• Title/Summary/Keyword: Amazon

Search Result 295, Processing Time 0.024 seconds

클라우드 환경의 서버 워크로드 보안 동향

  • Park, Moonhyung;Kim, DaeHyeob;Han, HyeonSang;Lee, Yongjoon
    • Review of KIISC
    • /
    • v.31 no.3
    • /
    • pp.39-44
    • /
    • 2021
  • 재택근무 확대와 온라인 수업 증가로 클라우드 환경으로의 전환이 확대되고 있다. 하지만 기존 온프레미스 환경과 달리 클라우드의 환경은 자원의 확장 및 재구성이 신속하기 때문에 복잡도가 증가 되었다. 본 논문에서는 급격히 전환되고 있는 클라우드 환경에서의 보안 위협과 이를 대응하기 위한 최근 위협관리 방안에 대해 분석하고, 특히 데브옵스와 같은 컨테이너 환경에서의 서버 워크로드 보안 동향과 수명주기 및 대응 자동화 등에 대한 구축 방향 관련 클라우드 환경 보안 동향을 연구한다.

Preliminary Performance Testing of Geo-spatial Image Parallel Processing in the Mobile Cloud Computing Service (모바일 클라우드 컴퓨팅 서비스를 위한 위성영상 병렬 정보처리 성능 예비실험)

  • Kang, Sang-Goo;Lee, Ki-Won;Kim, Yong-Seung
    • Korean Journal of Remote Sensing
    • /
    • v.28 no.4
    • /
    • pp.467-475
    • /
    • 2012
  • Cloud computing services are known that they have many advantages from the point of view in economic saving, scalability, security, sharing and accessibility. So their applications are extending from simple office systems to the expert system for scientific computing. However, research or computing technology development in the geo-spatial fields including remote sensing applications are the beginning stage. In this work, the previously implemented smartphone app for image processing was first migrated to mobile cloud computing linked to Amazon web services. As well, parallel programming was applied for improving operation performance. Industrial needs and technology development cases in terms of mobile cloud computing services are being increased. Thus, a performance testing on a satellite image processing module was carried out as the main purpose of this study. Types of implementation or services for mobile cloud varies. As the result of this testing study in a given condition, the performance of cloud computing server was higher than that of the single server without cloud service. This work is a preliminary case study for the further linkage approach for mobile cloud and satellite image processing.

Motivations for Sharing Photos and Videos on YouTube and Flickr (YouTube와 Flickr에 사진과 비디오를 공유하는 이용자 동기 연구)

  • Oh, Sanghee;Syn, Sue Yeon
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.4
    • /
    • pp.227-245
    • /
    • 2017
  • This study mainly investigates the motivations of YouTube and Flicker users for posting videos or images/photos on each service. The motivational framework with ten factors such as enjoyment, self-efficacy, learning, personal gain, altruism, empathy, social engagement, community interest, reputation and reciprocity were used to test the motivations. Those who are users of YouTube and Flickr were recruited from Amazon Mechanical Turk to participate in online surveys. Findings show that learning and social engagement are the two most highly rated motivations. Altruism was rated relatively low, although it was strongly correlated with all other motivations. Personal gain was rated as the lowest by both users but Flickr users rated personal gain higher than YouTube users. Findings from this study could be applicable to specify user motivations for using the services and to upgrade the designs of the services in the future.

A Study on the Diffusion of Web-Based Shopping Systems (웹기반 쇼핑시스템의 확산에 관한 연구)

