• Title/Summary/Keyword: 클라우드-컴퓨팅

Search Result 1,403, Processing Time 0.026 seconds

Design and Implementation of an Analysis module based on MapReduce for Large-scalable Social Data (대용량 소셜 데이터의 의미 분석을 위한 MapReduce 기반의 분석 모듈 설계 및 구현)

  • Lee, Hyeok-Ju;Kim, Myoung-Jin;Lee, Han-Ku;Yoon, Hyo-Gun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06b
    • /
    • pp.357-360
    • /
    • 2011
  • 최근 인터넷과 통신기술, 특히 모바일과 관련된 기술의 급속한 발전으로 소셜 커뮤니케이션 수단으로 대표되는 SNS(Social Networking Service)가 중요한 이슈로 부각되어지고 있다. SNS 서비스 제공시 중요하게 고려되어져야 할 사항은 정확하고 의미 있는 데이터를 통해서 사용자가 원하고 관심 있는 분야의 정보를 어떻게 제공할 것인가에 초점이 맞춰져 있어야 한다. 그러나 최근 폭발적으로 증가되어지고 있는 소셜 데이터 때문에 사용자는 의미 분석이 정확하게 이루어지지 않은 신뢰성이 결여된 소셜 커뮤니케이션 서비스를 제공받고 있다. 이러한 소셜데이터 분석의 문제점을 해결하기 위해서 본 논문에서는 소셜 네트워크 서비스에 필요한 데이터를 수집하고, 클라우드 컴퓨팅 환경에서 수집된 대용량 SNS 데이터의 의미를 분석 할 수 있는 MapReduce 기반의 분석 모듈의 구조를 제안하였다. 제안한 모듈은 의미 분석에 필요한 소셜 데이터를 수집하는 수집 기능과 수집된 소셜데이터의 의미 분석을 수행하는 분석 기능을 포함하고 있다. 수집 기능은 SNS에서 생성되는 텍스트 형태의 데이터를 수집하고 MapReduce를 통해서 데이터를 분석하기 쉽게 적절한 크기로 생성된 파일을 분할한다. 수집된 소셜 데이터의 의미 분석은 기존 TF-IDF 방식에 개선된 Weighted-MINMAX 적용한 알고리즘을 통해서 구현하였다. 개선된 알고리즘은 단어의 중요도를 평가하고, 중요도가 높은 단어로 구성된 의미정보 제공 서비스를 지원한다. 시스템의 성능 평가를 위해서 노드별 데이터 처리시간과 추출 키워드의 정확도를 측정하였다.

기업 사이버재난 관리를 위한 재해경감활동계획 수립

  • Lee, Young-Jai;Lee, Sung-Joong
    • Review of KIISC
    • /
    • v.20 no.4
    • /
    • pp.42-51
    • /
    • 2010
  • Government legislates a private sector preparedness act related to disasters such as natural, technological, and social ones. According to the law, it announces new standard for private sector preparedness. This paper illustrates a mitigation action plan based on the standard in terms of a cyber disaster. This plan includes organization, policy, assessment, impact analysis, strategy, plan, action, evaluation, and feedback. It will also help for business to mitigate a cyber disaster. Private sector accreditation and certification preparedness program which introduces on the law is the realization that enterprise disaster management will be expected as a great tipping-point.

A Study on the Security Framework for IoT Services based on Cloud and Fog Computing (클라우드와 포그 컴퓨팅 기반 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1928-1939
    • /
    • 2017
  • Fog computing is another paradigm of the cloud computing, which extends the ubiquitous services to applications on many connected devices in the IoT (Internet of Things). In general, if we access a lot of IoT devices with existing cloud, we waste a huge amount of bandwidth and work efficiency becomes low. So we apply the paradigm called fog between IoT devices and cloud. The network architecture based on cloud and fog computing discloses the security and privacy issues according to mixed paradigm. There are so many security issues in many aspects. Moreover many IoT devices are connected at fog and they generate much data, therefore light and efficient security mechanism is needed. For example, with inappropriate encryption or authentication algorithm, it causes a huge bandwidth loss. In this paper, we consider issues related with data encryption and authentication mechanism in the network architecture for cloud and fog-based M2M (Machine to Machine) IoT services. This includes trusted encryption and authentication algorithm, and key generation method. The contribution of this paper is to provide efficient security mechanisms for the proposed service architecture. We implemented the envisaged conceptual security check mechanisms and verified their performance.

A Modeling Technique for Development of Mobile App. based on Android (안드로이드 기반의 모바일 앱 개발을 위한 모델링 기법)

  • Cho, Eun-Sook;Kim, Chul-Jin;Lee, Sook-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.8
    • /
    • pp.3999-4005
    • /
    • 2013
  • We forecast that the scale of mobile market will be large scale according to the twenty million times of smart phone's user is arrived. The type of software development is being transferred into mobile-based App. or cloud computing-based service from web-based software. Currently both Google's android and Apple's IOS are known for two prominent platforms. Existing modeling techniques cannot be applied into the case of mobile application which is executed those platforms. Therefore, we suggest a modeling technique that is customized existing modeling techniques into android-based software development. That is, we propose an analysis and design techniques which are needed into android-based mobile smart environment.

