- Cloud Data Security Solutions
- Cryptography and Data Security
- Security and Verification in Computing
- Privacy-Preserving Technologies in Data
- Cloud Computing and Resource Management
- Blockchain Technology Applications and Security
- Cryptographic Implementations and Security
- Advanced Data Storage Technologies
- Distributed systems and fault tolerance
- Access Control and Trust
- Software System Performance and Reliability
- Distributed and Parallel Computing Systems
- Scientific Computing and Data Management
- IoT and Edge/Fog Computing
- Information and Cyber Security
- Complexity and Algorithms in Graphs
- Data Quality and Management
University of Westminster
2018-2022
University of Plymouth
2022
Ho Chi Minh City University of Science
2015
Vietnam National University Ho Chi Minh City
2015
Summary As cloud adoption increases, so do the number of available service providers. Moving complex applications between clouds can be beneficial—or other times necessary—but achieving this so‐called portability is rarely straightforward. This article presents OASIS TOSCA, a standard in declarative description applications, to encourage and facilitate MiCADO, an application‐level multi‐cloud orchestration auto‐scaling framework. The interface MiCADO Application Description Template, which...
Cloud orchestration frameworks are commonly used to deploy and operate cloud infrastructure. Their role spans both vertically (deployment on infrastructure, platform, application microservice levels) horizontally (deployments from many distinct resource providers). However, despite the central of orchestration, popular lack mechanisms provide security guarantees for operators. In this work, we analyze landscape multi-cloud We identify a set attack scenarios, define enforcement enablers...
Along with the rapid growth of cloud environments, rises problem secure data storage-a that both businesses and end-users take into consideration before moving their online. Recently, a lot solutions have been proposed based either on Symmetric Searchable Encryption (SSE) or Attribute-Based (ABE). SSE is an encryption technique offers security against internal external attacks. However, since in scheme, single key used to encrypt everything, revoking user would imply downloading entire...
Acute care demands the collaboration of multiple healthcare professionals and various organisations. During an emergency, availability Electronic Medical Records (EMR) allows acute teams to access a patient's data promptly, which facilitates decision-making process. Cloud solutions offer environment store share patients' EMR. However, security privacy issues arise, affect Inspired by hybrid encryption scheme combining Dynamic index-based Symmetric Searchable Encryption (DSSE) Attribute-Based...
Abstract Typical cloud applications require high-level policy driven orchestration to achieve efficient resource utilisation and robust security support different types of users user scenarios. However, the secure resources run is not trivial. Although there have been several efforts coordinated deployment, a smaller extent run-time in Cloud, no comprehensive solution has emerged until now that successfully leverages an efficient, seamless way. One major challenges how specify manage Quality...
Abstract Science gateways have been widely utilized by a large number of user communities to simplify access complex distributed computing infrastructures. While science are still becoming increasingly popular and the is growing, fast efficient creation new flexibility deploy these on‐demand on heterogeneous computational resources, remain challenge. Additionally, increase in users, especially with very different backgrounds, requires intuitive embedded e‐learning tools that support all...
No abstract available.
Zero-knowledge universal accumulator generates the succinct commitment to a set and produces short (non) membership proof (universal) without leaking information about (zero-knowledge). In order further support generic zero-knowledge, existing techniques generally combine zero-knowledge with other protocols, such as digital signatures hashes primes, which incur high overhead may not be suitable for real-world use. It is desirable commit of concealing optimal complexity. We devise ZAC, new...