• Title/Summary/Keyword: Cloud applications

Search Result 483, Processing Time 0.026 seconds

Vehicular Cyber-Physical Systems for Smart Road Networks

  • Jeong, Jaehoon Paul;Lee, Eunseok
    • Information and Communications Magazine
    • /
    • v.31 no.3
    • /
    • pp.103-116
    • /
    • 2014
  • This paper proposes the design of Vehicular Cyber-Physical Systems (called VCPS) based on vehicular cloud for smart road networks. Our VCPS realizes mobile cloud computing services where vehicles themselves or mobile devices (e.g., smartphones and tablets of drivers or passengers in vehicles) play a role of both cloud server and cloud client in the vehicular cloud. First, this paper describes the architecture of vehicular networks for VCPS and the delay modeling for the event prediction and data delivery, such as a mobile node's travel delay along its navigation path and the packet delivery delay in vehicular networks. Second, the paper explains two VCPS applications as smart road services for the driving efficiency and safety through the vehicular cloud, such as interactive navigation and pedestrian protection. Last, the paper discusses further research issues for VCPS for smart road networks.

Cloud computing for handling data from traffic sensing technologies and on-board diagnostics

  • Nkenyereye, Lionel;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.488-491
    • /
    • 2014
  • Based on a complete understanding research in Information and Communication Technologies (ICT), the Intelligent Transport Systems rapidly build up innovative applications to ensure real time attainment as well remote management of driven information, provide a huge range of services and involve many actors in automotive ecosystem. In this paper, we present an intelligent cloud computing for handling data received from traffic sensing technologies. Transportations technologies applied in ITS have played a great role in collecting data from devices deployed in vehicles and highway infrastructures utilizing broadband wireless technologies to the Cloud. In order to facilitate the interested in automotive industry to use data collected and afford services to the car's owner, a scalable acquisition, access to computing resources and offered services are the primary goal of the proposed cloud computing.

  • PDF

Energy Efficient Software Development Techniques for Cloud based Applications

  • Aeshah A. Alsayyah;Shakeel Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.119-130
    • /
    • 2023
  • Worldwide organizations use the benefits offered by Cloud Computing (CC) to store data, software and programs. While running hugely complicated and sophisticated software on cloud requires more energy that causes global warming and affects environment. Most of the time energy consumption is wasted and it is required to explore opportunities to reduce emission of carbon in CC environment to save energy. Many improvements can be done in regard to energy efficiency from the software perspective by considering and paying attention on the energy consumption aspects of software's that run on cloud infrastructure. The aim of the current research is to propose a framework with an additional phase called parameterized development phase to be incorporated along with the traditional Software Development Life cycle (SDLC) where the developers need to consider the suggested techniques during software implementation to utilize low energy for running software on the cloud and contribute in green computing. Experiments have been carried out and the results prove that the suggested techniques and methods has enabled in achieving energy consumption.

MS Load Balancing Algorithm in Cloud Computing

  • Ankita Gupta;Ranu Lal Chouhan
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.157-161
    • /
    • 2024
  • Cloud computing becomes an important technology for distributed computing and parallel computing. Cloud computing provides various facility like to share resources, software packages, information, storage and many different applications depending on user demand at any time and at any place. It provides an extensive measure for computing and storage. A service provided by it to user follows pay-as-you-go model. Although it provides many facilities still there is some problem which are resource discovery, fault tolerance, load balancing, and security. Out of these Load balancing is the main challenges. There are many techniques which used to distribute wor9kload or task equally across the servers. This paper includes cloud computing, cloud computing architecture, virtualization and MS load balancing technique which provide enhanced load balancing.

A study on Cloud Security based on Network Virtualization (네트워크 가상화 기반 클라우드 보안 구성에 관한 연구)

  • Sang-Beom Hong;Sung-Cheol Kim;Mi-Hwa Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • In the cloud computing environment, servers and applications can be set up within minutes, and recovery in case of fail ures has also become easier. Particularly, using virtual servers in the cloud is not only convenient but also cost-effective compared to the traditional approach of setting up physical servers just for temporary services. However, most of the und erlying networks and security systems that serve as the foundation for such servers and applications are primarily hardwa re-based, posing challenges when it comes to implementing cloud virtualization. Even within the cloud, there is a growing need for virtualization-based security and protection measures for elements like networks and security infrastructure. This paper discusses research on enhancing the security of cloud networks using network virtualization technology. I configured a secure network by leveraging virtualization technology, creating virtual servers and networks to provide various security benefits. Link virtualization and router virtualization were implemented to enhance security, utilizing the capabilities of virt ualization technology. The application of virtual firewall functionality to the configured network allowed for the isolation of the network. It is expected that based on these results, there will be a contribution towards overcoming security vulnerabil ities in the virtualized environment and proposing a management strategy for establishing a secure network.

SCHEDULE VIRTUAL MACHINES TO SUPPORT REAL-TIME SERVICES FOR U-LIFE CARE (라이프 케어 위해서 실시간 서비스를 지원하는 가상 기계 스케줄)

  • Hieu, Nguyen Trung;Abid, Hassan;Lee, Young-Koo;Lee, Sung-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06b
    • /
    • pp.17-20
    • /
    • 2011
  • This paper presents an approach for integrating u-Life care applications into the Cloud computing based on virtual resources to support real-time services and to improve quality of service (QoS) requirement. We propose an architecture for virtualization resources scheduling. The proposed is based on the concepts of Cloud computing and Wireless sensor networks. In this paper, we focus on the scheduling u-Life care applications run on the virtual machine (VM) resources in Cloud computing.

