• Title/Summary/Keyword: Cloud Analysis Environment

Search Result 343, Processing Time 0.024 seconds

Design of Malicious Traffic Dynamic Analysis System in Cloud Environment (클라우드 환경에서의 악성트래픽 동적 분석 시스템 설계)

  • Lee, Eun-Ji;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.579-589
    • /
    • 2017
  • The cloud environment is hypervisor-based, and many virtual machines are interconnected, which makes propagation of malicious code easier than other environments. Accordingly, this paper proposes a malicious traffic dynamic analysis system for secure cloud environment. The proposed system continuously monitors and analyzes malicious activity in an isolated virtual network environment by distinguishing malicious traffic that occurs in a cloud environment. In addition, the analyzed results are reflected in the distinguishment and analysis of malicious traffic that occurs in the future. The goal of this research is secure and efficient malicious traffic dynamic analysis by constructing the malicious traffic analysis environment in the cloud environment for detecting and responding to the new and variant malicious traffic generated in the cloud environment.

Analysis of Cybercrime Investigation Problems in the Cloud Environment

  • Khachatryan, Grigor
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.315-319
    • /
    • 2022
  • Cloud computing has emerged to be the most effective headway for investigating crime especially cybercrime in this modern world. Even as we move towards an information technology-controlled world, it is important to note that when innovations are made, some negative implications also come with it, and an example of this is these criminal activities that involve technology, network devices, and networking that have emerged as a result of web improvements. These criminal activities are the ones that have been termed cybercrime. It is because of these increased criminal activities that organizations have come up with different strategies that they use to counter these crimes, and one of them is carrying out investigations using the cloud environment. A cloud environment has been defined as the use of web-based applications that are used for software installation and data stored in computers. This paper examines problems that are a result of cybercrime investigation in the cloud environment. Through analysis of the two components in play; cybercrime and cloud environment, we will be able to understand what are the problems that are encountered when carrying out investigations in cloud forensics. Through the use of secondary research, this paper found out that most problems are associated with technical and legal channels that are involved in carrying out these investigations. Investigator's mistakes when extracting pieces of evidence form the most crucial problems that take a lead when it comes to cybercrime investigation in the cloud environment. This paper not only flags out the challenges that are associated with cybercrime investigation in cloud environments but also offer recommendations and suggested solutions that can be used to counter the problems in question here. Through a proposed model to perform forensics investigations, this paper discusses new methodologies solutions, and developments for performing cybercrime investigations in the cloud environment.

A Study on effective risk analysis and evaluation method of cloud computing system environment (클라우드컴퓨팅 시스템 환경의 효과적 위험분석평가 방법에 관한 연구)

  • Lee, Junglimg;Chang, Hangbae
    • Journal of Platform Technology
    • /
    • v.9 no.2
    • /
    • pp.10-25
    • /
    • 2021
  • Although many studies have been conducted on risk analysis and evaluation in the on-premises environment in information security, studies on effective methodologies of risk analysis and evaluation for cloud computing systems are lacking. In 2015, the Cloud Computing Development Act was enacted, which served as an opportunity to promote the introduction of cloud computing. However, due to the increase in security incidents in the cloud computing system, activation is insufficient. In addition, the cloud computing system is not being actively introduced because of the difficulty in understanding the cloud computing system technology of the person in charge who intends to introduce the cloud computing system. In this regard, this study presented an effective risk analysis and evaluation method by examining the characteristics, concepts, and models of cloud computing systems and analyzing how these characteristics affect risk analysis and evaluation.

Measurement of Insoluble Mineral Particles in a Saturated Atmosphere

  • Ma, Chang-Jin;Choi, Sung-Boo
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.24 no.E1
    • /
    • pp.44-53
    • /
    • 2008
  • This study was undertaken to measure the properties of individual mineral particles in an artificially saturated atmosphere at a vertical extinct mine with 430 m height. By synchrotron radiation X-ray fluorescence (SR-XRF) microprobe analysis, it was possible to determine the elemental composition of residual insoluble particles on individual cloud droplet replicas formed on the Collodion film. The XRF visualized elemental maps enabled us not only to presume the chemical mixing state of particles retained in cloud droplet, but also to estimate their source. Details about the individual mineral particles captured by artificial cloud droplets should be helpful to understand about the removal characteristics of dust particles such as interaction with clouds. Nearly all individual particles captured in cloud droplets are strongly enriched in Fe. Mass of Fe is ranged between 41 fg and 360 fg with average 112 fg. There is a good agreement between single particle analysis by SR-XRF and bulk particle analysis by PIXE.

A data corruption detection scheme based on ciphertexts in cloud environment

  • Guo, Sixu;He, Shen;Su, Li;Zhang, Xinyue;Geng, Huizheng;Sun, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3384-3400
    • /
    • 2021
  • With the advent of the data era, people pay much more attention to data corruption. Aiming at the problem that the majority of existing schemes do not support corruption detection of ciphertext data stored in cloud environment, this paper proposes a data corruption detection scheme based on ciphertexts in cloud environment (DCDC). The scheme is based on the anomaly detection method of Gaussian model. Combined with related statistics knowledge and cryptography knowledge, the encrypted detection index for data corruption and corruption detection threshold for each type of data are constructed in the scheme according to the data labels; moreover, the detection token for data corruption is generated for the data to be detected according to the data labels, and the corruption detection of ciphertext data in cloud storage is realized through corresponding tokens. Security analysis shows that the algorithms in the scheme are semantically secure. Efficiency analysis and simulation results reveal that the scheme shows low computational cost and good application prospect.

