• Title/Summary/Keyword: 클라우드-컴퓨팅

Search Result 1,403, Processing Time 0.03 seconds

A Study On The Cloud Hypervisor ESXi Security Vulnerability Analysis Standard (클라우드 하이퍼바이저 ESXi 보안 취약점 진단 기준에 관한 연구)

  • Kim, Sun-Jib;Heo, Jin
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.31-37
    • /
    • 2020
  • The cloud computing industry is regarded as a key element of the ICT industry and an important industry that will be a watershed for the future development of ICT industry. Korea has established the 1st~2nd cloud computing development basic plan to induce the growth of the cloud industry. However, the domestic information security guide provides technical vulnerability analysis criteria for Unix and Windows servers, DBMS, network equipment, and security equipment, but fails to provide vulnerability analysis criteria for hypervisors that are key elements of cloud computing. Organizations that have deployed cloud systems will be able to assist in vulnerability analysis using the criteria presented in this paper.

A Mobile Cloud Architecture for High Computing in Heterogeneous Cloud Environment (고성능 컴퓨팅 처리를 위한 이종 클라우드 환경에서의 모바일 클라우드 구조)

  • Kim, Seong-Hwan;Kim, Woo-Joong;Youn, Chan-Hyun
    • Annual Conference of KIPS
    • /
    • 2013.11a
    • /
    • pp.201-202
    • /
    • 2013
  • 최근 기업들의 업무환경이 강력한 이동성을 가지는 모바일 환경으로 일부 이동함에 따라 적은 전력 소모량을 만으로도 기업 업무를 처리할 수 있을 만한 성능의 컴퓨팅 자원을 지원 가능토록 하는 Thin Client 모델이 주목을 받게 되었다. 또한 이는 사용자 별 독립 자원을 제공할 수 있는 클라우드 기술과 융합하여 단일 모바일 단말과 단일 가상 머신 간의 원격제어를 관리하는 모바일 클라우드라는 개념으로 발전되었다. 그러나 해당 방법으로 얻을 수 있는 작업 처리의 성능은 제공되는 가상 머신의 성능만큼의 제한이 있다. 또한 이종 클라우드 환경을 이용할 시 자원 간 이질성으로 인해 성능의 편차가 발생하기 때문에 이러한 문제를 해결하기 위한 기술이 필요하게 된다. 따라서 본 논문에서는 이러한 모바일 단말에서 이종 클라우드 자원을 이용하여 고성능 컴퓨팅 처리를 가능하도록 하는 위한 모바일 클라우드 환경에서의 고려사항 및 구조를 제안한다.

A Study on Efficiency Cloud Computing Transformation (운영효율화 측면에서의 클라우드 전환에 관한 연구)

  • Jung, Ji-Young;Kim, Gwang-Bae;Yun, Hea-Jeang;Shin, YongTae
    • Annual Conference of KIPS
    • /
    • 2021.11a
    • /
    • pp.111-114
    • /
    • 2021
  • 기업은 IT 를 일종의 자산으로 판단하여 IT 센터를 직접 구축하고 온프레미스 형태의 시스템을 운영했다. 그러나 경영 환경의 변화가 빨라지면서 IT 부문의 비용 효율성에 대한 압박도 커지고 있다. 클라우드 컴퓨팅을 도입하면 IT 자원을 효율적으로 활용하고 사용한 만큼 비용을 지불할 수 있어 IT 자원의 효율화가 가능하다. 하지만 무작정 클라우드로 옮기는 방식으로 인해 시스템 복잡성이 오히려 증가하고, 관리포인트 증가로 시스템 안전성을 해치는 상황이 벌어지고 있는 것도 현실이다. 신규 서비스 제공 시 기존 시스템 안전성을 해치지 않으면서 IT 자원의 효율적인 활용도 고려하는 방안으로 서비스 단위별 클라우드 컴퓨팅 도입을 검토하였다. 이 방법은 클라우드의 우수한 시스템을 사용하며, 실시간 오케스트레이션이 가능하고, 보안도 우수하다고 볼 수 있다. 기존 인프라를 유지하면서 클라우드 컴퓨팅을 구현한 하이브리드 방식으로 시스템 구축 결과 중단 없는 시스템 운영이 가능하였으며, 보안도 보다 강화된 결과를 얻었다. 향후 시스템 구축 시 온프레미스의 경우 서비스 단위로 클라우드 서버를 병행 운영한다면 운영효율성 뿐 아니라 기능성까지 만족시킬 수 있을 것으로 기대한다.

