• Title/Summary/Keyword: Cloud Service Providers

Search Result 156, Processing Time 0.024 seconds

Study on APT Penetration Analysis and Plan of Reaction for Secure XaaS (안전한 XaaS 구현을 위한 APT 공격 분석과 대응방안에 관한 연구)

  • Lee, Sun Ho;Kim, DaeYoub
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.841-850
    • /
    • 2015
  • XaaS (Everything as a Service) provides re-usable, fine-grained software components like software, platform, infra across a network. Then users usually pay a fee to get access to the software components. It is a subset of cloud computing. Since XaaS is provided by centralized service providers, it can be a target of various security attacks. Specially, if XaaS becomes the target of APT (Advanced Persistent Threat) attack, many users utilizing XaaS as well as XaaS system can be exposed to serious danger. So various solutions against APT attack are proposed. However, they do not consider all aspects of security control, synthetically. In this paper, we propose overall security checkup considering technical aspect and policy aspect to securely operate XaaS.

A workflow scheduling based on decision table for cloud computing (클라우드 컴퓨팅에서 결정테이블을 이용한 워크플로우 스케줄링)

  • Kim, Jeong Won
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.5
    • /
    • pp.29-36
    • /
    • 2012
  • Cloud computing has gained great popularity because users don't need to install any softwares as well as maintain hardwares and service providers also can utilize its resources through virtualization of servers. As workflows feature variableness and servers are heterogenous, efficient scheduling of workflows in cloud computing is important factor in view of responsibility and resource utilization. In this paper, we propose a new workflow scheduling named 2-step scheduling which prioritizes each workflow through its significance degree and allocates resources to workflows through decision table. The goal of this 2-step scheduling is to improve responsibility as well as availability versus cost. Simulation results show that the proposed scheme in contrast of counterparts can improve the responsibility as well as availability of resource.

Scheduling Scheme for Cloud Computing based on Workflow Characteristics (클라우드 컴퓨팅에서 워크플로우의 특성을 고려한 스케줄링 기법)

  • Kim, Jeong-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.1-8
    • /
    • 2012
  • Cloud computing has got great popularity in recent times because users can easily access its resources as well as service providers can use efficiently use its resources. By the way, cloud computing are composed of heterogeneous resources and workflows of user application have various characteristics. So, the main goal of this paper is to design new efficient workflow scheduling algorithm, which classifies workflows through their importance degree and allocates resources to each workflow based on QoS metrics such as responsibility, cost and load balancing. Simulation results show that the proposed scheme can improve the responsibility as well as availability of resource.

Privacy-preserving and Communication-efficient Convolutional Neural Network Prediction Framework in Mobile Cloud Computing

  • Bai, Yanan;Feng, Yong;Wu, Wenyuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4345-4363
    • /
    • 2021
  • Deep Learning as a Service (DLaaS), utilizing the cloud-based deep neural network models to provide customer prediction services, has been widely deployed on mobile cloud computing (MCC). Such services raise privacy concerns since customers need to send private data to untrusted service providers. In this paper, we devote ourselves to building an efficient protocol to classify users' images using the convolutional neural network (CNN) model trained and held by the server, while keeping both parties' data secure. Most previous solutions commonly employ homomorphic encryption schemes based on Ring Learning with Errors (RLWE) hardness or two-party secure computation protocols to achieve it. However, they have limitations on large communication overheads and costs in MCC. To address this issue, we present LeHE4SCNN, a scalable privacy-preserving and communication-efficient framework for CNN-based DLaaS. Firstly, we design a novel low-expansion rate homomorphic encryption scheme with packing and unpacking methods (LeHE). It supports fast homomorphic operations such as vector-matrix multiplication and addition. Then we propose a secure prediction framework for CNN. It employs the LeHE scheme to compute linear layers while exploiting the data shuffling technique to perform non-linear operations. Finally, we implement and evaluate LeHE4SCNN with various CNN models on a real-world dataset. Experimental results demonstrate the effectiveness and superiority of the LeHE4SCNN framework in terms of response time, usage cost, and communication overhead compared to the state-of-the-art methods in the mobile cloud computing environment.

