• Title/Summary/Keyword: 클라우드 서비스 평가

Search Result 162, Processing Time 0.037 seconds

A Performance Analysis of RESTful Open API Information System (REST Open API 기반 정보시스템 성능 분석)

  • Choi, Min;Oh, Sechang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.424-426
    • /
    • 2012
  • REST 웹 서비스는 HTTP 프로토콜을 통해 손쉽게 적용 및 배포할 수 있다. 최근 다양한 정보시스템의 데이터베이스가 REST Open API 웹서비스를 통하여 배포되고 있으며, 이는 스마트폰 애플리케이션, 웹(Web) 등의 다양한 분야에서 활용되고 있다. 본 연구는 오픈 API 에 대한 시스템의 성능의 포인트에 서비스 평가를 제공하는 것이다. 본 연구는 REST 오픈 API 의 수행 성능 평가를 통하여 REST 오픈 API 웹 서비스의 확장성에 초점을 둔다. 이를 위해 REST 오픈 API 가 미래에 모바일 클라우드 플랫폼으로써 충분한 성능 및 활용될 수 있는지 검증할 필요가 있다. 본 논문은 큐잉 네트워크(Queueing Network)을 활용하여 REST Open API 웹서비스 서버 시스템을 모델링하고 성능을 분석하였다.

An Authority-Based Efficient Key Management Protocol for Cloud Environment (클라우드 환경을 위한 효율적인 권한 기반 키 설립 프로토콜)

  • Choi, Jeong-hee;Lee, Sang-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1035-1045
    • /
    • 2018
  • Recently, with the development of IT technology, authentication methods of users using cloud services have been diversified. However, research on providing authentication information of a user using a cloud service securely according to authority has not been make until now. In this paper, we propose a key establishment protocol which can perform split authentication using secret key and access control key according to the role authority of user in Intra cloud environment. The proposed protocol generates the access control key and secret key of the user by using the attributes of the user and the generated random number($t_1$, $t_2$), and classifies the roles according to the user's authority after generating the key. Unnecessary operation processes can be reduced. As a result of the performance evaluation, the proposed protocol guarantees the security against various type of attacks that may occur in the cloud environment because the user is authenticated by dividing the access control key and secret key. The size of the ciphertext used to establish the key could be reduced by ${\sum}+1$ more than the existing protocol.

A hierarchical property-based multi-level approach method for improves user access control in a cloud environment (클라우드 환경에서 사용자 접근제어를 향상시킨 계층적 속성 기반의 다단계 접근 방법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Choel
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.7-13
    • /
    • 2017
  • In recent years, cloud computing technology has been socially emerged that provides services remotely as various devices are used. However, there are increasing attempts by some users to provide cloud computing services with malicious intent. In this paper, we propose a property - based multi - level hierarchical approach to facilitate authentication access for users accessing servers in cloud environment. The proposed method improves the security efficiency as well as the server efficiency by hierarchically distributing a set of attribute values by replacing the order of the user 's attribute values in the form of bits according to a certain rule. In the performance evaluation, the proposed method shows that the accuracy of authentication according to the number of attributes is higher than that of the existing method by an average of 15.8% or more, and the authentication delay time of the server is decreased by 10.7% on average. As the number of attributes increases, the average overhead change is 8.5% lower than that of the conventional method.

The Establishment for Technology Development Plan for National Spatial Information Infrastructure Cloud Service (국가 공간정보 인프라의 클라우드 서비스 기술개발 방안 수립)

  • Youn, Junhee;Kim, Changyoon;Moon, Hyonseok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.469-477
    • /
    • 2017
  • Cloud computing is an IT resource providing technology to various users by using virtualization technology. Newly updated spatial information may not be used by other organizations since management authorities are dispersed for Korean public spatial information. Further, the national budget is wasted since each organization independently implements renewable GIS analysis function. These problems can be solved by applying cloud service. However, research related to the application of cloud service to Korea spatial information system has been proposed in the technology development direction, and no detailed development plan has been proposed. In this paper, we deal with the establishment of a technology development plan for national spatial information infrastructure cloud service. First, we deduct the implication to derive the technology development goals by analyzing the political and technical environment. Second, technology and critical technology elements are derived to achieve the goals of the specialist's analysis based on the evaluation elements. As a result, thirteen critical technology elements are derived. Finally, thirty-one research activities, which comprise the critical technology elements, are defined. Critical technology elements and research activities derived in this research will be used for the generation of a technology development road-map.