Research Trend Analysis Using Bibliographic Information and Citations of Cloud Computing Articles: Application of Social Network Analysis (클라우드 컴퓨팅 관련 논문의 서지정보 및 인용정보를 활용한 연구 동향 분석: 사회 네트워크 분석의 활용)

  • Kim, Dongsung;Kim, Jongwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.195-211
    • /
    • 2014
  • Cloud computing services provide IT resources as services on demand. This is considered a key concept, which will lead a shift from an ownership-based paradigm to a new pay-for-use paradigm, which can reduce the fixed cost for IT resources, and improve flexibility and scalability. As IT services, cloud services have evolved from early similar computing concepts such as network computing, utility computing, server-based computing, and grid computing. So research into cloud computing is highly related to and combined with various relevant computing research areas. To seek promising research issues and topics in cloud computing, it is necessary to understand the research trends in cloud computing more comprehensively. In this study, we collect bibliographic information and citation information for cloud computing related research papers published in major international journals from 1994 to 2012, and analyzes macroscopic trends and network changes to citation relationships among papers and the co-occurrence relationships of key words by utilizing social network analysis measures. Through the analysis, we can identify the relationships and connections among research topics in cloud computing related areas, and highlight new potential research topics. In addition, we visualize dynamic changes of research topics relating to cloud computing using a proposed cloud computing "research trend map." A research trend map visualizes positions of research topics in two-dimensional space. Frequencies of key words (X-axis) and the rates of increase in the degree centrality of key words (Y-axis) are used as the two dimensions of the research trend map. Based on the values of the two dimensions, the two dimensional space of a research map is divided into four areas: maturation, growth, promising, and decline. An area with high keyword frequency, but low rates of increase of degree centrality is defined as a mature technology area; the area where both keyword frequency and the increase rate of degree centrality are high is defined as a growth technology area; the area where the keyword frequency is low, but the rate of increase in the degree centrality is high is defined as a promising technology area; and the area where both keyword frequency and the rate of degree centrality are low is defined as a declining technology area. Based on this method, cloud computing research trend maps make it possible to easily grasp the main research trends in cloud computing, and to explain the evolution of research topics. According to the results of an analysis of citation relationships, research papers on security, distributed processing, and optical networking for cloud computing are on the top based on the page-rank measure. From the analysis of key words in research papers, cloud computing and grid computing showed high centrality in 2009, and key words dealing with main elemental technologies such as data outsourcing, error detection methods, and infrastructure construction showed high centrality in 2010~2011. In 2012, security, virtualization, and resource management showed high centrality. Moreover, it was found that the interest in the technical issues of cloud computing increases gradually. From annual cloud computing research trend maps, it was verified that security is located in the promising area, virtualization has moved from the promising area to the growth area, and grid computing and distributed system has moved to the declining area. The study results indicate that distributed systems and grid computing received a lot of attention as similar computing paradigms in the early stage of cloud computing research. The early stage of cloud computing was a period focused on understanding and investigating cloud computing as an emergent technology, linking to relevant established computing concepts. After the early stage, security and virtualization technologies became main issues in cloud computing, which is reflected in the movement of security and virtualization technologies from the promising area to the growth area in the cloud computing research trend maps. Moreover, this study revealed that current research in cloud computing has rapidly transferred from a focus on technical issues to for a focus on application issues, such as SLAs (Service Level Agreements).

Trust Assurance of Data in Cloud Computing Environment (클라우드 컴퓨팅 환경의 데이터 신뢰 확보)

  • Jung, Im-Y.;Jo, In-Soon;Yu, Young-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9B
    • /
    • pp.1066-1072
    • /
    • 2011
  • Cloud Computing Environment provides users with a blue print of IT Utopia with virtualization; unbounded computing power and data storage free from the cost and the responsibility of maintenance for the IT resources. But, there are several issues to be addressed for the Cloud Computing Environment to be realized as the blue print because users cannot control the IT resources provided by the Cloud Computing Environment but can only use them. One of the issues is how to secure and to trust data in the Cloud Computing Environment. In this paper, an efficient and practical trust assurance of data with provenance in Cloud Computing Environment.

A workflow scheduling based on decision table for cloud computing (클라우드 컴퓨팅에서 결정테이블을 이용한 워크플로우 스케줄링)

  • Kim, Jeong Won
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.5
    • /
    • pp.29-36
    • /
    • 2012
  • Cloud computing has gained great popularity because users don't need to install any softwares as well as maintain hardwares and service providers also can utilize its resources through virtualization of servers. As workflows feature variableness and servers are heterogenous, efficient scheduling of workflows in cloud computing is important factor in view of responsibility and resource utilization. In this paper, we propose a new workflow scheduling named 2-step scheduling which prioritizes each workflow through its significance degree and allocates resources to workflows through decision table. The goal of this 2-step scheduling is to improve responsibility as well as availability versus cost. Simulation results show that the proposed scheme in contrast of counterparts can improve the responsibility as well as availability of resource.

