• Title/Summary/Keyword: Cloud Infrastructure

Search Result 316, Processing Time 0.027 seconds

CLIAM: Cloud Infrastructure Abnormal Monitoring using Machine Learning

  • Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.105-112
    • /
    • 2020
  • In the fourth industrial revolution represented by hyper-connected and intelligence, cloud computing is drawing attention as a technology to realize big data and artificial intelligence technologies. The proliferation of cloud computing has also increased the number of threats. In this paper, we propose one way to effectively monitor to the resources assigned to clients by the IaaS service provider. The method we propose in this paper is to model the use of resources allocated to cloud systems using ARIMA algorithm, and it identifies abnormal situations through the use and trend analysis. Through experiments, we have verified that the client service provider can effectively monitor using the proposed method within the minimum amount of access to the client systems.

Considerations for the Migration of Electronic Medical Records to Cloud Based Storage (전자의무기록의 클라우드 기반 저장소 이동시 고려사항)

  • Yi, Myongho
    • Journal of Korean Library and Information Science Society
    • /
    • v.47 no.1
    • /
    • pp.149-173
    • /
    • 2016
  • As cloud computing becomes more and more popular and ubiquitous, many organizations are deciding to move their whole information infrastructure to the cloud. The healthcare industry is one of those that is beginning to utilize cloud-based solutions en masse. Cloud based computing and storage offers numerous benefits including scalability, cost efficiency, and accessibility, which in turn have the potential to streamline hospital operations. Despite the potential benefits of acquiring this system, considerations must still be given to the migration of the massive amounts of personal and highly protected data to a cloud-based solution. Health care organizations must consider all matters of security, reliability, and availability, to ensure that patients' data remains compliant to the Health Insurance Portability and Accountability Act (HIPAA) compliant. This paper will examine the benefits and challenges of such operation to determine the best practices for the utilization of Electronic Medical Record (EMR) cloud based networking and storage for small to mid-sized hospitals.

CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud

  • Hwang, Yong-Woon;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4136-4156
    • /
    • 2020
  • Recently, data can be safely shared or stored using the infrastructure of cloud computing in various fields. However, issues such as data security and privacy affect cloud environments. Thus, a variety of security technologies are required, one of them is security technology using CP-ABE. Research into the CP-ABE scheme is currently ongoing, but the existing CP-ABE schemes can pose security threats and are inefficient. In terms of security, the CP-ABE approach should be secure against user collusion attacks and masquerade attacks. In addition, in a dynamic cloud environment where users are frequently added or removed, they must eliminate user access when they leave, and so users will not be able to access the cloud after removal. A user who has left should not be able to access the cloud with the existing attributes, secret key that had been granted. In addition, the existing CP-ABE scheme increases the size of the ciphertext according to the number of attributes specified by the data owner. This leads to inefficient use of cloud storage space and increases the amount of operations carried out by the user, which becomes excessive when the number of attributes is large. In this paper, CP-ABE access control is proposed to block access of withdrawn users in dynamic cloud environments. This proposed scheme focuses on the revocation of the attributes of the withdrawn users and the output of a ciphertext of a constant-size, and improves the efficiency of the user decryption operation through outsourcing.

The Validity Analysis of SDN/NFV Military application (SDN/NFV의 군 적용 타당성 분석)

  • Jang, Ji-Hee;Kwon, Tae-Uk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.4
    • /
    • pp.687-694
    • /
    • 2020
  • SDN and NFV are next-generation network technologies, and cloud, such as data centers, campuses, and large companies, has been established, or is actively applied by service-oriented communication companies. In particular, the Defense Integrated Data Center will be a prime example for military applications. In order for the Defense Integrated Data Center (DIDC) to become an intelligent center, it is accelerating the promotion of the "Smart Defense Integrated Data Center", which applied the latest information and communication technology (ICT). At the time of the establishment of DIDC, it plans to start building infrastructure such as cloud services at around 30% level, and expand D-Cloud to 75% through 'Cloud First'. In addition, the introduction of SDN/NFV will reduce the operation cost and manpower of DIDC, strengthen the ability to efficiently use information resources and cyber information protection systems, and increase flexibility and agility in using each system to improve efficiency in defense management in the future. Therefore, we will discuss the justification and expected effects of SDN/NFV introduction, focusing on DIDC.

Analyzing the Challenges for Cloud Computing Business Dissemination in the Service Provider's Perspective (클라우드 컴퓨팅 시장 확산을 위한 공급자 관점의 선결요인)

  • Park, Soo Kyung;Cho, Ji Yeon;Lee, Bong Gyou
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.99-116
    • /
    • 2015
  • The concept of Cloud computing has been introduced in the IT field over 10 years and industry has been expanding constantly. However, compare to the maturity of global market, Korea cloud computing industry is only in the early stage. Even the Korea has advantages in technology infrastructure; the pace of Korea cloud computing market growth is taking a serious downturn. Under these circumstances, it is needed to be discussing that strategy for expanding the cloud computing market size and for sustaining global competitiveness of local companies. Previous studies on plans for Korea cloud computing market has been conducted since 2009 and most of them are tend to examined in demand perspective. Thus, this study aims at identifying the priority of business challenges for making better performance in the market with service provider aspects. To analyze the important factors in the providing cloud computing service, ANP methodology was applied in this study. The network model including five clusters, security, stability, performance, consumer, and institution, was defined through literature review and expert survey was conducted to collect data. As a result of ANP analysis, 'Securing service reliability' was analyzed as the most important factor and followed by 'Preparing the range of legal liability', 'Preventing personal information leakage' and 'Preventing confidential information data leakage.' The priority of result indicates that service provider needs to focus on to make the secured service environment. This study has significance on analyzing the priority of business challenges in the service provider perspective. This study will provide useful guidelines to for establishing strategies in cloud computing market.

