• Title/Summary/Keyword: 클라우드-컴퓨팅

Search Result 1,403, Processing Time 0.032 seconds

Fair-Share Scheduling of Virtual Machines via Virtual Runtime Compensation for Real-time Cloud Servers (실시간 클라우드 서버를 위한 Virtual Runtime 보상 기반 가상 머신 공정 스케줄링 기법)

  • Kim, Kyungrae;Noh, Soonhyun;Hong, Seongsoo
    • Annual Conference of KIPS
    • /
    • 2015.04a
    • /
    • pp.2-5
    • /
    • 2015
  • 가상화 기술을 기반으로 하는 클라우드 컴퓨팅 환경에서 실시간 응용들을 수행하려는 움직임이 많아지고 있다. 이 응용들의 실시간성을 보장하기 위해 리눅스의 실시간 스케줄러를 활용한 기법들이 제안되었지만, 이 기법들은 가상 머신들의 공정한 수행을 보장하지 못한다는 한계가 있다. 따라서 우리는 실시간 클라우드 환경에서 가상 머신 스케줄링의 공정성을 보장하기 위해 virtual runtime 보상 기반의 가상 머신 공정 스케줄링 기법을 제안한다. 제안된 기법은 실시간 응용으로 인해 CFS가 인지하지 못한 CPU 시간을 체크하고 이를 virtual runtime에 반영하여 가상 머신 간의 공정한 수행을 보장한다. 우리는 제안된 기법을 리눅스 커널 상에 구현하였다. 제안된 기법을 적용한 결과, 가상 머신 간의 수행시간 차이가 기존 경우보다 47% 줄어든 것을 확인하였다.

A Gossip-based Byzantine Consensus Algorithm in Cloud Computing Environments (클라우드 컴퓨팅 환경에서 가쉽 기반 비잔틴 합의 알고리즘)

  • Lim, JongBeom;Choi, HeeSeok;Kang, InSung;Lee, DaeWon;Yu, HeonChang
    • Annual Conference of KIPS
    • /
    • 2012.11a
    • /
    • pp.164-167
    • /
    • 2012
  • 합의는 분산 시스템 환경에서 해결해야 할 근본적인 문제 중 하나이다. 특히 노드 또는 프로세스의 임의적인 실패 즉, 비잔틴 실패가 발생하였을 때 합의 문제는 더 복잡해진다. 본 연구에서는 동적인 노드의 가입과 탈퇴가 자유로운 클라우드 환경에서 비잔틴 합의 문제를 해결하기 위한 가쉽 알고리즘을 제안한다. 제안하는 알고리즘에서 확장성과 결함 포용의 특성을 내재한 가쉽 알고리즘을 적용함으로써 클라우드 환경에서의 비잔틴 합의 문제를 확장적이고 결함 포용적으로 해결할 수 있다. 알고리즘의 성능을 분석하기 위해 성능 평가를 수행하였다.

Improved Access Control of SDP Single Packet Authorization (SDP 단일 패킷 인증의 접근통제 개선 방안)

  • Lee, sang-ku;Jung, jin-kyo;Kim, young-min
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2019.05a
    • /
    • pp.311-312
    • /
    • 2019
  • 최근 기업의 클라우드 도입 확산으로 인해 정보자산이 분산됨에 따라 보호해야 하는 접점이 점차 증가 되고 있다. 또한, 모바일의 업무 활용 증가, 망 분리 및 내부 사설 클라우드의 도입 등 기업 내 변화된 IT 환경으로 인해 네트워크 구성이 더욱 더 복잡해지고 있으며, 이로 인해 보안 수준 유지가 어려워지고 있다. 특히, 클라우드 컴퓨팅에서는 보호해야 하는 자원이 기업 외부에 분산되어 있어 기존처럼 경계를 구축하는 것은 어려운 일이다. 본 논문에서는 CSA가 주도하는 SDP 표준화 동향 및 SDP의 구성요소와 동작 원리에 대한 연구를 진행하고, 핵심 기술인 SPA 및 Dynamic Firewall 기술을 활용하여 기존 접근통제 방식의 문제점을 개선하기 위한 방안을 제시하고자 한다.

