• Title/Summary/Keyword: 클라우드-컴퓨팅

Search Result 1,403, Processing Time 0.029 seconds

Cloud Service Evaluation Techniques Using User Feedback based on Sentiment Analysis (감정 분석 기반의 사용자 피드백을 이용한 클라우드 서비스 평가 기법)

  • Yun, Donggyu;Kim, Ungsoo;Park, Joonseok;Yeom, Keunhyuk
    • Journal of Software Engineering Society
    • /
    • v.27 no.1
    • /
    • pp.8-14
    • /
    • 2018
  • As cloud computing has emerged as a hot trend in the IT industry, various types of cloud services have emerged. In addition, cloud service broker (CSB) technology has emerged to alleviate the complexity of the process of selecting the desired service that user wants among the various cloud services. One of the key features of the CSB is to recommend the best cloud services to users. In general, CSB can use a method to evaluate a service by receiving feedback about a service from users in order to recommend a cloud service. However, since each user has different criteria for giving a rating, there is a problem that reliability of service evaluation can be low when the rating is only used. In this paper, a method is proposed to supplement evaluation of rating based service by applying machine learning based sentiment analysis to cloud service user's review. In addition, the CSB prototype is implemented based on proposed method. Further, the results of comparing the performance of various learning algorithms is proposed that can be used for sentiment analysis through experiments using actual cloud service review as learning data. The proposed service evaluation method complements the disadvantages of the existing rating-based service evaluation and can reflect the service quality in terms of user experience.

  • PDF

Design and Forensic Analysis of a Zero Trust Model for Amazon S3 (Amazon S3 제로 트러스트 모델 설계 및 포렌식 분석)

  • Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.295-303
    • /
    • 2023
  • As the cloud computing market grows, a variety of cloud services are now reliably delivered. Administrative agencies and public institutions of South Korea are transferring all their information systems to cloud systems. It is essential to develop security solutions in advance in order to safely operate cloud services, as protecting cloud services from misuse and malicious access by insiders and outsiders over the Internet is challenging. In this paper, we propose a zero trust model for cloud storage services that store sensitive data. We then verify the effectiveness of the proposed model by operating a cloud storage service. Memory, web, and network forensics are also performed to track access and usage of cloud users depending on the adoption of the zero trust model. As a cloud storage service, we use Amazon S3(Simple Storage Service) and deploy zero trust techniques such as access control lists and key management systems. In order to consider the different types of access to S3, furthermore, we generate service requests inside and outside AWS(Amazon Web Services) and then analyze the results of the zero trust techniques depending on the location of the service request.

A Task Scheduling Algorithm with Environment-specific Performance Enhancement Method (환경 특성에 맞는 성능 향상 기법을 사용하는 태스크 스케줄링 알고리즘)

  • Song, Inseong;Yoon, Dongsung;Park, Taeshin;Choi, Sangbang
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.5
    • /
    • pp.48-61
    • /
    • 2017
  • An IaaS service of a cloud computing environment makes itself attractive for running large scale parallel application thanks to its innate characteristics that a user can utilize a desired number of high performance virtual machines without maintenance cost. The total execution time of a parallel application on a high performance computing environment depends on a task scheduling algorithm. Most studies on task scheduling algorithms on cloud computing environment try to reduce a user cost, and studies on task scheduling algorithms that try to reduce total execution time are rarely carried out. In this paper, we propose a task scheduling algorithm called an HAGD and a performance enhancement method called a group task duplication method of which the HAGD utilizes. The group task duplication method simplifies previous task duplication method, and the HAGD uses the group task duplication method or a task insertion method according to the characteristics of a computing environment and an application. We found that the proposed algorithm provides superior performance regardless of the characteristics in terms of normalized total execution time through performance evaluations.

Efficient Operation and Management Scheme of Micro Data Centers for Realization of Edge Computing (에지 컴퓨팅의 실현을 위한 마이크로 데이터센터의 효율적인 운영 및 관리 기법)

  • Choi, JungYul
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.30-39
    • /
    • 2020
  • As 5G mobile communication services are provided, efforts are being made to provide various services to users with ultra-low latency. This raises interest in edge computing, which can provide high performance computing services near users instead of cloud computing at the network core. This paper presents an efficient operation and management scheme of a micro data center, which is an essential equipment for realizing edge computing. First, we present the functional structure and deployment plan of edge computing. Next, we present the requirements for the micro data centers for edge computing and the operation and management scheme accordingly. Finally, in order to efficiently manage resources in the micro data centers, we present resource management items to be collected and monitored, and propose a performance indicator to measure the energy efficiency.

A study on the application of blockchain to the edge computing-based Internet of Things (에지 컴퓨팅 기반의 사물인터넷에 대한 블록체인 적용 방안 연구)

  • Choi, Jung-Yul
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.219-228
    • /
    • 2019
  • Thanks to the development of information technology and the vitalization of smart services, the Internet of Things (IoT) technology, in which various smart devices are connected to the network, has been continuously developed. In the legacy IoT architecture, data processing has been centralized based on cloud computing, but there are concerns about a single point of failure, end-to-end transmission delay, and security. To solve these problems, it is necessary to apply decentralized blockchain technology to the IoT. However, it is hard for the IoT devices with limited computing power to mine blocks, which consumes a great amount of computing resources. To overcome this difficulty, this paper proposes an IoT architecture based on the edge computing technology that can apply blockchain technology to IoT devices, which lack computing resources. This paper also presents an operaional procedure of blockchain in the edge computing-based IoT architecture.