  • 김창수
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2003.05a
    • /
    • pp.597-604
    • /
    • 2003
  • 웹기반 쇼핑시스템(Web-Based Shopping Systems: WBSS)이 매우 급속한 속도로 글로벌 전자상거래 환경에서 확산되고 있다. 웹기반 쇼핑시스템은 인터넷에 기반하여 제품(product)나 정보(Information) 그리고 서비스(service)에 대한 상거래 행위나 활동이 이루어 질 수 있도록 지원하는 시스템이다. 아마존(amazon.com)과 같은 닷컴기업들은 웹기반 쇼핑시스템을 성공적으로 운영하고 있는 대표적인 예에 해당된다. 아마존(amazon.com)의 예와 같이 기업들이 웹기반 쇼핑시스템을 도입함으로써 이전의 상거래와는 전혀 다른 유형의 사업(business)을 전개할 수 있다. 따라서 본 연구는 디지털 경제의 핵심적 동인(enabler)인 웹기반 쇼핑에 관련된 연구를 수행하는 연구자들 뿐만 아니라, 웹기반 쇼핑시스템의 성공적 구현 및 운영에 관심있는 기업인들에게 효과적인 가이드라인을 제공해 줄 것이다. 또한 전자상거래 (electronic commerce)에 관련된 기존 연구들은 정보통신기술(Information Communication Technology: ICT)의 역할을 과대평가하거나 혹은 과소평가하는 경향이 있다. 예를 들면 사회과학의 어떤 연구에서는 기술(technology)의 무분별한 수용에 대한 회의론이 제기되고 있고, 공학과 컴퓨터 분야의 연구에서는 기술적 측면에만 집중하여 연구가 수행되는 경향이 있다. 위와 같이 어느 한쪽에 편협된 시각에 근거하여 웹기반 쇼핑시스템과 같은 새로운 정보통신기술의 확산현상을 적절하게 설명하기에는 한계가 있는 것 같다. 따라서 본 연구에서는 웹기반 쇼핑시스템의 확산에 관련된 균형된 분석을 수행하기 위하여 경영(management)과 기술 (technology)을 조화롭게 고려한 관점에서 연구를 수행하고자 한다. 즉, 본 논문에서는 기술적 측면(technical aspect)과 경영적 측면(management aspect)을 동시에 고려하여 웹기반 쇼핑시스템의 주요만 특성을 살펴보고, 향후 정보통신 기술(ICT)의 확산에 관한 연구에서 두 가지 관점의 통합적 중요성에 대하여 강조하고자 한다. 그에 덧붙여 웹기반 쇼핑시스템과 다른 정보시스템을 비교하여 전자상거래 환경에서 웹기반 쇼핑시스템의 주요만 특성들이 두가지 연구관점에서 어떻게 개념화 될 수 있는지를 고찰하고자 한다. 이러만 분석에 기반하여 본 연구에서는 기술적 측면과 경영적인 측면을 동시에 고려한 웹기반 쇼핑시스템의 특성을 제시하고자 한다. 결론적으로 본 연구의 목적은 본 논문에서 적용한 기술(technical)과 경영(management)의 조화로운 연구관점이 향후 정보통신 기술이나 시스템, 그리고 전자상거래에 관련된 일련의 연구에 적응되어 보다 균형잡힌 논의와 분석이 이루어 질 수 있는 시발점이 되길 기대한다.

  • PDF

Antiplasmodial and Cytotoxic Activities of Toad Venoms from Southern Amazon, Brazil

  • Banfi, Felipe Finger;Guedes, Karla de Sena;Andrighetti, Carla Regina;Aguiar, Ana Carolina;Debiasi, Bryan Wender;Noronha, Janaina da Costa;Rodrigues, Domingos de Jesus;Vieira, Gerardo Magela Junior;Sanchez, Bruno Antonio Marinho
    • Parasites, Hosts and Diseases
    • /
    • v.54 no.4
    • /
    • pp.415-421
    • /
    • 2016
  • The drug-resistance of malaria parasites is the main problem in the disease control. The huge Brazilian biodiversity promotes the search for new compounds, where the animal kingdom is proving to be a promising source of bioactive compounds. The main objective of this study was to evaluate the antiplasmodial and cytotoxic activity of the compounds obtained from the toad venoms of Brazilian Amazon. Toad venoms were collected from the secretion of Rhinella marina and Rhaebo guttatus in Mato Grosso State, Brazil. The powder was extracted at room temperature, yielding 2 extracts (RG and RM) and a substance ('1') identified as a bufadienolide, named telocinobufagin. Growth inhibition, intraerythrocytic development, and parasite morphology were evaluated in culture by microscopic observations of Giemsa-stained thin blood films. Cytotoxicity was determined against HepG2 and BGM cells by MTT and neutral red assays. The 2 extracts and the pure substance ('1') tested were active against chloroquine-resistant Plasmodium falciparum strain, demonstrating lower $IC_{50}$ values. In cytotoxic tests, the 2 extracts and substance '1' showed pronounced lethal effects on chloroquine-resistant P. faciparum strain and low cytotoxic effect, highlighting toad parotoid gland secretions as a promising source of novel lead antiplasmodial compounds.

Cloud Computing-Based Processing of Large Volume UAV Images Acquired in Disaster Sites (재해/재난 현장에서 취득한 대용량 무인기 영상의 클라우드 컴퓨팅 기반 처리)

  • Han, Soohee
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.5_3
    • /
    • pp.1027-1036
    • /
    • 2020
  • In this study, a cloud-based processing method using Agisoft Metashape, a commercial software, and Amazon web service, a cloud computing service, is introduced and evaluated to quickly generate high-precision 3D realistic data from large volume UAV images acquired in disaster sites. Compared with on-premises method using a local computer and cloud services provided by Agisoft and Pix4D, the processes of aerial triangulation, 3D point cloud and DSM generation, mesh and texture generation, ortho-mosaic image production recorded similar time duration. The cloud method required uploading and downloading time for large volume data, but it showed a clear advantage that in situ processing was practically possible. In both the on-premises and cloud methods, there is a difference in processing time depending on the performance of the CPU and GPU, but notso much asin a performance benchmark. However, it wasfound that a laptop computer equipped with a low-performance GPU takes too much time to apply to in situ processing.

A Study on the Bibliographic Records and the Expansion of Library Catalog Using Open API (Open API를 이용한 서지레코드와 목록 확장에 관한 연구)

  • Gu, Jung-Eok;Lee, Eung-Bong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.43 no.2
    • /
    • pp.299-328
    • /
    • 2009
  • In this study, the present condition of 8 Open APIs for books, such as Naver, Daum, Aladdin, Amazon, Google, KERIS, LibraryThing, and OCLC, were compared and analyzed. In addition, the bibliographic records of 167 samples of visible 'light & paraphotic' (DDC 535) classifications were selected from the bibliographic records of the library of C university, and the effectiveness of the Open APIs were compared and analyzed. On the basis of the results of this analysis, 12 Open API application models, which were judged to be useful in expanding the function of the access point of the bibliographic records and enhancing the library catalog using Open API, were experimentally implemented. Various methods of augmenting access points of bibliographic records and expanded library catalogue were investigated using the unique identifier described in the KORMARC fields of 001, 010, 012, 020, 035, 246, 505, 520, 850, 856 for the integrated format for bibliographic data, and Open API. Finally, using Open API for the brief display and detailed display screen as a result of search of the OPAC of the sample bibliographic records, the devices for the expanding library catalog were implemented as examples.

Vulnerability Analysis on the CNG Crypto Library (CNG 암호 라이브러리의 보안 취약점 분석)

  • Lee, Kyungroul;Oh, Insu;Lee, Sun-Young;Yim, Kangbin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.838-847
    • /
    • 2017
  • CNG which was released as a substitute of the previous CAPI (Cryptography API) library from Microsoft is constructed with individual modules based on the plug-in architecture, this means CNG is exceedingly helpful in the cost of development as well as the facility of extension. On the opposite side of these advantages, considerations on security issues are quite insufficient. Therefore, a research on security assurance is strongly required in the environment of distributing and utilizing the CNG library, hence, we analyze possible security vulnerabilities on the CNG library. Based on analyzed vulnerabilities, proof-of-concept tools are implemented and vulnerabilities are verified using them. Verified results are that contents of mail, account information of mail server, and authentication information of web-sites such as Amazon, E-bay, Google, and Facebook are exposed in Outlook program and Internet Explorer program using CNG library. We consider that the analyzed result in this paper can improve the security for various applications using CNG library.

Flexible Crypto System for IoT and Cloud Service (IoT와 클라우드 서비스를 위한 유연한 암호화 시스템)

  • Kim, SeokWoo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.1
    • /
    • pp.15-23
    • /
    • 2016
  • As various IoT devices appear recently, Cloud Services such as DropBox, Amazon S3, Microsoft Azure Storage, etc are widely use for data sharing across the devices. Although, cryptographic algorithms like AES is prevalently used for data security, there is no mechanisms to allow selectively and flexibly use wider spectrum of lightweight cryptographic algorithms such as LEA, SEED, ARIA. With this, IoT devices with lower computation power and limited battery life will suffer from overly expensive workload and cryptographic operations are slower than what is enough. In this paper, we designed and implemented a CloudGate that allows client programs of those cloud services to flexibly select a cryptographic algorithms depending on the required security level. By selectively using LEA lightweight algorithms, we could achieve the cryptographic operations could be maximum 1.8 faster and more efficient than using AES.

A Study on ICT Technology Leading Change of Unmanned Store (무인판매점 변화를 리드하는 ICT 기술에 대한 연구)

  • Lee, Seong-Hoon;Lee, Dong-Woo
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.4
    • /
    • pp.109-114
    • /
    • 2018
  • In general, the simple items we need to live in are purchased through retail stores such as supermarkets near our home. In the store, not only the items but also the management personnel and the payment instruments for the store management are located in one space called the store. Such a general store environment is gradually changing into an 'unmanned market' as a result of the development and fusion of information and communication technology (ICT). An unmanned market is an environment in which no one runs a market as the word has. An example of a typical change is Amazon's Unofficial Amazon Store. In addition, the usage and prospects of unmanned market in China are growing very meaningfully. In this study, the present situation of the unmanned market is examined in the US and China markets, and the development prospects are described. It also describes the key milestones necessary for the unmanned market.