• Title/Summary/Keyword: Cloud/Grid Computing

Search Result 48, Processing Time 0.033 seconds

Mobile Edge Computing based Charging Infrastructure considering Electric Vehicle Charging Efficiency (전기자동차 충전 효율성을 고려한 모바일 에지 컴퓨팅 기반 충전 인프라 구조)

  • Lee, Juyong;Lee, Jihoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.10
    • /
    • pp.669-674
    • /
    • 2017
  • Due to the depletion of fossil fuels and the increase in environmental pollution, electric vehicles are attracting attention as next-generation transportation and are becoming popular all over the world. As the interest in electric vehicles and the penetration rate increase, studies on the charging infrastructure with vehicle-to-grid (V2G) technology and information technology are actively under way. In particular, communication with the grid network is the most important factor for stable charging and load management of electric vehicles. However, with the existing centralized infrastructure, there are problems when control-message requests increase and the charging infrastructure cannot efficiently operate due to slow response speed. In this paper, we propose a new charging infrastructure using mobile edge computing (MEC) that mitigates congestion and provides low latency by applying distributed cloud computing technology to wireless base stations. Through a performance evaluation, we confirm that the proposed charging infrastructure (with low latency) can cope with peak conditions more efficiently than the existing charging infrastructure.

An ID-based Broadcast Encryption Scheme for Cloud-network Integration in Smart Grid

  • Niu, Shufen;Fang, Lizhi;Song, Mi;Yu, Fei;Han, Song
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3365-3383
    • /
    • 2021
  • The rapid growth of data has successfully promoted the development of modern information and communication technologies, which are used to process data generated by public urban departments and citizens in modern cities. In specific application areas where the ciphertext of messages generated by different users' needs to be transmitted, the concept of broadcast encryption is important. It can not only improve the transmission efficiency but also reduce the cost. However, the existing schemes cannot entirely ensure the privacy of receivers and dynamically adjust the user authorization. To mitigate these deficiencies, we propose an efficient, secure identity-based broadcast encryption scheme that achieves direct revocation and receiver anonymity, along with the analysis of smart grid solutions. Moreover, we constructed a security model to ensure wireless data transmission under cloud computing and internet of things integrated devices. The achieved results reveal that the proposed scheme is semantically secure in the random oracle model. The performance of the proposed scheme is evaluated through theoretical analysis and numerical experiments.

A User Authentication Scheme using Blockchain in Smart Grid-based Edge Computing Environments (스마트 그리드 기반 엣지 컴퓨팅 환경에서 블록체인을 이용한 사용자 인증 기법)

  • Hakjun Lee;Youngsook Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.71-79
    • /
    • 2022
  • The smart grid system has emerged to maximize energy efficiency through real-time information exchange between power providers and consumers by combining information technology and power supply systems. The authentication schemes using blockchain in a smart grid system have been proposed, which utilize an edge server's architecture to collect and store electric power-related information and process data between a central cloud server and smart grid-IoT devices. Although authentication schemes are being proposed to enhance security in the smart grid environment, many vulnerabilities are still reported. This paper presents a new mutual authentication scheme to guarantee users' privacy and anonymity in a smart grid based on edge computing using blockchain. In the proposed scheme, we use the smart contract for the key management's efficiency, such as updating and discarding key materials. Finally, we prove that the proposed scheme not only securely establishes a session key between the smart grid-IoT device of the user and the edge server but also guarantees anonymity.

SLA-Aware Resource Management for Cloud based Multimedia Service

  • Hasan, Md. Sabbir;Islam, Md. Motaharul;Park, Jun Young;Huh, Eui-Nam
    • Annual Conference of KIPS
    • /
    • 2013.05a
    • /
    • pp.171-174
    • /
    • 2013
  • Virtualization technology opened a new era in the field of Data intensive, Grid and Cloud Computing. Today's Data centers are smarter than ever leveraging the Virtualization technology. In response to that, Dynamic consolidations of Virtual Machines (VMs) allow efficient resource management by live migration of VMs in the hosts. Moreover, each client typically has a service level agreement (SLA), leads to stipulation in dealing with energy-performance trade-off as aggressive consolidation may lead to performance degradation beyond the negotiation. In this paper we propose a Cloud Based CDN approach for allocation of VM that aims to maximize the client-level SLA. Our experiment result demonstrates significant enhancement of SLA at certain level.

Batch Resizing Policies and Techniques for Fine-Grain Grid Tasks: The Nuts and Bolts

  • Muthuvelu, Nithiapidary;Chai, Ian;Chikkannan, Eswaran;Buyya, Rajkumar
    • Journal of Information Processing Systems
    • /
    • v.7 no.2
    • /
    • pp.299-320
    • /
    • 2011
  • The overhead of processing fine-grain tasks on a grid induces the need for batch processing or task group deployment in order to minimise overall application turnaround time. When deciding the granularity of a batch, the processing requirements of each task should be considered as well as the utilisation constraints of the interconnecting network and the designated resources. However, the dynamic nature of a grid requires the batch size to be adaptable to the latest grid status. In this paper, we describe the policies and the specific techniques involved in the batch resizing process. We explain the nuts and bolts of these techniques in order to maximise the resulting benefits of batch processing. We conduct experiments to determine the nature of the policies and techniques in response to a real grid environment. The techniques are further investigated to highlight the important parameters for obtaining the appropriate task granularity for a grid resource.

