• Title/Summary/Keyword: 클라우드-컴퓨팅

Search Result 1,403, Processing Time 0.026 seconds

Implementation of SLA Management System for QoS Guarantee in Cloud Computing Environment (클라우드 환경에서 QoS 보장을 위한 SLA 관리시스템 구현)

  • Yoon, Ka-Ram;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.2
    • /
    • pp.302-308
    • /
    • 2013
  • Internet is becoming more common with increasing cloud services have been spreading rapidly. A SLA is agreements between service providers and customers of service providers is how to ensure quality of service. SLA in cloud computing environments from the perspective of the IT service providers to customer satisfaction increase for service quality, it will need to differentiate between competing carriers QoS guarantees with SLA is a very important factor. However, the study of SLA in the cloud is staying in its infancy. In this paper, SLA indices for cloud services defining and use them SLA Management System for QoS guarantee has been implemented. The proposed system using monitoring-based migration policy an open source-based cloud computing platform which Cluster Nodes load distribution of virtual machines assigned to their availability, response time, throughput analysis of what affects and is compared with existing cloud.

A Study on Data Movement Method between For for Cloud Computing (클라우드를 위한 포그 간의 데이터 이동 기법에 관한 연구)

  • Hwang, Chi-Gon;Yoon, Chang-Pyo;Lee, Hae-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.294-296
    • /
    • 2017
  • Cloud computing is a computing technique that uploads all the data from a cloud node to a cloud server and provides it to users as a service. This is difficult to provide services in real time depending on the network conditions. This is because it is necessary to download information to the remote site through the network, not the local area, and to download additional services to provide services in the cloud. So fog computing has been proposed as an alternative. In this paper, we propose an efficient data exchange technique between cloud, fog and user. The proposed fog provides services to users and collects and processes data. The cloud is responsible for the flow of data exchange and control between the fog. We propose a standard method for data exchange. The application for this is to process and service the information generated by the BAN (Body Area Network) in the fog, and the cloud serves as a mediator. This can resolve data heterogeneity between devices or services and provide efficient data movement.

  • PDF

A Owner's Privacy Preserving Protocol for u-Fitness-based Exercise Management in Cloud Computing (클라우드 컴퓨팅에서 u-Fitness 기반 운동 관리를 위한 소유자의 프라이버시를 보장하는 프로토콜)

  • Kim, Tae-yeon;Cho, Ki-hwan;Choi, Eun-Bok
    • Smart Media Journal
    • /
    • v.6 no.3
    • /
    • pp.21-28
    • /
    • 2017
  • There is growing interest in the use of cloud services these days because the amount of sensitive physical information related to u-fitness-based exercise management increase in explosive. However, it is possible to illegally access information stored in a cloud server, and to find out who owns the information, even, to illegally deduce an association among the information stored in its memory. The cloud server may also intentionally pass over the owner's legitimate operation requests such as modification and deletion of stored information, and may lose or damage information due to its malfunction. So, it is strongly required to solve the above problems because we can not trust the cloud server entirely. In this paper, we propose a protocol to preserve the privacy of the owner for u-Fitness-based exercise management in a cloud computing environment. And we show that our proposed architecture is applicable in real environment through security analysis and performance analysis.

A Dynamic Task Distribution approach using Clustering of Data Centers and Virtual Machine Migration in Mobile Cloud Computing (모바일 클라우드 컴퓨팅에서 데이터센터 클러스터링과 가상기계 이주를 이용한 동적 태스크 분배방법)

  • Mateo, John Cristopher A.;Lee, Jaewan
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.103-111
    • /
    • 2016
  • Offloading tasks from mobile devices to available cloud servers were improved since the introduction of the cloudlet. With the implementation of dynamic offloading algorithms, mobile devices can choose the appropriate server for the set of tasks. However, current task distribution approaches do not consider the number of VM, which can be a critical factor in the decision making. This paper proposes a dynamic task distribution on clustered data centers. A proportional VM migration approach is also proposed, where it migrates virtual machines to the cloud servers proportionally according to their allocated CPU, in order to prevent overloading of resources in servers. Moreover, we included the resource capacity of each data center in terms of the maximum CPU in order to improve the migration approach in cloud servers. Simulation results show that the proposed mechanism for task distribution greatly improves the overall performance of the system.