An Application of MapReduce Technique over Peer-to-Peer Network (P2P 네트워크상에서 MapReduce 기법 활용)

  • Ren, Jian-Ji;Lee, Jae-Kee
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.8
    • /
    • pp.586-590
    • /
    • 2009
  • The objective of this paper describes the design of MapReduce over Peer-to-Peer network for dynamic environments applications. MapReduce is a software framework used for Cloud Computing which processing large data sets in a highly-parallel way. Based on the Peer-to-Peer network character which node failures will happen anytime, we focus on using a DHT routing protocol which named Pastry to handle the problem of node failures. Our results are very promising and indicate that the framework could have a wide application in P2P network systems while maintaining good computational efficiency and scalability. We believe that, P2P networks and parallel computing emerge as very hot research and development topics in industry and academia for many years to come.

A Study on Individual User's Preference for Cloud Storage Service (클라우드 스토리지 서비스에 대한 개인 사용자의 선호 요인 연구)

  • Lee, Sewon;Hong, Ahreum;Hwang, Junseok
    • Journal of Technology Innovation
    • /
    • v.23 no.1
    • /
    • pp.1-36
    • /
    • 2015
  • The purpose of this research is to find individual user's preference for cloud storage service such as Daum Cloud, Naver N-Drive, GoogleDrive, Dropbox, SkyDrive and iCloud. Through literature reviewed and pilot tests, 6 attributes of cloud storage service (storage capacity, perceived cost, collaboration, accessibility, social influence and perceived security) were selected and all 6 attributes had significant effects on the preference of cloud storage service by conjoint analysis. The results shows that the user's willingness to pay is estimated 10,553 won for the free storage, 4,646 won for the function for mobile accessibility, and 2,443 won for more reliable cloud computing service provider. This study has significance to apply conjoint analysis with economic, technological, and environmental factors to cloud storage service (SaaS) and shed light on policy promotion of next generation of cloud computing ecosystem by user perception with willingness to pay on the storage service.

Computationally Efficient Instance Memory Monitoring Scheme for a Security-Enhanced Cloud Platform (클라우드 보안성 강화를 위한 연산 효율적인 인스턴스 메모리 모니터링 기술)

  • Choi, Sang-Hoon;Park, Ki-Woong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.775-783
    • /
    • 2017
  • As interest in cloud computing grows, the number of users using cloud computing services is increasing. However, cloud computing technology has been steadily challenged by security concerns. Therefore, various security breaches are springing up to enhance the system security for cloud services users. In particular, research on detection of malicious VM (Virtual Machine) is actively underway through the introspecting virtual machines on the cloud platform. However, memory analysis technology is not used as a monitoring tool in the environments where multiple virtual machines are run on a single server platform due to obstructive monitoring overhead. As a remedy to the challenging issue, we proposes a computationally efficient instance memory introspection scheme to minimize the overhead that occurs in memory dump and monitor it through a partial memory monitoring based on the well-defined kernel memory map library.

Design and Implementation of a Smart Home Cloud Control System Using Bridge based on IoT (IoT 기반의 브리지를 이용한 스마트 홈 클라우드 제어 시스템 설계 및 구현)

  • Hao, Xu;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.865-872
    • /
    • 2017
  • Recently, in response to the Internet age, the demand for hardware devices has been increasing, centering on the rapidly growing smart home field, due to the growth and management of sensor and control technology, mobile application, network traffic, big data management and cloud computing. In order to maintain the sustainable development of the hardware system, it is necessary to update the system, and the hardware device is absolutely necessary in real time processing of complex data (voice, image, etc.) as well as data collection. In this paper, we propose a method to simplify the control and communication method by integrating the hardware devices in two operating systems in a unified structure to solve the simultaneous control and communication method of hardware under different operating systems. The performance evaluation results of the proposed integrated hardware and the cloud control system connected to the cloud server are described and the main directions to be studied in the field of internet smart home are described.

A Resource Clustering Method Considering Weight of Application Characteristic in Hybrid Cloud Environment (하이브리드 클라우드 환경에서의 응용 특성 가중치를 고려한 자원 군집화 기법)

  • Oh, Yoori;Kim, Yoonhee
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.8
    • /
    • pp.481-486
    • /
    • 2017
  • There are many scientists who want to perform experiments in a cloud environment, and pay-per-use services allow scientists to pay only for cloud services that they need. However, it is difficult for scientists to select a suitable set of resources since those resources are comprised of various characteristics. Therefore, classification is needed to support the effective utilization of cloud resources. Thus, a dynamic resource clustering method is needed to reflect the characteristics of the application that scientists want to execute. This paper proposes a resource clustering analysis method that takes into account the characteristics of an application in a hybrid cloud environment. The resource clustering analysis applies a Self-Organizing Map and K-means algorithm to dynamically cluster similar resources. The results of the experiment indicate that the proposed method can classify a similar resource cluster by reflecting the application characteristics.