• Title/Summary/Keyword: Cloud Computing Architecture

Search Result 188, Processing Time 0.032 seconds

Goal-driven Optimization Strategy for Energy and Performance-Aware Data Centers for Cloud-Based Wind Farm CMS

  • Elijorde, Frank;Kim, Sungho;Lee, Jaewan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1362-1376
    • /
    • 2016
  • A cloud computing system can be characterized by the provision of resources in the form of services to third parties on a leased, usage-based basis, as well as the private infrastructures maintained and utilized by individual organizations. To attain the desired reliability and energy efficiency in a cloud data center, trade-offs need to be carried out between system performance and power consumption. Resolving these conflicting goals is often the major challenge encountered in the design of optimization strategies for cloud data centers. The work presented in this paper is directed towards the development of an Energy-efficient and Performance-aware Cloud System equipped with strategies for dynamic switching of optimization approach. Moreover, a platform is also provided for the deployment of a Wind Farm CMS (Condition Monitoring System) which allows ubiquitous access. Due to the geographically-dispersed nature of wind farms, the CMS can take advantage of the cloud's highly scalable architecture in order to keep a reliable and efficient operation capable of handling multiple simultaneous users and huge amount of monitoring data. Using the proposed cloud architecture, a Wind Farm CMS is deployed in a virtual platform to monitor and evaluate the aging conditions of the turbine's major components in concurrent, yet isolated working environments.

Architecture of Virtual Cloud Bank for Mediating Cloud Services based on Cloud User Requirements (클라우드 사용자 요구사항 기반으로 클라우드 서비스 중개를 위한 가상 클라우드 뱅크 아키텍처)

  • Park, Joonseok;An, Youngmin;Yeom, Keunhyuk
    • Journal of KIISE
    • /
    • v.42 no.9
    • /
    • pp.1090-1099
    • /
    • 2015
  • The concept of Cloud Service Brokerage (CSB) has been introduced as a result of the expansion of the cloud-computing paradigm. Cloud services that provide similar functionality are registered with a CSB. A CSB intermediates cloud services between cloud users and providers. However, there are differences in the price and performance offered by each of the cloud providers. Thus, cloud users have difficulty in finding suitable services to use. Therefore, a CSB is required in order to provide an approach for cloud services to fulfill the requirements of cloud users. In this paper, we propose a virtual cloud bank architecture that includes both a Service Analysis Model (SAM) that can be used to specify and analyze various cloud services and a requirement analysis method that can be used to collect and analyze the cloud user requirements. The VCB architecture that is herein proposed can be used as a reference architecture to provide user-centric cloud services.

IBC-Based Entity Authentication Protocols for Federated Cloud Systems

  • Cao, Chenlei;Zhang, Ru;Zhang, Mengyi;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1291-1312
    • /
    • 2013
  • Cloud computing changes the service models of information systems and accelerates the pace of technological innovation of consumer electronics. However, it also brings new security issues. As one of the important foundations of various cloud security solutions, entity authentication is attracting increasing interest of many researchers. This article proposes a layered security architecture to provide a trust transmission mechanism among cloud systems maintained by different organizations. Based on the security architecture, four protocols are proposed to implement mutual authentication, data sharing and secure data transmission in federated cloud systems. The protocols not only can ensure the confidentiality of the data transferred, but also resist man-in-the-middle attacks and masquerading attacks. Additionally, the security properties of the four protocols have been proved by S-pi calculus formal verification. Finally, the performance of the protocols is investigated in a lab environment and the feasibility of the security architecture has been verified under a hybrid cloud system.

Interaction Logic and Algorithm in Smart Cloud Computing (스마트 클라우드 컴퓨팅의 상호작용 로직 및 알고리즘)

  • Lee, Tae-Gyu;Shin, Seong-Yoon;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.203-206
    • /
    • 2014
  • This paper discuss both cloud computing and smart computing, and then debates structural and functional issues about how the two computing systems interact for offering user-friendly information solutions. Smart Table is proposed to configure cloud resources. Smart Control algorithm is proposed to choose the best resources. The information interaction between cloud computing and smart computing services is realized for efficient construction of information systems and for user's convenience of information services.

  • PDF

Secure Scheme Between Nodes in Cloud Robotics Platform (Cloud Robotics Platform 환경에서 Node간 안전한 통신 기법)

  • Kim, Hyungjoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.12
    • /
    • pp.595-602
    • /
    • 2021
  • The robot is developing into a software-oriented shape that recognizes the surrounding situation and is given a task. Cloud Robotics Platform is a method to support Service Oriented Architecture shape for robots, and it is a cloud-based method to provide necessary tasks and motion controllers depending on the situation. As it evolves into a humanoid robot, the robot will be used to help humans in generalized daily life according to the three robot principles. Therefore, in addition to robots for specific individuals, robots as public goods that can help all humans depending on the situation will be universal. Therefore, the importance of information security in the Cloud Robotics Computing environment is analyzed to be composed of people, robots, service applications on the cloud that give intelligence to robots, and a cloud bridge that connects robots and clouds. It will become an indispensable element for In this paper, we propose a Security Scheme that can provide security for communication between people, robots, cloud bridges, and cloud systems in the Cloud Robotics Computing environment for intelligent robots, enabling robot services that are safe from hacking and protect personal information.