A Survey of Homomorphic Encryption for Outsourced Big Data Computation

  • Fun, Tan Soo;Samsudin, Azman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3826-3851
    • /
    • 2016
  • With traditional data storage solutions becoming too expensive and cumbersome to support Big Data processing, enterprises are now starting to outsource their data requirements to third parties, such as cloud service providers. However, this outsourced initiative introduces a number of security and privacy concerns. In this paper, homomorphic encryption is suggested as a mechanism to protect the confidentiality and privacy of outsourced data, while at the same time allowing third parties to perform computation on encrypted data. This paper also discusses the challenges of Big Data processing protection and highlights its differences from traditional data protection. Existing works on homomorphic encryption are technically reviewed and compared in terms of their encryption scheme, homomorphism classification, algorithm design, noise management, and security assumption. Finally, this paper discusses the current implementation, challenges, and future direction towards a practical homomorphic encryption scheme for securing outsourced Big Data computation.

Adaptive Virtualized Resource Instance Allocation for Cloud Computing (클라우드 컴퓨팅을 위한 적응적 가상 자원 인스턴스 할당 기법)

  • Kang, Dong-Ki;Kim, Seong-Hwan;Heo, Jae-Won;Youn, Chan-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.189-191
    • /
    • 2013
  • 구글, 아마존 및 GoGrid 와 같은 클라우드 서비스 제공자(Cloud Service Providers)들은 서비스 사용자의 자원 사용 특성을 고려하여, 다양한 클라우드 서비스 가격 정책을 제공한다. 서비스 가격 정책은 할당되는 가상자원을 크게 온디맨드(On-demand), 예약형(Reserved) 및 스팟(Spot) 인스턴스로 구분하여 가격을 결정한다. 즉 클라우드 서비스 사용자는 자신의 응용을 고려하여 할당 받고자 하는 자원의 예상 사용 시간 및 허용 예산을 기반으로 최적화된 자원 할당을 요청해야 한다. 본 논문에서는 최적화 계산 시간 최소화 및 자원 할당 비용의 절감을 달성하면서도 사용자의 SLA를 보장할 수 있는 적응적 가상 자원 인스턴스 할당 요청 기법을 소개하고자 한다. 본 기법은 서비스 디맨드에 효율적으로 대응하면서도 응용에 따른 적절한 자원 할당을 수행할 수 있다.

Development of Cloud-based VTS Integration Platform for IVEF Service Implementation (IVEF 서비스 구현을 위한 클라우드 기반 VTS 통합 플랫폼 개발)

  • Yunja Yoo;Dae-Won Kim;Chae-Uk Song;Jung-Jin Lee;Sang-Gil Lee
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.7
    • /
    • pp.893-901
    • /
    • 2023
  • The International Association Marine Aids to Navigation and Lighthouse Authorities (IALA) proposed guidelines for VTS manual operation in 2016 for safe and efficient operation of ship. The Korea Coast Guard (KCG) established and operated 19 VTS centers in ports and coastal waters across the country by 2022 based on the IALA VTS manual and VTS operator's education and training guidelines. In addition, IALA proposed the Inter-VTS Exchange Format (IVEF) Service recommendation (V-145), a standard for data exchange between VTS, in 2011 for efficient e-Navigation system services and safe and efficient VTS service support by VTS authorities. The IVEF service in a common framework for ship information exchange, and it presents seven basic IVEF service (BISs) models. VTS service providers can provide safer and more efficient VTS services by sharing VTS information on joint area using IVEF standards. Based on the BIS data, interaction, and interfacing models, this paper introduced the development of the cloud-based VTS integration services performed by the KCG and the results of the VTS integration platform test-bed for IVEF service implementation. In addition, the results of establishing a cloud VTS integrated platform test-bed for the implementation of IVEF service and implementing the main functions of IVEF service were presented.

