Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zulkefli Muhammed Yusof is active.

Publication


Featured researches published by Zulkefli Muhammed Yusof.


international conference on information and communication technology | 2013

Fault tolerant cloud auditing

Ahmad Waqas; Zulkefli Muhammed Yusof; Asadullah Shah

The aim of cloud computing is to deliver on-demand services to its users with guarantee of scalability, availability and reliability. These services have a variety that may include simple and complex software, infrastructure and architecture. It may vary according to the Cloud Service Provider (CSP) and the service license agreement (SLA) with Cloud Client. The research contribution in this paper has two facets. First, an investigative review on cloud computing services, models, security and privacy concerns, and auditing strategies is conducted. Secondly, we suggest the fault tolerant approach in conjunction with the tiered strategy for cloud auditing.


international conference on advanced computer science applications and technologies | 2013

A Security-Based Survey and Classification of Cloud Architectures, State of Art and Future Directions

Ahmad Waqas; Zulkefli Muhammed Yusof; Asadullah Shah

This research paper aims to explore the underlying cloud computing architectures with respect to security and auditing services. As most of the standards have not been defined yet for cloud computing, academic and industrial researchers are participating with their ideas and proofs. We have surveyed and classified the available cloud computing architectures into three categories which are 1) Architecture of Cloud Computing Security and Auditing, 2) Data Storage Security, Privacy and Auditing of Data Leakage, and 3) Security and Auditing of Malicious Acts. This taxonomy and analysis of existing cloud architectures will be helpful to address the primary issues focusing the security and auditing perspectives in future research.


international conference on computer communications | 2014

Sharing of attacks information across clouds for improving security: A conceptual framework

Ahmad Waqas; Zulkefli Muhammed Yusof; Asadullah Shah; Nadeem Mahmood

Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the Internet. It is evolving as a key computing platform for sharing resources that include infrastructures, software, applications, and business processes. The cloud environment is required to have efficient security techniques as it contains precious assets such as data, users, technologies, resources and business transactions. Most of the proposed architectures for cloud computing implementations are for individual clouds which do not allow the sharing of attack information with other clouds and hence the other clouds are not able to safe themselves from the same attack. The aim of this research is to propose a conceptual framework for connected or federated clouds that can share information regarding attacks and attackers for securing themselves.


Information Assurance and Cyber Security (CIACS), 2014 Conference on | 2014

ReSA: Architecture for resources sharing between clouds

Ahmad Waqas; Zulkefli Muhammed Yusof; Asadullah Shah; Moharntnad Asif Khan

Cloud computing has emerged as paradigm for hosting and delivering services over the Internet. It is evolved as a key computing platform for delivering on-demand resources that include infrastructures, software, applications, and business processes. Mostly, clouds are deployed in a way that they are often isolated from each other. These implementations cause lacking of resources collaboration between different clouds. For example, cloud consumer requests some resource and that is not available at that point in time. Client satisfaction is important for business as denying the client may be expensive in many ways. To fulfill the client request, the cloud may ask the requested resource from some other cloud. In this research paper we aim to propose a trust worthy architecture named ReSA (Resource Sharing Architecture) for sharing on-demand resources between different clouds that may be managed under same or different rules, policies and management.


the internet of things | 2017

A framework for smart estimation of demand-supply for crowdsource management using WSN

Naeem A. Nawaz; Ahmad Waqas; Zulkefli Muhammed Yusof; Asadullah Shah

Crowdsource management imposes many challenges including varying degree of demands for food and daily routine consumables. The explicit problem for estimating increase or decrease in demand arises when crowd moves dynamically to different locations with respect to time. This may result in wastage or shortage of many resources and loss for various stakeholders. To overcome the issue of demand estimation more precisely food demand and efficient supply, this paper proposes a conceptual framework to sense the data of crowd such as number of humans and update the suppliers timely. IoT and WSN techniques are used to count the number of humans in crowd at some particular area with respect to time for food demand estimation.


