• Title, Summary, Keyword: Cloud computing

Search Result 1,389, Processing Time 0.051 seconds

The Security Establishment for Cloud Computing through CASE Study

  • Choi, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.6
    • /
    • pp.89-99
    • /
    • 2020
  • Cloud computing is rapidly increasing for achieving comfortable computing. Cloud computing has essentially security vulnerability of software and hardware. For achieving secure cloud computing, the vulnerabilities of cloud computing could be analyzed in a various and systematic approach from perspective of the service designer, service operator, the designer of cloud security and certifiers of cloud systems. The paper investigates the vulnerabilities and security controls from the perspective of administration, and systems. For achieving the secure operation of cloud computing, this paper analyzes technological security vulnerability, operational weakness and the security issues in an enterprise. Based on analysis, the paper suggests secure establishments for cloud computing.

Analyzing Factors Affecting the Adoption of Cloud Computing: A Case of Turkey

  • Akar, Ezgi;Mardiyan, Sona
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.18-37
    • /
    • 2016
  • Cloud computing is an upcoming technology and emerging concept in the field of information technologies. Companies have begun to invest in cloud computing with the expectation that it will improve their business performances, operations, and processes. However, many companies are not so much aware of the cloud computing, so they can hesitate to adopt this new technology. The aims of the study are analyzing factors affecting the adoption of cloud computing and applying structural equation modeling technique to analyze the important dimensions of the adoption. Concordantly, previous studies are examined and expert interviews are arranged. Based on both our literature review and expert interviews, a model is proposed to measure the adoption of cloud computing. It is obvious that there are scarce researches about cloud computing adoption in the literature. Thus, the originality of the paper lies on that it proposes a research model for cloud computing adoption and it investigates various dimensions of cloud computing adoption in detail.

Personal Information Management System (PIMS) improvement research using cloud computing security (개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구)

  • Jeong, Hyein;Kim, Seongjun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.55-61
    • /
    • 2017
  • Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.

An Analysis of Economic Effects of The Cloud Computing Industry (산업연관분석을 이용한 클라우드 컴퓨팅 산업의 경제적 파급효과 분석)

  • Kim, Dong Wook;Ban, Seung Hyun;Leem, Choon Seong
    • Journal of Information Technology Services
    • /
    • v.17 no.3
    • /
    • pp.37-51
    • /
    • 2018
  • Recently, cloud computing market is growing geometrically in both private and public area, and many global companies in various domains have developed and provided cloud computing services. In such situation, Korean government made multiple plans for domestic cloud computing industry. However, most research institutes have focused on market size and status information, which makes actual effectiveness of cloud computing service hard to recognize. In this study, we define cloud computing Industry by rearranging Input-Output table published by the Bank of Korea to use Input-Output Analysis. The Input-Output Analysis was devised in 1963 by Leontief and it is used in many fields of study until now. It produces various coefficients that are able to identify production-inducing effect, value-added effect, labor-inducing effect, front and rear chain effect. The analysis results show that production-inducing effect, front and rear chain effect of cloud computing industry is low compared to other industries. However, cloud computing Industry possesses relatively high value-added effect and labor-inducing effect. It is because industry magnitude of cloud computing is smaller than other industries such as manufacturing, chemical industries. The economic effects of the cloud computing industry are not remarkable, but this result is significant to emerging markets and industries and presents the fresh way of analyzing cloud computing research field.

Issues and Suggestions for "Act on the Development of Cloud Computing" and Protection of its Users ("클라우드컴퓨팅 발전 및 이용자 보호에 관한 법률"의 쟁점 및 개선방안)

  • Lee, Jung Koo;Min, Daihwan;Kwon, Hun Yeong
    • Journal of Information Technology Applications and Management
    • /
    • v.24 no.1
    • /
    • pp.81-91
    • /
    • 2017
  • In Korea, "Act on the Development of Cloud Computing and Protection of its Users" has been enforced since September 28, 2015. Many countries implemented 'Cloud First' policies and global companies such as Amazon, Microsoft, IBM started cloud services in Korea. Under these circumstance, the Act was established for developing the cloud computing industry. The Act includes clauses for encouraging the use of private cloud computing by public organizations, supporting small- and medium-size cloud service providers, and utilizing secure cloud computing services by users. However, some terms appear to be similar but have different meanings from "Act on Promotion of Information and Communications Network Utilization and Information Protection, etc." and "Personal Information Protection Act". This generated some confusion and conflicts in relation to providing user information to a 3rd party and notifying the intrusion in the Cloud Computing Act. This paper discusses these issues and suggestions for revision of the Cloud Computing Act.

