• Title/Summary/Keyword: Cloud ITS

Search Result 640, Processing Time 0.027 seconds

Cloud Computing : An Analysis of Security Vulnerabilities in managerial aspect (클라우드 컴퓨팅 : 관리적 측면에서의 보안 취약점 분석)

  • Choi, Chang-Ho;Lee, Young Sil;Lee, Hoon Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.291-294
    • /
    • 2014
  • By building an environment that can utilize big data, many companies are interested in the cloud computing technology that has increased its popularity recently. By developing cloud environments from existing virtual environments, in the process, we discovered a variety of security vulnerabilities such as management, virtual machines, hypervisors, hardware etc. The security techniques from administrative aspects in the cloud environment provide the environment which can securely store data by the identification and control of security threats. In this paper, we investigate a list of companies which supports the cloud services and the types of services, and analyze the security threats according to the administrative aspects in the cloud environment. In addition, we suggest the direction for future improvements by investigating accidents or incidents which occurred recently.

  • PDF

A Study on the Integrated Approach Methodology for Evaluating the Performance of the Cloud-based AIS - Comparative study of Korea and the US (클라우드 기반의 AIS시스템 성과평가를 위한 통합적 접근방법론에 관한 실증적 연구-한미 양국 비교연구)

  • Kim, Dong-Il
    • Journal of Industrial Convergence
    • /
    • v.20 no.7
    • /
    • pp.21-30
    • /
    • 2022
  • In this study, This study focuses on exploring the major factors influencing the successful introduction of the cloud-based accounting information system, which is the top priority in the field of corporate digital transformation. Therefore, theories were summarized based on the company's cloud environment and related prior research, and the major performance factors of the company were analyzed by dividing them into organizational factors, business operation factors, and technical system factors. Considering that the cloud-based accounting information system is in the early stages of its introduction, the research analysis method ranks major success factors according to their importance using the Delphi targeting the expert panel, through the AHP method, the major performance variables were finally explored through the mutual importance analysis of each major factor. As a result of the analysis, organizational factors were analyzed as corporate sustainability, business operational factors were the business solutions, and system scalability factors were analyzed. This study will be able to provide additional useful information on the initial introduction strategy and operation for the introduction and operation of the cloud-based accounting information system.

An Experimental Study on the Frequency Characteristics of Cloud Cavitation on Naval Ship Rudder (함정용 방향타에서 발생하는 구름(cloud) 캐비테이션의 주파수 특성에 대한 실험적 연구)

  • Paik, Bu-Geun;Ahn, Jong-Woo;Jeong, Hongseok;Seol, Hanshin;Song, Jae-Yeol;Ko, Yoon-Ho
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.58 no.3
    • /
    • pp.167-174
    • /
    • 2021
  • In this study, the amount and frequency characteristics of cloud cavitation formed on a navy ship rudder were investigated through cavitation image processing technique and cavitation noise analysis. A high-speed camera with high time resolution was used to observe the cavitation on a full-spade rudder. The deflection angle range of the full-spade rudder was set to 8 to 15 degrees so that cloud cavitation was generated on the rudder surface. For images taken at 104 fps (frame per second), reference values for detecting cavitation were defined and detected in Red, Green, Blue and Hue, Saturation, Lightness color spaces to quantitatively analyze the amount of cavitation. Intrinsic frequency characteristics of cloud cavitation were detected from the time series data of the amount of cavitation. The frequency characteristics of cloud cavitation obtained by using the image processing technique were found to be the same through the analysis of the noise signal measured by the hydrophone installed on the hull above the rudder, and its peak value was in the frequency band of 30~60Hz.

