• Title/Summary/Keyword: Cloud Environment

Search Result 1,324, Processing Time 0.024 seconds

Comparison of Distributed and Parallel NGS Data Analysis Methods based on Cloud Computing

  • Kang, Hyungil;Kim, Sangsoo
    • International Journal of Contents
    • /
    • v.14 no.1
    • /
    • pp.34-38
    • /
    • 2018
  • With the rapid growth of genomic data, new requirements have emerged that are difficult to handle with big data storage and analysis techniques. Regardless of the size of an organization performing genomic data analysis, it is becoming increasingly difficult for an institution to build a computing environment for storing and analyzing genomic data. Recently, cloud computing has emerged as a computing environment that meets these new requirements. In this paper, we analyze and compare existing distributed and parallel NGS (Next Generation Sequencing) analysis based on cloud computing environment for future research.

The Design of Collaboration System for Data Sharing In the Mobile Cloud Environment

  • Kim, Hyung-Seok;Lee, Jong-Yong;Jung, Kye-Dong
    • International journal of advanced smart convergence
    • /
    • v.5 no.2
    • /
    • pp.38-46
    • /
    • 2016
  • With the continuous effort to make business management more efficient, companies have started to utilize smart workplaces and the incorporation of mobile devices. Furthermore, big data processing, using Database as a Service (DBaas), is also being researched for integration. Similarly. mobile cloud can be utilized to allow for data sharing among employees. In this paper, in order to solve the issue of efficiency in business management, a collaboration system for data sharing using mobile cloud environment is explored. The proposed system, looks to benefit the increased integration of environment and corporate public through use of standardized data, in a design capable of efficient integrated management system.

An Application and Error Hooking running on Nested Session Management of Cloud Computing Collaboration Environment (클라우드 컴퓨팅 공동 환경의 네스티드 세션관리에서의 응용 및 오류 훅킹)

  • Ko, Eung-Nam
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.145-150
    • /
    • 2012
  • This paper explains a performance analysis of an error detection system running on nested session management of cloud computing collaboration environment using rule-based DEVS modeling and simulation techniques. In DEVS, a system has a time base, inputs, states, outputs, and functions. This paper explains the design and implementation of the FDA(Fault Detection Agent). FDA is a system that is suitable for detecting software error for multimedia remote control based on nested session management of cloud computing collaboration environment.

Blockchain based Application to Electric Vehicle in IoT environment

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Song, You-Jin
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.233-239
    • /
    • 2022
  • Recently, research is being conducted on the rapid service provision and reliability of the instance-based rather than the existing IP-based structure. Research is mainly conducted through Block cloud, a platform that combines service-centric networking (SCN) and blockchain. In addition, the Internet of Things network has been proposed as a fog computing environment in the structure of the existing cloud computing. Fog computing is an environment suitable for real-time information processing. In this paper, we propose a new Internet network structure based on fog computing that requires real-time for rapid processing of IoT services. The proposed system applies IoTA, the third-generation blockchain based on DAG, to the block cloud. In addition, we want to propose a basic model of the object block chain and check the application services of electric vehicles.

Personal Information Management System (PIMS) improvement research using cloud computing security (개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구)

  • Jeong, Hyein;Kim, Seongjun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.

Service Management for Cloud Marketplace : A Case of Internet2 NET+ (클라우드 마켓플레이스를 위한 서비스 관리체계 연구 : Internet2 NET+ 사례)

  • Kwon, Suhn Beom;Ahn, Sung Mahn
    • Journal of Information Technology Services
    • /
    • v.14 no.4
    • /
    • pp.221-236
    • /
    • 2015
  • Application software is delivered to customers as a form of service at cloud environment. A cloud service provider is a marketplace between supply side (application providers) and demand side (customers). Cloud service providers have to validate applications to be included in their service portfolio. Not only performance, security, networking, compliances should be checked but also business contract, authentication should be provided. Organization customers are more sensitive to these validation criteria and process. We study the Internet2 NET+, which is a successful cloud marketplace of applications for research and education organizations. This case study shows us three things : (i) a cloud marketplace's application management process : selection, validation, transition to service, customization of applications (ii) what a cloud marketplace has for its infrastructure like authentication, security, access control etc. (iii) what a cloud marketplace has as its governance structure. This case study will provide informative analysis of Internet2 NET, a profit-making vertical and buyer's marketplace (education industry). And we will get some strategic implications for planning and implementing cloud marketplaces.

