{"title":"The Effect of Laxity of Real-Time Workflow Applications on the Performance of Elastic Cloud Resources","authors":"Georgios L. Stavrinides, H. Karatza","doi":"10.1109/FiCloud57274.2022.00008","DOIUrl":"https://doi.org/10.1109/FiCloud57274.2022.00008","url":null,"abstract":"An increasing number of workflow applications with varying deadlines are processed on cloud platforms. One of the main characteristics of such environments is the elasticity of the virtualized resources, which allows them to be dynamically scaled in or out. Consequently, it is imperative to examine in this context how the laxity (slack time) of the workload affects performance. To this end, in this paper we investigate the effect of laxity of real-time workflow jobs on the performance of elastic cloud resources. We formulate the problem and evaluate through simulation the impact of laxity on the deadline miss ratio, energy consumption and monetary cost associated with the resources, considering workloads with different slack times. The simulation results provide useful insights into how each performance metric is affected by the laxity of the real-time workflow jobs.","PeriodicalId":349690,"journal":{"name":"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128894277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating Deep Packet Inspection in Large-scale Data Processing","authors":"F. Angiulli, A. Furfaro, D. Saccá, Ludovica Sacco","doi":"10.1109/FiCloud57274.2022.00010","DOIUrl":"https://doi.org/10.1109/FiCloud57274.2022.00010","url":null,"abstract":"The Internet has evolved to the point that gigabytes and even terabytes of data are generated and processed on a daily basis. Such a stream of data is characterised by high volume, velocity and variety and is referred to as Big Data. Traditional data processing tools can no longer be used to process big data, because they were not designed to handle such a massive amount of data. This problem concerns also cyber security, where tools like intrusion detection systems employ classification algorithms to analyse the network traffic. Achieving a high accuracy attack detection becomes harder when the amount of data increases and the algorithms must be efficient enough to keep up with the throughput of a huge data stream. Due to the challenges posed by a big data environment, some monitoring systems have already shifted from deep packet inspection to flow-level inspection. The goal of this paper is to evaluate the applicability of an existing intrusion detection technique that performs deep packet inspection in a big data setting. We have conducted several experiments with Apache Spark to assess the performance of the technique when classifying anomalous packets, showing that it benefits from the use of Spark.","PeriodicalId":349690,"journal":{"name":"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131337756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alexandre Brandwjan, Thomas Begin, Hind Castel-Taleb, T. Atmaca
{"title":"A Study of Live VM Migration for Server Consolidation in Data Centers","authors":"Alexandre Brandwjan, Thomas Begin, Hind Castel-Taleb, T. Atmaca","doi":"10.1109/FiCloud57274.2022.00018","DOIUrl":"https://doi.org/10.1109/FiCloud57274.2022.00018","url":null,"abstract":"This paper presents a theoretical study of the combined effect of Virtual Machine (VM) migration and Physical Machine (PM) consolidation on energy consumption, end-user task performance and equipment wear. Our numerical results indicate that a moderately aggressive consolidation strategy seems to be a good compromise. They indicate also the potential importance of distributional assumptions for time between VM launch requests and for VM lifetime.","PeriodicalId":349690,"journal":{"name":"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131046269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Delegation-based Privacy Preserving in IoT Architectures","authors":"Catarina Silva, J. Barraca","doi":"10.1109/FiCloud57274.2022.00014","DOIUrl":"https://doi.org/10.1109/FiCloud57274.2022.00014","url":null,"abstract":"The management of smart devices in IoT environments can benefit from the flexibility offered by delegation-based authorization. Dynamic delegation improves the system making the process more efficient and autonomous. Privacy preservation in that kind of scenario has, however, serious problems. This paper proposes an architecture based on delegation-based authorization to dynamic D2D delegation. A proof of concept demonstrates how a smart device can delegate its permissions to another smart device with the same abilities when it is required. Moreover, the architecture focus on preserving the user's privacy by requesting his consent when delegation involves access to personal data. Different levels of data sensitivity are considered and it works as a boundary to the system to recognize when consent is required and different levels of care should be taken into account depending on the data level sensitivity. Finally, a receipt is generated as proof of the consent providing the user's control over his data and transparency about the delegation process.","PeriodicalId":349690,"journal":{"name":"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130521480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alessio Catalfamo, A. Celesti, M. Fazio, M. Villari
