scispace - formally typeset
Search or ask a question
Author

Massimiliano Rak

Bio: Massimiliano Rak is an academic researcher from Seconda Università degli Studi di Napoli. The author has contributed to research in topics: Cloud computing & Cloud computing security. The author has an hindex of 26, co-authored 167 publications receiving 2273 citations. Previous affiliations of Massimiliano Rak include University of Naples Federico II.


Papers
More filters
Journal ArticleDOI
TL;DR: An integrated overview of the mOSAIC approach and the use of its various software prototypes in a Cloud application development process, starting from the design concepts and arrive to various applications, as well as to the position versus similar initiatives.
Abstract: The diversity of Cloud computing services is challenging the application developers as various and non-standard interfaces are provided for these services. Few middleware solutions were developed until now to support the design, deployment and execution of service-independent applications as well as the management of resources from multiple Clouds. This paper focuses on one of these advanced middleware solutions, called mOSAIC. Written after the completion of its development, this paper presents an integrated overview of the mOSAIC approach and the use of its various software prototypes in a Cloud application development process. We are starting from the design concepts and arrive to various applications, as well as to the position versus similar initiatives.

104 citations

Journal ArticleDOI
01 Jan 2015
TL;DR: This paper proposes a strategy to orchestrate stealthy attack patterns, which exhibit a slowly-increasing-intensity trend designed to inflict the maximum financial cost to the cloud customer, while respecting the job size and the service arrival rate imposed by the detection mechanisms.
Abstract: The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. According to this paradigm, the effects of Denial of Service (DoS) attacks involve not only the quality of the delivered service, but also the service maintenance costs in terms of resource consumption. Specifically, the longer the detection delay is, the higher the costs to be incurred. Therefore, a particular attention has to be paid for stealthy DoS attacks. They aim at minimizing their visibility, and at the same time, they can be as harmful as the brute-force attacks. They are sophisticated attacks tailored to leverage the worst-case performance of the target system through specific periodic, pulsing, and low-rate traffic patterns. In this paper, we propose a strategy to orchestrate stealthy attack patterns, which exhibit a slowly-increasing-intensity trend designed to inflict the maximum financial cost to the cloud customer, while respecting the job size and the service arrival rate imposed by the detection mechanisms. We describe both how to apply the proposed strategy, and its effects on the target system deployed in the cloud.

102 citations

Journal ArticleDOI
01 Sep 2018
TL;DR: The most common architectural solutions available today to shape an IoT system, ranging from already standardized architecture to commercial ones are reviewed, compared, analysed and mapped one against the other to determine a stable reference for Security and Interoperability analysis.
Abstract: The term Internet of Things (IoT) is used as an umbrella that covers several topics, related to the application of technological means to monitor, measure and act upon the environment. As a result, it is difficult to determine a univocal architecture to identify as a reference and several scenarios, involving different sensors, smart devices, networks or gateways, can unfold. The data exchanged within and among IoT frameworks are growing exponentially, and the pervasiveness of such systems brings them to come in possession of very sensitive information: as a consequence, Security and Privacy have become a hot topic on the IoT scenery. Furthermore, due to the great variety of technological solutions which are currently available, interoperability issues are bound to arise, especially when no standard API interface, or communication protocol, has been officially adopted. This paper provides a review of the most common architectural solutions available today to shape an IoT system, ranging from already standardized architecture to commercial ones. Elements from such architectures have been compared, analysed and mapped one against the other to determine a stable reference for Security and Interoperability analysis. Current solutions in the Security and API Interoperability domains for IoT have been also analysed.

100 citations

Proceedings Article
01 Jan 2011
TL;DR: This work describes a new approach for a cross platform API that encompass all cloud service levels and expects that the implementation of this approach will offer a higher degree of portability and vendor independence for Cloud based applications.
Abstract: Cross platform APIs for cloud computing are emerging due to the need of the application developer to combine the features exposed by different cloud providers and to port the codes from one provider environment to another. Such APIs are allowing nowadays the federation of clouds to an infrastructure level, requiring a certain knowledge of programming the infrastructure. We describe a new approach for a cross platform API that encompass all cloud service levels. We expect that the implementation of this approach will offer a higher degree of portability and vendor independence for Cloud based applications.