Quantifying Values from BIM-projects life cycle with cloud-based computing

  • Choi, Michelle Mang Syn;Kim, Inhan
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.271-275
    • /
    • 2015
  • A variety of evaluation application and initiatives on the adoption of Building Information Modelling (BIM) have been introduced in recent years. Most of which however, focused mainly on evaluating design to construction phase-processes, or BIM utilization performances. Through studying existing publications, it is found that continuous utilization of BIM data throughout the building's life cycle is comparatively less explored or documented. Therefore, this study looks at improving this incomplete life cycle condition with the concept that accumulated BIM data should be carried forward and statistically quantified for cross comparison, in order to facilitate practitioners to better improve the projects the future. Based on this conceptual theory of moving towards a closedloop BIM building life cycle, this study explores, through existing literature, the use of cloud based computing as the means to quantify and adaptively utilize BIM data. Categorization of BIM data relations in adaptive utilization of BIM data is then suggested as a initial step for enhancing cross comparison of BIM data in a cloud environment.

  • PDF

Cloud-based Healthcare data management Framework

  • Sha M, Mohemmed;Rahamathulla, Mohamudha Parveen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1014-1025
    • /
    • 2020
  • Cloud computing services changed the way the data are managed across the healthcare system that can improve patient care. Currently, most healthcare organizations are using cloud-based applications and related services to deliver better healthcare facilities. But architecting a cloud-based healthcare system needs deep knowledge about the working nature of these services and the requirements of the healthcare environment. The success is based on the usage of appropriate cloud services in the architecture to manage the data flow across the healthcare system.Cloud service providers offer a wide variety of services to ingest, store and process healthcare data securely. The top three public cloud providers- Amazon, Google, and Microsoft offers advanced cloud services for the solution that the healthcare industry is looking for. This article proposes a framework that can effectively utilize cloud services to handle the data flow among the various stages of the healthcare infrastructure. The useful cloud services for ingesting, storing and analyzing the healthcare data for the proposed framework, from the top three cloud providers are listed in this work. Finally, a cloud-based healthcare architecture using Amazon Cloud Services is constructed for reference.

An Overview of Mobile Edge Computing: Architecture, Technology and Direction

  • Rasheed, Arslan;Chong, Peter Han Joo;Ho, Ivan Wang-Hei;Li, Xue Jun;Liu, William
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.4849-4864
    • /
    • 2019
  • Modern applications such as augmented reality, connected vehicles, video streaming and gaming have stringent requirements on latency, bandwidth and computation resources. The explosion in data generation by mobile devices has further exacerbated the situation. Mobile Edge Computing (MEC) is a recent addition to the edge computing paradigm that amalgamates the cloud computing capabilities with cellular communications. The concept of MEC is to relocate the cloud capabilities to the edge of the network for yielding ultra-low latency, high computation, high bandwidth, low burden on the core network, enhanced quality of experience (QoE), and efficient resource utilization. In this paper, we provide a comprehensive overview on different traits of MEC including its use cases, architecture, computation offloading, security, economic aspects, research challenges, and potential future directions.

Agricultural Irrigation Control using Sensor-enabled Architecture

  • Abdalgader, Khaled;Yousif, Jabar H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3275-3298
    • /
    • 2022
  • Cloud-based architectures for precision agriculture are domain-specific controlled and require remote access to process and analyze the collected data over third-party cloud computing platforms. Due to the dynamic changes in agricultural parameters and restrictions in terms of accessing cloud platforms, developing a locally controlled and real-time configured architecture is crucial for efficient water irrigation and farmers management in agricultural fields. Thus, we present a new implementation of an independent sensor-enabled architecture using variety of wireless-based sensors to capture soil moisture level, amount of supplied water, and compute the reference evapotranspiration (ETo). Both parameters of soil moisture content and ETo values was then used to manage the amount of irrigated water in a small-scale agriculture field for 356 days. We collected around 34,200 experimental data samples to evaluate the performance of the architecture under different agriculture parameters and conditions, which have significant influence on realizing real-time monitoring of agricultural fields. In a proof of concept, we provide empirical results that show that our architecture performs favorably against the cloud-based architecture, as evaluated on collected experimental data through different statistical performance models. Experimental results demonstrate that the architecture has potential practical application in a many of farming activities, including water irrigation management and agricultural condition control.

Configuration Method of AWS Security Architecture for Cloud Service (클라우드 서비스 보안을 위한 AWS 보안 아키텍처 구성방안)

  • Park, Se-Joon;Lee, Yong-Joon;Park, Yeon-Chool
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.7
    • /
    • pp.7-13
    • /
    • 2021
  • Recently, due to the many features and advantages of cloud computing, cloud service is being introduced to countless industries around the world at an unbelievably rapid pace. With the rapid increase in the introduction of multi-cloud based services, security vulnerabilities are increasing, and the risk of data leakage from cloud computing services are also expected to increase. Therefore, this study will propose an AWS Well-Architected based security architecture configuration method such as AWS standard security architecture, AWS shared security architecture model that can be applied for personal information security including cost effective of cloud services for better security in AWS cloud service. The AWS security architecture proposed in this study are expected to help many businesses and institutions that are hoping to establish a safe and reliable AWS cloud system.