• Title/Summary/Keyword: Cloud Networks

Search Result 260, Processing Time 0.025 seconds

Performance Analysis of Multiple-Antenna Receiver in Cloud Transmission System for Building Single Frequency Networks (단일주파수방송망 구축을 위한 클라우드 전송 시스템에서의 다중 안테나 수신 성능 분석)

  • Gwak, Gye Seok;Kim, Jaekil;Ahn, Jae Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.8
    • /
    • pp.474-480
    • /
    • 2014
  • In this paper, we propose a study for the next generation terrestrial broadcasting technology based on SFN(Single Frequency Networks), which applies multiple receiving antenna to improve receiving performance of cloud transmission system. By applying multiple receiving antenna, the received broadcast signals at the boundary of different SFN broadcasting area could be modelled by distributed MIMO system. Due to the interference cancellation effect of the MIMO detector, the proposed scheme could suppress the adjacent area interference more efficiently compared to the single receiving antenna case. Simulation results show that receiving performance can be improved dramatically in overlapping area of SFN by applying multiple antenna receivers in cloud transmission system.

Client Technology on a Server for Mobile Cloud

  • Nguyen, Tien-Dung;Biao, Song;Wei, Tang;Lee, Jun-Hyung;Huh, Eui-Nam
    • Information and Communications Magazine
    • /
    • v.28 no.10
    • /
    • pp.3-10
    • /
    • 2011
  • The increasing ubiquity of wireless networks and decreasing cost of hardware is fueling a proliferation of mobile devices. These devices are enabling a new revolution in mobile technology, not only running locally on them, but running on cloud as a service as well. From web browsing, email, or video conferencing, presentations to movie and music entertainment or games, multimedia applications, mobile cloud enables providing such diverse applications. Many technologies have been designed to address the limited hardware and performance in thin client PC. However, with the assorted network and graphic condition, those proposed technologies is obligated to alter aim to adapt mobile cloud. In this paper, we provide a survey of client technology on a Server that can be sufficed the requirements of Mobile Cloud. We also analyze each technology and classify with its individual difficulties and challenges.

Cloud System Construction for Availability of University Information System

  • Jang, Hae-Sook;Park, Ki-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.12
    • /
    • pp.179-186
    • /
    • 2017
  • Managing students' data is a high prioritized duty of the university administration since most of the school affairs are proceed based on that database. Universities have invested in IT assets such as servers, storage, database, and networks. However, continuing investment in IT infrastructure is impossible due to limited budget and rapid changes in the educational environment. As cloud computing diffuse, universities are trying to reduce costs and improve efficiency by increasing server utilization, unlike when physically investing. We designed a hypothetical academic information management system based on cloud computing by utilizing the advanced server virtualization technology. This administrative cloud system allows universities to improve the availability of the system with low cost. The system demonstrates its flexibility of using data resources and immediacy of resumption.

A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage

  • Lee, Sun-Ho;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • v.9 no.2
    • /
    • pp.287-300
    • /
    • 2013
  • Cloud storage is provided as a service in order to keep pace with the increasing use of digital information. It can be used to store data via networks and various devices and is easy to access. Unlike existing removable storage, many users can use cloud storage because it has no storage capacity limit and does not require a storage medium. Cloud storage reliability has become a topic of importance, as many users employ it for saving great volumes of data. For protection against unethical administrators and attackers, a variety of cryptography systems, such as searchable encryption and proxy re-encryption, are being applied to cloud storage systems. However, the existing searchable encryption technology is inconvenient to use in a cloud storage environment where users upload their data. This is because this data is shared with others, as necessary, and the users with whom the data is shared change frequently. In this paper, we propose a searchable re-encryption scheme in which a user can safely share data with others by generating a searchable encryption index and then re-encrypt it.

Performance Analysis of Cloud-Net with Cross-sensor Training Dataset for Satellite Image-based Cloud Detection

  • Kim, Mi-Jeong;Ko, Yun-Ho
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.1
    • /
    • pp.103-110
    • /
    • 2022
  • Since satellite images generally include clouds in the atmosphere, it is essential to detect or mask clouds before satellite image processing. Clouds were detected using physical characteristics of clouds in previous research. Cloud detection methods using deep learning techniques such as CNN or the modified U-Net in image segmentation field have been studied recently. Since image segmentation is the process of assigning a label to every pixel in an image, precise pixel-based dataset is required for cloud detection. Obtaining accurate training datasets is more important than a network configuration in image segmentation for cloud detection. Existing deep learning techniques used different training datasets. And test datasets were extracted from intra-dataset which were acquired by same sensor and procedure as training dataset. Different datasets make it difficult to determine which network shows a better overall performance. To verify the effectiveness of the cloud detection network such as Cloud-Net, two types of networks were trained using the cloud dataset from KOMPSAT-3 images provided by the AIHUB site and the L8-Cloud dataset from Landsat8 images which was publicly opened by a Cloud-Net author. Test data from intra-dataset of KOMPSAT-3 cloud dataset were used for validating the network. The simulation results show that the network trained with KOMPSAT-3 cloud dataset shows good performance on the network trained with L8-Cloud dataset. Because Landsat8 and KOMPSAT-3 satellite images have different GSDs, making it difficult to achieve good results from cross-sensor validation. The network could be superior for intra-dataset, but it could be inferior for cross-sensor data. It is necessary to study techniques that show good results in cross-senor validation dataset in the future.

