- Cloud Computing and Resource Management
- Service-Oriented Architecture and Web Services
- Cloud Data Security Solutions
- Distributed and Parallel Computing Systems
- Scientific Computing and Data Management
- IoT and Edge/Fog Computing
- Privacy-Preserving Technologies in Data
- Blockchain Technology Applications and Security
- Semantic Web and Ontologies
- Cryptography and Data Security
- Caching and Content Delivery
- Advanced Malware Detection Techniques
- Smart Parking Systems Research
- Software System Performance and Reliability
- Indoor and Outdoor Localization Technologies
- Anomaly Detection Techniques and Applications
- Privacy, Security, and Data Protection
- Vehicular Ad Hoc Networks (VANETs)
- Network Security and Intrusion Detection
- Transportation and Mobility Innovations
- Human Mobility and Location-Based Analysis
- Systems Engineering Methodologies and Applications
- Reservoir Engineering and Simulation Methods
- Sleep and Work-Related Fatigue
- Geological Modeling and Analysis
Kyushu University
2020-2024
Oldenburger Institut für Informatik
2022
Tohoku University
2016-2019
Kyushu Sangyo University
2008-2015
The growing amount of data and advances in science have created a need for new kind cloud platform that provides users with flexibility, strong security, the ability to couple supercomputers edge devices through high-performance networks. We built such nation-wide platform, called "mdx" meet this need. mdx platform's virtualization service, jointly operated by 9 national universities 2 research institutes Japan, launched 2021, more features are development. Currently is used researchers wide...
Researching for malware detection using machine learning is becoming active. However, conventional techniques do not consider the impact of attacks on learning, which has become complicated in recent years. In this research, we focus data poisoning attack, one typical and aim to clarify influence technology. Data attack an method that intentionally manipulates predicted result a learned model by injecting into training data, applying this, it possible embed backdoor induces mis-prediction...
Hybrid cloud has been considered a viable option to address the unavailability and/or limited resources of an inhouse private as per user's requirements or at runtime. The approach is poised highly benefit user in terms procuring required time element. With many companies offering different features public services, even if such service same type, quest discover and select suitable provider utmost importance. This paper proposed anagent-based support system most based on requirements. Agents...
This paper presents a data protection mechanism for live migration process. The proposed verifies whether it is permissible the of an application movement source to be duplicated destination based on contents regulations related use issued by organizations and countries at start executes only when duplication permitted. makes appropriate possible while protecting privacy during
In recent years, the use of cloud has become one essential elements when constructing a system for deploying web services. By combining serverless services, various services can be performed without building servers. However, environments have limitations, and traditional methods servers on VM are indispensable. addition, technology migrating to physically different hosts was established, it became possible easily migrate between under same management. depending server running VM, there may...
With the proliferation of IoT sensors and devices, storing collected data in cloud has become common. A wide variety with different purposes forms are not directly stored but sent to via edge servers. At server, applications running containers virtual machines collect data. However, current deployment movement mechanisms for do consider any conventions or regulations it contains. Therefore, is easy deploy migrate machines. problem arises when deployed migrated, which may violate licensing...
This paper aims to propose our study of system model design for a Web 3D disabled access GIS. The GIS provides the with information on barriers and barrier-free modifications in consideration their abilities psychologies. We web-based accesses. It enhances its reusability mash-up capability. Our clearly divides database access, server-side service client-side user interface. implemented desktop client mobile phone examine model.
This paper presents a data protection mechanism for live migration process. The proposed verifies whether it is permissible the of an application movement source to be duplicated destination based on contents regulations related use issued by organizations and countries at start executes only when duplication permitted. makes appropriate possible while protecting privacy during
A sub-ontology extracted from its base ontology data contains only the concepts and relationships pertaining to information required by user. Sub-ontology extraction tailoring are then viewed as possible solutions efficiently utilize large-scale sparsely distributed on a Semantic Grid environment. This shall contribute reduce communication overhead in transporting data, increase processing performance, improve reliability aggregating ontology/sub-ontology, process of reuse. paper discussed...
The cloud computing paradigm with its pay-as-you-use business model is envisioned to provide immense benefits and promising returns. Hybrid deployment offers a viable solution of in-house private limited or unavailable resources on hand meet the application requirements at runtime. However, due large-scale, widely distributed complexity underlying infrastructure, system vulnerable failures which are great concern users may jeopardize reliability availability services. This paper describes...
Purpose – Hybrid cloud computing is considered a viable and cost-effective approach to satisfy the inability of private meet user requirements. The information status selected public service may change at runtime which should be reflected broker server database. This research illustrates mechanism assist IaaS discovery system assess update paper aims discuss these issues. Design/methodology/approach A prototype was developed with as main component in containing service. merge-ontology...
Hybrid cloud computing paradigm is gaining wide acceptance to multi-faceted IT organizations meet the users' different sets of requirements for types applications. However, this can also create an array issues, such as complex architectures, security, service provisioning in cases resources failures/disaster, etc. To mitigate impact and minimize trade-offs, we proposed ontology-based framework provide support a resiliency mechanism hybrid cloud. We adopted ontology technology unified...
This article presents a data audit system, which confirms that proper use of is performed on the iKaaS platform (intelligent Knowledge as Service) platform. The proposed system can alleviate ambiguous anxiety owner about unauthorized by providing measures to understand illegal cannot occur. achievement expected support construction environment and encourage discovery novel knowledge.