4.6 Article

A novel framework for software defined based secure storage systems

Journal

SIMULATION MODELLING PRACTICE AND THEORY
Volume 77, Issue -, Pages 407-423

Publisher

ELSEVIER SCIENCE BV
DOI: 10.1016/j.simpat.2016.05.003

Keywords

Software Defined Network (SDN); Software Defined Storage (SDStore); Software Defined Security (SDSec); Big data; Mininet; Virtualization

Funding

  1. Jordan University of Science and Technology [20150050]
  2. IBM
  3. IBM Cloud Academy

Ask authors/readers for more resources

The Software Defined Systems (SDSys) paradigm has been introduced recently as a solution to reduce the overhead in the control and management operations of complex computing systems and to maintain a high level of security and protection. The main concept behind this technology is around isolating the data plane from the control plane. Building a Software Defined System in a real life environment is considered an expensive solution and may have a lot of risks. Thus, there is a need to simulate such systems before the real-life implementation and deployment. In this paper we present a novel experimental framework as a virtualized testbed environment for software defined based secure storage systems. Its also covers some related issues for large scale data storage and sharing such as deduplication. This work builds on the Mininet simulator, where its core components, the host, switch and the controller, are customized to build the proposed experimental simulation framework. The developed emulator, will not only support the development and testing of SD-based secure storage solutions, it will also serve as an experimentation tool for researchers and for benchmarking purposes. The developed simulator/emulator could also be used as an educational tool to train students and novice researchers. (C) 2016 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Writer identification approach based on bag of words with OBI features

Amal Durou, Ibrahim Aref, Somaya Al-Maadeed, Ahmed Bouridane, Elhadj Benkhelifa

INFORMATION PROCESSING & MANAGEMENT (2019)

Article Computer Science, Software Engineering

Automated negotiated user profiling across distributed social mobile clouds for resource optimisation

Elhadj Benkhelifa, Thomas Welsh, Lo'ai Tawalbeh, Yaser Jararweh

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2020)

Article Computer Science, Theory & Methods

Determining the enabling factors for implementing cloud data governance in the Saudi public sector by structural equation modelling

Majid Al-Ruithe, Elhadj Benkhelifa

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Review Computer Science, Information Systems

A systematic literature review of data governance and cloud data governance

Majid Al-Ruithe, Elhadj Benkhelifa, Khawar Hameed

PERSONAL AND UBIQUITOUS COMPUTING (2019)

Editorial Material Computer Science, Information Systems

Advanced Arabic Natural Language Processing (ANLP) and its applications: Introduction to the special issue

Yaser Jararweh, Mahmoud Al-Ayyoub, Elhadj Benkhelifa

INFORMATION PROCESSING & MANAGEMENT (2019)

Article Computer Science, Interdisciplinary Applications

High tolerance of charge pump leakage current in Integer-N PLL frequency synthesizer for 5G networks

Zakia Berber, Samir Kameche, Elhadj Benkhelifa

SIMULATION MODELLING PRACTICE AND THEORY (2019)

Review Computer Science, Artificial Intelligence

Leveraging cloud computing for the semantic web: review and trends

Oluwasegun Adedugbe, Elhadj Benkhelifa, Russell Campion, Feras Al-Obeidat, Anoud Hani, Uchitha Jayawickrama

SOFT COMPUTING (2020)

Article Automation & Control Systems

Bioinspired Multiagent Embryonic Architecture for Resilient Edge Networks

Thomas Welsh, Elhadj Benkhelifa

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Correction Computer Science, Artificial Intelligence

Leveraging cloud computing for the semantic web: review and trends (vol 24, pg 5999, 2020)

Oluwasegun Adedugbe, Elhadj Benkhelifa, Russell Campion, Feras Al-Obeidat, Anoud Bani Hani, Uchitha Jayawickrama

SOFT COMPUTING (2020)

Article Computer Science, Software Engineering

Echo state network-based feature extraction for efficient color image segmentation

Abdelkerim Souahlia, Ammar Belatreche, Abdelkader Benyettou, Zoubir Ahmed-Foitih, Elhadj Benkhelifa, Kevin Curran

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2020)

Article Telecommunications

Blockchain-based forgery resilient vehicle registration system

Leila Benarous, Benamar Kadri, Ahmed Bouridane, Elhadj Benkhelifa

Summary: The existing vehicle registration systems are centralized and prone to allowing the registration of illegally smuggled or stolen vehicles. A proposed transparent system using blockchain technology aims to improve security and transparency by saving transaction records on a public blockchain. Evaluation shows the superiority of this solution compared to current registration systems in terms of security and resilience against forged transactions.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2022)

Article Computer Science, Information Systems

A microservices persistence technique for cloud-based online social data analysis

Feras Al-Obeidat, Anoud Bani-Hani, Oluwasegun Adedugbe, Munir Majdalawieh, Elhadj Benkhelifa

Summary: Social data analysis is a vital tool for businesses and organizations to mine data from social media for purposes such as customer opinion mining, pattern recognition, and predictive analytics. This paper proposes a persistence mechanism and methodology leveraging cloud computing, microservices, and orchestration for online social data analysis, maximizing cloud capabilities and optimizing cloud computing resources to deliver real-time, persistent social data analytics as a cloud service.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2021)

Article Computer Science, Information Systems

Virtual Environments Testing as a Cloud Service: A Methodology for Protecting and Securing Virtual Infrastructures

Elhadj Benkhelifa, Anoud Bani Hani, Thomas Welsh, Siyakha Mthunzi, Chirine Ghedira Guegan

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Addressing Data Governance in Cloud Storage: Survey, Techniques and Trends

