• Title/Summary/Keyword: Cloud services

Search Result 1,010, Processing Time 0.031 seconds

A Method for Service Evaluation Based on Fuzzy Theory for Cloud Computing

  • Guo, Liangmin;Luo, Yonglong;He, Xiaokang;Hu, Guiyin;Dong, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.1820-1840
    • /
    • 2017
  • Aiming at the phenomenon of false information issued by service providers in cloud computing environment, a method for service evaluation based on fuzzy theory is put forward in this paper. According to the quality of services provided by cloud service providers and their behavior during interactions, a trust relationship between cloud service providers and cloud service consumers is established, which can be quantified by using fuzzy theory. The quality of services is evaluated by drawing on the trust relationship. In our method, the recommendation credibility of a cloud service consumer is determined through behavior similarity with evaluators and a praise factor. The introduction of the praise factor better suits the phenomenon of a high-quality service getting more repeat customers. The negative impact of dishonest customers is reduced, and the accuracy of trust and cloud service quality evaluation is improved by introducing a confidence factor that can be dynamically adjusted. The experimental results show that our method can effectively and accurately evaluate the trust value and service quality of providers, while weakening the influence of dishonest consumers, and quickly detect dishonest service providers. This is beneficial for consumers trying to find high quality service providers for similar services.

Two Factor Authentication for Cloud Computing

  • Lee, Shirly;Ong, Ivy;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.427-432
    • /
    • 2010
  • The fast-emerging of cloud computing technology today has sufficiently benefited its wide range of users from individuals to large organizations. It carries an attractive characteristic by renting myriad virtual storages, computing resources and platform for users to manipulate their data or utilize the processing resources conveniently over Internet without the need to know the exact underlying infrastructure which is resided remotely at cloud servers. However due to the loss of direct control over the systems/applications, users are concerned about the risks of cloud services if it is truly secured. In the literature, there are cases where attackers masquerade as cloud users, illegally access to their accounts, by stealing the static login password or breaking the poor authentication gate. In this paper, we propose a two-factor authentication framework to enforce cloud services' authentication process, which are Public Key Infrastructure (PKI) authentication and mobile out-of-band (OOB) authentication. We discuss the framework's security analysis in later session and conclude that it is robust to phishing and replay attacks, prohibiting fraud users from accessing to the cloud services.

A Study on Decision Making Factors of Cloud Computing Adoption Using BCOR Approach (BCOR 접근법을 이용한 클라우드 컴퓨팅 도입의 의사결정 요인에 관한 연구)

  • Lee, Young-Chan;Hanh, Tang Nguyen
    • Journal of Information Technology Services
    • /
    • v.11 no.1
    • /
    • pp.155-171
    • /
    • 2012
  • With the continuous and outstanding development of information technology(IT), human being is coming to the new computing era which is called cloud computing. This era brings lots of huge benefits also at the same time release the resources of IT infrastructure and data boom for man. In the future no longer, most of IT service providers, enterprises, organizations and systems will adopt this new computing model. There are three main deployment models in cloud computing including public cloud, private cloud and hybrid cloud; each one also has its own cons and pros. While implementing any kind of cloud services, customers have to choose one of three above deployment models. Thus, our paper aims to represent a practical framework to help the adopter select which one will be the best suitable deployment model for their requirements by evaluating each model comprehensively. The framework is built by applying the analytic hierarchy process(AHP), namely benefit-cost-opportunity-risk(BCOR) model as a powerful and effective tool to serve the problem. The gained results hope not only to provide useful information for the readers but also to contribute valuable knowledge to this new area. In addition, it might support the practitioners' effective decision making process in case they meet the same issue and have a positive influence on the increase of right decision for the organization.

Exploring Working Group's Psychological Subjectivity on Public Smart Work Services in a Cloud-based Social Networking

  • Kim, Ki Youn;Song, In Kuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4748-4762
    • /
    • 2020
  • Recently, the COVID 19 pandemic has affected on our daily lives and society in many ways. Specifically, it has brought rapid changes in the working environment from office working to smart telecommuting. In addition, cloud computing technology and services not only provided ubiquitous access, but also led to a sharing of information, internal-external communication channels, telework, and innovative smart work for the business process. As a result, smart work services based on social cloud networking have spread to the public sector. However, existing academic research examining smart work merely remains to focus on the theoretical conceptualization or to deal with merely several examples of private views. Best practices of smart work services based on cloud computing technology in the public field rarely exists. Moreover, many studies have been differently measured the values of smart work for private and public sectors depending on organizational singularities. Therefore, the study aims to define new theoretical implications and to explore future business strategies and policy directions based on a technical working group's personal psychological subjectivity. The research applied Q methodology, and selected five public organizations in Korea, that they have adopted or currently plan to adopt some part of smart work services.

