• 제목/요약/키워드: Cloud System

검색결과 1,903건 처리시간 0.026초

클라우드 서비스 품질·성능 관리체계의 개선방안 (Improvement of Cloud Service Quality and Performance Management System)

  • 김남주;함재춘;서광규
    • 반도체디스플레이기술학회지
    • /
    • 제20권4호
    • /
    • pp.83-88
    • /
    • 2021
  • Cloud services have become the core infrastructure of the digital economy as a basis for collecting, storing, and processing large amounts of data to trigger artificial intelligence-based services and industrial innovation. Recently, cloud services have been spotlighted as a means of responding to corporate crises and changes in the work environment in a national disaster caused by COVID-19. While the cloud is attracting attention, the speed of adoption and diffusion of cloud services is not being actively carried out due to the lack of trust among users and uncertainty about security, performance, and cost. This study compares and analyzes the "Cloud Service Quality and Performance Management System" and the "Cloud Service Certification System" and suggests complementary points and improvement measures for the cloud service quality and performance management system.

이종 분산 클라우드 서비스 브로커리지 환경에서의 사용자 통합 인증 시스템 설계 (Design of User Integrated Authentication System in Heterogeneous Distributed Cloud Service Brokerage Environment)

  • 이대성
    • 한국정보통신학회논문지
    • /
    • 제20권11호
    • /
    • pp.2061-2066
    • /
    • 2016
  • 현재 클라우드 시스템은 사업자가 각자의 방식으로 클라우드 환경을 구축함에 따라 클라우드 시스템 간 상호운용성이 떨어져 호환이 되지 않는다. 예를 들어 Google 클라우드를 사용하는 사용자는 별도의 추가적인 로그인하는 과정을 거치지 않으면 MS(마이크로소프트) 클라우드 시스템을 사용할 수 없다. Google 클라우드 사용자가 MS 클라우드 서비스를 이용하기 위해 Google 클라우드 시스템 로그아웃 이후 다시 MS 클라우드에 로그인 하는 과정을 거쳐야 한다. 이러한 문제를 해결하기 위해 CSB(Cloud Service Broker) 기술이 등장하여 클라우드 시스템간의 상호 호환 문제를 해결하고 있으나, 아직도 많은 연구와 개발이 필요한 실정이다. 본 연구에서는 이종 분산 클라우드 환경의 서비스 중재 기술로 등장하고 있는 CSB(Cloud Service Broker) 기술 중에서 클라우드 사용자의 상호운용성의 근본적인 해결 과제인 사용자 통합 인증 시스템을 설계한다.

System Access Control Technique for Secure Cloud Computing

  • Jang, Eun-Gyeom
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권8호
    • /
    • pp.67-76
    • /
    • 2019
  • Along with the diversification of digital content services using wired/wireless networks, the market for the construction of base systems is growing rapidly. Cloud computing services are recognized for a reasonable cost of service and superior system operations. Cloud computing is convenient as far as system construction and maintenance are concerned; however, owing to the security risks associated with the system construction of actual cloud computing service, the ICT(Information and Communications Technologies) market is lacking regardless of its many advantages. In this paper, we conducted an experiment on a cloud computing security enhancement model to strengthen the security aspect of cloud computing and provide convenient services to the users. The objective of this study is to provide secure services for system operation and management while providing convenient services to the users. For secure and convenient cloud computing, a single sign-on (SSO) technique and a system access control technique are proposed. For user authentication using SSO, a security level is established for each user to facilitate the access to the system, thereby designing the system in such a manner that the rights to access resources of the accessed system are not abused. Furthermore, using a user authentication ticket, various systems can be accessed without a reauthorization process. Applying the security technique to protect the entire process of requesting, issuing, and using a ticket against external security threats, the proposed technique facilitates secure cloud computing service.

Cloud-based Healthcare data management Framework

  • Sha M, Mohemmed;Rahamathulla, Mohamudha Parveen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권3호
    • /
    • pp.1014-1025
    • /
    • 2020
  • Cloud computing services changed the way the data are managed across the healthcare system that can improve patient care. Currently, most healthcare organizations are using cloud-based applications and related services to deliver better healthcare facilities. But architecting a cloud-based healthcare system needs deep knowledge about the working nature of these services and the requirements of the healthcare environment. The success is based on the usage of appropriate cloud services in the architecture to manage the data flow across the healthcare system.Cloud service providers offer a wide variety of services to ingest, store and process healthcare data securely. The top three public cloud providers- Amazon, Google, and Microsoft offers advanced cloud services for the solution that the healthcare industry is looking for. This article proposes a framework that can effectively utilize cloud services to handle the data flow among the various stages of the healthcare infrastructure. The useful cloud services for ingesting, storing and analyzing the healthcare data for the proposed framework, from the top three cloud providers are listed in this work. Finally, a cloud-based healthcare architecture using Amazon Cloud Services is constructed for reference.