International Journal of Advanced Computer Science and Applications | 2017

A Features-based Comparative Study of the State-of-the-art Cloud Computing Simulators and Future Directions

Ahmad Waqas; M. Abdul Rehman; Abdul Rehman Gilal; Mohammad Asif Khan; Javed Ahmed; Zulkefli Muhammed Yusof

Cloud computing has emerged during the last decade and turned out to be an essential component for today’s business. Therefore, many solutions are being proposed to optimize and secure the cloud computing environment. To test and validate the proposed solutions before deploying in real cloud infrastructure, a cloud computing simulator is the key requirement. There are several cloud computing simulators that have been used by research community for this purpose. In this paper, we have discussed modern cloud simulators and presented comprehensive comparison based on their features.


international conference on information and communication technology | 2014

Simulation of resource sharing architecture between clouds (ReSA) using Java programming

Ahmad Waqas; Zulkefli Muhammed Yusof; Asadullah Shah; Zeeshan Bhatti; Nadeem Mahmood

Cloud computing has been emerged as cost-effective solution to organizations for renting resources. The prime objective is to deliver on-demand resources over the Internet. In this paper, we have implemented the architecture for resource sharing between clouds (ReSA) to connect different clouds that may be under different rule, policies, management and ownership. The ultimate task is to enable clouds to borrow resource from other connected clouds to fulfill the demand of the client. We have demonstrated the implementation using java socket programing and test-bed. We further analyzed the average waiting time for resources when they are borrowed from other cloud.


international conference on information and communication technology | 2013

Implementation issues of vehicular ad hoc network applications: Selected case studies in Malaysia

Zulkefli Muhammed Yusof; Nur Nazmah Mat Zin; Nor Hanini S. Baharun; Nur Syahirah M Khairi

This paper looks into the implementation issues on Vehicular Network applications. In order to have better insights two scenarios have been chosen and simulated. A toll booth system shows the issues on a hybrid VANET application while City Taxi system provides the studies of highly mobile applications.


international conference on information and communication technology | 2013

Dynamic object replica placement using underlying routing protocols: Ensuring the reliability

Ahmad Waqas; Nahdia Majeed; Zulkefli Muhammed Yusof; Abdul Waheed Mahesar

Object replication is an unavoidable phenomenon in distributed systems to address the issues of size, administrative and resources scalability. It also guarantees the availability of system as more users can be accommodated and failures can be tolerated. If the location of object replica is not proper, the problem may arise when it is requested by many entities at once. The response time may also increase due to the network latency although network is considered to be steadfast in the distributed systems but the latency can never be avoided. Efficient replica placement, both client initiated and server initiated, can be ensured using the dynamic replica placement mechanism in conjunction with the underlying routing protocols that provides the reliability of contents distribution and minimizes the network latency. In this paper, it is discussed that reliability can be assured if we use replica placement algorithm along with the EIGRP (Enhanced Interior Gateway Routing Protocol). The issues of choosing the best path for placing the replica that provides the minimum latency and reliability of contents transmission can be overcome by combining the EIGRP features that includes internetwork delay, bandwidth consumption, reliability of packet transmission and traffic load, with dynamic replica placement algorithm.


international conference on advanced computer science applications and technologies | 2013

Load-Balancing Technique in Clustered Mobile Ad-hoc Networks

Labdah M.H.M. ALGhafran; Zulkefli Muhammed Yusof

Collaboration


Dive into the Zulkefli Muhammed Yusof's collaboration.

Top Co-Authors

Avatar

Asadullah Shah

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Ahmad Waqas

Sukkur Institute of Business Administration

View shared research outputs
Top Co-Authors

Avatar

Ahmad Waqas

Sukkur Institute of Business Administration

View shared research outputs
Top Co-Authors

Avatar

Nadeem Mahmood

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Naeem A. Nawaz

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Abdul Waheed Mahesar

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Nur Nazmah Mat Zin

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Zeeshan Bhatti

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Abdul Rehman Gilal

Universiti Teknologi Petronas

View shared research outputs
Top Co-Authors

Avatar

Nor Hanini S. Baharun

International Islamic University Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge