• 제목/요약/키워드: CLOUD

검색결과 5,547건 처리시간 0.032초

이종 분산 클라우드 서비스 브로커리지 환경에서의 사용자 통합 인증 시스템 설계 (Design of User Integrated Authentication System in Heterogeneous Distributed Cloud Service Brokerage Environment)

  • 이대성
    • 한국정보통신학회논문지
    • /
    • 제20권11호
    • /
    • pp.2061-2066
    • /
    • 2016
  • 현재 클라우드 시스템은 사업자가 각자의 방식으로 클라우드 환경을 구축함에 따라 클라우드 시스템 간 상호운용성이 떨어져 호환이 되지 않는다. 예를 들어 Google 클라우드를 사용하는 사용자는 별도의 추가적인 로그인하는 과정을 거치지 않으면 MS(마이크로소프트) 클라우드 시스템을 사용할 수 없다. Google 클라우드 사용자가 MS 클라우드 서비스를 이용하기 위해 Google 클라우드 시스템 로그아웃 이후 다시 MS 클라우드에 로그인 하는 과정을 거쳐야 한다. 이러한 문제를 해결하기 위해 CSB(Cloud Service Broker) 기술이 등장하여 클라우드 시스템간의 상호 호환 문제를 해결하고 있으나, 아직도 많은 연구와 개발이 필요한 실정이다. 본 연구에서는 이종 분산 클라우드 환경의 서비스 중재 기술로 등장하고 있는 CSB(Cloud Service Broker) 기술 중에서 클라우드 사용자의 상호운용성의 근본적인 해결 과제인 사용자 통합 인증 시스템을 설계한다.

클라우드서비스 활성화를 위한 서비스수준협약(SLA) 프레임워크 (A Framework of Service Level Agreement for Activating Cloud Services)

  • 서광규
    • 융합정보논문지
    • /
    • 제8권6호
    • /
    • pp.173-186
    • /
    • 2018
  • 클라우드 서비스가 확대되고 있지만, 많은 이용자들은 클라우드 서비스의 도입에 어려움을 겪고 있다. 이는 이용자 입장에서 어떤 클라우드 서비스를 신뢰할 수 있는지에 대한 정보가 없기 때문이다. 클라우드 서비스수준협약(클라우드 SLA)은 클라우드 서비스를 제공하는 공급자와 이용자간에 서비스의 품질과 성능 등을 포함한 정성적인 지표와 정량적 지표를 이용하여 협의하는 것이다. 이 연구에서는 클라우드 서비스 사업자의 서비스 수준을 향상하고 이용자를 보호하기 위해 국내 클라우드 산업에 적용할 수 있는 클라우드 SLA를 위한 프레임워크 제안하고 이를 이용하여 국내 클라우드 산업에 적용할 수 있는 클라우드 SLA의 세부 구성항목을 도출하고자 한다. 이를 통해 정부의 "클라우드컴퓨팅 발전 및 이용자 보호에 관한 법률" 체계하의 클라우드 서비스 제공자와 이용자간의 신뢰도 향상을 위한 정책적 활용은 물론 궁극적으로 국내 클라우드 서비스의 품질 성능 수준 향상 및 이용자 신뢰기반 조성을 통해 클라우드 서비스의 활성화를 기대한다.

개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구 (Personal Information Management System (PIMS) improvement research using cloud computing security)

  • 정혜인;김성준
    • 디지털산업정보학회논문지
    • /
    • 제12권3호
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.

INVESTIGATION OF CLOUD COVERAGE OVER ASIA WITH NOAA AVHRR TIME SERIES

  • Takeuchit Wataru;Yasuokat Yoshifumi
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2005년도 Proceedings of ISRS 2005
    • /
    • pp.26-29
    • /
    • 2005
  • In order to compute cloud coverage statistics over Asian region, an operational scheme for masking cloud-contaminated pixels in Advanced Very High Resolution Radiometer (AVHRR) daytime data was developed, evaluated and presented. Dynamic thresholding was used with channell, 2 and 3 to automatically create a cloud mask for a single image. Then the IO-day cloud coverage imagery was generated over the whole Asian region along with cloud-free composite imagery. Finally the monthly based statistics were computed based on the derived cloud coverage imagery in terms of land cover and country. As a result, it was found that 20-day is required to acquire the cloud free data over the whole Asia using NOAA AVHRR. The to-day cloud coverage and cloud-free composite imagery derived in this research is available via the web-site http://webpanda.iis.u-tokyo.ac.jp/CloudCover/.

