• Title/Summary/Keyword: Cloud computing service

Search Result 777, Processing Time 0.029 seconds

An Exploratory Study on the Cloud Computing Services: Issues and Suggestion for The Success

  • Lee, Jong Un;Seo, Kyung Jin;Kim, Hee-Woong
    • Asia pacific journal of information systems
    • /
    • v.24 no.4
    • /
    • pp.473-491
    • /
    • 2014
  • There is a growing interest for 'Cloud computing' to cut costs, and help the users focus on their core business instead of being impeded by IT obstacles. As it became IT version 3.0 which represents the era of cloud services and the dominance of a new kind of IT service provider, cloud service providers (CSPs)' role is more critical as a trusted IT advisor to include cloud migration and integration expertise. However, previous literatures related to cloud computing service have mainly analyzed from customers, although it is hard for customers to totally understand the complex and diverse cloud ecosystem. Therefore, it is an urgent task to mitigate the inhibitory factors in providing the cloud services for activating cloud industry. This study, an exploratory research based on interviews, has derived factors of promoting and hindering the activation of cloud computing from the provider's perspective, and has analyzed a sequence of cause and effect for each factor. For this, the casual loop diagram was developed to deduce key issues, and propose an alternative. The results of this study are expected to help activate 'Cloud computing' in Korea by minimizing the potential negative effects of activating 'Cloud computing' industry.

A Study on the Factors Affecting the Adoption of Cloud Computing Service:Focused on the Technology Acceptance Model(TAM) and Resistance (개인사용자 중심의 클라우드서비스의 수용에 영향을 미치는 요인에 관한 연구:기술수용모형(TAM)과 저항을 중심으로)

  • Park, Yoonseo;Kim, Yongsik
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.1-23
    • /
    • 2013
  • This study examines whether key characteristics of cloud computing services would affect the intention of use for personalized cloud computing services. The research model was generated based on Technology Acceptance Model (TAM) with resistance variable, and verified statistically by undertaking a survey about the perception of personal users. As the results of this analysis, we could find the structural relationship among the factors affecting adoption of the cloud computing service. We found that the expectation of ubiquity as a representative function of the cloud computing service meaningfully affected the perceived ease of use and resistance, and that the relativeness with existing services also meaningfully affected the perceived ease of use, but not the resistance. In addition, the moderating effects of use experience in the path leading from the perceived ease of use and resistance to the intention of use were identified. This study will provide diverse implications for the companies providing personalized cloud computing services.

A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion (Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1041-1051
    • /
    • 2012
  • Attack on Cloud Computing, an intensive service solution using network infrastructure recently released, generates service breakdown or intrusive incidents incapacitating developmental platforms, web-based software, or resource services. Therefore, it is needed to conduct research on security for the operational information of three kinds of services (3S': laaS, PaaS, SaaS) supported by the Cloud Computing system and also generated data from the illegal attack on service blocking. This paper aims to build a system providing optimal services as a 4-stage defensive method through the test on the attack and defense of Cloud Computing services. It is a defense policy that conducts 4-stage, orderly and phased access control as follows: controlling the initial access to the network, controlling virtualization services, classifying services for support, and selecting multiple routes. By dispersing the attacks and also monitoring and analyzing to control the access by stage, this study performs defense policy realization and analysis and tests defenses by the types of attack. The research findings will be provided as practical foundational data to realize Cloud Computing service-based defense policy.

Analysis of Cloud Service Providers

  • Lee, Yo-Seob
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.315-320
    • /
    • 2021
  • Currently, cloud computing is being used as a technology that greatly changes the IT field. For many businesses, many cloud services are available in the form of custom, reliable, and cost-effective web applications. Most cloud service providers provide functions such as IoT, machine learning, AI services, blockchain, AR & VR, mobile services, and containers in addition to basic cloud services that support the scalability of processors, memory, and storage. In this paper, we will look at the most used cloud service providers and compare the services provided by the cloud service providers.

Service Oriented Cloud Computing Trusted Evaluation Model

  • Jiao, Hongqiang;Wang, Xinxin;Ding, Wanning
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1281-1292
    • /
    • 2020
  • More and more cloud computing services are being applied in various fields; however, it is difficult for users and cloud computing service platforms to establish trust among each other. The trust value cannot be measured accurately or effectively. To solve this problem, we design a service-oriented cloud trust assessment model using a cloud model. We also design a subjective preference weight allocation (SPWA) algorithm. A flexible weight model is advanced by combining SPWA with the entropy method. Aiming at the fuzziness and subjectivity of trust, the cloud model is used to measure the trust value of various cloud computing services. The SPWA algorithm is used to integrate each evaluation result to obtain the trust evaluation value of the entire cloud service provider.

A Study on the Effect of Mobile Cloud Computing Services Characteristics on the Intellectual Convergence and the Performance Expectancy in Construction Project: From the Perspective of the Social Capital (건설프로젝트에서 Mobile-Cloud Computing Service 특성이 정보융합과 기대성과에 미치는 영향에 관한 연구: 사회적 자본의 관점에서)

  • Kim, Youngwoo;Oh, Jay In
    • The Journal of Bigdata
    • /
    • v.4 no.1
    • /
    • pp.129-142
    • /
    • 2019
  • Construction projects have experienced many failures due to incomplete production environments. Thus, the purpose of this study is to use ICT resources leased during the construction period at the construction site and to introduce the Mobile Cloud Computing Service, which utilizes Cloud Computing Service and mobile devices such as smart phones, tablet PCs, and notebooks instead of physically wired communication networks. The characteristics of Mobile Cloud, such as rapid accuracy, shared collaboration, and ubiquity, will affect the social network among various construction site participants. we conducted empirical research on the introduction of Mobile Cloud to promote information exchange and convergence among the participants and mutual trust, ultimately improving the project performance.