  • PDF

Distributed Edge Computing for DNA-Based Intelligent Services and Applications: A Review (딥러닝을 사용하는 IoT빅데이터 인프라에 필요한 DNA 기술을 위한 분산 엣지 컴퓨팅기술 리뷰)

  • Alemayehu, Temesgen Seyoum;Cho, We-Duke
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.12
    • /
    • pp.291-306
    • /
    • 2020
  • Nowadays, Data-Network-AI (DNA)-based intelligent services and applications have become a reality to provide a new dimension of services that improve the quality of life and productivity of businesses. Artificial intelligence (AI) can enhance the value of IoT data (data collected by IoT devices). The internet of things (IoT) promotes the learning and intelligence capability of AI. To extract insights from massive volume IoT data in real-time using deep learning, processing capability needs to happen in the IoT end devices where data is generated. However, deep learning requires a significant number of computational resources that may not be available at the IoT end devices. Such problems have been addressed by transporting bulks of data from the IoT end devices to the cloud datacenters for processing. But transferring IoT big data to the cloud incurs prohibitively high transmission delay and privacy issues which are a major concern. Edge computing, where distributed computing nodes are placed close to the IoT end devices, is a viable solution to meet the high computation and low-latency requirements and to preserve the privacy of users. This paper provides a comprehensive review of the current state of leveraging deep learning within edge computing to unleash the potential of IoT big data generated from IoT end devices. We believe that the revision will have a contribution to the development of DNA-based intelligent services and applications. It describes the different distributed training and inference architectures of deep learning models across multiple nodes of the edge computing platform. It also provides the different privacy-preserving approaches of deep learning on the edge computing environment and the various application domains where deep learning on the network edge can be useful. Finally, it discusses open issues and challenges leveraging deep learning within edge computing.

An Authentication Scheme for Providing to User Service Transparency in Multicloud Environment (멀티클라우드 환경에서 사용자에게 서비스의 투명성을 제공하는 인증 기법)

  • Lee, Jaekyung;Son, Junggab;Kim, Hunmin;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1131-1141
    • /
    • 2013
  • Most of the single server model of cloud computing services have problems that are hard to solve, such as a service availability, insider attack, and vendor lock-in, etc. To solve these problems, the research about multicloud has emerged. Multicloud model can supplement previous cloud model's weakness and provides new services to user. In this paper, we focus on a user authentication problem in multicloud model and propose a scheme to resolve it. We define a cloud broker-based multicloud model. And we propose an authentication protocol that is applicable at presented model. The proposed scheme can provide service transparency to user and prevent an impersonation attack by service provider.

A Study on Cloud Computing for Financial Sector limited to Processing System of Non-Critical Information: Policy Suggestion based on US and UK's approach (비중요 정보처리시스템으로 한정된 국내 금융권 클라우드 시장 활성화를 위한 제안: 영미 사례를 중심으로)

  • Do, Hye-Ji;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.39-51
    • /
    • 2017
  • In October 2016, the NFSA (National Financial Supervisory Authorities) revised the network separation clause of the Regulation on Supervision of Electronic Financial Activities in order to promote the Cloud Computing implementation in the financial sectors. The new regulation, however, limits the Cloud Computing usage to non-critical information and its processing system. Financial institutions that provide customer data analysis and personalized services based on personal data regard current revision as unchanged as before. The implementation of Cloud Computing has greatly contributed to cost reduction, business innovation and is an essential requirement in ever-changing information communication technology environment. To guarantee both security and reliability of the implementation of the Cloud Computing in financial sectors, a considerable amount of research and debate needs to be done. This paper examines current Cloud Computing policies in the Korean financial sector and the challenges associated with it. Finally, the paper identifies policy suggestions based on both European Union and United States' approach as they have successfully introduced Cloud Computing Services for their financial sectors.

