• Title/Summary/Keyword: 서버 기반 컴퓨팅

Search Result 589, Processing Time 0.026 seconds

Microservice construction method based on UML design assets of monolithic applications (모놀리식 애플리케이션의 UML 설계 자료에 기반한 마이크로서비스 구성 방법)

  • Kim, Daeho;Park, Joonseok;Yeom, Keunhyuk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.5
    • /
    • pp.7-18
    • /
    • 2018
  • Recently, serverless computing is spotlighted. Because it supports the development of application based on micro-service. Micro-service means a small-scale service that can operate independently. Applications with micro-service units have the advantage of enabling individual updates, easy and fast deployment. In addition, it has the advantage of supporting various languages and platforms for each service. Therefore many enterprise are trying to change from monolithic architecture to micro-service based architecture. However, there is a lack of research on methods and baseline for micro-service construction. In this paper, a method is proposed to construct the micro-service unit by analyzing UML design in monolithic application. It also shows the proposed approach can reconstruct monolithic application into micro-service based unit by implementing the constructed micro-services in a real serverless platform environment. In addition, the results of the comparative evaluation with the related studies are presented.

A Study on Clustered EJB Container Server System (EJB(Enterprise JavaBeans) 컨테이너 서버의 클러스터링에 관한 연구)

  • 김성훈;정승욱;서범수;김중배
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.43-45
    • /
    • 2003
  • EJB(Enterprise JavaBeans)는 Sun사에서 추진하는 분산 트랜잭션 기반의 엔터프라이즈 어플리케이션을 위한 컴포넌트 컴퓨팅 아키텍처이다. 또한 J2EE 표준 플랫폼에서 서버 측 컴포넌트를 위한 아키텍처로써, 다중플랫폼 또는 다중 서버에 이식 가능한 비즈니스 로직을 표현하는 코어 기술이다. 본 논문에서는 이러한 EJB 아키텍처에 따라 구현된 EJB 서버 시스템을 클러스터링 환경으로 확장하여 고가용성 및 확장성을 얻고자 할 때 고려해야 할 사항들과 시스템 구현에 따른 구체적인 설계 방안을 제시한다.

  • PDF

User Authentication Protocol through Distributed Process for Cloud Environment (클라우드 환경을 위한 분산 처리 사용자 인증 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.841-849
    • /
    • 2012
  • Cloud computing that provides IT service and computer resource based on internet is now getting attention. However, the encrypted data can be exposed because it is saved in cloud server, even though it is saved as an encrypted data. In this paper, user certification protocol is proposed to prevent from illegally using of secret data by others while user who locates different physical position is providing secret data safely. The proposed protocol uses one way hash function and XOR calculation to get user's certification information which is in server when any user approaches to particular server remotely. Also it solves user security problem of cloud.

P2P Systems based on Cloud Computing for Scalability of MMOG (MMOG의 확장성을 위한 클라우드 컴퓨팅 기반의 P2P 시스템)

  • Kim, Jin-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.1-8
    • /
    • 2021
  • In this paper, we propose an approach that combines the technological advantages of P2P and cloud computing to support MMOGs that allowing a huge amount of users worldwide to share a real-time virtual environment. The proposed P2P system based on cloud computing can provide a greater level of scalability because their more resources are added to the infrastructure even when the amount of users grows rapidly. This system also relieves a lot of computational power and network traffic, the load on the servers in the cloud by exploiting the capacity of the peers. In this paper, we describe the concept and basic architecture of cloud computing-based P2P Systems for scalability of MMOGs. An efficient and effective provisioning of resources and mapping of load are mandatory to realize this architecture that scales in economical cost and quality of service to large communities of users. Simulation results show that by controlling the amount of cloud and user-provided resource, the proposed P2P system can reduce the bandwidth at the server while utilizing their enough bandwidth when the number of simultaneous users keeps growing.

Performance Testing of Satellite Image Processing based on OGC WPS 2.0 in the OpenStack Cloud Environment (오픈스택 클라우드 환경 OGC WPS 2.0 기반 위성영상처리 성능측정 시험)

  • Yoon, Gooseon;Kim, Kwangseob;Lee, Kiwon
    • Korean Journal of Remote Sensing
    • /
    • v.32 no.6
    • /
    • pp.617-627
    • /
    • 2016
  • Many kinds of OGC-based web standards have been utilized in the lots of geo-spatial application fields for sharing and interoperable processing of large volume of data sets containing satellite images. As well, the number of cloud-based application services by on-demand processing of virtual machines is increasing. However, remote sensing applications using these two huge trends are globally on the initial stage. This study presents a practical linkage case with both aspects of OGC-based standard and cloud computing. Performance test is performed with the implementation result for cloud detection processing. Test objects are WPS 2.0 and two types of geo-based service environment such as web server in a single core and multiple virtual servers implemented on OpenStack cloud computing environment. Performance test unit by JMeter is five requests of GetCapabilities, DescribeProcess, Execute, GetStatus, GetResult in WPS 2.0. As the results, the performance measurement time in a cloud-based environment is faster than that of single server. It is expected that expansion of processing algorithms by WPS 2.0 and virtual processing is possible to target-oriented applications in the practical level.

