• Title, Summary, Keyword: Cloud

Search Result 4,076, Processing Time 0.043 seconds

The Automatic Collection and Analysis System of Cloud Artifact (클라우드 아티팩트 자동 수집 및 분석 시스템)

  • Kim, Mingyu;Jeong, Doowon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1377-1383
    • /
    • 2015
  • As the cloud services users' increase, there are important files created by individual in cloud storage. Thus, investigation of cloud artifact should be conducted. There are two methods of analyzing cloud service, one is that investigates cloud server provider (CSP), and another is that investigates client. In this paper, we presents an automated framework to detect the altered artifact and developes a tool that detects the cloud artifact. We also developed Cloud Artifact Tool that can investigate client computer. Cloud Artifact Tool provides feature of collection and analysis for the services such as Google Drive, Dropbox, Evernote, NDrive, DaumCloud, Ucloud, LG Cloud, T Cloud and iCloud.

Survey and Analysis on Security Control Schema in Cloud Assurance Criteria

  • Kim, Jong-Chul;Kim, Nam-Ju;Kou, Kab-Seung;Min, Young-Gi
    • Journal of Security Engineering
    • /
    • v.14 no.5
    • /
    • pp.337-344
    • /
    • 2017
  • On September 9, 2015, the South Korean Ministry of Science and ICT(the "MSIT") established and announced the "Information Protection Measures for Vitalization of Cloud Services" in anticipation that the use of cloud computing would actively increase based on the implementation of the Act on Cloud Computing Advancement and User Protection(the "Cloud Computing Act") on September 28, 2015. In addition, the K-ICT Cloud Computing Activation Plan(Nov. 15) announced the basic plan for the development of cloud computing, and decided to establish info rmation security scheme to improve the level of cloud information protection. Accordingly, The Korea Internet Security Agency(the "KISA") has implemented the "Cloud Security Assurance Program". In this paper survey and analyze the international cloud security criteria and security certification criteria of major countries, and discusses the status of Korea cloud certification system.

Development of Cloud Amount Calculation Algorithm using MTSAT-1R Satellite Data (MTSAT-1R 정지기상위성 자료를 이용한 전운량 산출 알고리즘 개발)

  • Lee, Byung-Il;Kim, Yoonjae;Chung, Chu-Yong;Lee, Sang-Hee;Oh, Sung-Nam
    • Atmosphere
    • /
    • v.17 no.2
    • /
    • pp.125-133
    • /
    • 2007
  • Cloud amount calculation algorithm was developed using MTSAT-1R satellite data. The cloud amount is retrieved at 5 km ${\times}$ 5 km over the Korean Peninsula and adjacent sea area. The algorithm consists of three steps that are cloud detection, cloud type classification, and cloud amount calculation. At the first step, dynamic thresholds method was applied for detecting cloud pixels. For using objective thresholds in the algorithm, sensitivity test was performed for TBB and Albedo variation with temporal and spatial change. Detected cloud cover was classified into 3 cloud types (low-level cloud, cirrus or uncertain cloud, and cumulonimbus type high-level cloud) in second step. Finally, cloud amount was calculated by the integration method of the steradian angle of each cloud pixel over $3^{\circ}$ elevation. Calculated cloud amount was compared with measured cloud amount with eye at surface observatory for the validation. Bias, RMSE, and correlation coefficient were 0.4, 1.8, and 0.8, respectively. Validation results indicated that calculated cloud amount was a little higher than measured cloud amount but correlation was considerably high. Since calculated cloud amount has 5km ${\times}$ 5km resolution over Korean Peninsula and adjacent sea area, the satellite-driven cloud amount could show the possibility which overcomes the temporal and spatial limitation of measured cloud amount with eye at surface observatory.

Cloud Forecast using Numerical Weather Prediction (수치 예보를 이용한 구름 예보)

  • Kim, Young-Chul
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.15 no.3
    • /
    • pp.57-62
    • /
    • 2007
  • In this paper, we attempted to produce the cloud forecast that use the numerical weather prediction(NWP) MM5 for objective cloud forecast. We presented two methods for cloud forecast. One of them used total cloud mixing ratio registered to sum(synthesis) of cloud-water and cloud-ice grain mixing ratio those are variables related to cloud among NWP result data and the other method that used relative humidity. An experiment was carried out period from 23th to 24th July 2004. According to the sequence of comparing the derived cloud forecast data with the observed value, it was indicated that both of those have a practical use possibility as cloud forecast method. Specially in this Case study, cloud forecast method that use total cloud mixing ratio indicated good forecast availability to forecast of the low level clouds as well as middle and high level clouds.

  • PDF

Cloud-based Healthcare data management Framework

  • Sha M, Mohemmed;Rahamathulla, Mohamudha Parveen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1014-1025
    • /
    • 2020
  • Cloud computing services changed the way the data are managed across the healthcare system that can improve patient care. Currently, most healthcare organizations are using cloud-based applications and related services to deliver better healthcare facilities. But architecting a cloud-based healthcare system needs deep knowledge about the working nature of these services and the requirements of the healthcare environment. The success is based on the usage of appropriate cloud services in the architecture to manage the data flow across the healthcare system.Cloud service providers offer a wide variety of services to ingest, store and process healthcare data securely. The top three public cloud providers- Amazon, Google, and Microsoft offers advanced cloud services for the solution that the healthcare industry is looking for. This article proposes a framework that can effectively utilize cloud services to handle the data flow among the various stages of the healthcare infrastructure. The useful cloud services for ingesting, storing and analyzing the healthcare data for the proposed framework, from the top three cloud providers are listed in this work. Finally, a cloud-based healthcare architecture using Amazon Cloud Services is constructed for reference.