클라우드 서비스 브로커 인증 기술에 관한 연구 (A Study on Authentication Technology of Cloud Service Broker)

  • 이대성
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2016년도 추계학술대회
    • /
    • pp.321-323
    • /
    • 2016
  • 현재 클라우드 시스템은 사업자가 각자의 방식으로 클라우드 환경을 구축함에 따라 클라우드 시스템 간 상호 운용성이 떨어져 호환이 되지 않는다. 예를 들어 Google 클라우드 시스템을 사용하는 사용자는 MS(마이크로소프트) 클라우드 시스템을 사용할 수 없다. 이러한 문제를 해결하기 위해 CSB(Cloud Service Broker) 기술이 등장하여 클라우드 시스템간의 상호 호환 문제를 해결하고 있으나, 아직도 많은 연구와 개발이 필요한 실정이다. 본 연구에서는 이종 분산 클라우드 환경의 서비스 중재 기술로 등장하고 있는 CSB(Cloud Service Broker) 기술 중에서 클라우드 사용자의 상호운용성의 근본적인 해결 과제인 인증 시스템에 관해 연구한다.

  • PDF

Cloud and Fog Computing Amalgamation for Data Agitation and Guard Intensification in Health Care Applications

  • L. Arulmozhiselvan;E. Uma
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권3호
    • /
    • pp.685-703
    • /
    • 2024
  • Cloud computing provides each consumer with a large-scale computing tool. Different Cyber Attacks can potentially target cloud computing systems, as most cloud computing systems offer services to many people who are not known to be trustworthy. Therefore, to protect that Virtual Machine from threats, a cloud computing system must incorporate some security monitoring framework. There is a tradeoff between the security level of the security system and the performance of the system in this scenario. If strong security is needed, then the service of stronger security using more rules or patterns is provided, since it needs much more computing resources. A new way of security system is introduced in this work in cloud environments to the VM on account of resources allocated to customers are ease. The main spike of Fog computing is part of the cloud server's work in the ongoing study tells the step-by-step cloud server to change the tremendous measurement of information because the endeavor apps are relocated to the cloud to keep the framework cost. The cloud server is devouring and changing a huge measure of information step by step to reduce complications. The Medical Data Health-Care (MDHC) records are stored in Cloud datacenters and Fog layer based on the guard intensity and the key is provoked for ingress the file. The monitoring center sustains the Activity Log, Risk Table, and Health Records. Cloud computing and Fog computing were combined in this paper to review data movement and safe information about MDHC.

A Design of P2P Cloud System Using The Super P2P

  • Jung, Yean-Woo;Cho, Seongsoo;Lee, Jong-Yong;Jeong, KyeDong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제7권1호
    • /
    • pp.42-48
    • /
    • 2015
  • Generally, the current commercial cloud system is hosted by the centralization large datacenter. However, the other clouding forms existed and one of them is the P2P cloud. The P2P Cloud is a distributed systems, is freedom to join and leave and is possible to provide the IaaS. Commonly, P2P Cloud System is based on Pure-P2P System. Since a number of connection paths exist, it has a high reliability and easily scalability of the network. However, there are disadvantages of the slow rate of route because of looking up the all peers in order to search for the peer. In this paper, it proposes the P2P cloud system based on super-peer P2P. Super-peer P2P system has fast routing time, because of searching for cluster unit and it also can has high reliability and high scalability. We designs the super Peer cloud service and proposes the system model and Resource Allocation Algorithm for IaaS in Super peer P2P environment.

개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구 (Personal Information Management System (PIMS) improvement research using cloud computing security)

  • 정혜인;김성준
    • 디지털산업정보학회논문지
    • /
    • 제12권3호
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.

A Design of Cooperation Coordinator using Band-Cloud

  • Min, Seongwon;Lee, Jong-Yong;Jung, Kye-Dong
    • International Journal of Advanced Culture Technology
    • /
    • 제5권2호
    • /
    • pp.90-97
    • /
    • 2017
  • The Internet of Things(IoT) market is expected to grow from 15.5billion to 75.4 billion by 2015-2025. As the number of IoT devices increases, the amount of data that is sent to the cloud is increasing. Today's Cloud Computing models are not suited to handle the vast amount of data generated by IoT devices. In this paper, we propose a Cooperation Coordinator System that reduces server load and improved real-time processing capability under specific circumstances by using Band-Cloud. The cooperation coordinator system dynamically forms the cloud when cooperation is needed between mobile devices located near. It is called Band-Cloud. Band-Cloud provides services entrusted by Central Cloud. This paper describes the proposed system and shows the cooperation process using the Android-based mobile devices and Wi-Fi Direct technology. Such a system can be applied to cases where real-time processing is required in a narrow area such as a hospital ward or a school classroom.

Building a Private Cloud-Computing System for Greenhouse Control

  • Kim, JoonYong;Lee, Chun Gu;Park, Dong-Hyeok;Park, Heun Dong;Rhee, Joong-Yong
    • Journal of Biosystems Engineering
    • /
    • 제43권4호
    • /
    • pp.440-444
    • /
    • 2018
  • Purpose: Cloud-computing technology has several advantages, including maintenance, management, accessibility, and computing power. A greenhouse-control system utilizing these advantages was developed using a private cloud-computing system. Methods: A private cloud needs a collection of servers and a suite of software tools to monitor and control cloud-computing resources. In this study, a server farm, operated by OpenStack as a cloud platform, was constructed using servers, and other network devices. Results: The greenhouse-control system was developed according to the fundamental cloud service models: infrastructure as a service, platform as a service, and software as a service. This system has four additional advantages - security, control function, public data use, and data exchange. There are several considerations that must be addressed, such as service level agreement, data ownership, security, and the differences between users. Conclusions: When the advantages are utilized and the considerations are addressed, cloud-computing technology will be beneficial for agricultural use.