Cloud Computing : An Analysis of Security Vulnerabilities in managerial aspect (클라우드 컴퓨팅 : 관리적 측면에서의 보안 취약점 분석)

  • Choi, Chang-Ho;Lee, Young Sil;Lee, Hoon Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.291-294
    • /
    • 2014
  • By building an environment that can utilize big data, many companies are interested in the cloud computing technology that has increased its popularity recently. By developing cloud environments from existing virtual environments, in the process, we discovered a variety of security vulnerabilities such as management, virtual machines, hypervisors, hardware etc. The security techniques from administrative aspects in the cloud environment provide the environment which can securely store data by the identification and control of security threats. In this paper, we investigate a list of companies which supports the cloud services and the types of services, and analyze the security threats according to the administrative aspects in the cloud environment. In addition, we suggest the direction for future improvements by investigating accidents or incidents which occurred recently.

  • PDF

A Study on Resource Access Anomaly Detection Algorithm in Mobile Cloud (모바일 클라우드 자원 접근 이상행위 분석 알고리즘 연구)

  • Kim, Ji-Yeon;Choi, Ju-Young;Kim, Hyung-Jong;Park, Choon-Sik;Kim, Jeong-Wook;Jeong, Hyun-Cheol
    • Annual Conference of KIPS
    • /
    • 2011.11a
    • /
    • pp.941-944
    • /
    • 2011
  • 모바일 클라우드 서비스는 사용자가 모바일 단말에 자원을 가지고 있지 않더라도 인터넷을 통해 외부의 다양한 IT 자원을 제공하는 서비스로서 모바일 단말이 가지는 성능적 한계를 극복시킬 수 있다는 장점과 함께 이용자 수가 증가하고 있다. 그러나 클라우드 컴퓨팅 환경에 존재하는 개인 및 기업의 정보 유출과 같은 문제들은 모바일 클라우드 컴퓨팅 환경에도 그대로 상속되기 때문에 이러한 문제에 대응하기 위해서는 모바일 클라우드 컴퓨팅 환경에서 정보유출을 탐지할 수 있는 이상행위 탐지 알고리즘이 마련되어야 한다. 여기서 이상행위란, 모바일 클라우드 자원에 접근하는 방법에 있어 기존에 인지하고 있던 정상적인 행위에서 벗어나는 행위를 의미하며 이상행위로 판단되는 상황이 발생되는 경우, 이를 정보유출이 발생할 수 있는 상황으로 인지함으로써 적절한 대응을 할 수 있게 된다. 따라서 본 논문에서는 모바일 클라우드 자원의 정보유출을 방지하기 위한 목적으로 자원 접근에 대한 이상행위 탐지 알고리즘 개발 모델을 제시한다. 이상행위 탐지 알고리즘을 개발하고 이를 검증하기 위해서는 이상행위를 일으키는 공격 모델 및 대응 모델이 개발되어야 한다. 따라서 본 논문에서는 인증 및 권한관리의 취약점을 이용하여 위협을 일으키는 공격 모델을 개발하는 방법을 제시하고, 사용자의 접속환경 및 클라우드 자원의 정보 흐름을 분석함으로써 이상행위를 탐지하는 알고리즘을 제시한다.

Key-Agreement Protocol between IoT and Edge Devices for Edge Computing Environments (에지 컴퓨팅 환경을 위한 IoT와 에지 장치 간 키 동의 프로토콜)

  • Choi, Jeong-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.2
    • /
    • pp.23-29
    • /
    • 2022
  • Recently, due to the increase in the use of Internet of Things (IoT) devices, the amount of data transmitted and processed to cloud computing servers has increased rapidly. As a result, network problems (delay, server overload and security threats) are emerging. In particular, edge computing with lower computational capabilities than cloud computing requires a lightweight authentication algorithm that can easily authenticate numerous IoT devices.In this paper, we proposed a key-agreement protocol of a lightweight algorithm that guarantees anonymity and forward and backward secrecy between IoT and edge devices. and the proposed algorithm is stable in MITM and replay attacks for edge device and IoT. As a result of comparing and analyzing the proposed key-agreement protocol with previous studies, it was shown that a lightweight protocol that can be efficiently used in IoT and edge devices.

