Toshihiro Uchibayashi

ORCID: 0000-0003-1042-2461
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • Service-Oriented Architecture and Web Services
  • Cloud Data Security Solutions
  • Distributed and Parallel Computing Systems
  • Scientific Computing and Data Management
  • IoT and Edge/Fog Computing
  • Privacy-Preserving Technologies in Data
  • Blockchain Technology Applications and Security
  • Semantic Web and Ontologies
  • Cryptography and Data Security
  • Caching and Content Delivery
  • Advanced Malware Detection Techniques
  • Smart Parking Systems Research
  • Software System Performance and Reliability
  • Indoor and Outdoor Localization Technologies
  • Anomaly Detection Techniques and Applications
  • Privacy, Security, and Data Protection
  • Vehicular Ad Hoc Networks (VANETs)
  • Network Security and Intrusion Detection
  • Transportation and Mobility Innovations
  • Human Mobility and Location-Based Analysis
  • Systems Engineering Methodologies and Applications
  • Reservoir Engineering and Simulation Methods
  • Sleep and Work-Related Fatigue
  • Geological Modeling and Analysis

Kyushu University
2020-2024

Oldenburger Institut für Informatik
2022

Tohoku University
2016-2019

Kyushu Sangyo University
2008-2015

The growing amount of data and advances in science have created a need for new kind cloud platform that provides users with flexibility, strong security, the ability to couple supercomputers edge devices through high-performance networks. We built such nation-wide platform, called "mdx" meet this need. mdx platform's virtualization service, jointly operated by 9 national universities 2 research institutes Japan, launched 2021, more features are development. Currently is used researchers wide...

10.1109/dasc/picom/cbdcom/cy55231.2022.9927975 article EN 2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) 2022-09-12

Researching for malware detection using machine learning is becoming active. However, conventional techniques do not consider the impact of attacks on learning, which has become complicated in recent years. In this research, we focus data poisoning attack, one typical and aim to clarify influence technology. Data attack an method that intentionally manipulates predicted result a learned model by injecting into training data, applying this, it possible embed backdoor induces mis-prediction...

10.1109/pst47121.2019.8949034 article EN 2019-08-01

Hybrid cloud has been considered a viable option to address the unavailability and/or limited resources of an inhouse private as per user's requirements or at runtime. The approach is poised highly benefit user in terms procuring required time element. With many companies offering different features public services, even if such service same type, quest discover and select suitable provider utmost importance. This paper proposed anagent-based support system most based on requirements. Agents...

10.1109/iccsa.2013.15 article EN 2013-06-01

This paper presents a data protection mechanism for live migration process. The proposed verifies whether it is permissible the of an application movement source to be duplicated destination based on contents regulations related use issued by organizations and countries at start executes only when duplication permitted. makes appropriate possible while protecting privacy during

10.1109/candar.2016.0122 article EN 2016-11-01

In recent years, the use of cloud has become one essential elements when constructing a system for deploying web services. By combining serverless services, various services can be performed without building servers. However, environments have limitations, and traditional methods servers on VM are indispensable. addition, technology migrating to physically different hosts was established, it became possible easily migrate between under same management. depending server running VM, there may...

10.1109/dasc/picom/cbdcom/cyberscitech.2019.00073 article EN 2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) 2019-08-01

With the proliferation of IoT sensors and devices, storing collected data in cloud has become common. A wide variety with different purposes forms are not directly stored but sent to via edge servers. At server, applications running containers virtual machines collect data. However, current deployment movement mechanisms for do consider any conventions or regulations it contains. Therefore, is easy deploy migrate machines. problem arises when deployed migrated, which may violate licensing...

10.3390/computers12020027 article EN cc-by Computers 2023-01-27

This paper aims to propose our study of system model design for a Web 3D disabled access GIS. The GIS provides the with information on barriers and barrier-free modifications in consideration their abilities psychologies. We web-based accesses. It enhances its reusability mash-up capability. Our clearly divides database access, server-side service client-side user interface. implemented desktop client mobile phone examine model.

10.1145/1529282.1529424 article EN 2009-03-08

This paper presents a data protection mechanism for live migration process. The proposed verifies whether it is permissible the of an application movement source to be duplicated destination based on contents regulations related use issued by organizations and countries at start executes only when duplication permitted. makes appropriate possible while protecting privacy during

10.1109/candar.2016.27 article EN International Symposium on Computing and Networking 2016-11-01

A sub-ontology extracted from its base ontology data contains only the concepts and relationships pertaining to information required by user. Sub-ontology extraction tailoring are then viewed as possible solutions efficiently utilize large-scale sparsely distributed on a Semantic Grid environment. This shall contribute reduce communication overhead in transporting data, increase processing performance, improve reliability aggregating ontology/sub-ontology, process of reuse. paper discussed...

10.1109/iccsa.2011.71 article EN International Conference on Computational Science and Its Applications 2011-06-01

The cloud computing paradigm with its pay-as-you-use business model is envisioned to provide immense benefits and promising returns. Hybrid deployment offers a viable solution of in-house private limited or unavailable resources on hand meet the application requirements at runtime. However, due large-scale, widely distributed complexity underlying infrastructure, system vulnerable failures which are great concern users may jeopardize reliability availability services. This paper describes...

10.1109/iccsa.2014.23 article EN 2014-06-01

Purpose – Hybrid cloud computing is considered a viable and cost-effective approach to satisfy the inability of private meet user requirements. The information status selected public service may change at runtime which should be reflected broker server database. This research illustrates mechanism assist IaaS discovery system assess update paper aims discuss these issues. Design/methodology/approach A prototype was developed with as main component in containing service. merge-ontology...

10.1108/ijwis-10-2013-0025 article EN International Journal of Web Information Systems 2013-10-31

Hybrid cloud computing paradigm is gaining wide acceptance to multi-faceted IT organizations meet the users' different sets of requirements for types applications. However, this can also create an array issues, such as complex architectures, security, service provisioning in cases resources failures/disaster, etc. To mitigate impact and minimize trade-offs, we proposed ontology-based framework provide support a resiliency mechanism hybrid cloud. We adopted ontology technology unified...

10.1109/dasc-picom-datacom-cyberscitec.2016.90 article EN 2016-08-01

This article presents a data audit system, which confirms that proper use of is performed on the iKaaS platform (intelligent Knowledge as Service) platform. The proposed system can alleviate ambiguous anxiety owner about unauthorized by providing measures to understand illegal cannot occur. achievement expected support construction environment and encourage discovery novel knowledge.

10.1109/kicss.2016.7951439 article EN 2016-11-01
Coming Soon ...