IEEE International Conference on Computer Communications
15-19 April 2018 // Honolulu, HI // USA

Workshop on CCSNA: Cloud Computing Systems, Networks, and Applications - Program

The International Workshop on Cloud Computing Systems, Networks, and Applications (CCSNA 2018)


Monday, April 16, 2018 ● Room: Iolani 6


Cloud computing, as well as Cloud-inspired business models, enables on-demand access to a shared pool of resources, namely computing, storage, networks, services, and applications. With the advent of Cloud-based systems, cloud operators have been aiming at reliable, secured, privacy-preserving and cost-efficient cloud design and management. As the Cloud infrastructure aims at offering various IT resources as services, requirements of Cloud applications vary based on the resources which are requested as services. Thus, the resources may refer to heavy computation resources, massive storage resources, and high-capacity network resources and so on. The heterogeneity of cloud applications leads to the challenge of holistic design of a robust Cloud system which can oversee and handle the diverse needs of numerous types of applications. On the other hand, these challenges enforce cooperation of various players in the Cloud system, each of which focuses on a different segment such as network, computing, applications, and systems. The Seventh International Workshop on Cloud Computing Systems, Networks, and Applications (CCSNA-2018) aims at the crossroads between scientists, researchers, practitioners and students from diverse domains in Cloud computing research. The Workshop aims at attracting contributions of system and network design that can support existing and future applications and



Chuan Heng Foh (University of Surrey, UK)

Yaser Jararweh (Jordan University of Science and Technology, Jordan)


08:00 – 08:10

Opening Session

Abdallah Khreishah (New Jersey Institute of Technology, USA)


08:10 – 10:00

Session 1


Online Provisioning for Virtual Clusters in Multi-tenant Cloud Data Center Network

Shuaibing Lu, Zhiyi Fang  (Jilin University, P.R. China) Jie Wu (Temple University, USA)


Exploring Edges for Connected and Autonomous Driving

Lee Gillam (University of Surrey, UK), Konstantinos Katsaros (Digital Catapult Centre, London, UK), Mehrdad Dianati (Digital Catapult Centre, London, UK), Alex Mouzakitis (Jaguar Land Rover,UK)


Hybrid Computation Offloading in Fog and Cloud Networks with Non-Orthogonal Multiple Access

Yiming Liu(Beijing University of Posts and Telecommunicaitons, P.R. China),   F. Richard Yu (Carleton University, Canada),    Xi Li(Beijing University of Posts and Telecommunicaitons, P.R. China), Hong Ji(Beijing University of Posts and Telecommunicaitons, P.R. China), Victor C.M. Leung (University of British Columbia, Canada)


VENUS: Verifiable Range Query in Data Streaming

I-Chen Tsai (National Taiwan University, Taiwan),  Chia-Mu Yu (National Chung Hsing University, Taiwan),   Haruo Yokota (Tokyo Institute of Technology, Japan),  Sy-Yen Kuo(National Taiwan University, Taiwan)


LEAP: A Latency Control Protocol For Multi-Path Data Delivery With Pre-Defined QoS Guarantees

Federico Chiariotti(University of Padova, Italy),  Stepan Kucera(Bell Labs, Alcatel-Lucent Ltd., Ireland      ),  Andrea Zanella(University of Padova, Italy),  Holger Claussen(Nokia Bell Labs, Ireland)


Cloud Data Centers Revenue Maximization using Server Consolidation: Modeling and Evaluation

Mohammad Wardat (Iowa State University, USA), Mahmoud Al-Ayyoub,  Yaser Jararweh (Jordan University of Science and Technology, Jordan), Abdallah A Khreishah (New Jersey Institute of Technology, USA)



10:30 – 11:15

Keynote Session

Dr. Xiaojiang (James) Du, Temple University, Philadelphia, USA.

Title: Verifying Cloud Service Level Agreement by a Third Party Auditor


In this work, we study the important issue of verifying Service Level Agreement(SLA) with an untrusted cloud, and  present a SLA verification framework that utilizes a third party auditor (TPA). Cloud provides users with elastic computing and storage resources in a pay-as-you-go way. A SLA between the cloud and a user is a contract which specifies the computing resources and performances that the cloud should provide to the user. A cloud service provider (CSP) has the incentives to cheat on SLA, e.g., providing a user with less CPU and memory resources as specified in the SLA, which allows the CSP to support more users and make more profits. A malicious CSP can easily disrupt the existing SLA monitoring/ verification techniques by interfering the monitoring/measurement process. A TPA resolves the trust dilemma between a CSP and its users. Under the TPA framework and the untrusted-cloud threat model, we design two effective testing algorithms that can detect a SLA violation of the memory size of a VM. Using real experiments, we demonstrate that our algorithms can detect cloud cheating on VM memory size (i.e., SLA violations). Furthermore, we show that our testing algorithms can defend various attacks from a malicious CSP, which tries to hide a SLA violation.


Dr. Xiaojiang (James) Du is a Professor and the Director of the Security And Networking (SAN) Lab in the Department of Computer and Information Sciences at Temple University, Philadelphia, USA. Dr. Du received his B.S. and M.S. degree in Electrical Engineering (Automation Department) from Tsinghua University, Beijing, China in 1996 and 1998, respectively. He received his M.S. and Ph.D. degree in Electrical Engineering from the University of Maryland College Park in 2002 and 2003, respectively. His research interests are security, wireless networks, and systems. He has authored over 270 journal and conference papers in these areas, as well as a book published by Springer. Dr. Du has been awarded more than 5 million US dollars research grants from the US National Science Foundation (NSF), Army Research Office, Air Force Research Lab, NASA, the State of Pennsylvania, and Amazon. He won the best paper award at IEEE GLOBECOM 2014 and the best poster runner-up award at the ACM MobiHoc 2014. He serves on the editorial boards of two international journals. Dr. Du served as the lead Chair of the Communication and Information Security Symposium of the IEEE International Communication Conference (ICC) 2015, and a Co-Chair of Mobile and Wireless Networks Track of IEEE Wireless Communications and Networking Conference (WCNC) 2015. He is (was) a Technical Program Committee (TPC) member of several premier ACM/IEEE conferences such as INFOCOM (2007 - 2018), IM, NOMS, ICC, GLOBECOM, WCNC, BroadNet, and IPCCC. Dr. Du is a Senior Member of IEEE and a Life Member of ACM.​


11:15 – 12:00

Session 2


Mean Latency Optimization in Erasure-coded Distributed Storage Systems

Abubakr O. Al-Abbasi, Vaneet Aggarwal (Purdue University, USA)


Security and Privacy of Big Data for Social Networking Services in Cloud

Christos Stergiou, Kostas Psannis, Andreas Plageras, Theofanis Xifilidis (University of Macedonia, Greece),Brij Gupta (National Institute of Technology Kurukshetra, India       )


RARE: Defeating Side Channels based on Data-Deduplication in Cloud Storage

Zahra Pooranian (University of Padua, Italy), Kang-Cheng Chen (Yuan Ze University, Taiwan), Chia-Mu Yu (National Chung Hsing University, Taiwan), Mauro Conti (University of Padua, Italy)