Development and Implementation of Monitoring System for Management of Virtual Resource Based on Cloud Computing (클라우드 컴퓨팅 기반 가상 자원 관리를 위한 모니터링 시스템 설계 및 구현)

  • Cho, Dae-Kyun;Park, Seok-Cheon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.2
    • /
    • pp.41-47
    • /
    • 2013
  • In this paper, for this open system-based virtual resource monitoring system was designed. Virtual resources, CPU, memory, disk, network, each subdivided into parts, each modular implementation. Implementation results in real time CPU, memory, disk, network information, confirmed the results of monitoring. System designed to implement the Windows, Linux, Xen was used for the operating system, implementation language, C++ was used, the structure of the system, such as the ability to upgrade and add scalability and modularity by taking into account the features available in cloud computing environments applicable to cloud computing, virtual resource monitoring system has been implemented.

Development of bigdata service brokers for bigdata analysis service operation and management (빅데이터 분석 서비스 운영 관리를 위한 빅데이터 서비스 브로커 설계 및 개발)

  • Kim, Baul;Kim, Sanggyu;Kim, Subin;Koo, Wonbon
    • Annual Conference of KIPS
    • /
    • 2021.11a
    • /
    • pp.125-127
    • /
    • 2021
  • 본 논문에서는 기존의 산업 및 서비스 변화에 따라 발생하는 빅데이터 분석 서비스 처리를 위한 빅데이터 분석 서비스 브로커 시스템을 제안한다. 기존의 빅데이터 분석 시스템은 분석하는 시간 동안 지속적으로 자원을 점유하고 있어야 하며, 이러한 서비스를 이용하기 위해 내부에 대규모의 시스템을 구축하고 지속적으로 운영해야하는 단점이 존재한다. 본 논문에서는 빅데이터 분석에 필요한 자원을 효과적으로 사용하기 위해 클라우드 기반의 자원 관리와 연계하고 서비스 이용을 용이하게 하기 위해 단일 엔드포인트 기반의 빅데이터 분석 서비스 호출 구조를 설계하였다. 이를 통해 빅데이터 서비스 분석에 소요되는 자원 점유에 따라 동적으로 자원을 생성 관리하여 자원을 보다 효과적으로 이용할 수 있는지 테스트베드를 구축하여 서비스 이용 및 자원 사용을 효과적으로 하는지 확인하였다. 또한, 이를 통해 대규모 자원을 지속적으로 점유해야하는 빅데이터 분석 플랫폼의 자원사용에 대한 한계를 일부 해소하여 자원을 효과적으로 이용할 수 있는 것을 확인하였다.

A Study on the Security Requirement for Transforming Cloud Data Center : Focusing on N - Data Center (클라우드 데이터센터로의 전환을 위한 보안요건 - N데이터센터를 중심으로)

  • Ra, Jong-Hei;Lee, Jae-Sook
    • Journal of Digital Convergence
    • /
    • v.12 no.11
    • /
    • pp.299-307
    • /
    • 2014
  • N-Data Center which provide of cloud computing service for the Government departments, will be prepared transforming to cloud data center and transformed into an 'IT service' provided as a service to the information resources required by each department. N-Data center already provide a cloud service to the departments as maintains a high level of security, and plan to connecting with the private sector as a precondition of security. Therefore, in order to promote them effectively, it is necessary to determine the level of security in the cloud data center, and we have proposed appropriate measures. In this paper, we analyze security requirements of cloud data centers in developed countries and identify the leading private cloud data center security. In addition, we identify the N-data center security level, and analyzes the data center and private cloud gap and provide a transition strategy in terms of security finally.

Scheduling Scheme for Cloud Computing based on Workflow Characteristics (클라우드 컴퓨팅에서 워크플로우의 특성을 고려한 스케줄링 기법)

  • Kim, Jeong-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.1-8
    • /
    • 2012
  • Cloud computing has got great popularity in recent times because users can easily access its resources as well as service providers can use efficiently use its resources. By the way, cloud computing are composed of heterogeneous resources and workflows of user application have various characteristics. So, the main goal of this paper is to design new efficient workflow scheduling algorithm, which classifies workflows through their importance degree and allocates resources to each workflow based on QoS metrics such as responsibility, cost and load balancing. Simulation results show that the proposed scheme can improve the responsibility as well as availability of resource.