• Title/Summary/Keyword: Cloud Analysis

Search Result 1,462, Processing Time 0.024 seconds

A Study of Security Risk Analysis for Public IaaS Cloud Certification (공공 IaaS 클라우드 인증제도에 적용할 위험분석 방법에 대한 연구)

  • Kim, Sun-Jib;Kim, Ki-Young
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.9-15
    • /
    • 2015
  • Cloud computing has emerged with promise to decrease the cost of server additional cost and expanding the data storage and ease for computer resource sharing and apply the new technologies. However, Cloud computing also raises many new security concerns due to the new structure of the cloud service models. Therefore, several cloud service certification system were performed in the world in order to meet customers need which is the safe and reliable cloud service. This paper we propose the new risk analysis method different compare with existing method for secure the reliability of certification considering public IaaS(Infrastructure as a Service) cloud service properties.

A Study On The Cloud Hypervisor ESXi Security Vulnerability Analysis Standard (클라우드 하이퍼바이저 ESXi 보안 취약점 진단 기준에 관한 연구)

  • Kim, Sun-Jib;Heo, Jin
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.31-37
    • /
    • 2020
  • The cloud computing industry is regarded as a key element of the ICT industry and an important industry that will be a watershed for the future development of ICT industry. Korea has established the 1st~2nd cloud computing development basic plan to induce the growth of the cloud industry. However, the domestic information security guide provides technical vulnerability analysis criteria for Unix and Windows servers, DBMS, network equipment, and security equipment, but fails to provide vulnerability analysis criteria for hypervisors that are key elements of cloud computing. Organizations that have deployed cloud systems will be able to assist in vulnerability analysis using the criteria presented in this paper.

Derivation of Security Requirements for Cloud Managing Security Services System by Threat Modeling Analysis (위협 모델링 분석에 의한 클라우드 보안관제시스템 보안요구사항 도출)

  • Jang, Hwan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.5
    • /
    • pp.145-154
    • /
    • 2021
  • Recently, the introduction of Cloud Managing Security Services System to respond to security threats in cloud computing environments is increasing. Accordingly, it is necessary to analyze the security requirements for the Cloud Managing Security Services System. However, the existing research has a problem that does not reflect the virtual environment of the cloud and the data flow of the Cloud Managing Security Services System in the process of deriving the requirements. To solve this problem, it is necessary to identify the information assets of the Cloud Managing Security Services System in the process of threat modeling analysis, visualize and display detailed components of the cloud virtual environment, and analyze the security threat by reflecting the data flow. Therefore, this paper intends to derive the security requirements of the Cloud Managing Security Services System through threat modeling analysis that is an improved existing research.

Technical analysis of Cloud Storage for Cloud Computing (클라우드 컴퓨팅을 위한 클라우드 스토리지 기술 분석)

  • Park, Jeong-Su;Bae, Yu-Mi;Jung, Sung-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1129-1137
    • /
    • 2013
  • Cloud storage system that cloud computing providers provides large amounts of data storage and processing of cloud computing is a key component. Large vendors (such as Facebook, YouTube, Google) in the mass sending of data through the network quickly and easily share photos, videos, documents, etc. from heterogeneous devices, such as tablets, smartphones, and the data that is stored in the cloud storage using was approached. At time, growth and development of the globally data, the cloud storage business model emerging is getting. Analysis new network storage cloud storage services concepts and technologies, including data manipulation, storage virtualization, data replication and duplication, security, cloud computing core.

Analysis of of Horizontal Global Radiation and Cloud Cover in Korea (국내 수평면 전일사량과 운량 분석)

  • Jo, Dok-Ki;Yun, Chang-Yeol;Kim, Kwang-Deuk;Kang, Young-Heack
    • 한국태양에너지학회:학술대회논문집
    • /
    • 2011.11a
    • /
    • pp.124-129
    • /
    • 2011
  • Since the horizontal global radiation and cloud cover are a main factor for designing any solar energy system, it is necessary to evaluate its characteristics all over the country. The work presented here are the investigation of horizontal global radiation and cloud cover in Korea. The data utilized in the investigation consist of horizontal global radiation and cloud cover collected for 27 years(1982.12~2008.12) at measuring stations across the country. The analysis shows that the annual-average daily horizontal global radiation is $3.61kWh/m^2$ and the annual-average daily cloud cover is 5.1 in Korea. We also constructed the contour map of cloud cover in Korea by interpolating actually measured data across the country.