A Study on Sizing and Operational Policies for Building the Cloud Training Portal System of Cyber Universities (사이버대학의 클라우드 실습 포털 구축을 위한 규모 산정 및 운영 정책)

  • Park, Jung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.171-178
    • /
    • 2015
  • In these days, the practical training education is getting highlighted in IT curriculum. This study is for the Cloud computing based Virtual Desktop Service Plan of IT education and its efficient operation and management plan. With the implementation of a virtual lab environment system, the training environment which is customized by the curriculum is able to be provided. Also in the case of the limited system, the curriculum is able to be provided for each subject in advance. Therefore if the Cloud Training (or Practicing) Portal system for the multiple cyber universities is implemented according to this study's estimated scale and operation managing policies, the virtual training education service system could be provided in more efficient and more effective ways.

Design and Implementation of Cloud Service with Unix System & Java Based Application (유닉스 시스템과 자바 기반의 애플리케이션을 이용한 Cloud 서비스 설계 및 구현)

  • Nam, Jeon-Woo;Park, Yeong-Beom;Lee, Yong-Jae;Song, Jin-Ha;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.273-276
    • /
    • 2011
  • In this paper, Cloud services to support the implementation of UNIX virtualization systems, and applications using Java-based service are proposed. Unix Virtualization with Web Server zone NFS zone and FTP zone is divided into three systems and is implemented. Applications are implemented with Java programming. Applicable to Unix systems, applications and data anytime, anywhere by uploading, downloading music, documents tasks, and It provides efficiency. From Unix virtualization for server resources, we can expect energy savings. Smart phone without PC conduct its mission and business with benefits.

  • PDF

Evolution of Integrated Management Systems for Smart Library

  • Min, Byung-Won;Oh, Yong-Sun
    • International Journal of Contents
    • /
    • v.8 no.4
    • /
    • pp.12-20
    • /
    • 2012
  • For a library to be able provide information services and fulfill its function as a knowledge convergence center capable of responding to various information demands, the development of next-generation information systems based on the latest information and communication technology is needed. The development of mobile information services using portable devices such smart phones and tablet PCs and information systems which incorporate the concepts of cloud computing, SaaS (Software as a Service), annotation and Library2.0 is also required. This paper describes a library information system that utilizes collective intelligence and cloud computing. The information system developed for this study adopts the SaaS-based cloud computing service concept to cope with the shift in the mobile service paradigm in libraries and the explosion of electronic data. The strengths of such a conceptual model include the sharing of resources, support of multi-tenants, and the configuration and support of metadata. The user services are provided in the form of software on-demand. To test the performance of the developed system, the efficiency analysis and TTA certification test were conducted. The results of performance tests, It is encouraging that, at least up to 100MB, the job time is approximately linear and with only a moderate overhead of less than one second. The system also passed the level-3 or higher criteria in the certification test, which includes the SaaS maturity, performance and application program functions.

A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4576-4598
    • /
    • 2018
  • In big data age, flexible and affordable cloud storage service greatly enhances productivity for enterprises and individuals, but spontaneously has their outsourced data susceptible to integrity breaches. Provable Data Possession (PDP) as a critical technology, could enable data owners to efficiently verify cloud data integrity, without downloading entire copy. To address challenging integrity problem on multiple clouds for multiple owners, an identity-based batch PDP scheme was presented in ProvSec 2016, which attempted to eliminate public key certificate management issue and reduce computation overheads in a secure and batch method. In this paper, we firstly demonstrate this scheme is insecure so that any clouds who have outsourced data deleted or modified, could efficiently pass integrity verification, simply by utilizing two arbitrary block-tag pairs of one data owner. Specifically, malicious clouds are able to fabricate integrity proofs by 1) universally forging valid tags and 2) recovering data owners' private keys. Secondly, to enhance the security, we propose an improved scheme to withstand these attacks, and prove its security with CDH assumption under random oracle model. Finally, based on simulations and overheads analysis, our batch scheme demonstrates better efficiency compared to an identity based multi-cloud PDP with single owner effort.