{"title":"A Homomorphic Encryption Service to Secure Data Processing in a Cloud/Edge Continuum Context","authors":"Alessio Catalfamo, A. Celesti, M. Fazio, M. Villari","doi":"10.1109/FiCloud57274.2022.00015","DOIUrl":"https://doi.org/10.1109/FiCloud57274.2022.00015","url":null,"abstract":"For years, one of the major issues against the adoption of Cloud computing has been security. Typically, with traditional symmetric and asymmetric encryption schemes, data can be encrypted and sent into Cloud data centers, but this approach presents a great weakness: data must be transferred to the client-side to be deciphered and then processed. Nevertheless, such an approach is not feasible for a large amount of data. In this paper, we address such an issue through the adoption of homomorphic encryption in a Cloud/Edge continuum environment. Specifically, pieces of data are encrypted in the Edge and transferred into the Cloud for storage and processing without the need to decode them. Experiments performed on different homomorphic encryption schemes in a Cloud/Edge testbed highlight the goodness of our approach.","PeriodicalId":349690,"journal":{"name":"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131828045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maha Yaghi, Sana Hafez, Arwa Sheibani, Abdalla Abdelkhalek, Z. Farhan, Mohammed Ghazal, Ayman Elbaz, A. Khelifi
{"title":"AI Assisted Medical Diagnosis of Lung Diseases Using Accurate Symptoms Visualization","authors":"Maha Yaghi, Sana Hafez, Arwa Sheibani, Abdalla Abdelkhalek, Z. Farhan, Mohammed Ghazal, Ayman Elbaz, A. Khelifi","doi":"10.1109/FiCloud57274.2022.00049","DOIUrl":"https://doi.org/10.1109/FiCloud57274.2022.00049","url":null,"abstract":"Mobile health tracking applications are one of the needed technologies that have a great potential to collect patients’ health history effectively. Contact tracing, symptom tracking and assessment, and health information distribution are among the unmet needs of the healthcare and public health systems, which these apps can address. In this paper, we propose an AIassisted medical diagnosis multiplatform mobile application for lung diseases. The proposed application allows users to track their journey of symptoms as they develop, intensify, and resolve. With a few clicks, the application enables the user to log some symptoms, including headache, cough, and other symptoms and logs other health data like blood pressure and glucose levels automatically from device sensors and wearables through Google Fit integration. Recorded cough sounds are then classified based on spectrogram features using our Convolutional Neural Network on-device cough classifier with an 89% accuracy. Manually input and automatically detected symptoms are added to a timeline that visualizes the user’s symptom history and intensity over time. Users can then navigate the symptom journey themselves or share it with a doctor when needed reducing the need for frequently asked questions by doctors and making it easier to identify and track their symptoms over a long period. Our results show that our proposed application can be used as a diagnostic tool to record symptoms anytime in a few clicks and generate history timelines to track the user’s health. Our user-friendly application is an effective and organized way to document the user’s health status regularly and can be shared with a doctor if necessary.","PeriodicalId":349690,"journal":{"name":"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134226086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message from the FiCloud-2022 Chairs","authors":"","doi":"10.1109/ficloud57274.2022.00005","DOIUrl":"https://doi.org/10.1109/ficloud57274.2022.00005","url":null,"abstract":"","PeriodicalId":349690,"journal":{"name":"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132689520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Thorough Analysis and Comparison of Data Communication Protocols Used in Industry 4.0: the Case of Smart-CNC","authors":"Bilgin Umut Deveci, Hilal Baş, Emre Ummak, Özlem Albayrak, Perin Ünal","doi":"10.1109/FiCloud57274.2022.00034","DOIUrl":"https://doi.org/10.1109/FiCloud57274.2022.00034","url":null,"abstract":"Several key methods have been developed to transfer data accurately and completely. In this regard, a communication protocol specifies the rules for transmitting blocks of data between network nodes. This study examines in detail the scope of the Qu4lity project, the data communication protocols used by the pilots, the protocols used by TEKNOPAR, and the benefits, drawbacks, and application areas of different data communication protocols. Protocols were analysed against a number of technical criteria aimed at identifying the most appropriate procedure. Communication protocols were categorized considering the following features: technical qualifications such as transport protocol, coding format, message system, architecture, security, and scalability.","PeriodicalId":349690,"journal":{"name":"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133486509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Physical Layer Security (PLS) approach through Address Fed Mapping Crest Factor Reduction applicable for 5G/6G signals","authors":"S. Mohammady, D. Malone","doi":"10.1109/FiCloud57274.2022.00047","DOIUrl":"https://doi.org/10.1109/FiCloud57274.2022.00047","url":null,"abstract":"The privacy and security of 5G/6G infrastructures are receiving great attention together with power consumption and efficiency. Here, Physical Layer Security (PLS) is considered and a technique named Address Fed Mapping (AFM) is proposed which not only enhances the physical layer security, but also reduces the effect of high Peak to Average Power Ratio (PAPR), which results in efficiency improvement in OFDM based signals used in beyond 5G and 6G [1]. The AFM is designed based on the idea of randomly generated signals, modifying the original signal to reduce PAPR. Instead of a typical randomization algorithm, a unique key is generated based on Channel response that is known only transmitter-receiver pairs. This key is used to pick a signal and send it. It is shown that the proposed AFM technique reduces PAPR, which improves the energy efficiency of the system.","PeriodicalId":349690,"journal":{"name":"2022 9th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"414 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115954271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}