Study on Weather Modification Hybrid Rocket Experimental Design and Application (기상조절용 하이브리드 로켓의 실험 설계 및 활용연구)

  • Joo Wan Cha;Bu-Yo Kim;Miloslav Belorid;Yonghun Ro;A-Reum Ko;Sun Hee Kim;Dong-Ho Park;Ji Man Park;Hae Jung Koo;Ki-Ho Chang;Hong Hee Lee;Soojong Kim
    • Atmosphere
    • /
    • v.34 no.2
    • /
    • pp.203-216
    • /
    • 2024
  • The National Institute of Meteorological Sciences in Korea has developed the Weather Modification Hybrid Rocket (WMHR), an advanced system that offers enhanced stability and cost-effectiveness over conventional solid-fuel rockets. Designed for precise operation, the WMHR enables accurate control over the ejection altitude of pyrotechnics by modulating the quantity of oxidizer, facilitating specific cloud seeding at various atmospheric layers. Furthermore, the rate of descent for pyrotechnic devices can be adjusted by modifying parachute sizes, allowing for controlled dispersion time and concentration of seeding agents. The rocket's configuration also supports adjustments in the pyrotechnic device's capacity, permitting tailored seeding agent deployment. This innovation reflects significant technical progression and collaborations with local manufacturers, in addition to efforts to secure testing sites and address hybrid rocket production challenges. Notable outcomes of this project include the creation of a national framework for weather modification technology utilizing hybrid rockets, enhanced cloud seeding methods, and the potential for broader meteorological application of hybrid rockets beyond precipitation augmentation. An illustrative case study confirmed the WMHR's operational effectiveness, although the impact on cloud seeding was limited by unfavorable weather conditions. This experience has provided valuable insights and affirmed the system's potential for varied uses, such as weather modification and deploying high-altitude meteorological sensors. Nevertheless, the expansion of civilian weather rocket experiments in Korea faces challenges due to inadequate infrastructure and regulatory limitations, underscoring the urgent need for advancements in these areas.

A Study of Application Development Method for Improving Productivity on Cloud Native Environment (Cloud Native환경에서의 생산성 향상을 위한 어플리케이션 개발 방법 연구)

  • Kim, Jung-Bo;Kim, Jung-In
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.2
    • /
    • pp.328-342
    • /
    • 2020
  • As the cloud-based ICT(Information & Communication Technology) infrastructure matures, the existing monolithic software development method is evolving into a micro-service structure based on cloud native computing. To develop and operate the services efficiently under the cloud native environment, DevOps-based application development plans through MSA(Micro Service Architecture) design based are essential. A cloud native environment is an approach to developing and running applications that take advantage of cloud computing models such as automation of source distribution, container-based virtualization, application scalability, resource efficiency, and flexible maintenance through object independence. To implement this approach, the utilization of key elements such as DevOps, continuous delivery, micro service, and containers is essential, but there are not enough previous studies on case analyses or application methods of these key elements. Therefore, in this paper, we analyze the cases of application development in cloud native environment and propose the optimized application development process and development method through small and medium-sized SI projects.

Fine Grained Security in Cloud with Cryptographic Access Control

  • Aparna Manikonda;Nalini N
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.123-127
    • /
    • 2024
  • Cloud computing services has gained increasing popularity in recent years for supporting various on demand and scalable services for IT consumers where there is a need of less investment towards infrastructure. While storage architecture of cloud enjoys a more robust and fault-tolerant cloud computing network, such architecture also poses a number of security challenges especially when applied in applications related to social networks, Financial transactions, etc. First, as data are stored and maintained by individual virtual machines so Cloud resources are prone to hijacked. Such attacks allow attackers to create, modify and delete machine images, and change administrative passwords and settings successfully. hence, it is significantly harder to ensure data security. Second, Due to dynamic and shared nature of the Cloud, data may be compromised in many ways. Last but not least, Service hijacking may lead to redirect client to an illegitimate website. User accounts and service instances could in turn make a new base for attackers. To address the above challenges, we propose in this paper a distributed data access control scheme that is able to fulfil fine-grained access control over cloud data and is resilient against strong attacks such as compromise and user colluding. The proposed framework exploits a novel cryptographic primitive called attribute-based encryption (ABE), tailors, and adapts it for cloud computing with respect to security requirements

High Quality Network and Device Aware Multimedia Content Delivery for Mobile Cloud

  • Saleem, Muhammad;Saleem, Yasir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.4886-4907
    • /
    • 2019
  • The use of mobile devices is increasing in multimedia applications. The multimedia contents are delivered to mobile users over heterogeneous networks. Due to fluctuation in bandwidth and user mobility, the service providers are facing difficulties in providing Quality of Service (QoS) guaranteed delivery for multimedia applications. Multimedia applications depend on QoS parameters such as delay, bandwidth, and jitter to offer better user experience. The existing schemes use the single source and multisource delivery but are unable to balance between stream quality and network congestion for mobile users. We proposed a Quality Oriented Multimedia Content Delivery Scheme (QOMCDS) for the mobile cloud to deliver better quality multimedia contents for the mobile user. The multimedia contents are delivered to the mobile device based on the device's parameters and network environment. The objective video quality assessment models like Peak Signal-to-Noise Ratio (PSNR), Structural Similarity (SSIM), and Video Quality Measurement (VQM) are used to measure the quality of the video. The client side Quality of Experience metric such as Startup delay, Rebuffering events, and Bitrate switch count was used for evaluation. The proposed scheme is evaluated using dash.js and is compared to existing schemes. The results show significant improvement over existing multimedia content delivery schemes.