Trends in Visual Quality Assessment (영상 화질평가 기술동향)

  • Lee, S.K.;Yoo, W.Y.;Suh, Y.H.
    • Electronics and Telecommunications Trends
    • /
    • v.27 no.3
    • /
    • pp.83-91
    • /
    • 2012
  • 디지털 영상은 캡처 디바이스를 통해 획득된 후, 처리, 압축, 저장, 전송, 재생산 등의 과정을 거치면서 반드시 왜곡이 수반된다. 이렇게 왜곡된 영상은 인간 지각이 허용할 수 있는 범위 내에서 정확히 재생되어야 한다. 따라서, 영상이 재생되기 전 영상의 화질을 평가할 필요가 있다. 실제 응용에 있어서, 인간의 견해로 영상 화질의 점수를 정하는 주관적 화질평가는 일반적으로 불편하고 시간도 많이 소요되며, 비용이 많이 든다. 예를 들어, 사진, 동영상 등의 영상 콘텐츠를 대규모로 저장하고 있는 클라우드 서비스의 경우, 영상 콘텐츠가 상용으로 서비스되기 전 모든 영상의 화질을 인간이 직접 평가하는 것은 불가능하다. 영상 화질평가(visual quality assessment)에 대한 연구목적은 지각된 영상의 화질을 자동으로 예측하는 측도를 개발하는 것이다. 본고에서는 기존에 제안된 영상 화질평가 기술들을 설명하고, 앞으로의 연구에서 해결해야 할 이슈들을 살펴본다.

  • PDF

User privacy protection model through enhancing the administrator role in the cloud environment (클라우드 환경에서 관리자 역할을 강화한 사용자 프라이버시 보호 모델)

  • Jeong, Yoon-Su;Yon, Yong-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.3
    • /
    • pp.79-84
    • /
    • 2018
  • Cloud services are readily available through a variety of media, attracting a lot of attention from users. However, there are various security damages that abuse the privacy of users who use cloud services, so there is not enough technology to prevent them. In this paper, we propose a protection model to safeguard user's privacy in a cloud environment so as not to illegally exploit user's privacy. The proposed model randomly manages the user's signature to strengthen the role of the middle manager and the cloud server. In the proposed model, the user's privacy information is provided illegally by the cloud server to the user through the security function and the user signature. Also, the signature of the user can be safely used by bundling the random number of the multiplication group and the one-way hash function into the hash chain to protect the user's privacy. As a result of the performance evaluation, the proposed model achieved an average improvement of data processing time of 24.5% compared to the existing model and the efficiency of the proposed model was improved by 13.7% than the existing model because the user's privacy information was group managed.

Distributed Table Join for Scalable RDFS Reasoning on Cloud Computing Environment (클라우드 컴퓨팅 환경에서의 대용량 RDFS 추론을 위한 분산 테이블 조인 기법)