  • PDF

클라우드 마켓플레이스를 위한 서비스 관리체계 연구 : Internet2 NET+ 사례 (Service Management for Cloud Marketplace : A Case of Internet2 NET+)

  • 권순범;안성만
    • 한국IT서비스학회지
    • /
    • 제14권4호
    • /
    • pp.221-236
    • /
    • 2015
  • Application software is delivered to customers as a form of service at cloud environment. A cloud service provider is a marketplace between supply side (application providers) and demand side (customers). Cloud service providers have to validate applications to be included in their service portfolio. Not only performance, security, networking, compliances should be checked but also business contract, authentication should be provided. Organization customers are more sensitive to these validation criteria and process. We study the Internet2 NET+, which is a successful cloud marketplace of applications for research and education organizations. This case study shows us three things : (i) a cloud marketplace's application management process : selection, validation, transition to service, customization of applications (ii) what a cloud marketplace has for its infrastructure like authentication, security, access control etc. (iii) what a cloud marketplace has as its governance structure. This case study will provide informative analysis of Internet2 NET, a profit-making vertical and buyer's marketplace (education industry). And we will get some strategic implications for planning and implementing cloud marketplaces.

Dynamic Service Assignment based on Proportional Ordering for the Adaptive Resource Management of Cloud Systems

  • Mateo, Romeo Mark A.;Lee, Jae-Wan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권12호
    • /
    • pp.2294-2314
    • /
    • 2011
  • The key issue in providing fast and reliable access on cloud services is the effective management of resources in a cloud system. However, the high variation in cloud service access rates affects the system performance considerably when there are no default routines to handle this type of occurrence. Adaptive techniques are used in resource management to support robust systems and maintain well-balanced loads within the servers. This paper presents an adaptive resource management for cloud systems which supports the integration of intelligent methods to promote quality of service (QoS) in provisioning of cloud services. A technique of dynamically assigning cloud services to a group of cloud servers is proposed for the adaptive resource management. Initially, cloud services are collected based on the excess cloud services load and then these are deployed to the assigned cloud servers. The assignment function uses the proposed proportional ordering which efficiently assigns cloud services based on its resource consumption. The difference in resource consumption rate in all nodes is analyzed periodically which decides the execution of service assignment. Performance evaluation showed that the proposed dynamic service assignment (DSA) performed best in throughput performance compared to other resource allocation algorithms.

An Exploratory Study on the Cloud Computing Services: Issues and Suggestion for The Success

  • Lee, Jong Un;Seo, Kyung Jin;Kim, Hee-Woong
    • Asia pacific journal of information systems
    • /
    • 제24권4호
    • /
    • pp.473-491
    • /
    • 2014
  • There is a growing interest for 'Cloud computing' to cut costs, and help the users focus on their core business instead of being impeded by IT obstacles. As it became IT version 3.0 which represents the era of cloud services and the dominance of a new kind of IT service provider, cloud service providers (CSPs)' role is more critical as a trusted IT advisor to include cloud migration and integration expertise. However, previous literatures related to cloud computing service have mainly analyzed from customers, although it is hard for customers to totally understand the complex and diverse cloud ecosystem. Therefore, it is an urgent task to mitigate the inhibitory factors in providing the cloud services for activating cloud industry. This study, an exploratory research based on interviews, has derived factors of promoting and hindering the activation of cloud computing from the provider's perspective, and has analyzed a sequence of cause and effect for each factor. For this, the casual loop diagram was developed to deduce key issues, and propose an alternative. The results of this study are expected to help activate 'Cloud computing' in Korea by minimizing the potential negative effects of activating 'Cloud computing' industry.

