Papers by Michele Mastroianni

International Conference on Emerging Internet, Data & Web Technologies (EIDWT 2024), 2024
Energy-related Denial of Service (DoS) attacks have the potential to impact not only the quality ... more Energy-related Denial of Service (DoS) attacks have the potential to impact not only the quality or availability of services provided by large-scale data center (DC) infrastructures but also the operating expenses incurred by the organizations managing them, essentially in terms of energy bills. More specifically, the impact on the overall energy usage and, consequently, on the associated expenses, increases with the amount of time required to identify the attack. Therefore, the degradation of the environmental control systems in the buildings/facilities hosting the computing or storage nodes poses an especially insidious threat, which could result in a novel kind of attack to the involved infrastructures. Due to the limited ability to observe events in cyber-physical systems, recognizing these violations is extremely challenging for data center administrators. This paper proposed a new methodology for detecting cooling systems attacks based on continuous Power Usage Effectiveness (PUE) monitoring. This kind of measurement is quite simple to arrange in a data center, and can help to detect, in a limited amount of time, both attacks and failures on a DC cooling system, thus helping the system administration to limit expenses and service outages.

2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, 2022
The legal definition of privacy regulations, like GDPR in the European Union, significantly impac... more The legal definition of privacy regulations, like GDPR in the European Union, significantly impacted on the way in which software, systems and organizations should be designed or maintained to be compliant to rules. While the privacy community stated proper risk assessment and mitigation approaches to be applied, literature seems to suggest that the software engineering community, with special reference to companies, did actually concentrate on the specification phase, with less attention for the test phase of products. In coherence with the privacy-by-design approach, we believe that a bigger methodological effort must be put in the systematic adaptation of software development cycles to privacy regulations, and that this effort might be promoted in the industrial community by focusing on the relation between organizational costs vs technical features, also leveraging the benefits of targeted testing as a mean to lower operational privacy enforcement costs.

2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing (IEEE DASC 2022), 2022
The trend of energy consumed by Data Centers (DC) has clear implications for global energy demand... more The trend of energy consumed by Data Centers (DC) has clear implications for global energy demand, and several indicators have been proposed in order to help designers to monitor the efficiency and the GHG emissions of their DCs, and plan renovation and extensions of DC in order reduce both costs and emissions. Moreover, all devices involved in the DC infrastructures have their own network access and could be affected by new threats, that may cause a rise in energy consumption, with noticeable effects on the efficiency of DC and the related performance indicators. This paper aims to investigate the meaning of the most relevant indicators for energy efficiency and reduction of emissions, and the impact that some energyaware and green-aware policies could have on such indicators. The impact of attacks is also taken into account.

2023 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), 2023
Simulation tools play a critical role in various domains of cloud computing. They offer researche... more Simulation tools play a critical role in various domains of cloud computing. They offer researchers and infrastructure designers a virtual environment to work in, eliminating the expenses associated with physical infrastructure, so those platforms could offer determinant support to analyze the performance of cloud systems and the related data centers. For those reasons, many cloud simulators have been developed. They are currently used by academics and practitioners, but only a few of these provide useful features in order to perform effective simulations of cloud systems for energy-related issues. The goal of this work is to help academics and professionals interested in energy-aware simulations of cloud systems to select the most suitable simulation platform for their purposes. The first part of this paper reviews the five simulators that hold the most promising features regarding energy issues. Subsequently, an evaluation metric has been introduced, based on five qualitative indexes: Last update, Popularity, Availability, Granularity, and Performance profile. The evaluation aims to provide researchers with suggestions for the best simulator choice.
Evaluation of Public E-Procurement Services Accessibility: A Multicriteria Approach
Due to the economic crisis that has hit many countries in the world, Governments have reduced the... more Due to the economic crisis that has hit many countries in the world, Governments have reduced the budgets for research: as a consequence, public University have to reduce their expenses for both research and administration. The possibility to share resources offered by federated Clouds represents the perfect opportunity to reduce expenses for Hardware and Software resources, and at the same time to improve the collaboration between Universities. In this paper the services offered by the GARR Federated Cloud have been exploited to provide an efficient back-up system for the documentation produced by administrative office of the Vanvitelli University, which results to be cheaper and more reliable than the current NAS-based system
Performance Modeling And Analysis Of An Autonomic Router
A Simulation Study On A WSN For Emergency Management

An Approach to Help in Cloud Model Choice for Academia Services’ Supplying
Springer eBooks, Oct 20, 2019
In academic institutions, there is frequently the need to provide new services, in a cloud model,... more In academic institutions, there is frequently the need to provide new services, in a cloud model, to be used either in teaching or research activities. One of the main decisions to be addressed is related to the cloud model to adopt (private, public or hybrid), and what the mixing of functionalities to use for the hybrid one. In this paper a new approach is proposed to define a methodology to serve as a tool to be used as decision support for the ICT manager in order to help him in this decision. A simple and intuitive graph representation has been used. The methodology has been tested with a real case study on the provisioning of a new e-learning service for the university of the authors. The work has to be considered a tentative approach as a starting point to further researches in the same direction.

