Amjad Ullah

amjad ullah

Dr Amjad Ullah

Lecturer

Biography

Amjad Ullah has received his PhD from University of Stirling in 2017 with a thesis on “Towards a biologically-inspired cloud elasticity framework”. He has 3+ years of Postdoctoral research experience, where he was actively involved in the cutting-edge research and development of innovation and research-based Horizon 2020 European projects including COLA, CloudiFacturing, ASCLEPIOS, and Digitbrain. He has the experience of co-authored research papers in leading international journals and peer-reviewed international conference proceedings. Amjad actively review for the Journal of Gird computing. He also has strong interest in contributing to the open-source development community. His research interests include in the following areas:
• Cloud computing;
• Cloud-to-Edge ecosystem;
• Internet-of-things (IoT);
• Distributed computing;

More specifically, he is working on problems related:

• Orchestration and run-time management of applications in the cloud;
• Cloud resource provisioning, management and optimisation;
• Cloud auto-scaling (Horizontal and vertical elasticity);
• Performance based scaling policies;
• Deadline based scaling policies to support batch-based applications in the cloud environment;
• Orchestration and run-time management of IoT applications in the Cloud-to-Edge environments;
• Computational offloading in edge computing;


Dr. Ullah is a also a member of the advisory board of emGORA Workspace (https://www.emgora.eu/) - A B2B ecosystem for smart manufacturing. This system is the result of a European project called CloudiFacturing (https://www.cloudifacturing.eu/).

Students project topic ideas are listed here: https://amjad-ullah.netlify.app/#ideas

Date


13 results

Footsteps in the fog: Certificateless fog-based access control

Journal Article
Frimpong, E., Michalas, A., & Ullah, A. (2022)
Footsteps in the fog: Certificateless fog-based access control. Computers and Security, 121, Article 102866. https://doi.org/10.1016/j.cose.2022.102866
The proliferating adoption of the Internet of Things (IoT) paradigm has fuelled the need for more efficient and resilient access control solutions that aim to prevent unauthor...

Toward a reference architecture based science gateway framework with embedded e‐learning support

Journal Article
Pierantoni, G., Kiss, T., Bolotov, A., Kagialis, D., DesLauriers, J., Ullah, A., …Gesing, S. (in press)
Toward a reference architecture based science gateway framework with embedded e‐learning support. Concurrency and Computation: Practice and Experience, https://doi.org/10.1002/cpe.6872
Science gateways have been widely utilized by a large number of user communities to simplify access to complex distributed computing infrastructures. While science gateways ar...

MiCADO-Edge: Towards an Application-level Orchestrator for the Cloud-to-Edge Computing Continuum

Journal Article
Ullah, A., Dagdeviren, H., Ariyattu, R. C., DesLauriers, J., Kiss, T., & Bowden, J. (2021)
MiCADO-Edge: Towards an Application-level Orchestrator for the Cloud-to-Edge Computing Continuum. Journal of Grid Computing, 19(4), Article 47. https://doi.org/10.1007/s10723-021-09589-5
Automated deployment and run-time management of microservices-based applications in cloud computing environments is relatively well studied with several mature solutions. Howe...

(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption

Conference Proceeding
Bakas, A., Michalas, A., & Ullah, A. (2021)
(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption. In Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event, November 23--24, 2020, Proceedings 25 (111-126). https://doi.org/10.1007/978-3-030-70852-8_7
Functional Encryption (FE) allows users who hold a specific secret key (known as the functional key) to learn a specific function of encrypted data whilst learning nothing abo...

Cloud apps to‐go: Cloud portability with TOSCA and MiCADO

Journal Article
DesLauriers, J., Kiss, T., Ariyattu, R. C., Dang, H., Ullah, A., Bowden, J., …Terstyanszky, G. (2021)
Cloud apps to‐go: Cloud portability with TOSCA and MiCADO. Concurrency and Computation: Practice and Experience, 33(19), https://doi.org/10.1002/cpe.6093
As cloud adoption increases, so do the number of available cloud service providers. Moving complex applications between clouds can be beneficial—or other times necessary—but a...

Attribute-Based Symmetric Searchable Encryption

Conference Proceeding
Dang, H., Ullah, A., Bakas, A., & Michalas, A. (2020)
Attribute-Based Symmetric Searchable Encryption. In Applied Cryptography and Network Security Workshops (318-336). https://doi.org/10.1007/978-3-030-61638-0_18
Symmetric Searchable Encryption (SSE) is an encryption technique that allows users to search directly on their outsourced encrypted data while preserving the privacy of both t...

Design and evaluation of a biologically-inspired cloud elasticity framework

Journal Article
Ullah, A., Li, J., & Hussain, A. (2020)
Design and evaluation of a biologically-inspired cloud elasticity framework. Cluster Computing, 23, 3095-3117. https://doi.org/10.1007/s10586-020-03073-7
The elasticity in cloud is essential to the effective management of computational resources as it enables readjustment at runtime to meet application demands. Over the years, ...

Towards workload-aware cloud resource provisioning using a multi-controller fuzzy switching approach

Journal Article
Ullah, A., Li, J., & Hussain, A. (2018)
Towards workload-aware cloud resource provisioning using a multi-controller fuzzy switching approach. International Journal of High Performance Computing and Networking, 12(1), 13-25. https://doi.org/10.1504/IJHPCN.2018.093838
Elasticity enables cloud customers to enrich their applications to dynamically adjust underlying cloud resources. Over the past, a plethora of techniques have been introduced ...

A control theoretical view of cloud elasticity: taxonomy, survey and challenges

Journal Article
Ullah, A., Li, J., Shen, Y., & Hussain, A. (2018)
A control theoretical view of cloud elasticity: taxonomy, survey and challenges. Cluster Computing, 21(4), 1735-1764. https://doi.org/10.1007/s10586-018-2807-6
The lucrative features of cloud computing such as pay-as-you-go pricing model and dynamic resource provisioning (elasticity) attract clients to host their applications over th...

Genetic optimization of fuzzy membership functions for cloud resource provisioning

Conference Proceeding
Ullah, A., Li, J., Hussain, A., & Shen, Y. (2017)
Genetic optimization of fuzzy membership functions for cloud resource provisioning. https://doi.org/10.1109/SSCI.2016.7850088
The successful usage of fuzzy systems can be seen in many application domains owing to their capabilities to model complex systems by exploiting knowledge of domain experts. T...

Current Post Grad projects