Multi-cloud Technology Introduction and Research Trends (멀티 클라우드 기술 개요 및 연구 동향)

  • Kim, B.S.;Jung, Y.W.;Oh, B.T.;Kim, S.Y.;Son, S.;Seo, J.H.;Bae, S.J.;Lee, G.C.;Kang, D.J.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.3
    • /
    • pp.45-54
    • /
    • 2020
  • The cloud computing industry has focused on establishing a cloud-based business environment for enterprises with efforts to convert using their own on-premise computing infrastructures to using cloud services. With these efforts, using cloud services has become natural, especially for the IT industry. The cloud computing industry is moving toward proliferation of the cloud computing environment into various evolving industries. Along with industrial trends, new technical trends such as edge computing and multi-cloud are emerging. These trends are expected to create new business models and develop related service ecosystems, providing new opportunities for service providers and new experiences for users. A mong those emerging technologies, multi-cloud technology is expected to realize unlimited global cloud computing resources by unifying cloud resources from multiple public cloud service providers. In this paper, we introduce the concept and related trends of multi-cloud technology. Subsequently, we analyze the main functionalities and several use cases of multi-cloud technology. Finally, we summarize the effects and usefulness of multi-cloud technology in the domestic cloud industry.

Cloud computing Issues and Security measure (클라우드 컴퓨팅 보안 대책 연구)

  • Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.31-35
    • /
    • 2015
  • Cloud computing is internet-based computing technology. This is a form for exchanging service focused on the Internet. Because Cost is saved and use is easy there's a tendency that many companies are using. Cloud is in the form of a public cloud and private cloud and hybrid cloud. The service model is SaaS, PaaS, IaaS. Cloud computing use is simple but it has a security vulnerability. In particular, there is a vulnerability in virtualization and centralized information. In order to overcome this new security technology is to be developed. In particular, network security technology and authentication technology should be developed. Another way to overcome security responsibilities must be clearly and policies should be unified.

  • PDF

Analysis of K-Defense Cloud Computing Service Availability Considering of Cloud Computing Traffic Growth (클라우드 컴퓨팅 트래픽 증가를 고려한 국방 클라우드 컴퓨팅 서비스 가용성 분석)

  • Lee, Sung-Tae;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.93-100
    • /
    • 2013
  • In 2012, According to 'Cisco Global Cloud Index 2011-2016', the Cisco company forecasted that global data center traffic will nearly quadruple and cloud traffic will nearly sextuple by 2016. Such a rapid growing of traffic is caused by traffic inside the data center and cloud computing workloads. In 2010, the Ministry of National Defense decided to build a Mega Center including the cloud computing technology by 2014, as part of the '2012 Information Service Plan', which is now underway. One of the factors to consider is cloud computing traffic to build a Mega Center. Since the K-defense cloud computing system is built, K-defense cloud computing traffic will increase steadily. This paper, analyzed the availability of K-defense cloud computing service with the K-defense cloud computing traffic increasing using K-Defense cloud computing test system and CloudAnalyst simulation tool. Created 3 scenarios and Simulated with these scenarios, the results are derived that the availability of K-defense cloud computing test system is fulfilled, even cloud workloads are increased as muh as forecasted cloud traffic growth from now until 2016.

Technology Trends of SDN, NFV, and Cloud (SDN/NFV/Cloud 동향)

  • Lee, B.C.;Yang, S.H.;Lee, B.S.
    • Electronics and Telecommunications Trends
    • /
    • v.30 no.1
    • /
    • pp.87-93
    • /
    • 2015
  • 본고에서는 SDN(Software Defined Networking)/NFV(Network Function Virtualization)/Cloud 기술 현황 및 SDN/NFV/Cloud 표준화 현황을 바탕으로 통합적인 측면에서 SDN/NFV/Cloud 기술을 전망한다. SDN/NFV/Cloud는 응용/서비스에 따라 ICT 인프라가 제어 및 관리할 수 있게 하여 새로운 지식 기반 서비스 및 솔루션을 창출하는 핵심 기술임을 설명한다. SDN, NFV 및 Cloud 기술을 연계 분석하여 SDN/NFV/Cloud 개별 및 융합 기술 진화방향을 전망한다. 끝으로 SDN/NFV/Cloud 기술개발 가속화, 융합 기술 확산 및 효과에 대해서 예측한다.

  • PDF

Issues and Suggestions for "Act on the Development of Cloud Computing" and Protection of its Users ("클라우드컴퓨팅 발전 및 이용자 보호에 관한 법률"의 쟁점 및 개선방안)

  • Lee, Jung Koo;Min, Daihwan;Kwon, Hun Yeong
    • Journal of Information Technology Applications and Management
    • /
    • v.24 no.1
    • /
    • pp.81-91
    • /
    • 2017
  • In Korea, "Act on the Development of Cloud Computing and Protection of its Users" has been enforced since September 28, 2015. Many countries implemented 'Cloud First' policies and global companies such as Amazon, Microsoft, IBM started cloud services in Korea. Under these circumstance, the Act was established for developing the cloud computing industry. The Act includes clauses for encouraging the use of private cloud computing by public organizations, supporting small- and medium-size cloud service providers, and utilizing secure cloud computing services by users. However, some terms appear to be similar but have different meanings from "Act on Promotion of Information and Communications Network Utilization and Information Protection, etc." and "Personal Information Protection Act". This generated some confusion and conflicts in relation to providing user information to a 3rd party and notifying the intrusion in the Cloud Computing Act. This paper discusses these issues and suggestions for revision of the Cloud Computing Act.