• Title/Summary/Keyword: 클라우드-컴퓨팅

Search Result 1,403, Processing Time 0.033 seconds

Analysis of Accountability for Trust DRM Cloud Service and Design of Monitoring Tool (신뢰되는 DRM 클라우드 서비스를 위한 책임 추적성 분석 및 모니터링 툴 설계)

  • Lee, Hyejoo;Seo, Changho;Shin, Sang Uk
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.303-311
    • /
    • 2014
  • The accountability of cloud service which provides the cloud users with accountable services applies various technologies such as the compliance of service policy, monitoring and auditing, logging, and others. It ultimately intends to provide trustworthy cloud service by determining who is accountable for various problems happened during data processing and service offering. In this paper, we propose a cloud ecosystem formed from the chain of content and DRM Cloud service in order to offer secure and trust DRM cloud service when providing high value-added content service. Besides this, we analyse the requirements of cloud services for content owners and users and then propose some logging information to be recorded for trace of accountability and a structure of tool for monitoring.

Derivation of Security Requirements for Cloud Managing Security Services System by Threat Modeling Analysis (위협 모델링 분석에 의한 클라우드 보안관제시스템 보안요구사항 도출)

  • Jang, Hwan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.5
    • /
    • pp.145-154
    • /
    • 2021
  • Recently, the introduction of Cloud Managing Security Services System to respond to security threats in cloud computing environments is increasing. Accordingly, it is necessary to analyze the security requirements for the Cloud Managing Security Services System. However, the existing research has a problem that does not reflect the virtual environment of the cloud and the data flow of the Cloud Managing Security Services System in the process of deriving the requirements. To solve this problem, it is necessary to identify the information assets of the Cloud Managing Security Services System in the process of threat modeling analysis, visualize and display detailed components of the cloud virtual environment, and analyze the security threat by reflecting the data flow. Therefore, this paper intends to derive the security requirements of the Cloud Managing Security Services System through threat modeling analysis that is an improved existing research.

A Study for Transaction Processing Supporting Scalability in the Cloud (클라우드 환경에서 확장성을 지원하는 트랜잭션 처리 방법)

  • Kim, Chi-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.873-879
    • /
    • 2012
  • Recently the cloud computing paradigm has been widely accepting in various applications. Data management system of cloud computing requires ability to manage tremendous data and supporting scalability. The former can be achieved by weaken consistency and limitation of transactions, and the latter needs expand or shrink of components. In this paper, we propose a transaction processing model and a scalable module management algorithm when transaction is executed in the cloud. Transaction processing model consists of a transaction management module and a data management module. Scalable module management algorithm has no redistribution of components and may alleviates loads of existed modules. With simulation results, we can see the improvement of response time and decrease abort ratio of transactions.

A Secure Data Transmission Scheme Based on Secret Sharing for the Maritime Cloud Environment (해사클라우드 환경에 적합한 비밀분산 기반의 안전한 데이터 전송 기법)

  • Lee, Donghyeok;Park, Namje
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.4
    • /
    • pp.232-237
    • /
    • 2017
  • The Maritime Cloud is a technology that enables the seamless exchange of information between several communication links in the maritime domain. Although research on The Maritime Cloud security is still at an early stage, furthering this knowledge is vital to securing the marine environment. In this paper, we propose a method for secure data transmission through The Maritime Cloud domain. The proposed technique, based on the "secret sharing" scheme, is delivered through specifically-dedicated geocasting software. Thus, only authorized vessels can restore the original information. The proposed method is safe from so-called "sniffing" and "man-in-the-middle" attacks.

Information Sharing Model based on Adaptive Group Communication for Cloud-Enabled Robots (클라우드 로봇을 위한 적응형 그룹통신 기반 정보공유 모델)

  • Mateo, Romeo Mark;Lee, Jaewan
    • Journal of Internet Computing and Services
    • /
    • v.14 no.4
    • /
    • pp.53-62
    • /
    • 2013
  • In cloud robotics, the model to share information efficiently is still a research challenge. This paper presents an information sharing model for cloud-enabled robots to collaborate and share intelligence. To provide the efficient message dissemination, an adaptive group communication based on multi-agent is proposed. The proposed algorithm uses a weight function for the link nodes to determine the significant links. The performance evaluation showed that the proposed algorithm produced minimal message overhead and was faster to answer queries because of the significant links compared to traditional group communication methods.

Information Retrieval System using Keyword-Base Concept Nets in Mobile Cloud (모바일 클라우드 환경의 키워드 개념 망을 이용한 정보 검색 시스템)

  • Moon, Seok-Jae;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.661-663
    • /
    • 2013
  • The purpose of the following report is to introduce a model that makes it possible to efficiently search data by using keyword-based concept network for reliable access of information which is rapidly increasing in the mobile cloud. A keyword-based concept network is a method with the application of ontology. However, the proposed model is added by association information between keyword concepts as a method for a user's efficient information retrieval. Furthermore, the proposed concept network consists of the keyword centered concept network, expert-group-recommended field concept network, and process concept network.

