• Title/Summary/Keyword: 클라우드-컴퓨팅

Search Result 1,403, Processing Time 0.029 seconds

All Flash Array Storage Virtualisation using SCST (SCST를 이용한 All Flash Array 스토리지 가상화)

  • Heo, Huiseong;Pirahandeh, Mehdi;Lee, Kwangsoo;Kim, Deokhwan
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.10
    • /
    • pp.525-533
    • /
    • 2014
  • SCST(The generic SCSI target subsystem for Linux) enables developers to make SCSI target storage and supports various SCSI network protocol such as iSCSI, FC, SRP. In this paper, we propose storage virtualization method using SCST and virtualize all flash array as high performance storage through 4Gb Fiber Channel, 10Gb Ethernet and 40Gb Infiniband and evaluate their performance, respectively. Experimental result shows that 40Gb infiniband network appliance have better performance than others. In case of sequential/random read, 40Gb infiniband network appliance shows 78% and 79% of local all flash array performance attached to SCSI target system. In case of sequential/random write, it shows 83% and 88% of local flash array performance attached to SCSI target system.

A DDMPF(Distributed Data Management Protocol using FAT) Design of Self-organized Storage for Negotiation among a Client and Servers based on Clouding (클라우딩 기반에서 클라이언트와 서버간 협상을 위한 자가 조직 저장매체의 DDMPF(Distributed Data Management Protocol using FAT) 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee;Yang, Seung-Hae
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1048-1058
    • /
    • 2012
  • This paper proposes the DDMPF(Distributed Data Management Protocol using FAT) which prevents data loss and keeps the security of self-organized storages by comprising a client, a storage server, and a verification server in clouding environment. The DDMPF builds a self-organized storage server, solves data loss by decentralizing the partitioned data in it in contrast to the centralized problem and the data loss caused by the storage server problems of existing clouding storages, and improves the efficiency of distributed data management with FAT(File Allocation Table). And, the DDMPF improves the reliability of data by a verification server's verifying the data integrity of a storage server, and strengthens the security in double encryption with a client's private key and the system's master key using EC-DH algorithm. Additionally, the DDMPF limits the number of verification servers and detects the flooding attack by setting the TS(Time Stamp) for a verification request message and the replay attack by using the nonce value generated newly, whenever the verification is requested.

Design and Implementation of a Hadoop-based Efficient Security Log Analysis System (하둡 기반의 효율적인 보안로그 분석시스템 설계 및 구현)

  • Ahn, Kwang-Min;Lee, Jong-Yoon;Yang, Dong-Min;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1797-1804
    • /
    • 2015
  • Integrated log management system can help to predict the risk of security and contributes to improve the security level of the organization, and leads to prepare an appropriate security policy. In this paper, we have designed and implemented a Hadoop-based log analysis system by using distributed database model which can store large amount of data and reduce analysis time by automating log collecting procedure. In the proposed system, we use the HBase in order to store a large amount of data efficiently in the scale-out fashion and propose an easy data storing scheme for analysing data using a Hadoop-based normal expression, which results in improving data processing speed compared to the existing system.

Constant-Size Ciphertext-Policy Attribute-Based Data Access and Outsourceable Decryption Scheme (고정 크기 암호 정책 속성 기반의 데이터 접근과 복호 연산 아웃소싱 기법)

  • Hahn, Changhee;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.43 no.8
    • /
    • pp.933-945
    • /
    • 2016
  • Sharing data by multiple users on the public storage, e.g., the cloud, is considered to be efficient because the cloud provides on-demand computing service at anytime and anywhere. Secure data sharing is achieved by fine-grained access control. Existing symmetric and public key encryption schemes are not suitable for secure data sharing because they support 1-to-1 relationship between a ciphertext and a secret key. Attribute based encryption supports fine-grained access control, however it incurs linearly increasing ciphertexts as the number of attributes increases. Additionally, the decryption process has high computational cost so that it is not applicable in case of resource-constrained environments. In this study, we propose an efficient attribute-based secure data sharing scheme with outsourceable decryption. The proposed scheme guarantees constant-size ciphertexts irrespective of the number of attributes. In case of static attributes, the computation cost to the user is reduced by delegating approximately 95.3% of decryption operations to the more powerful storage systems, whereas 72.3% of decryption operations are outsourced in terms of dynamic attributes.

An Empirical Study of Implementation and Application of Mold Life Cycle Management Information System In the Cloud Computing Environment (클라우드 컴퓨팅 환경에서 금형 수명주기관리 정보시스템 구축 및 적용의 실증적 연구)

  • Koh, Joon-Cheol;Nam, Seung-Done;Kim, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.4
    • /
    • pp.331-341
    • /
    • 2014
  • Internet of Thing(IoT), which is recently talked about with the development of information and communication technology, provides big data to all nodes such as companies and homes, means of transportation etc. by connecting all things with all people through the integrated global network and connecting all actual aspects of economic and social life with Internet of Thing through sensor and software. Defining Internet of Thing, it plays the role of a connector of providing various information required for the decision-making of companies in the cloud computing environment for the Insight usage by collecting and storing Raw Data of the production site through the sensor network and extracting big data in which data is accumulated and Insight through this. In addition, as the industry showing the largest linkage with other root industries among root industries, the mold industry is the core technology for controlling the quality and performance of the final product and realizing the commercialization of new industry such as new growth power industry etc. Recently, awareness on the mold industry is changing from the structure of being labor-intensive, relying on the experience of production workers and repeating modification without the concept of cost to technology-intensive, digitization, high intellectualization due to technology combination according to IT convergence. This study, therefore, is to provide a golden opportunity to increase the direct and indirect expected effects in poor management activities of small businesses by actually implementing and managing the entire process of mold life cycle to information system from mold planning to mass production and preservation by building SME(small and medium-sized enterprises)-type mold life cycle management information system in the cloud computing environment and applying it to the production site.