A Study of Factors Affecting the Adoption of Cloud Computing (기업의 Cloud Computing 서비스 도입의도에 영향을 미치는 Cloud Computing 특성 요인에 관한 연구)

  • Kim, Dong-Ho;Lee, Jung-Hoon;Park, Yang-Pyo
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.1
    • /
    • pp.111-136
    • /
    • 2012
  • The global recession has made it more difficult for companies to invest in IT, and they are increasingly aware of the environmental costs of so doing. In these circumstances, cloud computing has emerged as a new paradigm in the business IT sector. Governments, institutes and companies around the world, as well as specifically in Korea since 2009, have turned to this model of providing IT resources. This study is concerned to identify those characteristics of cloud computing that affect its introduction on a company's part; it offers a theoretical framework describing cloud services and seeks to establish causal linkages between antecedent factors and a company's introduction and application of this form of IT provision. The features of cloud computing in particular contexts that the study selected for analysis were its scalability, speed, security, potential compatibility with existing services, efficiency, economic feasibility, dependency and credibility. The study thus related these to whether or not cloud computing was adopted, verifying adjustment effects for cloud services. On the basis of a survey of enterprise IT decision-makers, it emerged through a statistical analysis of correlations that cloud computing's efficiency, economic feasibility and credibility had an effect on its introduction. This study's results should be of use to vendors and potential purchasers of cloud computing services. It is one of the first pieces of research on cloud computing from the customer perspective, based on the perceived characteristics of cloud services as they are seen and valued by users.

A Study on the Architecture of Cloud Hospital Information System for Small and Medium Sized Hospitals (중소형 병원의 클라우드 병원정보시스템 서비스 체계에 관한 연구)

  • Lee, Nan Kyung;Lee, Jong Ok
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.89-112
    • /
    • 2015
  • Recently, the business environment of healthcare has changed rapidly due to the entering the mobile era, the intensifying global competition, and the explosion of healthcare needs. Despite of necessity in expanding new IT-based medical services and investing IT resources to respond environmental changes, the small and medium sized hospitals could not realize these requirements due to the limited management resources. CHISSMH is designed and presented in this research to provide high valued clouding medical services with reasonable price. CHISMH is designed and presented in this research to provide high valued medical services with reasonable price through cloud computing. CHISME is designed to maximize resource pooling and sharing through the visualization. By doing so, Cloud Service provider could minimize maintenance cost of cloud data center, provide high level services with reasonable pay-per-use price. By doing so, Cloud Service provider could minimize maintenance cost of cloud data center, and could provide high level services with reasonable pay-per-use price. CHISME is expected to be base framework of cloud HIS services and be diffusion factor of cloud HIS services Operational experience in CHISSMH with 15 hospitals is analyzed and presented as well.

How to Manage Cloud Risks Based on the BMIS Model

  • Song, Youjin;Pang, Yasheng
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.132-144
    • /
    • 2014
  • Information always comes with security and risk problems. There is the saying that, "The tall tree catches much wind," and the risks from cloud services will absolutely be more varied and more severe. Nowadays, handling these risks is no longer just a technology problem. So far, a good deal of literature that focuses on risk or security management and frameworks in information systems has already been submitted. This paper analyzes the causal risk factors in cloud environments through critical success factors, from a business perspective. We then integrated these critical success factors into a business model for information security by mapping out 10 principles related to cloud risks. Thus, we were able to figure out which aspects should be given more consideration in the actual transactions of cloud services, and were able to make a business-level and general-risk control model for cloud computing.

A Design of Interdependent Multi Session Authentication Scheme for Secure Cloud Service (안전한 클라우드 서비스를 위한 상호의존적 다중세션 인증 기법 설계)

  • Song, Jun Ho;Choi, Do Hyun;Park, Jung Oh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.181-196
    • /
    • 2014
  • Cloud computer technology currently provides diverse services based on a comprehensive environment ranging from hardware to solution, network and service. While the target of services has been extended from institutions and corporations to personal infrastructure and issues were made about security problems involved with protection of private information, measures on additional security demands for such service characteristics are insufficient. This paper proposes a multi-session authentication technique based on the characteristics of SaaS (Software as a Service) among cloud services. With no reliable authentication authority, the proposed technique reinforced communication sessions by performing key agreement protocol safe against key exposure and multi-channel session authentication, providing high efficiency of performance through key renewal using optimzied key table. Each formed sessions have resistance against deprivation of individual confirmation and service authority. Suggested confirmation technique that uses these features is expected to provide safe computing service in clouding environment.

The Method of Data Synchronization Among Devices for Personal Cloud Services (퍼스널 클라우드 서비스를 위한 임의의 단말간 컨텐츠 동기화 방법)

  • Choi, Eunjeong;Lee, Jeunwoo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.6 no.6
    • /
    • pp.377-382
    • /
    • 2011
  • This paper describes the method of data synchronization among devices for personal cloud services. Existing data synchronization for mobile devices is based on a central server to mobile devices or a PC to a mobile device. However, the purpose of this paper is to share user data in heterogeneous environments, without depending on central server. This technology can be applied to synchronize personal data between a device and a personal cloud storage for personal cloud services. The ad hoc synchronization needs a sync agent service discovery module, a user authentication module, a network adapter, and an application data synchronization module. The method described in this paper is better than existing synchronization technology based on client-server in availability, performance, scalability quality attributes.

A Novel Architecture for Mobile Crowd and Cloud computing for Health care

  • kumar, Rethina;Ganapathy, Gopinath;Kang, Jeong-Jin
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.226-232
    • /
    • 2018
  • The rapid pace of growth in internet usage and rich mobile applications and with the advantage of incredible usage of internet enabled mobile devices the Green Mobile Crowd Computing will be the suitable area to research combining with cloud services architecture. Our proposed Framework will deploy the eHealth among various health care sectors and pave a way to create a Green Mobile Application to provide a better and secured way to access the Products/ Information/ Knowledge, eHealth services, experts / doctors globally. This green mobile crowd computing and cloud architecture for healthcare information systems are expected to lower costs, improve efficiency and reduce error by also providing better consumer care and service with great transparency to the patient universally in the field of medical health information technology. Here we introduced novel architecture to use of cloud services with crowd sourcing.