Effect of Air-mass Back Trajectory on the Chemical Composition of Cloud/Fog Water at Daegwallyeong (기류의 유입경로가 대관령 지역 안개의 화학조성에 미치는 영향)

  • Kim Man-Goo;Lee Bo-Kyoung;Kim Hyun-Jin;Hong Young-Min
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.21 no.3
    • /
    • pp.343-355
    • /
    • 2005
  • Cloud/fog water was collected at Daegwallyeong, a typical clean environmental area, by using an active fog sampler during the foggy period in 2002, The pH ranged from 3,7 to 6,5 with a mean of 5,0, but the pH calculated from average concentrations of $H^+$ was 4.4. $SO_4^{2-},\;NO_3^-\;and\;NH_4^+$ were predominant ions with average concentrations of 473,3, 463,3 and $576,0\;{\mu}eq/L$, respectively, This showed that cloud/fog water was slightly acidified, but the concentrations of major pollutants were as high as those for polluted area, suggesting effect from long range transported pollutants, Samples were categorized into four groups (E, W, S, N) by applying 48-h back trajectory analysis using the Hybrid Single-Particle Largrangian Integrated Trajectory (HYSPLIT) model. Concentrations of seasalt $(Na^+\;and\;Cl^-)$ were the highest for group E, indicating large input of seasalts by air masses transported from the East Sea. The concentrations of $SO_4^{2-}$ were slightly higher in group W but the difference was not significant. However, the concentrations of $NO_3^-$ were significantly higher in group W than those in other three groups, The median values of cloud/fog water pH for group N and W were below 4,5, which is significantly lower than median values in group E and group S, This suggests that the acidifying pollutants were transported from the Asia continents and Seoul metropolitan area cause acidification of the cloud/fog water in Daegwallyeong.

Cloud-based Healthcare data management Framework

  • Sha M, Mohemmed;Rahamathulla, Mohamudha Parveen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1014-1025
    • /
    • 2020
  • Cloud computing services changed the way the data are managed across the healthcare system that can improve patient care. Currently, most healthcare organizations are using cloud-based applications and related services to deliver better healthcare facilities. But architecting a cloud-based healthcare system needs deep knowledge about the working nature of these services and the requirements of the healthcare environment. The success is based on the usage of appropriate cloud services in the architecture to manage the data flow across the healthcare system.Cloud service providers offer a wide variety of services to ingest, store and process healthcare data securely. The top three public cloud providers- Amazon, Google, and Microsoft offers advanced cloud services for the solution that the healthcare industry is looking for. This article proposes a framework that can effectively utilize cloud services to handle the data flow among the various stages of the healthcare infrastructure. The useful cloud services for ingesting, storing and analyzing the healthcare data for the proposed framework, from the top three cloud providers are listed in this work. Finally, a cloud-based healthcare architecture using Amazon Cloud Services is constructed for reference.

A study on BSN data collection technique through mobile devices in a cloud environment

  • Hwang, Chigon;Kim, Hyung-Seok;Lee, Jong-Yong;Jung, Kyedong
    • International journal of advanced smart convergence
    • /
    • v.6 no.2
    • /
    • pp.82-88
    • /
    • 2017
  • The data generated by the BSN sensor attached to the human body is mostly mobile. Accordingly, in a mobile cloud environment that processes BSN data, the service should not be fixed in a specific area but be able to support it according to the move. The mobile device must be able to process, filter and transmit the collected BSN data. The cloud server must be able to collect the data processed by the mobile device and provide it as a service. And the transfer of data requires standardized transfer between each device. In this paper, we propose a data delivery method through standard schema when mobile device processes data and provides service in cloud system and a data processing method according to the movement of the mobile device.

A Design of Interdependent Multi Session Authentication Scheme for Secure Cloud Service (안전한 클라우드 서비스를 위한 상호의존적 다중세션 인증 기법 설계)

  • Song, Jun Ho;Choi, Do Hyun;Park, Jung Oh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.181-196
    • /
    • 2014
  • Cloud computer technology currently provides diverse services based on a comprehensive environment ranging from hardware to solution, network and service. While the target of services has been extended from institutions and corporations to personal infrastructure and issues were made about security problems involved with protection of private information, measures on additional security demands for such service characteristics are insufficient. This paper proposes a multi-session authentication technique based on the characteristics of SaaS (Software as a Service) among cloud services. With no reliable authentication authority, the proposed technique reinforced communication sessions by performing key agreement protocol safe against key exposure and multi-channel session authentication, providing high efficiency of performance through key renewal using optimzied key table. Each formed sessions have resistance against deprivation of individual confirmation and service authority. Suggested confirmation technique that uses these features is expected to provide safe computing service in clouding environment.