Amjad Ullah
amjad ullah

Dr Amjad Ullah

Lecturer

Biography

Amjad Ullah received his PhD from the University of Stirling in 2017 with a thesis titled “Towards a Biologically-Inspired Cloud Elasticity Framework.” He has over three years of postdoctoral research experience, during which he contributed to several cutting-edge Horizon 2020 European projects, including COLA, CloudiFacturing, ASCLEPIOS, and DIGITbrain. His work focused on innovative solutions in cloud computing, edge computing, and secure data processing.

He has co-authored research papers published in leading international journals and peer-reviewed conference proceedings. In addition to his academic contributions, he maintains a strong interest in open-source software development and actively supports community-driven innovation. His research interests include:

• Cloud and edge computing
• Distributed systems and orchestration
• Bio-inspired computing models
• Secure and privacy-preserving data processing
• AI-driven resource management in cloud environments

Students project topic ideas are listed here: https://amjad-ullah.netlify.app/#ideas

Esteem

Conference Organising Activity

  • Session Chair IEEE ICFEC
  • Session chair for plusEquals5
  • Program Committee member of 24th UK Workshop on Computational Intelligence
  • Hybrid Running Chair for LOCO 2024

 

Editorial Activity

  • Guest editor of the special issue

 

Fellowships and Awards

  • IEEE Membership

 

Reviewing

  • Future Generation Computer Systems
  • ACM Transactions on Internet of Things
  • Journal of Parallel and Distributed Computing

 

Date


15 results

Automated generation of deployment descriptors for managing microservices-based applications in the cloud to edge continuum

Journal Article
DesLauriers, J., Kovacs, J., Kiss, T., Stork, A., Serna, S. P., & Ullah, A. (2025)
Automated generation of deployment descriptors for managing microservices-based applications in the cloud to edge continuum. Future Generation Computer Systems, 166, Article 107628. https://doi.org/10.1016/j.future.2024.107628
With the emergence of Internet of Things (IoT) devices collecting large amounts of data at the edges of the network, a new generation of hyper-distributed applications is emer...

Swarmchestrate: Towards a Fully Decentralised Framework for Orchestrating Applications in the Cloud-to-Edge Continuum

Presentation / Conference Contribution
Kiss, T., Ullah, A., Terstyanszky, G., Kao, O., Becker, S., Verginadis, Y., Michalas, A., Stankovski, V., Kertesz, A., Ricci, E., Altmann, J., Egger, B., Tusa, F., Kovacs, J., & Lovas, R. (2024, April)
Swarmchestrate: Towards a Fully Decentralised Framework for Orchestrating Applications in the Cloud-to-Edge Continuum. Presented at 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan
Collecting and analysing large amounts of data in the Cloud-to-Edge computing continuum raises novel challenges that traditional centralised orchestration solutions cannot han...

Footsteps in the fog: Certificateless fog-based access control

Journal Article
Frimpong, E., Michalas, A., & Ullah, A. (2022)
Footsteps in the fog: Certificateless fog-based access control. Computers and Security, 121, Article 102866. https://doi.org/10.1016/j.cose.2022.102866
The proliferating adoption of the Internet of Things (IoT) paradigm has fuelled the need for more efficient and resilient access control solutions that aim to prevent unauthor...

Toward a reference architecture based science gateway framework with embedded e‐learning support

Journal Article
Pierantoni, G., Kiss, T., Bolotov, A., Kagialis, D., DesLauriers, J., Ullah, A., …Gesing, S. (in press)
Toward a reference architecture based science gateway framework with embedded e‐learning support. Concurrency and Computation: Practice and Experience, https://doi.org/10.1002/cpe.6872
Science gateways have been widely utilized by a large number of user communities to simplify access to complex distributed computing infrastructures. While science gateways ar...

MiCADO-Edge: Towards an Application-level Orchestrator for the Cloud-to-Edge Computing Continuum

Journal Article
Ullah, A., Dagdeviren, H., Ariyattu, R. C., DesLauriers, J., Kiss, T., & Bowden, J. (2021)
MiCADO-Edge: Towards an Application-level Orchestrator for the Cloud-to-Edge Computing Continuum. Journal of Grid Computing, 19(4), Article 47. https://doi.org/10.1007/s10723-021-09589-5
Automated deployment and run-time management of microservices-based applications in cloud computing environments is relatively well studied with several mature solutions. Howe...

(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption

Conference Proceeding
Bakas, A., Michalas, A., & Ullah, A. (2021)
(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption. In Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event, November 23--24, 2020, Proceedings 25 (111-126). https://doi.org/10.1007/978-3-030-70852-8_7
Functional Encryption (FE) allows users who hold a specific secret key (known as the functional key) to learn a specific function of encrypted data whilst learning nothing abo...

Cloud apps to‐go: Cloud portability with TOSCA and MiCADO

Journal Article
DesLauriers, J., Kiss, T., Ariyattu, R. C., Dang, H., Ullah, A., Bowden, J., …Terstyanszky, G. (2021)
Cloud apps to‐go: Cloud portability with TOSCA and MiCADO. Concurrency and Computation: Practice and Experience, 33(19), https://doi.org/10.1002/cpe.6093
As cloud adoption increases, so do the number of available cloud service providers. Moving complex applications between clouds can be beneficial—or other times necessary—but a...

Attribute-Based Symmetric Searchable Encryption

Conference Proceeding
Dang, H., Ullah, A., Bakas, A., & Michalas, A. (2020)
Attribute-Based Symmetric Searchable Encryption. In Applied Cryptography and Network Security Workshops (318-336). https://doi.org/10.1007/978-3-030-61638-0_18
Symmetric Searchable Encryption (SSE) is an encryption technique that allows users to search directly on their outsourced encrypted data while preserving the privacy of both t...

Design and evaluation of a biologically-inspired cloud elasticity framework

Journal Article
Ullah, A., Li, J., & Hussain, A. (2020)
Design and evaluation of a biologically-inspired cloud elasticity framework. Cluster Computing, 23, 3095-3117. https://doi.org/10.1007/s10586-020-03073-7
The elasticity in cloud is essential to the effective management of computational resources as it enables readjustment at runtime to meet application demands. Over the years, ...

Towards workload-aware cloud resource provisioning using a multi-controller fuzzy switching approach

Journal Article
Ullah, A., Li, J., & Hussain, A. (2018)
Towards workload-aware cloud resource provisioning using a multi-controller fuzzy switching approach. International Journal of High Performance Computing and Networking, 12(1), 13-25. https://doi.org/10.1504/IJHPCN.2018.093838
Elasticity enables cloud customers to enrich their applications to dynamically adjust underlying cloud resources. Over the past, a plethora of techniques have been introduced ...

Current Post Grad projects