Design and Implementation of a Cloud-based Linux Software Practice Platform (클라우드 기반 리눅스 SW 실습 플랫폼의 설계 및 구현 )

  • Hyokyung Bahn;Kyungwoon Cho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.2
    • /
    • pp.67-71
    • /
    • 2023
  • Recently, there are increasing cases of managing software labs by assigning virtual PCs in the cloud instead of physical PCs to each student. In this paper, we design and implement a Linux-based software practice platform that allows students to efficiently build their environments in the cloud. In our platform, instructors can create and control virtual machine templates for all students at once, and students practice on their own machines as administrators. Instructors can also troubleshoot each machine and restore its state. Meanwhile, the biggest obstacle to implementing this approach is the difficulty of predicting the costs of cloud services instantly. To cope with this situation, we propose a model that can estimate the cost of cloud resources used. By using daemons in each user's virtual machine, we instantly estimate resource usage and costs. Although our model has very low overhead, the predicted results are very close to the actual resource usage measured by cloud service providers. To further validate our model, we used the proposed platform in a Linux practice lecture for a semester and confirmed that the proposed model is very accurate.

Understanding Watching Patterns of Live TV Programs on Mobile Devices: A Content Centric Perspective

  • Li, Yuheng;Zhao, Qianchuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3635-3654
    • /
    • 2015
  • With the rapid development of smart devices and mobile Internet, the video application plays an increasingly important role on mobile devices. Understanding user behavior patterns is critical for optimized operation of mobile live streaming systems. On the other hand, volume based billing models on cloud services make it easier for video service providers to scale their services as well as to reduce the waste from oversized service capacities. In this paper, the watching behaviors of a commercial mobile live streaming system are studied in a content-centric manner. Our analysis captures the intrinsic correlation existing between popularity and watching intensity of programs due to the synchronized watching behaviors with program schedule. The watching pattern is further used to estimate traffic volume generated by the program, which is useful on data volume capacity reservation and billing strategy selection in cloud services. The traffic range of programs is estimated based on a naive popularity prediction. In cross validation, the traffic ranges of around 94% of programs are successfully estimated. In high popularity programs (>20000 viewers), the overestimated traffic is less than 15% of real happened traffic when using upper bound to estimate program traffic.

A Resource Reduction Scheme with Low Migration Frequency for Virtual Machines on a Cloud Cluster

  • Kim, Changhyeon;Lee, Wonjoo;Jeon, Changho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.6
    • /
    • pp.1398-1417
    • /
    • 2013
  • A method is proposed to reduce excess resources from a virtual machine(VM) while avoiding subsequent migrations for a computer cluster that provides cloud service. The proposed scheme cuts down on the resources of a VM based on the probability that migration may occur after a reduction. First, it finds a VM that can be scaled down by analyzing the history of the resource usage. Then, the migration probability is calculated as a function of the VM resource usage trend and the trend error. Finally, the amount of resources needed to eliminate from an underutilized VM is determined such that the migration probability after the resource reduction is less than or equal to an acceptable migration probability. The acceptable migration probability, to be set by the cloud service provider, is a criterion to assign a weight to the resource reduction either to prevent VM migrations or to enhance VM utilization. The results of simulation show that the proposed scheme lowers migration frequency by 31.6~60.8% depending on the consistency of resource demand while losing VM utilization by 9.1~21.5% compared to other known approaches, such as the static and the prediction-based methods. It is also verified that the proposed scheme extends the elapsed time before the first occurrence of migration after resource reduction 1.1~2.3-fold. In addition, changes in migration frequency and VM utilization are analyzed with varying acceptable migration probabilities and the consistency of resource demand patterns. It is expected that the analysis results can help service providers choose a right value of the acceptable migration probability under various environments having different migration costs and operational costs.