  • PDF

An Exploratory Study on the Derivation of Characteristics of Personal Cloud Computing (개인용 클라우드 컴퓨팅의 특성 도출에 관한 탐색적 연구)

  • Moon, Hye Young;Ryu, Jae Hong;Choi, Jinho
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.2
    • /
    • pp.57-68
    • /
    • 2013
  • Recently, cloud computing has been viewed as a technology of great influence. Despite the importance of personal cloud services, the majority of cloud computing studies has been focused on an enterprise level. Therefore, in this research, we list variables of personal cloud computing characteristics (accessibility, storage, trust, perceived ease of use, availability) from preceding research done on an enterprise level. So, through pilot testing, we analyze whether examined characteristic variables affect the intention to use personal cloud computing. Next, we investigate the relevancy between user characteristics, including gender, age, and occupation, and the usage rate of personal cloud computing. Lastly, we implement an analysis of variance in order to speculate whether there is any difference between the five characteristic variables in using personal cloud computing between cloud service enterprises. For empirical testing people with experience in personal cloud computing are surveyed. Frequency analysis, exploratory factor analysis, internal consistency analysis, T-test, ANOVA, and multiple regression analysis are implemented with 325 valid samples. The analysis results are as follows: First, among user characteristic variables, 'occupation' shows a significant relationship with cloud service usage, Second, between cloud service enterprises, all five characteristic variables of 'Naver N Drive' are thoroughly evaluated and 'Google Drive' receives a high evaluation in availability and accessibility. Third and finally, all of the selected characteristic variables affect the intention to use personal cloud computing. However, availability is identified to be the most important factor. This research will serve as a reference to enterprises for the practical implementation of personal cloud computing service.

Analyzing the Challenges for Cloud Computing Business Dissemination in the Service Provider's Perspective (클라우드 컴퓨팅 시장 확산을 위한 공급자 관점의 선결요인)

  • Park, Soo Kyung;Cho, Ji Yeon;Lee, Bong Gyou
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.99-116
    • /
    • 2015
  • The concept of Cloud computing has been introduced in the IT field over 10 years and industry has been expanding constantly. However, compare to the maturity of global market, Korea cloud computing industry is only in the early stage. Even the Korea has advantages in technology infrastructure; the pace of Korea cloud computing market growth is taking a serious downturn. Under these circumstances, it is needed to be discussing that strategy for expanding the cloud computing market size and for sustaining global competitiveness of local companies. Previous studies on plans for Korea cloud computing market has been conducted since 2009 and most of them are tend to examined in demand perspective. Thus, this study aims at identifying the priority of business challenges for making better performance in the market with service provider aspects. To analyze the important factors in the providing cloud computing service, ANP methodology was applied in this study. The network model including five clusters, security, stability, performance, consumer, and institution, was defined through literature review and expert survey was conducted to collect data. As a result of ANP analysis, 'Securing service reliability' was analyzed as the most important factor and followed by 'Preparing the range of legal liability', 'Preventing personal information leakage' and 'Preventing confidential information data leakage.' The priority of result indicates that service provider needs to focus on to make the secured service environment. This study has significance on analyzing the priority of business challenges in the service provider perspective. This study will provide useful guidelines to for establishing strategies in cloud computing market.

Analysis of K-Defense Cloud Computing Service Availability Considering of Cloud Computing Traffic Growth (클라우드 컴퓨팅 트래픽 증가를 고려한 국방 클라우드 컴퓨팅 서비스 가용성 분석)

  • Lee, Sung-Tae;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.93-100
    • /
    • 2013
  • In 2012, According to 'Cisco Global Cloud Index 2011-2016', the Cisco company forecasted that global data center traffic will nearly quadruple and cloud traffic will nearly sextuple by 2016. Such a rapid growing of traffic is caused by traffic inside the data center and cloud computing workloads. In 2010, the Ministry of National Defense decided to build a Mega Center including the cloud computing technology by 2014, as part of the '2012 Information Service Plan', which is now underway. One of the factors to consider is cloud computing traffic to build a Mega Center. Since the K-defense cloud computing system is built, K-defense cloud computing traffic will increase steadily. This paper, analyzed the availability of K-defense cloud computing service with the K-defense cloud computing traffic increasing using K-Defense cloud computing test system and CloudAnalyst simulation tool. Created 3 scenarios and Simulated with these scenarios, the results are derived that the availability of K-defense cloud computing test system is fulfilled, even cloud workloads are increased as muh as forecasted cloud traffic growth from now until 2016.

Building a Private Cloud-Computing System for Greenhouse Control

  • Kim, JoonYong;Lee, Chun Gu;Park, Dong-Hyeok;Park, Heun Dong;Rhee, Joong-Yong
    • Journal of Biosystems Engineering
    • /
    • v.43 no.4
    • /
    • pp.440-444
    • /
    • 2018
  • Purpose: Cloud-computing technology has several advantages, including maintenance, management, accessibility, and computing power. A greenhouse-control system utilizing these advantages was developed using a private cloud-computing system. Methods: A private cloud needs a collection of servers and a suite of software tools to monitor and control cloud-computing resources. In this study, a server farm, operated by OpenStack as a cloud platform, was constructed using servers, and other network devices. Results: The greenhouse-control system was developed according to the fundamental cloud service models: infrastructure as a service, platform as a service, and software as a service. This system has four additional advantages - security, control function, public data use, and data exchange. There are several considerations that must be addressed, such as service level agreement, data ownership, security, and the differences between users. Conclusions: When the advantages are utilized and the considerations are addressed, cloud-computing technology will be beneficial for agricultural use.