Improved Tag Selection for Tag-cloud using the Dynamic Characteristics of Tag Co-occurrence (태그 동시 출현의 동적인 특징을 이용한 개선된 태그 클라우드의 태그 선택 방법)

  • Kim, Du-Nam;Lee, Kang-Pyo;Kim, Hyoung-Joo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.6
    • /
    • pp.405-413
    • /
    • 2009
  • Tagging system is the system that allows internet users to assign new meta-data which is called tag to article, photo, video and etc. for facilitating searching and browsing of web contents. Tag cloud, a visual interface is widely used for browsing tag space. Tag cloud selects the tags with the highest frequency and presents them alphabetically with font size reflecting their popularity. However the conventional tag selection method includes known weaknesses. So, we propose a novel tag selection method Freshness, which helps to find fresh web contents. Freshness is the mean value of Kullback-Leibler divergences between each consecutive change of tag co-occurrence probability distribution. We collected tag data from three web sites, Allblog, Eolin and Technorati and constructed the system, 'Fresh Tag Cloud' which collects tag data and creates our tag cloud. Comparing the experimental results between Fresh Tag Cloud and the conventional one with data from Allblog, our one shows 87.5% less overlapping average, which means Fresh Tag Cloud outperforms the conventional tag cloud.

Privacy-Preserving Self-Certified Public Auditing for Secure Cloud Storage (안전한 클라우드 스토리지를 위한 프라이버시 보장 자체 인증 공공 감사)

  • Baek, Mokryeon;Kim, Dongmin;Jeong, Ik Rae
    • Journal of KIISE
    • /
    • v.43 no.4
    • /
    • pp.497-508
    • /
    • 2016
  • With a cloud storage service, data owners can easily access their outsourced data in cloud storage on different devices and at different locations, and can share their data with others. However, as the users no longer physically have possession of their outsourced data and the cloud still facing the existence of internal/external threats, the task of checking the data integrity is formidable. Over recent years, numerous schemes have been proposed to ensure data integrity in an untrusted cloud. However, the existing public auditing schemes use a third-party auditor(TPA) to execute high computation to check data integrity and may still face many security threats. In this paper, we first demonstrate that the scheme proposed by Zhang et al. is not secure against our two threat models, and then we propose a self-certified public auditing scheme to eliminate the security threats and guarantee a constant communication cost. Moreover, we prove the securities of our public auditing scheme under three security models.

OpenID Based User Authentication Scheme for Multi-clouds Environment (멀티 클라우드 환경을 위한 OpenID 기반의 사용자 인증 기법)

  • Wi, Yukyeong;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.7
    • /
    • pp.215-223
    • /
    • 2013
  • As cloud computing is activated, a variety of cloud services are being distributed. However, to use each different cloud service, you must perform a individual user authentication process to service. Therefore, not only the procedure is cumbersome but also due to repeated authentication process performance, it can cause password exposure or database overload that needs to have user's authentication information each cloud server. Moreover, there is high probability of security problem that being occurred by phishing attacks that result from different authentication schemes and input scheme for each service. Thus, when you want to use a variety of cloud service, we proposed OpenID based user authentication scheme that can be applied to a multi-cloud environment by the trusted user's verify ID provider.

The Influence of Social Factors of Acceptance of Cloud Services on Consumer Usage Intentions (클라우드 서비스의 수용 관련 사회적 요인이 소비자의 이용의도에 미치는 영향)

  • Chen, Yu-Fei;Nie, Xin-Yu;Quan, Dong-mei
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.173-178
    • /
    • 2022
  • With the development of information technology, the popularization of 5G and cloud computing has accelerated the circulation and digital transformation of information. In the network information society where information is rapidly increasing, it is very important to have the ability to manage and collect the required information. In particular, the information storage and management functions of cloud services are widely used among young people. This research takes the social factors of accepting cloud services as the breakthrough point, and takes young consumers aged 20-30 as the survey object, and designs a research model according to the development of cloud computing technology. The findings verify the influence of social factors on cloud service acceptance and 20-30-year-old consumers' intention to use cloud services. The partial and complete mediating effects of perceived ease of use were verified from the influence relationship between social factors and exploitation intention. Finally, this study provides inspiration for the development direction of cloud computing technology through empirical analysis.