Analysis of Billing System using AHP for Cloud Computing Services (클라우드 컴퓨팅 환경에서 AHP를 이용한 서비스 과금체계 연구)

  • Chang, Pil Sik;Choi, Il Young;Choi, Ju Cheol;Kim, Jae Kyeong
    • Journal of Information Technology Services
    • /
    • v.11 no.3
    • /
    • pp.129-159
    • /
    • 2012
  • Cloud-computing is in the limelight with expectation for cost reduction, because it alleviates the burden of initial investment and maintenance cost and based on pay-as-you-use billing policy. However, many suppliers of Cloud-computing service are suggesting diverse and complicated billing policies without consideration for setting reasonable service billing policy and definite criteria of properties to determine service billing system. So companies willing to use Cloud-computing service are hard to understand the billing system and often spend more expensive cost than necessary. Therefore, this study invested billing system properties of four representative suppliers. Based on these properties of billing system, this study found priorities using AHP survey which conducted to experts who are able to make decisions for adopting Cloud-computing in the company using or willing to use Cloud-computing service. We expect that this study can suggest basic guideline for comparing and analyzing properties of Cloud-computing service with standardized and objective method.

User behavior analysis in No Disk System Configuration (No Disk System 환경에서의 사용자 행위 분석)

  • Kim, Deunghwa;Namgung, Jaeung;Park, Jungheum;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.491-500
    • /
    • 2013
  • With the advent of big data and increased costs of SSD(HDD), domestic and foreign Internet cafes and organizations have adopted NDS(No Disk System) solution recently. NDS is a storage virtualization solution based on a kind of cloud computing. It manages Operating System and applications in the central server, which were originally managed by individual computers. This research will illustrate the way to analyze user's behaviors under NDS circumstance.

Analysis of Global Research Trend on Information Security (정보보안에 대한 연구 트렌드 분석)

  • Kim, Won-pil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1110-1116
    • /
    • 2015
  • This paper analyzes global research trend on information security. All technical fields based on information requires security so that discovering technologies (technical terms) which are developing newly or dramatically is able to guide the future direction of the field of information security. In this paper, the ultimate of this research is to figure out the technologies related to information security and to forecast the future through understanding their trends. The paper, as a beginning for the analysis on macroscopic viewpoint, contains measurement of yearly relatedness between technical terms from 2001 to 2014 by using temporal co-occurrence and interpretation of its meaning through comparing the relatedness with trends of top-related technical terms. And to conclude, we could find that Android platform, Big data, Internet of things, Mobile technologies, and Cloud computing are emerging technologies on information security.

Study on the physical vulnerability factors in the convergence IT environment (융합 IT 환경의 물리적 취약요인에 관한 연구)

  • Jeon, Jeong Hoon;Ahn, Chang Hoon;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.16 no.1
    • /
    • pp.59-68
    • /
    • 2016
  • Recently, many domestic and foreign industries is increasing gradually in the importance of security such as the emergence of a Convergence Information Technology(internet of things, cloud computing service, big data etc). Among these techniques, the industrial security market is expected to grow gradually and the evolution of security technologies, as well as vulnerabilities are also expected to increase. Therefore, an increase in physical vulnerability factors it is no exaggeration to standards that are determining the security of industrial security. In this paper will be analyzed to the physical security technology and case study, physical vulnerability factor. Thereby this is expected to be utilized as a basis for the countermeasure of physical corresponding infringement and attack in a future.

Design and Implementation of a Monitor for Hadoop Cluster (Hadoop 클러스터를 위한 모니터의 설계 및 구현)

  • Keum, Tae-Hoon;Lee, Won-Joo;Jeon, Chang-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.1
    • /
    • pp.8-15
    • /
    • 2012
  • In this paper, we propose a new monitor for collecting job information from Hadoop clusters in real time. This monitor is made of two programs called Collector and Agent. Agent collects Hadoop cluster's node information and job information, and Collector analyzes the collected information and saves it in a database. Also, Collector was placed in a new node outside the Hadoop cluster so that it does not affect Hadoop's work and will not cause overload. When the proposed monitor was implemented and applied, the testbed cluster was able to detect the occurrence of dead nodes immediately. In addition, we were able to find Hadoop jobs which were inefficient and when we modified such jobs to further enhance the performance of Hadoop.

Design of Trajectory Data Indexing and Query Processing for Real-Time LBS in MapReduce Environments (MapReduce 환경에서의 실시간 LBS를 위한 이동궤적 데이터 색인 및 검색 시스템 설계)

  • Chung, Jaehwa
    • Journal of Digital Contents Society
    • /
    • v.14 no.3
    • /
    • pp.313-321
    • /
    • 2013
  • In recent, proliferation of mobile smart devices have led to big-data era, the importance of location-based services is increasing due to the exponential growth of trajectory related data. In order to process trajectory data, parallel processing platforms such as cloud computing and MapReduce are necessary. Currently, the researches based on MapReduce are on progress, but due to the MapReduce's properties in using batch processing and simple key-value structure, applying MapReduce framework for real time LBS is difficult. Therefore, in this research we propose a suitable system design on efficient indexing and search techniques for real time service based on detailed analysis on the properties of MapReduce.