Performance evaluation for the design of a hybrid cloud based distance synchronous and asynchronous learning architecture
Simulation Modelling Practice and Theory, May 1, 2021
The COVID-19 emergency suddenly obliged schools and universities around the world to deliver on-l... more The COVID-19 emergency suddenly obliged schools and universities around the world to deliver on-line lectures and services. While the urgency of response resulted in a fast and massive adoption of standard, public on-line platforms, generally owned by big players in the digital services market, this does not sufficiently take into account privacy-related and security-related issues and potential legal problems about the legitimate exploitation of the intellectual rights about contents. However, the experience brought to attention a vast set of issues, which have been addressed by implementing these services by means of private platforms.This work presents a modeling and evaluation framework, defined on a set of high-level, management-oriented parameters and based on a Vectorial Auto Regressive Fractional (Integrated) Moving Average based approach, to support the design of distance learning architectures. The purpose of this framework is to help decision makers to evaluate the requirements and the costs of hybrid cloud technology solutions. Furthermore, it aims at providing a coarse grain reference organization integrating low-cost, long-term storage management services to implement a viable and accessible history feature for all materials. The proposed solution has been designed bearing in mind the ecosystem of Italian universities. A realistic case study has been shaped on the needs of an important, generalist, polycentric Italian university, where some of the authors of this paper work.
Towards privacy-aware software design in small and medium enterprises
2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Sep 12, 2022
Towards a cloud model choice evaluation: comparison between cost/features and ontology-based analysis
International Journal of Grid and Utility Computing, 2023
Quantitative Modeling of the Behaviour of an Autonomic Router
Autonomic routers are the main component on which autonomic networking is founded. Our goal is to... more Autonomic routers are the main component on which autonomic networking is founded. Our goal is to provide a first approach performance modeling method that can be usable by networking professionals that are not part of the Performance Evaluation community.

ECMS 2023 Proceedings edited by Enrico Vicario, Romeo Bandinelli, Virginia Fani, Michele Mastroianni
Cloud platforms offer not only the capacity to facilitate effective and scalable services for thi... more Cloud platforms offer not only the capacity to facilitate effective and scalable services for third-party applications and business solutions, but also present an opportunity to implement intricate disaster recovery strategies. For instance, a Chief Technical Officer may opt to maintain operations on private systems in order to effectively manage costs, privacy, and security, while simultaneously leveraging the cloud as an autonomous and immediate disaster recovery support. This can be achieved by building a secondary leg of the IT system that functions as an online cold or hot spare, manages workload peaks, or handles a portion of the workload under normal conditions. To assess the effectiveness and cost-effectiveness of such solutions, appropriate models are essential to examine the trade-offs and explore the parameter space of possible alternatives. This paper presents a modeling approach for the design and evaluation of cloud-based recovery setups.
Evaluating the Impact of Data Anonymization in a Machine Learning Application
Lecture Notes in Computer Science, 2022
In this paper, we introduce a solution aiming to improve the accuracy of the surface temperature ... more In this paper, we introduce a solution aiming to improve the accuracy of the surface temperature detection in an outdoor environment. The temperature sensing subsystem relies on Mobotix thermal camera without the black body, the automatic compensation subsystem relies on Raspberry Pi with Node-RED and TensorFlow 2.x. The final results showed that it is possible to automatically calibrate the camera using machine learning and that it is possible to use thermal imaging cameras even in critical conditions such as outdoors. Future development is to improve performance using computer vision techniques to rule out irrelevant measurements.

Neural Computing and Applications
The wide use of IT resources to assess and manage the recent COVID-19 pandemic allows to increase... more The wide use of IT resources to assess and manage the recent COVID-19 pandemic allows to increase the effectiveness of the countermeasures and the pervasiveness of monitoring and prevention. Unfortunately, the literature reports that IoT devices, a widely adopted technology for these applications, are characterized by security vulnerabilities that are difficult to manage at the state level. Comparable problems exist for related technologies that leverage smartphones, such as contact tracing applications, and non-medical health monitoring devices. In analogous situations, these vulnerabilities may be exploited in the cyber domain to overload the crisis management systems with false alarms and to interfere with the interests of target countries, with consequences on their economy and their political equilibria. In this paper we analyze the potential threat to an example subsystem to show how these influences may impact it and evaluate a possible consequence.
A New Structured Model for ICT Competencies Assessment Through Data Warehousing Software
L'industria - Rivista di economia e politica industriale, 1999
... tecnologici e di mercato nel settore dei personal computer Emilio Esposito, Michele Mastroian... more ... tecnologici e di mercato nel settore dei personal computer Emilio Esposito, Michele Mastroianni Università di Napoli «Federico II» l ... Numerosi lavori hanno affrontato il problema della misurazione della tec-nologia (Dodson, 1985; Lenz, 1985; Saviotti, 1985; Gagliardi et al, 1988 ...
A methodology to evaluate the accessibility of public e-procurement services
Uploads
Papers by Michele Mastroianni