De-Centralized Information Flow Control for Cloud Virtual Machines with Blowfish Encryption Algorithm

  • Gurav, Yogesh B.;Patil, Bankat M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.235-247
    • /
    • 2021
  • Today, the cloud computing has become a major demand of many organizations. The major reason behind this expansion is due to its cloud's sharing infrastructure with higher computing efficiency, lower cost and higher fle3xibility. But, still the security is being a hurdle that blocks the success of the cloud computing platform. Therefore, a novel Multi-tenant Decentralized Information Flow Control (MT-DIFC) model is introduced in this research work. The proposed system will encapsulate four types of entities: (1) The central authority (CA), (2) The encryption proxy (EP), (3) Cloud server CS and (4) Multi-tenant Cloud virtual machines. Our contribution resides within the encryption proxy (EP). Initially, the trust level of all the users within each of the cloud is computed using the proposed two-stage trust computational model, wherein the user is categorized bas primary and secondary users. The primary and secondary users vary based on the application and data owner's preference. Based on the computed trust level, the access privilege is provided to the cloud users. In EP, the cipher text information flow security strategy is implemented using the blowfish encryption model. For the data encryption as well as decryption, the key generation is the crucial as well as the challenging part. In this research work, a new optimal key generation is carried out within the blowfish encryption Algorithm. In the blowfish encryption Algorithm, both the data encryption as well as decryption is accomplishment using the newly proposed optimal key. The proposed optimal key has been selected using a new Self Improved Cat and Mouse Based Optimizer (SI-CMBO), which has been an advanced version of the standard Cat and Mouse Based Optimizer. The proposed model is validated in terms of encryption time, decryption time, KPA attacks as well.

A Resource Scheduling Algorithm Using Node Clustering in VDI Environment (VDI 환경에서 클러스터링을 이용한 자원 스케줄링 알고리즘)

  • Seo, Kyung-Seok;Lee, Bong-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.360-363
    • /
    • 2012
  • Recently green IT is considered as an essential element due to continuous consumption of energy and abrupt oil price. Thus, IT infrastructure is being replaced with cloud computing platform in oder to reduce server heat and energy consumption of data centers. In this paper, we implement an open source-based cloud platform and propose a resource scheduling algorithm for cloud VDI service using node clustering.

  • PDF

Applying Workload Shaping Toward Green Cloud Computing

  • Kim, Woongsup
    • International journal of advanced smart convergence
    • /
    • v.1 no.2
    • /
    • pp.12-15
    • /
    • 2012
  • Energy costs for operating and cooling computing resources in Cloud infrastructure have increased significantly up to the point where they would surpass the hardware purchasing costs. Thus, reducing the energy consumption can save a significant amount of management cost. One of major approach is removing hardware over-provisioning. In this paper, we propose a technique that facilitates power saving through reducing resource over provisioning based on virtualization technology. To this end, we use dynamic workload shaping to reschedule and redistribute job requests considering overall power consumption. In this paper, we present our approach to shape workloads dynamically and distribute them on virtual machines and physical machines through virtualization technology. We generated synthetic workload data and evaluated it in simulating and real implementation. Our simulated results demonstrate our approach outperforms to when not using no workload shaping methodology.

A Study on Improvement Stability of Cloud Service using Attack Information Collection (공격정보 수집을 이용한 클라우드 서비스의 안전성 향상에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.2
    • /
    • pp.73-79
    • /
    • 2013
  • Cloud computing is a form which provides IT resources through network and pays the cost as much as you used. And it has advantages that it doesn't need to construct infrastructure and can be offered a variety of environments. The main core of these computing is virtualization technology. Security mechanism about attacks using vulnerabilities of virtualization technology isn't provided right and existing security tools can't be applied as it is. In this paper, we proposed honeyVM structure that can cope actively by collecting the information about attacks using virtualization vulnerability. Mamdani fuzzy inference is used to adjust dynamically the number of formed honeyVM depending on the load of system. Security structure to protect actual virtual machine from attacks and threats is proposed. The performance of the proposed structure in this paper measured occurred attack detection rate and resource utilization rate.

Implementation of Linux Virtual Server Load Balancing in Cloud Environment (클라우드 환경에서 Linux Virtual Server 로드밸런싱 구현)

  • Seo, Kyung-Seok;Lee, Bon-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.793-796
    • /
    • 2012
  • Recently adoption of the Green IT is regarded as an essential element in order to decrease server heat and save energy in data center because of continuous increase of energy consumption and energy price. Consequently the conventional IT infrastructure is replaced with cloud computing platform. In this paper, we have implemented a Linux virtual server load balancing in open source-based cloud platform and the performance of the LVS load balancing is analyzed.

  • PDF