Majid Al-Ruithe, Elhadj Benkhelifa, Yaser Jararweh, Chirine Ghedira

JOURNAL OF INTERNET TECHNOLOGY (2018)

Article Computer Science, Hardware & Architecture

A framework and a process for digital forensic analysis on smart phones with multiple data logs

Elhadj Benkhelifa, Benjamin E. Thomas, Lo'ai Tawalbeh, Yaser Jararweh

INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS (2018)

Article Computer Science, Interdisciplinary Applications

Zone-based stable and secure clustering technique for VANETs

Shivani Sharma, Sateesh Kumar Awasthi

Summary: Vehicular Ad-hoc Network (VANET) is crucial in Intelligent Transportation Systems, and this study proposes a hybrid system utilizing V2V and V2I communications for secure data dissemination in urban scenarios.

SIMULATION MODELLING PRACTICE AND THEORY (2024)

Article Computer Science, Interdisciplinary Applications

HEPGA: A new effective hybrid algorithm for scientific workflow scheduling in cloud computing environment

Hind Mikram, Said El Kafhali, Youssef Saadi

Summary: Efficient task scheduling in cloud data centers is crucial for optimizing resource utilization and load balance. This paper introduces a hybrid algorithm, HEPGA, that combines particle swarm optimization (PSO) and genetic algorithm (GA) to allocate tasks efficiently and minimize makespan in cloud computing environments. By integrating PSO, GA, and HEFT-based initialization, the algorithm capitalizes on parallel processing capabilities and adapts to varying priorities to enhance resource utilization. Meticulous analysis of the algorithm's performance, considering both makespan and resource utilization, demonstrates its ability to consistently allocate resources and adapt to different optimization goals.

SIMULATION MODELLING PRACTICE AND THEORY (2024)

Article Computer Science, Interdisciplinary Applications

MC-reduction simulation approach with heuristic rules for reliability estimation in a multi-state flow network

Ping-Chen Chang, Cheng-Fu Huang, Ding-Hsiang Huang

Summary: This paper introduces a novel simulation approach based on minimal cuts to estimate the system reliability of a multistate flow network (MSFN). The approach improves computational efficiency by reducing the number of minimal cuts and preserving saturated minimal cuts. It effectively deals with non-integer demands and demonstrates effectiveness and efficiency in illustrative examples.

SIMULATION MODELLING PRACTICE AND THEORY (2024)

Article Computer Science, Interdisciplinary Applications

A data-driven agent-based simulation of the public bicycle-sharing system in Sejong city

Jang Won Bae, Chun-Hee Lee, Jeong-Woo Lee, Seon Han Choi

Summary: In this study, a data-driven agent-based model is proposed for simulating the public bicycle-sharing systems (PBSSs) in Sejong City, South Korea. The model captures users' behavioral characteristics and analyzes their convenience through a bottom-up approach. By extracting parameters from actual operational data and demographic information, the model's accuracy is improved. Model simulations evaluate the utilization and user convenience of Eoulling, providing a viable solution for addressing multiple concerns.

SIMULATION MODELLING PRACTICE AND THEORY (2024)

Article Computer Science, Interdisciplinary Applications

Numerical study on rock fracturing with pulsed pressure in hard rocks with a pipe-domain seepage model

Chong Shi, Junbao Pian, Cong Zhang, Xiao Chen, Yonggang Zhang

Summary: This study presents a novel numerical simulation method for analyzing the mechanisms of pulsed pressure-induced rock fractures. The results show that rock fracturing under impulsive loading is a combined effect of stress waves and high-pressure fluids, with the fluid penetration and splitting action playing important roles in the process.

SIMULATION MODELLING PRACTICE AND THEORY (2024)

Article Computer Science, Interdisciplinary Applications

Numerical investigation on optimal blasting parameters of tunnel face in granite rock

Junwei Zhang, Zhongwei Chen, Kang Shao

Summary: This study investigated the performance of three constitutive models for rock material in simulation of blast-induced rock cracks, and proposed an optimal blasting parameters design.

SIMULATION MODELLING PRACTICE AND THEORY (2024)

Article Computer Science, Interdisciplinary Applications

Agent-based modeling and simulation for 5G and beyond networks : A comprehensive survey

Joshua Shakya, Chaima Ghribi, Leila Merghem-Boulahia

Summary: Modeling and simulation of telecommunication networks, especially 5G+ networks, have become increasingly important and challenging. Traditional simulation techniques may not be sufficient to capture the dynamic changes in 5G+ networks, leading researchers to adopt an Agent-based modeling and simulation approach from the perspective of Complex System Science. This study provides insights into the advantages, potential, and challenges of Agent-based simulation in the context of 5G+ networks, and proposes a prospective architecture for a simulator and its evolution into a Digital Twin.

SIMULATION MODELLING PRACTICE AND THEORY (2024)

Article Computer Science, Interdisciplinary Applications

A fine discrete floor field cellular automaton model with natural step length for pedestrian dynamics

Sensen Xing, Cheng Wang, Wei Wang, Rui Feng Cao, Anthony Chun Yin Yuen, Eric Wai Ming Lee, Guan Heng Yeoh, Qing Nian Chan

Summary: This paper proposes an extended FFCA model that integrates the natural step length into pedestrian movement, allowing pedestrians to occupy multiple grids and expanding the interaction area. Through simulation of evacuation scenarios, the model accurately reproduces density-velocity relations and matches experimental results. Compared to traditional models, this model generates more reasonable velocity variations and evacuation paths.

SIMULATION MODELLING PRACTICE AND THEORY (2024)