A Study on Evaluating Digital Illusion Level of Public Library (공공도서관의 디지털 통합 수준 평가에 관한 연구)

  • Noh, Younghee
    • Journal of the Korean Society for information Management
    • /
    • v.32 no.4
    • /
    • pp.167-203
    • /
    • 2015
  • This study tends to apprehend how much public library contributes to a role of upbuilder of digital integrated local society through a survey. For this, I performed the survey on 935 organization of public library in the whole country registered in national library statistical system. As a result, firstly, it's apprehended that equipment infra, Internet infra, etc like computer, laptop, scanner, tablet PC, etc are in relatively high level. Secondly, service or resource like electronic book, digital and virtual reference service, library service mobile App, etc that users can use are in relatively high level but software supporting cooperation and group task, fusibility of participating space, etc are shown very low level. Thirdly, the rate of literacy training relating to technology were only 22.4%, education subject focused on resource searching subject and somewhat future-oriented technical education like directions of video conference technique, cloud computing application education, etc wasn't conducted. Finally, we should consider expansion of providing technology and equipment and provision of future-oriented service and education according to a flow of the time that needs to seek change in various roles of library as enjoying culture space or creative space.

A K-Nearest Neighbour Query Processing Algorithm for Encrypted Spatial Data in Road Network (도로 네트워크 환경에서 암호화된 공간데이터를 위한 K-최근접점 질의 처리 알고리즘)

  • Jang, Mi-Young;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.20 no.3
    • /
    • pp.67-81
    • /
    • 2012
  • Due to the recent advancement of cloud computing, the research on database outsourcing has been actively done. Moreover, the number of users who utilize Location-based Services(LBS) has been increasing with the development in w ireless communication technology and mobile devices. Therefore, LBS providers attempt to outsource their spatial database to service provider, in order to reduce costs for data storage and management. However, because unauthorized access to sensitive data is possible in spatial database outsourcing, it is necessary to study on the preservation of a user's privacy. Thus, we, in this paper, propose a spatial data encryption scheme to produce outsourced database from an original database. We also propose a k-Nearest Neighbor(k-NN) query processing algorithm that efficiently performs k-NN by using the outsourced database. Finally, we show from performance analysis that our algorithm outperforms the existing one.

Automation of Service Level Agreement based on Active SLA (Active SLA 기반 서비스 수준 협약의 자동화)

  • Kim, Sang-Rak;Kang, Man-Mo;Bae, Jae-Hak
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.229-237
    • /
    • 2013
  • As demand for IT services increase, which are based on SOA and cloud computing, service level agreements (SLAs) have received more attention in the parties concerned. An SLA is usually a paper contract written in natural language. SLA management tools which are commercially available, implement SLAs implicitly in the application with a procedural language. This makes automation of SLA management difficult. It is also laborious to maintain contract management systems because changes in a contract give rise to extensive modifications in the source code. We see the source of the trouble is the existence of documentary SLAs (paper contracts) and corresponding executable SLAs (contracts coded in the procedural language). In this paper, to resolve the current SLA management problems we propose an active SLM (Active Service Level Management) system, which is based on the active SLA (Active Service Level Agreement). In the proposed system, the separated management and processing of dual SLAs can be unified into a single process with the introduction of active SLAs (ASLAs).

Connected-IPs: A Novel Connected Industrial Parks Architecture for Building Smart Factory in Korea (연결형 산업단지(CIPs): 한국의 스마트공장 구축을 위한 연결형 산업단지 아키텍처)

  • Yang, Young-Chuel;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.131-142
    • /
    • 2018
  • In Korea, for the past 50 years, industrial parks have played an important role in economic growth as a cluster of national key industries. However, due to various problems of these old industrial parks, they are weakening competitiveness. It is necessary to be converted into a model for the management and fostering of high-tech industrial complex park by classifying them into development plans, management plans, and support plans according to types and characteristics of industrial parks. For this purpose, we propose CIPs (Connected-Industrial parks) using new technologies such as Cloud Computing, RFID, WSN, CPS, and Big Data analysis based on IoT. It is a hub that supports various services in transportation, warehousing and manufacturing fields while possessing and operating physical assets as concept. each CIP (Connected-Industrial park) is connected and expanded Through such CIPs, network-type collaborative manufacturing and intelligent logistics innovation enables cost reduction, delivery shortening, quality improvement.

Performance Evaluation and Analysis for Block I/O Access Pattern between KVM-based Virtual Machine and Real Machine in the Virtualized Environment (KVM 기반 가상화 환경에서의 가상 머신과 리얼 머신의 입출력 패턴 분석 및 성능 측정)

  • Kim, Hyeunjee;Kim, Youngwoo;Kim, Youngmin;Choi, Hoonha;No, Jaechun;Park, Sungsoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.1
    • /
    • pp.86-96
    • /
    • 2016
  • Recently, virtualization is becoming the critical issue in the cloud computing due to its advantages of resource utilization and consolidation. In order to efficiently use virtualization services, several issues should be taken into account, including data reliability, security, and performance. In particular, a high write bandwidth on the virtual machine must be guaranteed to provide fast responsiveness to users. In this study, we implemented a way of visualizing comparison results between the block write pattern of KVM-based virtual machine and that of the real machine. Our final objective is to propose an optimized virtualization environment that enables to accelerate the disk write bandwidth.