Amjad Ullah
amjad ullah

Dr Amjad Ullah

Lecturer

Biography

Amjad Ullah has received his PhD from University of Stirling in 2017 with a thesis on 鈥淭owards a biologically-inspired cloud elasticity framework鈥. He has 3+ years of Postdoctoral research experience, where he was actively involved in the cutting-edge research and development of innovation and research-based Horizon 2020 European projects including COLA, CloudiFacturing, ASCLEPIOS, and Digitbrain. He has the experience of co-authored research papers in leading international journals and peer-reviewed international conference proceedings. Amjad actively review for the Journal of Gird computing. He also has strong interest in contributing to the open-source development community. His research interests include in the following areas:
鈥 Cloud computing;
鈥 Cloud-to-Edge ecosystem;
鈥 Internet-of-things (IoT);
鈥 Distributed computing;

More specifically, he is working on problems related:

鈥 Orchestration and run-time management of applications in the cloud;
鈥 Cloud resource provisioning, management and optimisation;
鈥 Cloud auto-scaling (Horizontal and vertical elasticity);
鈥 Performance based scaling policies;
鈥 Deadline based scaling policies to support batch-based applications in the cloud environment;
鈥 Orchestration and run-time management of IoT applications in the Cloud-to-Edge environments;
鈥 Computational offloading in edge computing;

Students project topic ideas are listed here: https://amjad-ullah.netlify.app/#ideas

Esteem

Conference Organising Activity

  • Program Committee member of 24th UK Workshop on Computational Intelligence

 

Date


15 results

Automated generation of deployment descriptors for managing microservices-based applications in the cloud to edge continuum

Journal Article
DesLauriers, J., Kovacs, J., Kiss, T., Stork, A., Serna, S. P., & Ullah, A. (2025)
Automated generation of deployment descriptors for managing microservices-based applications in the cloud to edge continuum. Future Generation Computer Systems, 166, Article 107628. https://doi.org/10.1016/j.future.2024.107628
With the emergence of Internet of Things (IoT) devices collecting large amounts of data at the edges of the network, a new generation of hyper-distributed applications is emer...

Swarmchestrate: Towards a Fully Decentralised Framework for Orchestrating Applications in the Cloud-to-Edge Continuum

Presentation / Conference Contribution
Kiss, T., Ullah, A., Terstyanszky, G., Kao, O., Becker, S., Verginadis, Y., Michalas, A., Stankovski, V., Kertesz, A., Ricci, E., Altmann, J., Egger, B., Tusa, F., Kovacs, J., & Lovas, R. (2024, April)
Swarmchestrate: Towards a Fully Decentralised Framework for Orchestrating Applications in the Cloud-to-Edge Continuum. Presented at 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan
Collecting and analysing large amounts of data in the Cloud-to-Edge computing continuum raises novel challenges that traditional centralised orchestration solutions cannot han...

Footsteps in the fog: Certificateless fog-based access control

Journal Article
Frimpong, E., Michalas, A., & Ullah, A. (2022)
Footsteps in the fog: Certificateless fog-based access control. Computers and Security, 121, Article 102866. https://doi.org/10.1016/j.cose.2022.102866
The proliferating adoption of the Internet of Things (IoT) paradigm has fuelled the need for more efficient and resilient access control solutions that aim to prevent unauthor...

Toward a reference architecture based science gateway framework with embedded e鈥恖earning support

Journal Article
Pierantoni, G., Kiss, T., Bolotov, A., Kagialis, D., DesLauriers, J., Ullah, A., 鈥esing, S. (in press)
Toward a reference architecture based science gateway framework with embedded e鈥恖earning support. Concurrency and Computation: Practice and Experience, https://doi.org/10.1002/cpe.6872
Science gateways have been widely utilized by a large number of user communities to simplify access to complex distributed computing infrastructures. While science gateways ar...

MiCADO-Edge: Towards an Application-level Orchestrator for the Cloud-to-Edge Computing Continuum

Journal Article
Ullah, A., Dagdeviren, H., Ariyattu, R. C., DesLauriers, J., Kiss, T., & Bowden, J. (2021)
MiCADO-Edge: Towards an Application-level Orchestrator for the Cloud-to-Edge Computing Continuum. Journal of Grid Computing, 19(4), Article 47. https://doi.org/10.1007/s10723-021-09589-5
Automated deployment and run-time management of microservices-based applications in cloud computing environments is relatively well studied with several mature solutions. Howe...

(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption

Conference Proceeding
Bakas, A., Michalas, A., & Ullah, A. (2021)
(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption. In Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event, November 23--24, 2020, Proceedings 25 (111-126). https://doi.org/10.1007/978-3-030-70852-8_7
Functional Encryption (FE) allows users who hold a specific secret key (known as the functional key) to learn a specific function of encrypted data whilst learning nothing abo...

Cloud apps to鈥恎o: Cloud portability with TOSCA and MiCADO

Journal Article
DesLauriers, J., Kiss, T., Ariyattu, R. C., Dang, H., Ullah, A., Bowden, J., 鈥erstyanszky, G. (2021)
Cloud apps to鈥恎o: Cloud portability with TOSCA and MiCADO. Concurrency and Computation: Practice and Experience, 33(19), https://doi.org/10.1002/cpe.6093
As cloud adoption increases, so do the number of available cloud service providers. Moving complex applications between clouds can be beneficial鈥攐r other times necessary鈥攂ut a...

Attribute-Based Symmetric Searchable Encryption

Conference Proceeding
Dang, H., Ullah, A., Bakas, A., & Michalas, A. (2020)
Attribute-Based Symmetric Searchable Encryption. In Applied Cryptography and Network Security Workshops (318-336). https://doi.org/10.1007/978-3-030-61638-0_18
Symmetric Searchable Encryption (SSE) is an encryption technique that allows users to search directly on their outsourced encrypted data while preserving the privacy of both t...

Design and evaluation of a biologically-inspired cloud elasticity framework

Journal Article
Ullah, A., Li, J., & Hussain, A. (2020)
Design and evaluation of a biologically-inspired cloud elasticity framework. Cluster Computing, 23, 3095-3117. https://doi.org/10.1007/s10586-020-03073-7
The elasticity in cloud is essential to the effective management of computational resources as it enables readjustment at runtime to meet application demands. Over the years, ...

Towards workload-aware cloud resource provisioning using a multi-controller fuzzy switching approach

Journal Article
Ullah, A., Li, J., & Hussain, A. (2018)
Towards workload-aware cloud resource provisioning using a multi-controller fuzzy switching approach. International Journal of High Performance Computing and Networking, 12(1), 13-25. https://doi.org/10.1504/IJHPCN.2018.093838
Elasticity enables cloud customers to enrich their applications to dynamically adjust underlying cloud resources. Over the past, a plethora of techniques have been introduced ...

Current Post Grad projects