Implementation of Billing System for KI Cloud based CPU usage (CPU 사용량 기반의 KI Cloud 과금 시스템 구현)

  • Jeong, Kimoon;Cho, Hyeyoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.126-128
    • /
    • 2022
  • 초고성능컴퓨터를 활용하여 전통적인 병렬처리 기반의 계산과학을 비롯하여 AI, 빅데이터 등의 ICT 기반 연구를 수행할 수 있어야 한다는 수요가 증가하고 있다. 계산과학 연구의 다양성에 맞춰 컴퓨팅 연구환경을 제공하기 위하여 한국과학기술정보연구원(KISTI)에서는 초고성능컴퓨터를 인프라로 활용하는 HPC 클라우드인 KI(KISTI Intelligent) Cloud를 개발하여 서비스하고 있다. 본 논문에서는 KI Cloud의 과금을 위한 기능의 설계 및 구현 현황을 기술하였다. 가상서버(VM) 기반의 서비스와 컨테이너 기반의 서비스의 사용량을 측정하기 위하여 Prometheus로 CPU의 사용량을 수집하여 과금 정책을 적용하고 있는 KI Cloud의 과금 기능에 대해서 살펴보도록 한다.

클라우드 컴퓨팅 환경의 가상화 기술 취약점 분석연구

  • Kim, Ji-Yeon;Kim, Hyung-Jong;Park, Choon-Sik;Kim, Myung-Joo
    • Review of KIISC
    • /
    • v.19 no.4
    • /
    • pp.72-77
    • /
    • 2009
  • 가상화 기술은 클라우드 컴퓨팅의 핵심 기술로서 서버 및 스토리지, 하드웨어 등을 분리된 시스템이 아닌 하나의 자원 영역으로 간주하여 자원을 필요에 따라 할당할 수 있다. 클라우드 컴퓨팅 환경에서는 가상화 기술을 통해 자원을 통합하여 활용을 극대화하고, 운영비용 절감 및 공간절약의 효과를 얻을 수 있다. 그러나 가상화 가술을 제공하는 가상화 소프트웨어의 경우, 소프트웨어 자체에서 발생할 수 있는 보안 취약점이 존재하게 되고, 이를 이용한 보안 위협 요소는 가상화 환경 기반의 클라우드 컴퓨팅 서비스의 신뢰도를 저하시킬 수 있다. 본 논문에서는 가상머신(VM : Virtual Machine)이 갖는 취약점 분석을 통하여 가상화 환경에서 발생 가능한 보안 위협을 정의하고, 분석 결과를 기반으로 클라우드 컴퓨팅의 가상화 환경에서 고려해야할 보안 문제 및 대응 방안을 기술한다.

Trends of Storage Virtualization Technologies on Cloud Computing (클라우드 컴퓨팅에서 스토리지 가상화 기술 동향)

  • Kim, Y.C.;Cha, M.H.;Lee, S.M.;Kim, Y.K.
    • Electronics and Telecommunications Trends
    • /
    • v.24 no.4
    • /
    • pp.69-78
    • /
    • 2009
  • 가상화는 클라우드 컴퓨팅 서비스를 제공하기 위한 기반 기술로 서버, 스토리지, 네트워크 등과 같은 컴퓨팅 자원을 통합 관리하면서 필요에 따라 자원을 할당함으로써 자원 활용률을 높이고 운영 비용을 절감할 수 있도록 한다. 또한 가상화된 자원에 대한 높은 확장성과 안정성을 제공할 수 있다. 최근에 클라우드 컴퓨팅에서 제공하는 스토리지 서비스는 이러한 가상화 기술 중에서 스토리지 가상화 기술을 기반으로 한다. 본 고에서는 클라우드 컴퓨팅 서비스에서 요구하는 스토리지 가상화 기술과 클라우드 스토리지 서비스에 대해 살펴본다.

A Study on Data Storage and Recovery in Hadoop Environment (하둡 환경에 적합한 데이터 저장 및 복원 기법에 관한 연구)

  • Kim, Su-Hyun;Lee, Im-Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.569-576
    • /
    • 2013
  • Cloud computing has been receiving increasing attention recently. Despite this attention, security is the main problem that still needs to be addressed for cloud computing. In general, a cloud computing environment protects data by using distributed servers for data storage. When the amount of data is too high, however, different pieces of a secret key (if used) may be divided among hundreds of distributed servers. Thus, the management of a distributed server may be very difficult simply in terms of its authentication, encryption, and decryption processes, which incur vast overheads. In this paper, we proposed a efficiently data storage and recovery scheme using XOR and RAID in Hadoop environment.

Development of Win32 API Message Authorization System for Windows based Application Provision Service (윈도우 기반 응용프로그램 제공 서비스를 위한 Win32 API 메시지 인가 시스템의 개발)

  • Kim, Young-Ho;Jung, Mi-Na;Won, Yong-Gwan
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.47-54
    • /
    • 2004
  • The growth of computer resource and network speed has increased requests for the use of remotely located computer systems by connecting through computer networks. This phenomenon has hoisted research activities for application service provision that uses server-based remote computing paradigm. The server-based remote computing paradigm has been developed as the ASP (Application Service Provision) model, which provides remote users through application sharing protocol to application programs. Security requirement such as confidentiality, availability, integrity should be satisfied to provide ASP service using centralized computing system. Existing Telnet or FTP service for a remote computing systems have satisfied security requirement by a simple access control to files and/or data. But windows-based centralized computing system is vulnerable to confidentiality, availability, integrity where many users use the same application program installed in the same computer. In other words, the computing system needs detailed security level for each user different from others, such that only authorized user or group of users can run some specific functional commands for the program. In this paper, we propose windows based centralized computing system that sets security policies for each user for the use of instructions of the application programs, and performs access control to the instructions based on the security policies. The system monitors all user messages which are executed through graphical user interface by the users connecting to the system. Ail Instructions, i.e. messages, for the application program are now passed to authorization process that decides if an Instruction is delivered to the application program based on the pre-defined security polices. This system can be used as security clearance for each user for the shared computing resource as well as shared application programs.