  • PDF

Service Management for Cloud Marketplace : A Case of Internet2 NET+ (클라우드 마켓플레이스를 위한 서비스 관리체계 연구 : Internet2 NET+ 사례)

  • Kwon, Suhn Beom;Ahn, Sung Mahn
    • Journal of Information Technology Services
    • /
    • v.14 no.4
    • /
    • pp.221-236
    • /
    • 2015
  • Application software is delivered to customers as a form of service at cloud environment. A cloud service provider is a marketplace between supply side (application providers) and demand side (customers). Cloud service providers have to validate applications to be included in their service portfolio. Not only performance, security, networking, compliances should be checked but also business contract, authentication should be provided. Organization customers are more sensitive to these validation criteria and process. We study the Internet2 NET+, which is a successful cloud marketplace of applications for research and education organizations. This case study shows us three things : (i) a cloud marketplace's application management process : selection, validation, transition to service, customization of applications (ii) what a cloud marketplace has for its infrastructure like authentication, security, access control etc. (iii) what a cloud marketplace has as its governance structure. This case study will provide informative analysis of Internet2 NET, a profit-making vertical and buyer's marketplace (education industry). And we will get some strategic implications for planning and implementing cloud marketplaces.

Performance Analysis of Cloud Rendering Based on Web Real-Time Communication

  • Lim, Gyubeom;Hong, Sukjun;Lee, Seunghyun;Kwon, Soonchul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.276-284
    • /
    • 2022
  • In this paper, we implemented cloud rendering using WebRTC for high-quality AR and VR services. Cloud rendering is an applied technology of cloud computing. It efficiently handles the rendering of large volumes of 3D content. The conventional VR and AR service is a method of downloading 3D content. The download time is delayed as the 3D content capacity increases. Cloud rendering is a streaming method according to the user's point of view. Therefore, stable service is possible regardless of the 3D content capacity. In this paper, we implemented cloud rendering using WebRTC and analyzed its performance. We compared latency of 100MB, 300MB, and 500MB 3D AR content in 100Mbps and 300Mbps internet environments. As a result of the analysis, cloud rendering showed stable latency regardless of data volume. On the other hand, the conventional method showed an increase in latency as the data volume increased. The results of this paper quantitatively evaluate the stability of cloud rendering. This is expected to contribute to high-quality VR and AR services

An Analysis of Spot Cloud in Cloud Computing

  • Mansoor, Usman;Mehmood, Usman;Khan, Faraz Idris;Kim, Ki-Hyung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.242-245
    • /
    • 2011
  • Cloud Computing is a fast developing domain in computer system architecture which enables dynamically scalable and virtualized resources to its users. Spot Cloud is the next evolutionary step in this field which allows the cloud computing resources to be treated as a market commodity. Cloud computing vendors will now be able to put their un used computational resources for sale using the singular access platform provided by Spot Cloud. Meanwhile customers will be able to buy/sell these resources according to their requirements. This paper analyzes the idea of Spot Cloud and the anticipated impact it will have on Cloud Computing globally. The paper also presents the risks and inherent barriers associated with this idea and how they might hinder the development of Spot Cloud to its full potential.

Analysis of Research Trends in Cloud Security Using Topic Modeling and Time-Series Analysis: Focusing on NTIS Projects (토픽모델링과 시계열 분석을 활용한 클라우드 보안 분야 연구 동향 분석 : NTIS 과제를 중심으로)

  • Sun Young Yun;Nam Wook Cho
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.31-38
    • /
    • 2024
  • Recent expansion in cloud service usage has heightened the importance of cloud security. The purpose of this study is to analyze current research trends in the field of cloud security and to derive implications. To this end, R&D project data provided by the National Science and Technology Knowledge Information Service (NTIS) from 2010 to 2023 was utilized to analyze trends in cloud security research. Fifteen core topics in cloud security research were identified using LDA topic modeling and ARIMA time series analysis. Key areas identified in the research include AI-powered security technologies, privacy and data security, and solving security issues in IoT environments. This highlights the need for research to address security threats that may arise due to the proliferation of cloud technologies and the digital transformation of infrastructure. Based on the derived topics, the field of cloud security was divided into four categories to define a technology reference model, which was improved through expert interviews. This study is expected to guide the future direction of cloud security development and provide important guidelines for future research and investment in academia and industry.

PCIA Cloud Service Modeling and Performance Analysis of Physical & Logical Resource Provisioning (PCIA 클라우드 서비스 모델링 및 자원 구성에 따른 성능 영향도 분석)

  • Yin, Binfeng;Kwak, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.2
    • /
    • pp.1-10
    • /
    • 2014
  • Cloud computing provides flexible and efficient mass data analysis platform. In this paper, we define a new resource provisioning architecture in the public cloud, named PCIA. In addition, we provide a service model of PCIA and its new naming scheme. Our model selects the proper number of physical or virtual resources based on the requirements of clients. By the analysis of performance variation in the PCIA, we evaluate the relationship between performance variation and resource provisioning, and we present key standards for cloud system constructions, which can be an important resource provisioning criteria for both cloud service providers and clients.