- Advanced Data Storage Technologies
- Human Mobility and Location-Based Analysis
- Data Management and Algorithms
- Power Line Communications and Noise
- Parallel Computing and Optimization Techniques
- Blockchain Technology Applications and Security
- Smart Grid Security and Resilience
- Caching and Content Delivery
- Cloud Computing and Resource Management
- IoT and Edge/Fog Computing
- Smart Grid Energy Management
- Green IT and Sustainability
- Numerical Methods and Algorithms
- Algorithms and Data Compression
- Context-Aware Activity Recognition Systems
- Security and Verification in Computing
- Cloud Data Security Solutions
- Internet Traffic Analysis and Secure E-voting
- Distributed Control Multi-Agent Systems
- Mobile and Web Applications
- Geographic Information Systems Studies
- Sharing Economy and Platforms
- Advanced Wireless Communication Technologies
- Privacy-Preserving Technologies in Data
- Cryptographic Implementations and Security
Aarhus University
2018-2023
Budapest University of Technology and Economics
2011-2014
Abstract Cloud computing considerably reduces the costs of deploying applications through on-demand, automated and fine-granular allocation resources. Even in private settings, cloud platforms enable agile self-service management, which means that physical resources are shared more efficiently. Nevertheless, using infrastructures also creates opportunities for attacks data breaches. In this paper, we describe SecureCloud approach. The project aims to confidentiality integrity running...
Given the large and sustained growth in number of smart meters for different applications, e.g., electricity, water or heat, effective data compression has become increasingly important. Although tend to encrypt payloads using state-of-the-art solutions, packet length variability introduced by can be exploited a side channel attack gain knowledge about consumption individual meters. For example, meter reporting constant (e.g. zero) compressed more than one erratic usage. An attacker may...
No one disputes that mobile phones have become part of everyday life. Besides phone calling we use them for browsing, messaging, playing games and many other things which were possible only on a desktop computer several years ago. Although these devices are even more "smart", but due to the growing resource requirements their batteries discharging in very short period. This is important phenomenon, forces find alternative ways reduce energy consumption smartphones. One method "computation...
Utility providers are relying more often on smart, wirelessly connected smart meters to collect consumption information of their customers. The sheer amount and the growing requirements provide frequent reports from each device putting a large strain existing systems protocols. In this paper, we propose three novel lossless compression schemes that significantly reduce size standard DLMS data messages uploaded by electricity meters. Using real life sets, show these methods can achieve rates...
Distributed storage systems spanning across different cloud data centers have substantially improved availability and flexibility for retrieval operations. However, stringent latency requirements of emerging applications necessitate optimized selection resources that exhibit smaller delay. Introducing edge into distributed enables placement closer to its source, but simultaneously increases the complexity decision-making orchestration processes optimal placement. In this work, we develop...
The popularity of smartphones is growing every day. Thanks to the more powerful hardware applications can run tasks and use broadband network connection, however there are several known issues. For example, under typical usage (messaging, browsing, gaming) a smartphone be discharged in one This makes battery life biggest problems mobile devices. That good motivation find energy-efficient solutions. One possible methods "computation offloading" mechanism, which means that some uploaded cloud....
We are witnessing a wave of emerging cloud computing technologies and services that empower advanced applications from different vertical sectors, with diverse requirements. These trends give rise to number fundamental challenges relate the application deployment, support heterogeneous infrastructures provided security. In this setting, SERRANO project steps in define an intent-based paradigm operating federated consisting edge, HPC resources, which will be realized through platform....
The number of IoT devices is expected to continue its dramatic growth in the coming years and, with it, a amount data be transmitted, processed and stored. Compression techniques that support analytics directly on compressed could pave way for systems scale efficiently these growing demands. This paper proposes two novel methods preprocessing stream floating point improve compression capabilities various compressors. In particular, are shown helpful recent compressors allow random access...
Nowadays the need for autonomous robots has increased rapidly. These should have different types of sensors, thus their functionality can be extended. In order to process data coming from require a proper processing hardware. However, cost unique on-board controller system, which is able handle advanced algorithms, relatively expensive. Our proposal attach an inexpensive commercial mobile device robot, high-resolution camera and unit operations. this paper we will present vision-based model...
Cloud computing considerably reduces the costs of deploying applications through on-demand, automated, and fine-granular allocation resources. Even in private settings, cloud platforms enable agile self-service management, which means that physical resources are shared more efficiently. Nevertheless, using infrastructures also creates opportunities for attacks data breaches. In this paper, we describe SecureCloud approach. The project aims to confidentiality integrity running potentially...
There are many patterns in the everyday life of a person, some which more conscious, others less. Going to work on weekdays, or visiting friends every second Saturdays typically conscious ones, natural human, but hard recognize for computer. In this paper we introducing set algorithm proposals, designed efficiently routines human movement. The domain recognition is far beyond daily routines, any frequency movement repetition can be identified. Based an optimal meeting point calculation...
This paper advocates for the use of Intel SGX capable chips to deliver a secure and scalable architecture Big Data processing in cloud. The provides novel Key-Value store service designed these new security capabilities as well delivering flexible mechanism hot, cold, warm data using replication, network coding, hybrid mechanisms. We also describe various representative streams from smart city sensors applications gathered Brazil used tailor guide our system design.
Data reduction algorithms operating on GPS tracklogs are widely used in cartographic applications, because the raw dataset usually includes a huge redundancy and unneccessarily high volume of measurement points. The existing methods for compressing either too simplistic or intended to be powerful computers, whereas our research focuses mobile environments where both memory computational power very limited. In this paper we introducing modified version well-known line generalization...
Smart electricity meters are widely deployed report power consumption automatically and frequently. However, the current compression methods have been suspected to leak information about times when consumers active, by mirroring spikes of in compressed message size. In this paper we show that, sizes indeed highly correlated with underlying use. We present a clustering-based method that allows passive adversary monitoring encrypted network traffic build exploit profiles homes. evaluate...
Smart electricity meters typically upload power consumption readings once or few times a day. Utility providers aim to increase the frequency in order access information near real time, but currently used data compressors fail provide sufficient savings this new scenario on low-bandwidth, high-cost connection. We propose compression method and format for DLMS smart meter readings, which is significantly better with frequent uploads makes it feasible report every reading time same lower sizes...
Modern in-memory databases are typically used for high-performance workloads, therefore they have to be optimized small memory footprint and high query speed at the same time. Data compression has potential reduce requirements but often reduces too. In this paper we propose a novel, adaptive compressor that offers new trade-off point of these dimensions, achieving better than LZ4 while reaching speeds close fastest existing segment encoders. We evaluate our both with synthetic data in...
Smartphones become the part of our life, in developed countries almost everyone has a mobile computer his pocket at all times. One main differences between these devices and traditional PCs is that we always carry phone with us, which allows new family application areas called Location-Based Services (LBS). Currently functionality typical LBS limited to pinpointing location user attach this information post, or list places near him. However constant tracking geographical position creating...
The number of IoT devices is expected to continue its dramatic growth in the coming years and, with it, a amount data be transmitted, processed and stored. Compression techniques that support analytics directly on compressed could pave way for systems scale efficiently these growing demands. This paper proposes two novel methods preprocessing stream floating point improve compression capabilities various compressors. In particular, are shown helpful recent compressors allow random access...
Learning patterns of human movement is a complex and hard task, including several computationally expensive algorithms. This issue has even higher emphasis in mobile environment, since handheld devices contain significantly less memory computing power than usual PC does. In this paper we are going to compare novel, mobile-optimized methods for separating trajectories routine recognition framework.