks and propose the use of AI in its protocols and operations. Published papers on the topic discuss either the requirements of applications via a top-down approach or the network requirements in terms of agility, performance, and energy saving using a down-top perspective. In contrast, this paper adopts a holistic outlook, considering the applications, the middleware, the underlying technologies, and the 6G network systems towards an intelligent and integrated computing, communication, coordination, and decision-making ecosystem. In particular, we discuss the temporal evolution of the wireless network generations' development to capture the applications, middleware, and technological requirements that led to the development of the network generation systems from 1G to AI-enabled 6G and its employed self-learning models. We provide a taxonomy of the technology-enabled smart city applications' systems and present insights into those systems for the realization of a trustworthy and efficient smart city ecosystem. We propose future research directions in 6G networks for smart city applications.
  • Item
    No Preview Available
  • Item
    No Preview Available
    START: Straggler Prediction and Mitigation for Cloud Computing Environments using Encoder LSTM Networks
    Tuli, S ; Gill, SS ; Garraghan, P ; Buyya, R ; Casale, G ; Jennings, N (Institute of Electrical and Electronics Engineers (IEEE), 2021-01-01)
  • Item
    No Preview Available
    A Novel Machine Learning-Based Approach for Outlier Detection in Smart Healthcare Sensor Clouds
    Dwivedi, RK ; Kumar, R ; Buyya, R (IGI GLOBAL, 2021-10-01)

    A smart healthcare sensor cloud is an amalgamation of the body sensor networks and the cloud that facilitates the early diagnosis of diseases and the real-time monitoring of patients. Sensitive data of the patients which are stored in the cloud must be free from outliers that may be caused by malfunctioned hardware or the intruders. This paper presents a machine learning-based scheme for outlier detection in smart healthcare sensor clouds. The proposed scheme is a hybrid of clustering and classification techniques in which a two-level framework is devised to identify the outliers precisely. At the first level, a density-based scheme is used for clustering while at the second level, a Gaussian distribution-based approach is used for classification. This scheme is implemented in Python and compared with a clustering-based approach (Mean Shift) and a classification-based approach (Support Vector Machine) on two different standard datasets. The proposed scheme is evaluated on various performance metrics. Results demonstrate the superiority of the proposed scheme over the existing ones.

  • Item
    No Preview Available
  • Item
    Thumbnail Image
    A Privacy-Preserving Mobile and Fog Computing Framework to Trace and Prevent COVID-19 Community Transmission
    Whaiduzzaman, M ; Hossain, MR ; Shovon, AR ; Roy, S ; Laszka, A ; Buyya, R ; Barros, A (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2020-12-01)
    To slow down the spread of COVID-19, governments worldwide are trying to identify infected people, and contain the virus by enforcing isolation, and quarantine. However, it is difficult to trace people who came into contact with an infected person, which causes widespread community transmission, and mass infection. To address this problem, we develop an e-government Privacy-Preserving Mobile, and Fog computing framework entitled PPMF that can trace infected, and suspected cases nationwide. We use personal mobile devices with contact tracing app, and two types of stationary fog nodes, named Automatic Risk Checkers (ARC), and Suspected User Data Uploader Node (SUDUN), to trace community transmission alongside maintaining user data privacy. Each user's mobile device receives a Unique Encrypted Reference Code (UERC) when registering on the central application. The mobile device, and the central application both generate Rotational Unique Encrypted Reference Code (RUERC), which broadcasted using the Bluetooth Low Energy (BLE) technology. The ARCs are placed at the entry points of buildings, which can immediately detect if there are positive or suspected cases nearby. If any confirmed case is found, the ARCs broadcast pre-cautionary messages to nearby people without revealing the identity of the infected person. The SUDUNs are placed at the health centers that report test results to the central cloud application. The reported data is later used to map between infected, and suspected cases. Therefore, using our proposed PPMF framework, governments can let organizations continue their economic activities without complete lockdown.
  • Item
  • Item
    Thumbnail Image
    On the effectiveness of isolation-based anomaly detection in cloud data centers
    Calheiros, RN ; Ramamohanarao, K ; Buyya, R ; Leckie, C ; Versteeg, S (WILEY, 2017-09-25)
  • Item