Analysis of K-Defense Cloud Computing Service Availability Considering of Cloud Computing Traffic Growth (클라우드 컴퓨팅 트래픽 증가를 고려한 국방 클라우드 컴퓨팅 서비스 가용성 분석)

  • Lee, Sung-Tae;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.93-100
    • /
    • 2013
  • In 2012, According to 'Cisco Global Cloud Index 2011-2016', the Cisco company forecasted that global data center traffic will nearly quadruple and cloud traffic will nearly sextuple by 2016. Such a rapid growing of traffic is caused by traffic inside the data center and cloud computing workloads. In 2010, the Ministry of National Defense decided to build a Mega Center including the cloud computing technology by 2014, as part of the '2012 Information Service Plan', which is now underway. One of the factors to consider is cloud computing traffic to build a Mega Center. Since the K-defense cloud computing system is built, K-defense cloud computing traffic will increase steadily. This paper, analyzed the availability of K-defense cloud computing service with the K-defense cloud computing traffic increasing using K-Defense cloud computing test system and CloudAnalyst simulation tool. Created 3 scenarios and Simulated with these scenarios, the results are derived that the availability of K-defense cloud computing test system is fulfilled, even cloud workloads are increased as muh as forecasted cloud traffic growth from now until 2016.

A Comparative Study For Mobile Cloud Computing Environment (모바일 클라우드 컴퓨팅 환경의 비교 연구)

  • Jang, Rae-Young;Jung, Sung-Jae;Bae, Yu-Mi;Sung, Kyung;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • /
    • pp.277-280
    • /
    • 2011
  • After the concept of Cloud Computing was first introduced, IT industry had focused on it. The Cloud Computing market is increasing as many major coporations have been participating in it. Now, the possibility of Mobile Cloud Computing has rising. Needless to say, the growth of Mobile Cloud Computing is explosive. Mobile industry changes its operational system from FeaturePhone to SmartPhone which are based on iPhone or Android. The number of Smart phone users in Korea exceeds 10 millions. Through this study, we will examine sorts and acctual situations of available domestic and international Mobile Cloud Computing Services in SmartPhone. Also, we will investigate the problems of current Mobile Cloud Computing and present the solutions.

  • PDF

Design and Implementation of Multi-Cloud Service Common Platform (멀티 클라우드 서비스 공통 플랫폼 설계 및 구현)

  • Kim, Sooyoung;Kim, Byoungseob;Son, Seokho;Seo, Jihoon;Kim, Yunkon;Kang, Dongjae
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.1
    • /
    • pp.75-94
    • /
    • 2021
  • The 4th industrial revolution needs a fusion of artificial intelligence, robotics, the Internet of Things (IoT), edge computing, and other technologies. For the fusion of technologies, cloud computing technology can provide flexible and high-performance computing resources so that cloud computing can be the foundation technology of new emerging services. The emerging services become a global-scale, and require much higher performance, availability, and reliability. Public cloud providers already provide global-scale services. However, their services, costs, performance, and policies are different. Enterprises/ developers to come out with a new inter-operable service are experiencing vendor lock-in problems. Therefore, multi-cloud technology that federatively resolves the limitations of single cloud providers is required. We propose a software platform, denoted as Cloud-Barista. Cloud-Barista is a multi-cloud service common platform for federating multiple clouds. It makes multiple cloud services as a single service. We explain the functional architecture of the proposed platform that consists of several frameworks, and then discuss the main design and implementation issues of each framework. To verify the feasibility of our proposal, we show a demonstration which is to create 18 virtual machines on several cloud providers, combine them as a single resource, and manage it.

Systematic Literature Review on Cloud Adoption

  • Bagiwa, Idris Lawal;Ghani, Imran;Younas, Muhammad;Bello, Mannir
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.1-22
    • /
    • 2016
  • While many organizations believe that cloud computing has the potential to reduce operational cost by abstracting capital assets like data storage center and processing systems into a readily on demand available and affordable operating expenses, still many of these organizations are not aware of the factors determining the performance of cloud computing technology. This paper provides a systematic literature review focusing on the factors determining the performance of cloud computing. In trying to come up with this review, the following sources were searched for relevant articles: ScienceDirect, Scientific.Net, ACMDigital Library, IEEE Xplore, Springer, World Scientific Journal, Wiley Online Library, Academic Search Premier (via EBSCOHost) and EdITLib (Education & Information Technology Digital Library). In first search strategy, approximately 100 keywords related to the research domain like; "Cloud Computing" and "Cloud Services" were used. In second search strategy, 65 keywords more related to the research domain were selected. In the third search strategy, the primary materials were identified and classified according to the paper types (Journal or Conference), year of publication and so on. Based on this study, twenty (20) factors were found that determine the performance of cloud computing. The IT organization needs to consider these twenty (20) factors in order to adopt cloud computing.