Deployment Strategies of Cloud Computing System for Defense Infrastructure Enhanced with High Availability (고가용성 보장형 국방 클라우드 시스템 도입 전략)

  • Kang, Ki-Wan;Park, Jun-Gyu;Lee, Sang-Hoon;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.3
    • /
    • pp.7-15
    • /
    • 2019
  • Cloud computing markets are rapidly growing as cost savings and business innovation are being carried out through ICT worldwide. In line with this paradigm, the nation is striving to introduce cloud computing in various areas, including the public sector and defense sector, through various research. In the defense sector, DIDC was established in 2015 by integrating military, naval, air and military computing centers, and it provides cloud services in the form of IaaS to some systems in the center. In DIDC and various future cloud defense systems, It is an important issue to ensure availability in cloud defense systems in the defense sector because system failures such as network delays and system resource failures are directly linked to the results of battlefields. However, ensuring the highest levels of availability for all systems in the defense cloud can be inefficient, and the efficiency that can be gained from deploying a cloud system can be reduced. In this paper, we classify and define the level of availability of defense cloud systems step by step, and propose the strategy of introducing Erasure coding and failure acceptance systems, and disaster recovery system technology according to each level of availability acquisition.

Key management based on Signcryption for efficient data access in cloud computing (클라우드 컴퓨팅 환경에서 효율적인 데이터 접근을 위한 Signcryption기반 키 관리 기법)

  • Kim, Su-Hyun;Hong, In-Sik;Lee, Im-Yeong
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.50-52
    • /
    • 2012
  • 클라우드 컴퓨팅 환경에서는 사용자의 데이터를 수많은 분산서버를 이용하여 데이터를 저장한다. 클라우드 컴퓨팅 환경에서는 사용자의 데이터 보호를 위해 데이터를 암호화하여 저장한다. 개인이 아닌 그룹 내에서 공동으로 사용하는 시스템의 경우 그룹 내 사용자 모두 데이터를 서비스 받기 위해 공동의 그룹키를 사용하여 데이터를 암호화 하게 된다. 추후에 그룹 내의 기존 사용자가 그룹을 탈퇴할 경우 그 사용자가 접근 가능했던 데이터가 탈퇴한 그룹원에 의해 노출되게 된다. 이를 방지하기 위해 탈퇴한 멤버에 의한 데이터 유출을 막기 위해서 새로운 그룹키를 갱신하여 모든 데이터를 다시 암호화해야 한다. 하지만 이 과정에서 대용량 데이터의 암복호화 과정에서 막대한 오버헤드가 발생하게 된다. 이러한 문제점을 해결하기 위해 본 논문에서는 이러한 그룹 멤버의 가입과 탈퇴에 독립적인 그룹키 관리 방식을 제안한다. 또한 분산서버로부터 데이터를 수집할 시 분산서버의 서명과 데이터의 암호화가 동시에 이루어지는 사인크립션 기법을 적용하여 보다 원활한 데이터 조각을 모을 수 있는 기법을 제안한다.

  • PDF

Technology Trends of Cloud Computing-based Game Streaming (클라우드 컴퓨팅 기반의 게임 스트리밍 기술 동향)

  • Lim, C.G.;Kim, S.S.;Kim, K.I.;Won, J.H.;Park, C.J.
    • Electronics and Telecommunications Trends
    • /
    • v.26 no.1
    • /
    • pp.47-56
    • /
    • 2011
  • 클라우드 컴퓨팅 기술의 탄생과 다양한 이동단말기, 디지털 TV의 보급은 컴퓨터 게임과 같은 고품질 3D 애플리케이션을 이동단말기나 디지털 TV에서도 사용하고자 하는 사용자의 욕구를 불러일으키고 있다. 고가의 고성능 장비를 갖춘 서버에서 3D 애플리케이션을 구동하고 사용자는 저가의 원격 단말기를 사용하여 서버에 초고속 인터넷을 통하여 접속한다면 고품질 3D 애플리케이션을 별도의 추가 비용 없이 사용할 수 있다는 장점이 있다. 본 논문에서는 클라우드 컴퓨팅 기반의 게임 스트리밍 기술을 정의하고, 가능성을 고찰하고자 한다. 아울러, 현재 개발 완료된 또는 개발중인 기술에 대해서 핵심 기술, 장단점을 분석하고자 한다.

  • PDF