Comparison of Distributed and Parallel NGS Data Analysis Methods based on Cloud Computing

  • Kang, Hyungil;Kim, Sangsoo
    • International Journal of Contents
    • /
    • v.14 no.1
    • /
    • pp.34-38
    • /
    • 2018
  • With the rapid growth of genomic data, new requirements have emerged that are difficult to handle with big data storage and analysis techniques. Regardless of the size of an organization performing genomic data analysis, it is becoming increasingly difficult for an institution to build a computing environment for storing and analyzing genomic data. Recently, cloud computing has emerged as a computing environment that meets these new requirements. In this paper, we analyze and compare existing distributed and parallel NGS (Next Generation Sequencing) analysis based on cloud computing environment for future research.

An extended cloud analysis method for seismic fragility assessment of highway bridges

  • Sfahani, Mohammad Ghalami;Guan, Hong
    • Earthquakes and Structures
    • /
    • v.15 no.6
    • /
    • pp.605-616
    • /
    • 2018
  • In this paper, an extended Cloud analysis method is developed for seismic fragility assessment of existing highway bridges in the southeast Queensland region. This method extends the original Cloud analysis dataset by performing scaled Cloud analyses. The original and scaled Cloud datasets are then paired to generate seismic fragility curves. The seismic hazard in this region is critically reviewed, and the ground motion records are selected for the time-history analysis based on various record selection criteria. A parametric highway bridge model is developed in the OpenSees analysis software, and a sampling technique is employed to quantify the uncertainties of highway bridges ubiquitous in this region. Technical recommendations are also given for the seismic performance evaluation of highway bridges in such low-to-moderate seismic zones. Finally, a probabilistic fragility study is conducted by performing a total of 8000 time-history analyses and representative bridge fragility curves are generated. It is illustrated that the seismic fragility curves generated by the proposed extended Cloud analysis method are in close agreement with those which are obtained by the rigorous incremental dynamic analysis method. Also, it reveals that more than 50% of highway bridges existing in southeast Queensland will be damaged subject to a peak ground acceleration of 0.14 g.

A Study on the Providing the Visibility in a Cloud Environment (클라우드 환경에서의 가시성 제공 방안 연구)

  • Kim Taekyung;Baik Namkyun;Kim Junghyup
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.1
    • /
    • pp.23-30
    • /
    • 2023
  • According to the government's plan for cloud conversion and integration of information resources for administrative and public institutions, work is underway to convert administrative and public institutions to the cloud by 2025. In addition, in the private sector, companies in many fields, including finance, are already using cloud services, and the usage is expected to expand more and more. As a result, changes have occurred in security control activities using security systems, it is required to secure visibility for encrypted traffic when building a cloud control environment. In this paper, an analysis was conducted on the way to provide visibility in the cloud service environment. Ways to provide visibility in the cloud service environment include methods of using load balancer, methods of using security systems, and methods of using equipment dedicated to SSL/TLS decryption. For these methods, Performance comparison was performed in terms of confidentiality, functionality (performance), cost. Through this, the pros and cons of each visibility provision method were presented.

Development of Performance Measurement Model for Cloud Companies (클라우드 기업의 성과측정모형 개발)

  • Seo, Kwang-Kyu
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.3
    • /
    • pp.39-44
    • /
    • 2021
  • Since the recent Corona 19, the importance of cloud computing is increasing, and at the same time, competition among clouds is intensifying. Cloud companies are competing for survival by promoting various management innovation methods for continuous growth and development amid a rapidly changing business environment. They are also increasingly interested in performance management in their operations and growth. In this paper, we propose Cloud BSC, an IT BSC-based performance measurement model for cloud enterprise performance management. The validity of the proposed model is verified through statistical analysis and causal analysis. Eventually, the proposed model is expected to be utilized as a management evaluation tool that can provide useful performance analysis information to cloud companies.

A Development of Cloud Service Partner Competency Analysis Framework (클라우드 서비스 파트너 역량 분석 프레임워크 개발)

  • Park, Wonju;Seo, Kwang-Kyu
    • Journal of the Semiconductor & Display Technology
    • /
    • v.21 no.3
    • /
    • pp.69-73
    • /
    • 2022
  • The application of cloud computing to many industrial domains is rapidly increasing, and domestic and foreign cloud service providers are actively conducting business. In the domestic cloud market, it is necessary to establish an ecosystem with partner operators that work closely with private cloud service providers. In this paper, to create such an environment, we propose a framework that can evaluate the capabilities of partners required for cloud service providers to establish specific business strategies. The framework proposed in this study establishes criteria for evaluating partners' competencies and applies a decision-making model such as fuzzy AHP for evaluation. Eventually this will help not only to expand the domestic cloud market but also to strengthen the competitiveness of domestic cloud partners through the growth of the domestic cloud market.