89 citations

Proceedings ArticleDOI
15 Feb 2010
TL;DR: The experience here presented shows that the mobile agent paradigm well fulfills the dynamic properties of the Cloud paradigm and could be a good choice to simply develop application and services able to dynamically adapt themselves to the virtualized environment.
Abstract: The cloud paradigm appeared on the computing scene in 2005 with the Amazon Elastic Compute Cloud (EC2) . After this date, a large set of related technologies has been developed. In the academic world, and especially in the HPC area, cloud computing is in some way in competition with the GRID model, which offers a middleware based approach. One of the solutions proposed is the integration of the two paradigms, in order to use the enormous potential of the existent computational GRIDs in new ways. One of the most diffused problems on this systems is the choice of the correct programming paradigm: many different approaches exist and it is difficult to define which is the approach that best fit with the cloud paradigm. In this paper we propose the integration of a Cloud on GRID architecture with a mobile agent platform. The architecture we propose offer Virtual clusters with full administrative control to final users, adopting an existent GRID architecture and especially its security infrastructure. The mobile agent platform is able to dynamically add and configure services on the virtual clusters. The experience here presented shows that the mobile agent paradigm well fulfills the dynamic properties of the Cloud paradigm and could be a good choice to simply develop application and services able to dynamically adapt themselves to the virtualized environment.

87 citations


Cited by
More filters
Posted Content
TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Abstract: In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.A POR may be viewed as a kind of cryptographic proof of knowledge (POK), but one specially designed to handle a large file (or bitstring) F. We explore POR protocols here in which the communication costs, number of memory accesses for the prover, and storage requirements of the user (verifier) are small parameters essentially independent of the length of F. In addition to proposing new, practical POR constructions, we explore implementation considerations and optimizations that bear on previously explored, related schemes.In a POR, unlike a POK, neither the prover nor the verifier need actually have knowledge of F. PORs give rise to a new and unusual security definition whose formulation is another contribution of our work.We view PORs as an important tool for semi-trusted online archives. Existing cryptographic techniques help users ensure the privacy and integrity of files they retrieve. It is also natural, however, for users to want to verify that archives do not delete or modify files prior to retrieval. The goal of a POR is to accomplish these checks without users having to download the files themselves. A POR can also provide quality-of-service guarantees, i.e., show that a file is retrievable within a certain time bound.

1,783 citations

Journal ArticleDOI
TL;DR: The security issues that arise due to the very nature of cloud computing are detailed and the recent solutions presented in the literature to counter the security issues are presented.

694 citations

Journal ArticleDOI
TL;DR: Fog computing is not a substitute for cloud computing but a powerful complement as discussed by the authors, which enables processing at the edge while still offering the possibility to interact with the cloud. But it still faces several challenges, such as the distance between the cloud and the end devices.
Abstract: Cloud computing with its three key facets (i.e., Infrastructure-as-a-Service, Platform-as-a-Service, and Software-as-a-Service) and its inherent advantages (e.g., elasticity and scalability) still faces several challenges. The distance between the cloud and the end devices might be an issue for latency-sensitive applications such as disaster management and content delivery applications. Service level agreements (SLAs) may also impose processing at locations where the cloud provider does not have data centers. Fog computing is a novel paradigm to address such issues. It enables provisioning resources and services outside the cloud, at the edge of the network, closer to end devices, or eventually, at locations stipulated by SLAs. Fog computing is not a substitute for cloud computing but a powerful complement. It enables processing at the edge while still offering the possibility to interact with the cloud. This paper presents a comprehensive survey on fog computing. It critically reviews the state of the art in the light of a concise set of evaluation criteria. We cover both the architectures and the algorithms that make fog systems. Challenges and research directions are also introduced. In addition, the lessons learned are reviewed and the prospects are discussed in terms of the key role fog is likely to play in emerging technologies such as tactile Internet.

598 citations

01 Jan 2016
TL;DR: Thank you very much for downloading using mpi portable parallel programming with the message passing interface for reading a good book with a cup of coffee in the afternoon, instead they are facing with some malicious bugs inside their laptop.
Abstract: Thank you very much for downloading using mpi portable parallel programming with the message passing interface. As you may know, people have search hundreds times for their chosen novels like this using mpi portable parallel programming with the message passing interface, but end up in harmful downloads. Rather than reading a good book with a cup of coffee in the afternoon, instead they are facing with some malicious bugs inside their laptop.

593 citations

Journal ArticleDOI
TL;DR: This paper carefully analyzed and discussed the properties of a monitoring system for the Cloud, the issues arising from such properties and how such issues have been tackled in literature, and identifies open issues, main challenges and future directions in the field of Cloud monitoring.

543 citations