An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage

  • Xia, Yingjie;Xia, Fubiao;Liu, Xuejiao;Sun, Xin;Liu, Yuncai;Ge, Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3607-3623
    • /
    • 2014
  • The increasing demand in promoting cloud computing in either business or other areas requires more security of a cloud storage system. Traditional cloud storage systems fail to protect data integrity information (DII), when the interactive messages between the client and the data storage server are sniffed. To protect DII and support public verifiability, we propose a data integrity verification scheme by deploying a designated confirmer signature DCS as a building block. The DCS scheme strikes the balance between public verifiable signatures and zero-knowledge proofs which can address disputes between the cloud storage server and any user, whoever acting as a malicious player during the two-round verification. In addition, our verification scheme remains blockless and stateless, which is important in conducting a secure and efficient cryptosystem. We perform security analysis and performance evaluation on our scheme, and compared with the existing schemes, the results show that our scheme is more secure and efficient.

Cost-Aware Dynamic Resource Allocation in Distributed Computing Infrastructures

  • Ricciardi, Gianni M.;Hwang, Soon-Wook
    • International Journal of Contents
    • /
    • v.7 no.2
    • /
    • pp.1-5
    • /
    • 2011
  • Allocation of computing resources is a crucial issue when dealing with a huge number of tasks to be completed according to a given deadline and cost constraints. The task scheduling to several resources (e.g. grid, cloud or a supercomputer) with different characteristics is not trivial, especially if a trade-off in terms of time and cost is considered. We propose an allocation approach able to fulfill the given requirements about time and cost through the use of optimizing techniques and an adaptive behavior. Simulated productions of tasks have been run in order to evaluate the characteristics of the proposed approach.

Application Profiling Technique For Optimal Resource Allocation in Cloud Environment (클라우드 환경에서 최적 자원 할당을 위한 어플리케이션 프로파일링 기술)

  • Kim, Woo-Joong;Youn, Chan-Hyun
    • Annual Conference of KIPS
    • /
    • 2013.11a
    • /
    • pp.208-209
    • /
    • 2013
  • 클라우드 환경에서 Scientific Application Service와 같이 computing intensive한 job을 최소한의 자원을 이용해 성능을 보장하면서 서비스를 제공할 수 있는 어플리케이션 프로파일링(Application Profiling) 기술을 제안한다.

Adaptive Virtualized Resource Instance Allocation for Cloud Computing (클라우드 컴퓨팅을 위한 적응적 가상 자원 인스턴스 할당 기법)

  • Kang, Dong-Ki;Kim, Seong-Hwan;Heo, Jae-Won;Youn, Chan-Hyun
    • Annual Conference of KIPS
    • /
    • 2013.05a
    • /
    • pp.189-191
    • /
    • 2013
  • 구글, 아마존 및 GoGrid 와 같은 클라우드 서비스 제공자(Cloud Service Providers)들은 서비스 사용자의 자원 사용 특성을 고려하여, 다양한 클라우드 서비스 가격 정책을 제공한다. 서비스 가격 정책은 할당되는 가상자원을 크게 온디맨드(On-demand), 예약형(Reserved) 및 스팟(Spot) 인스턴스로 구분하여 가격을 결정한다. 즉 클라우드 서비스 사용자는 자신의 응용을 고려하여 할당 받고자 하는 자원의 예상 사용 시간 및 허용 예산을 기반으로 최적화된 자원 할당을 요청해야 한다. 본 논문에서는 최적화 계산 시간 최소화 및 자원 할당 비용의 절감을 달성하면서도 사용자의 SLA를 보장할 수 있는 적응적 가상 자원 인스턴스 할당 요청 기법을 소개하고자 한다. 본 기법은 서비스 디맨드에 효율적으로 대응하면서도 응용에 따른 적절한 자원 할당을 수행할 수 있다.

Miblie Network based on Virtual Network environment (가상 네트워크 환경에 기반한 모바일 네트워크)

  • Lee, Jong-seo;Moon, Il-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.793-794
    • /
    • 2009
  • In recent years a significant increase in computing resources, the Internet, many computing resources associated with multiple users using the service and how it will do for cloud computing or grid computing technology is attracting attention from the networks on physical networks and virtual network links You can configure the virtual network of nodes to configure the virtual network environment, research is being made. Virtualization technology, rather than the actual network operating system is being developed in the field of research for a long time, but this paper is applied to the network field is applied to a mobile network based virtualization technology for virtual mobile network will explore.

  • PDF