Visualization Method of Social Networks Service using Message correlations based on Distributed Parallel Processing (메시지의 상관관계를 이용한 분산병렬처리 기반의 소셜 네트워크 서비스 시각화 방법)

  • Kim, Yong-Il;Park, Sun;Ryu, Gab-Sang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1168-1173
    • /
    • 2013
  • This paper proposes a new visualization method based on cloud technique which uses internal relationship of user correlation and external relation of social network to visualize user relationship hierarchy. The visualization method of this paper can well represent user-focused relationship hierarchy on social networks by a correlation matrix. The importance of a access node reflects into user relationship hierarchy by exploiting external relation of social network. Users of the method can well understand user relationships on account of representing user relationship hierarchy from social networks. In addition, the method use hadoop and hive for distribution storing and parallel processing which the result of calculation visualizes hierarchy graph using D3.

Design and performance evaluation of a storage cloud service model over KREONET (KREONET 기반의 스토리지 클라우드 서비스 모델 설계 및 성능평가)

  • Hong, Wontaek;Chung, Jinwook
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.7
    • /
    • pp.29-37
    • /
    • 2017
  • Compared to the commercial networks, R&E networks have the strength such as flexible network engineering and design. Based on those features of R&E networks, we propose our storage cloud service model which supports general-purpose network users in a central region and experimental network users in distributed regions simultaneously. We prototype our service model utilizing multiple proxy controllers of OpenStack Swift service in order to deploy several regions via experimental backbone networks. Our experiments on the influence of the network latency and the size of data to be transmitted show that the bigger size of data is preferable to the smaller size of data in an experimental backbone network where the network latency increases within 10ms because the rate of throughput decline in the bigger object is comparatively small. It means that our service model is appropriate for experimental network users who directly access the service in order to move intermittently high volume of data as well as normal users in the central region who access the service frequently.

Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing

  • Li, Haoxing;Li, Fenghua;Song, Chenggen;Yan, Yalong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2719-2735
    • /
    • 2015
  • In the cloud environment, users pay more attentions to their data security since all of them are stored in the cloud server. Researchers have proposed many mutual authentication schemes for the access control of the cloud server by using the smart card to protect the sensitive data. However, few of them can resist from the smart card lost problem and provide both of the forward security and the backward security. In this paper, we propose a novel authentication scheme for cloud computing which can address these problems and also provide the anonymity for the user. The trick we use is using the password, the smart card and the public key technique to protect the processes of the user's authentication and key exchange. Under the Elliptic Curve Diffie-Hellman (ECDH) assumption, it is provably secure in the random oracle model. Compared with the existing smart card based authentication schemes in the cloud computing, the proposed scheme can provide better security degree.

The Design of mBodyCloud System for Sensor Information Monitoring in the Mobile Cloud Environment

  • Park, Sungbin;Moon, Seok-Jae;Lee, Jong-Yong;Jung, Kye-Dong
    • International journal of advanced smart convergence
    • /
    • v.5 no.1
    • /
    • pp.1-7
    • /
    • 2016
  • Recently, introduced a cloud computing technology to the IT industry, smart phones, it has become possible connection between mobility terminal such as a tablet PC. For dissemination and popularization of movable wireless terminal, the same operation have focused on a viable mobile cloud in various terminal. Also, it evolved Wireless Sensor Network(WSN) technology, utilizing a Body Sensor Network(BSN), which research is underway to build large Ubiquitous Sensor Network(USN). BSN is based on large-scale sensor networks, it integrates the state information of the patient's body, it has been the need to build a managed system. Also, by transferring the acquired sensor information to HIS(Hospital Information System), there is a need to frequently monitor the condition of the patient. Therefore, In this paper, possible sensor information exchange between terminals in a mobile cloud environment, by integrating the data obtained by the body sensor HIS and interoperable data DBaaS (DataBase as a Service) it will provide a base of mBodyCloud System. Therefore, to provide an integrated protocol to include the sensor data to a standard HL7(Health Level7) medical information data.

Efficient Flow Table Management Scheme in SDN-Based Cloud Computing Networks

  • Ha, Nambong;Kim, Namgi
    • Journal of Information Processing Systems
    • /
    • v.14 no.1
    • /
    • pp.228-238
    • /
    • 2018
  • With the rapid advancement of Internet services, there has been a dramatic increase in services that dynamically provide Internet resources on demand, such as cloud computing. In a cloud computing service, because the number of users in the cloud is changing dynamically, it is more efficient to utilize a flexible network technology such as software-defined networking (SDN). However, to efficiently support the SDN-based cloud computing service with limited resources, it is important to effectively manage the flow table at the SDN switch. Therefore, in this paper, a new flow management scheme is proposed that is able to, through efficient management, speed up the flow-entry search speed and simultaneously maximize the number of flow entries. The proposed scheme maximizes the capacity of the flow table by efficiently storing flow entry information while quickly executing the operation of flow-entry search by employing a hash index. In this paper, the proposed scheme is implemented by modifying the actual software SDN switch and then, its performance is analyzed. The results of the analysis show that the proposed scheme, by managing the flow tables efficiently, can support more flow entries.