클라우드 서비스 브로커 인증 기술에 관한 연구 (A Study on Authentication Technology of Cloud Service Broker)

  • 이대성
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2016년도 추계학술대회
    • /
    • pp.321-323
    • /
    • 2016
  • 현재 클라우드 시스템은 사업자가 각자의 방식으로 클라우드 환경을 구축함에 따라 클라우드 시스템 간 상호 운용성이 떨어져 호환이 되지 않는다. 예를 들어 Google 클라우드 시스템을 사용하는 사용자는 MS(마이크로소프트) 클라우드 시스템을 사용할 수 없다. 이러한 문제를 해결하기 위해 CSB(Cloud Service Broker) 기술이 등장하여 클라우드 시스템간의 상호 호환 문제를 해결하고 있으나, 아직도 많은 연구와 개발이 필요한 실정이다. 본 연구에서는 이종 분산 클라우드 환경의 서비스 중재 기술로 등장하고 있는 CSB(Cloud Service Broker) 기술 중에서 클라우드 사용자의 상호운용성의 근본적인 해결 과제인 인증 시스템에 관해 연구한다.

  • PDF

Cloud-Based Accounting Adoption in Jordanian Financial Sector

  • ELDALABEEH, Abdel Rahman;AL-SHBAIL, Mohannad Obeid;ALMUIET, Mohammad Zayed;BANY BAKER, Mohammad;E'LEIMAT, Dheifallah
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권2호
    • /
    • pp.833-849
    • /
    • 2021
  • Cloud accounting represents a new area of accounting information systems. Past research has often focused on accounting information systems and its antecedents, rather than factors that adopt cloud accounting system. The purpose of this paper is to explain the factors that influence the adoption of cloud accounting in the financial sectors. This paper applied the technology acceptance model (TAM), technology-organization-environment, and the De Lone and Mc Lean model, coupled with proposed factors relevant to cloud accounting. The proposed model was empirically evaluated using survey data from 187 managers (financial managers, IT department managers, audit managers, heads of accounting departments, and head of internal control departments) in Jordanian bank branches. Based on the SEM results, top management support, organizational competency, service quality, system quality, perceived usefulness, and perceived ease of use had a positive relationship with the intention of using cloud accounting. Cloud accounting adoption positively affected cloud accounting usage. This paper contributes to a theoretical understanding of factors that activate the adoption of cloud accounting. For financial firms in general the results enable them to better develop cloud accounting framework. The paper verifies the factors that affect the adoption of cloud accounting and the proposed cloud accounting model.

Cloud and Fog Computing Amalgamation for Data Agitation and Guard Intensification in Health Care Applications

  • L. Arulmozhiselvan;E. Uma
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권3호
    • /
    • pp.685-703
    • /
    • 2024
  • Cloud computing provides each consumer with a large-scale computing tool. Different Cyber Attacks can potentially target cloud computing systems, as most cloud computing systems offer services to many people who are not known to be trustworthy. Therefore, to protect that Virtual Machine from threats, a cloud computing system must incorporate some security monitoring framework. There is a tradeoff between the security level of the security system and the performance of the system in this scenario. If strong security is needed, then the service of stronger security using more rules or patterns is provided, since it needs much more computing resources. A new way of security system is introduced in this work in cloud environments to the VM on account of resources allocated to customers are ease. The main spike of Fog computing is part of the cloud server's work in the ongoing study tells the step-by-step cloud server to change the tremendous measurement of information because the endeavor apps are relocated to the cloud to keep the framework cost. The cloud server is devouring and changing a huge measure of information step by step to reduce complications. The Medical Data Health-Care (MDHC) records are stored in Cloud datacenters and Fog layer based on the guard intensity and the key is provoked for ingress the file. The monitoring center sustains the Activity Log, Risk Table, and Health Records. Cloud computing and Fog computing were combined in this paper to review data movement and safe information about MDHC.