Star Formation Activity in Infra-Red Dark Cloud at ${\Gamma}53.2^{\circ}$

  • Kim, Hyun-Jeong;Koo, Bon-Chul
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.36 no.1
    • /
    • pp.82.2-82.2
    • /
    • 2011
  • Infra-Red Dark Clouds (IRDCs) seen silhouette against the bright Galactic background in mid-IR are a class of interstellar clouds that are dense and cold with very high column densities. While IRDCs are believed to be the precursors to massive stars and star clusters, individual IRDCs show diverse star forming activities within them. We report a remarkable example of such cloud, the IRDC at ${\Gamma}53.2^{\circ}$, and star formation activity in this cloud. The IRDC was previously identified in part as three separate, arcmin-size clouds in the catalogue of MSX IRDC candidates, but we found that the IRDC is associated with a long, filamentary CO cloud at 2 kpc from the Galactic Ring Survey data of $^{13}CO$ J = 1-0 emission, and that its total extent reaches ~ 30pc. The Spitzer MIPSGAL 24mm data show a number of reddened mid-IR sources distributed along the IRDC which are probably young stellar objects (YSOs), and the UWISH2 $H_2$ data (2.122mm) reveal ubiquitous out flows around them. These observations indicate that the IRDC is a site of active star formation with YSOs in various evolutionary stages. In order to investigate the nature of mid-IR sources, we have performed photometry of MIPSGAL data, and we present a catalogue of YSOs combining other available point source catalogues from optical to IR. We discuss the evolutionary stages and characteristics of YSOs from their IR colors and spectral energy distributions.

  • PDF

A Load-Balancing Approach Using an Improved Simulated Annealing Algorithm

  • Hanine, Mohamed;Benlahmar, El-Habib
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.132-144
    • /
    • 2020
  • Cloud computing is an emerging technology based on the concept of enabling data access from anywhere, at any time, from any platform. The exponential growth of cloud users has resulted in the emergence of multiple issues, such as the workload imbalance between the virtual machines (VMs) of data centers in a cloud environment greatly impacting its overall performance. Our axis of research is the load balancing of a data center's VMs. It aims at reducing the degree of a load's imbalance between those VMs so that a better resource utilization will be provided, thus ensuring a greater quality of service. Our article focuses on two phases to balance the workload between the VMs. The first step will be the determination of the threshold of each VM before it can be considered overloaded. The second step will be a task allocation to the VMs by relying on an improved and faster version of the meta-heuristic "simulated annealing (SA)". We mainly focused on the acceptance probability of the SA, as, by modifying the content of the acceptance probability, we could ensure that the SA was able to offer a smart task distribution between the VMs in fewer loops than a classical usage of the SA.

A Multi-Stage Approach to Secure Digital Image Search over Public Cloud using Speeded-Up Robust Features (SURF) Algorithm

  • AL-Omari, Ahmad H.;Otair, Mohammed A.;Alzwahreh, Bayan N.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.65-74
    • /
    • 2021
  • Digital image processing and retrieving have increasingly become very popular on the Internet and getting more attention from various multimedia fields. That results in additional privacy requirements placed on efficient image matching techniques in various applications. Hence, several searching methods have been developed when confidential images are used in image matching between pairs of security agencies, most of these search methods either limited by its cost or precision. This study proposes a secure and efficient method that preserves image privacy and confidentially between two communicating parties. To retrieve an image, feature vector is extracted from the given query image, and then the similarities with the stored database images features vector are calculated to retrieve the matched images based on an indexing scheme and matching strategy. We used a secure content-based image retrieval features detector algorithm called Speeded-Up Robust Features (SURF) algorithm over public cloud to extract the features and the Honey Encryption algorithm. The purpose of using the encrypted images database is to provide an accurate searching through encrypted documents without needing decryption. Progress in this area helps protect the privacy of sensitive data stored on the cloud. The experimental results (conducted on a well-known image-set) show that the performance of the proposed methodology achieved a noticeable enhancement level in terms of precision, recall, F-Measure, and execution time.