  • Lee, Wan-Gon;Kim, Je-Min;Park, Young-Tack
    • Journal of KIISE
    • /
    • v.41 no.9
    • /
    • pp.674-685
    • /
    • 2014
  • The Knowledge service system needs to infer a new knowledge from indicated knowledge to provide its effective service. Most of the Knowledge service system is expressed in terms of ontology. The volume of knowledge information in a real world is getting massive, so effective technique for massive data of ontology is drawing attention. This paper is to provide the method to infer massive data-ontology to the extent of RDFS, based on cloud computing environment, and evaluate its capability. RDFS inference suggested in this paper is focused on both the method applying MapReduce based on RDFS meta table, and the method of single use of cloud computing memory without using MapReduce under distributed file computing environment. Therefore, this paper explains basically the inference system structure of each technique, the meta table set-up according to RDFS inference rule, and the algorithm of inference strategy. In order to evaluate suggested method in this paper, we perform experiment with LUBM set which is formal data to evaluate ontology inference and search speed. In case LUBM6000, the RDFS inference technique based on meta table had required 13.75 minutes(inferring 1,042 triples per second) to conduct total inference, whereas the method applying the cloud computing memory had needed 7.24 minutes(inferring 1,979 triples per second) showing its speed twice faster.

Design and Evaluation of an Edge-Fog Cloud-based Hierarchical Data Delivery Scheme for IoT Applications (사물인터넷 응용을 위한 에지-포그 클라우드 기반 계층적 데이터 전달 방법의 설계 및 평가)

  • Bae, Ihn-Han
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.37-47
    • /
    • 2018
  • The number of capabilities of Internet of Things (IoT) devices will exponentially grow over the next years. These devices may generate a vast amount of time-constrained data. In the context of IoT, data management should act as a layer between the objects and devices generating the data and the applications accessing the data for analysis purposes and services. In addition, most of IoT services will be content-centric rather than host centric to increase the data availability and the efficiency of data delivery. IoT will enable all the communication devices to be interconnected and make the data generated by or associated with devices or objects globally accessible. Also, fog computing keeps data and computation close to end users at the edge of network, and thus provides a new breed of applications and services to end users with low latency, high bandwidth, and geographically distributed. In this paper, we propose Edge-Fog cloud-based Hierarchical Data Delivery ($EFcHD^2$) method that effectively and reliably delivers IoT data to associated with IoT applications with ensuring time sensitivity. The proposed $EFcHD^2$ method stands on basis of fully decentralized hybrid of Edge and Fog compute cloud model, Edge-Fog cloud, and uses information-centric networking and bloom filters. In addition, it stores the replica of IoT data or the pre-processed feature data by edge node in the appropriate locations of Edge-Fog cloud considering the characteristic of IoT data: locality, size, time sensitivity and popularity. Then, the performance of $EFcHD^2$ method is evaluated through an analytical model, and is compared to fog server-based and Content-Centric Networking (CCN)-based data delivery methods.

A Design of u-Learning's Teaching and Learning Model in the Cloud Computing Environment (클라우드 컴퓨팅 환경에서의 u-러닝 교수학습 모형 설계)

  • Jeong, Hwa-Young;Kim, Yoon-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.5
    • /
    • pp.781-786
    • /
    • 2009
  • The cloud computing environment is a new trend of web based application parts. It can be IT business model that is able to easily support learning service and allocate resources through the internet to users. U-learning also is a maximal model with efficiency of the internet based learning. Thus, in this research, we proposed a design of u-learning's teaching and learning model that is applying the internet based learning. Proposal method is to fit u-learning and has 7 steps: Preparing, planning, gathering, learning process, analysis and evaluation, and feedback. We make a cloud u-learning server and cloud LMS to process and manage the service. And We also make a mobile devices meta data to aware the model.

  • PDF

Scheduling Scheme for Cloud Computing based on Workflow Characteristics (클라우드 컴퓨팅에서 워크플로우의 특성을 고려한 스케줄링 기법)

  • Kim, Jeong-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.1-8
    • /
    • 2012
  • Cloud computing has got great popularity in recent times because users can easily access its resources as well as service providers can use efficiently use its resources. By the way, cloud computing are composed of heterogeneous resources and workflows of user application have various characteristics. So, the main goal of this paper is to design new efficient workflow scheduling algorithm, which classifies workflows through their importance degree and allocates resources to each workflow based on QoS metrics such as responsibility, cost and load balancing. Simulation results show that the proposed scheme can improve the responsibility as well as availability of resource.