  • PDF

Response Time Analysis Considering Sensing Data Synchronization in Mobile Cloud Applications (모바일 클라우드 응용에서 센싱 데이터 동기화를 고려한 응답 시간 분석)

  • Min, Hong;Heo, Junyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.137-141
    • /
    • 2015
  • Mobile cloud computing uses cloud service to solve the resource constraint problem of mobile devices. Offloading means that a task executed on the mobile device commits to cloud and many studies related to the energy consumption have been researched. In this paper, we designed a response time model considering sensing data synchronization to estimate the efficiency of the offloading scheme in terms of the response time. The proposed model considers synchronization of required sensing data to improve the accuracy of response time estimation when cloud processes the task requested from a mobile device. We found that the response time is effected by new sensing data generation rate and synchronization period through simulation results.

Implementation and Analysis of Dynamic Resource Allocation for Docker in Cloud Environment (클라우드 환경에서 도커의 동적 자원 할당 구현 및 효과 분석)

  • Choi, Sungmin;Song, Sungjin;Yu, Heonchang;Chung, KwangSik;Park, JiSu
    • Annual Conference of KIPS
    • /
    • 2015.10a
    • /
    • pp.140-143
    • /
    • 2015
  • 클라우드 컴퓨팅에서 가상화 기술은 단일 물리 자원을 논리적인 자원으로 분할해 다수의 시스템이 병행적으로 운용될 수 있는 환경을 구축하여 준다. 이에 컨테이너 기술 또한 프로세스의 격리를 이용해서 가상화와 같은 병행 수행 환경을 제공한다. 게다가 컨테이너 기술은 하드웨어를 추상화하는 절차가 없기 때문에 기존의 가상화 기술에 비해 오버헤드가 현저히 작다. 따라서 기존의 하이퍼바이저 자리를 대체하기 위한 수단으로 컨테이너 기술의 가능성이 점쳐지고 있다. 본 논문에서는 상용화 된 컨테이너 기술인 도커를 기존의 클라우드-가상화 환경에 도입하였을 때 발생되는 문제를 분석하여 해결 방안을 제안하고 실험을 통해 그 효과를 비교하였다. 기존의 도커는 정적 자원 할당만을 지원하며 이는 클라우드 환경에서 급격한 변화에 유연하게 대처하지 못한다는 단점을 가지고 있다. 따라서 도커에 동적 자원 할당 기술을 적용하여 기존의 단점을 보완하고 클라우드 환경에서 컨테이너 기술의 운영 효율성을 제고한다.

Edge Computing based Industrial Field Worker's Behavior Analysis System using Deep Learning (딥러닝을 활용한 엣지 컴퓨팅 기반 산업현장 작업자 행동 분석 시스템)

  • Lee, Se-Hoon;Bak, Jeong-Jun;Lee, Tae-Hyeong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.01a
    • /
    • pp.63-64
    • /
    • 2020
  • 본 논문에서는 딥러닝을 이용한 작업자 위험 행동 모니터링 선행 연구에 기반해, 엣지 컴퓨팅 기반 딥러닝을 사용하여 클라우드에 대한 의존성 문제를 해결하였다. 작업자는 IoT 안전벨트와 영상 전송 안전모를 통해 정보를 수집, 처리한다. 또한 LSTM 방식에서 개량된 필터를 통한 FFNN 딥러닝 방법을 사용하여 작업자 위험 행동 패턴 분석을 하며 선행 연구의 작업자 행동 모니터링 시스템을 엣지 컴퓨팅 기반 위에서 구현하였다.

  • PDF

A Technique for Provisioning Virtual Clusters in Real-time and Improving I/O Performance on Computational-Science Simulation Environments (계산과학 시뮬레이션을 위한 실시간 가상 클러스터 생성 및 I/O 성능 향상 기법)

  • Choi, Chanho;Lee, Jongsuk Ruth;Kim, Hangi;Jin, DuSeok;Yu, Jung-lok
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.1
    • /
    • pp.13-18
    • /
    • 2015
  • Computational science simulations have been used to enable discovery in a broad spectrum of application areas, these simulations show irregular demanding characteristics of computing resources from time to time. The adoption of virtualized high performance cloud, rather than CPU-centric computing platform (such as supercomputers), is gaining interest of interests mainly due to its ease-of-use, multi-tenancy and flexibility. Basically, provisioning a virtual cluster, which consists of a lot of virtual machines, in a real-time has a critical impact on the successful deployment of the virtualized HPC clouds for computational science simulations. However, the cost of concurrently creating many virtual machines in constructing a virtual cluster can be as much as two orders of magnitude worse than expected. One of the main factors in this bottleneck is the time spent to create the virtual images for the virtual machines. In this paper, we propose a novel technique to minimize the creation time of virtual machine images and improve I/O performance of the provisioned virtual clusters. We also confirm that our proposed technique outperforms the conventional ones using various sets of experiments.