• Title/Summary/Keyword: Cloud-technology

Search Result 1,869, Processing Time 0.031 seconds

Services Quality Improvement through Control Management Cloud-Based SLA

  • Abel Adane
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.89-94
    • /
    • 2023
  • Cloud-based technology is used in different organizations around the world for various purposes. Using this technology, the service providers provide the service mainly SaaS, PaaS and while the cloud service consumer consumes the services by paying for the service they used or accessed by the principle of "pay per use". The customer of the services can get any services being at different places or locations using different machines or electronic devices. Under the conditions of being well organized and having all necessary infrastructures, the services can be accessed suitably. The identified problem in this study is that cloud providers control and monitor the system or tools by ignoring the calculation and consideration of various faults made from the cloud provider side during service delivery. There are currently problems with ignoring the consumer or client during the monitoring and mentoring system for cloud services consumed at the customer or client level by SLA provisions. The new framework was developed to address the above-mentioned problems. The framework was developed as a unified modeling language. Eight basic components are used to develop the framework. For this research, the researcher developed a prototype by using a selected cloud tool to simulate and java programming language to write a code as well as MySQL to store data during SLA. The researcher used different criteria to validate the developed framework i.e. to validate SLA that is concerned with a cloud service provider, validate what happened when the request from the client-side is less than what is specified in SLA and above what is specified in SLA as well as implementing the monitoring mechanism using the developed Monitoring component. The researcher observed that with the 1st and 3rd criteria the service level agreement was violated and this indicated that if the Service level agreement is monitored or managed only by cloud service prover, there is a violation of LSA. Therefore, the researcher recommended that the service level agreement be managed by both cloud service providers and service consumers in the cloud computing environment.

Service Management for Cloud Marketplace : A Case of Internet2 NET+ (클라우드 마켓플레이스를 위한 서비스 관리체계 연구 : Internet2 NET+ 사례)

  • Kwon, Suhn Beom;Ahn, Sung Mahn
    • Journal of Information Technology Services
    • /
    • v.14 no.4
    • /
    • pp.221-236
    • /
    • 2015
  • Application software is delivered to customers as a form of service at cloud environment. A cloud service provider is a marketplace between supply side (application providers) and demand side (customers). Cloud service providers have to validate applications to be included in their service portfolio. Not only performance, security, networking, compliances should be checked but also business contract, authentication should be provided. Organization customers are more sensitive to these validation criteria and process. We study the Internet2 NET+, which is a successful cloud marketplace of applications for research and education organizations. This case study shows us three things : (i) a cloud marketplace's application management process : selection, validation, transition to service, customization of applications (ii) what a cloud marketplace has for its infrastructure like authentication, security, access control etc. (iii) what a cloud marketplace has as its governance structure. This case study will provide informative analysis of Internet2 NET, a profit-making vertical and buyer's marketplace (education industry). And we will get some strategic implications for planning and implementing cloud marketplaces.

Enhanced Cloud Service Discovery for Naïve users with Ontology based Representation

  • Viji Rajendran, V;Swamynathan, S
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.38-57
    • /
    • 2016
  • Service discovery is one of the major challenges in cloud computing environment with a large number of service providers and heterogeneous services. Non-uniform naming conventions, varied types and features of services make cloud service discovery a grueling problem. With the proliferation of cloud services, it has been laborious to find services, especially from Internet-based service repositories. To address this issue, services are crawled and clustered according to their similarity. The clustered services are maintained as a catalogue in which the data published on the cloud provider's website are stored in a standard format. As there is no standard specification and a description language for cloud services, new efficient and intelligent mechanisms to discover cloud services are strongly required and desired. This paper also proposes a key-value representation to describe cloud services in a formal way and to facilitate matching between offered services and demand. Since naïve users prefer to have a query in natural language, semantic approaches are used to close the gap between the ambiguous user requirements and the service specifications. Experimental evaluation measured in terms of precision and recall of retrieved services shows that the proposed approach outperforms existing methods.

An Efficient and Secure Data Storage Scheme using ECC in Cloud Computing (클라우드 컴퓨팅에서 ECC 암호를 적용한 안전한 데이터 스토리지 스킴)

  • Yin, XiaoChun;Thiranant, Non;Lee, HoonJae
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.49-58
    • /
    • 2014
  • With the fast development of internet, cloud computing has become the most demanded technology used all over the world. Cloud computing facilitates its consumers by providing virtual resources via internet. One of the prominent services offered in cloud computing is cloud storage. The rapid growth of cloud computing also increases severe security concerns to cloud storage. In this paper, we propose a scheme which allows users not only securely store and access data in the cloud, but also share data with multiple users in a secured way via unsecured internet. We use ECC for cryptography and authentication operation which makes the scheme work in a more efficient way.

Building a Private Cloud-Computing System for Greenhouse Control

  • Kim, JoonYong;Lee, Chun Gu;Park, Dong-Hyeok;Park, Heun Dong;Rhee, Joong-Yong
    • Journal of Biosystems Engineering
    • /
    • v.43 no.4
    • /
    • pp.440-444
    • /
    • 2018
  • Purpose: Cloud-computing technology has several advantages, including maintenance, management, accessibility, and computing power. A greenhouse-control system utilizing these advantages was developed using a private cloud-computing system. Methods: A private cloud needs a collection of servers and a suite of software tools to monitor and control cloud-computing resources. In this study, a server farm, operated by OpenStack as a cloud platform, was constructed using servers, and other network devices. Results: The greenhouse-control system was developed according to the fundamental cloud service models: infrastructure as a service, platform as a service, and software as a service. This system has four additional advantages - security, control function, public data use, and data exchange. There are several considerations that must be addressed, such as service level agreement, data ownership, security, and the differences between users. Conclusions: When the advantages are utilized and the considerations are addressed, cloud-computing technology will be beneficial for agricultural use.

Enhancement of a Secure Remote Working Environment using CloudHSM and edge-DRM Proxy (Cloud HSM와 edge-DRM Proxy를 활용한 안전한 원격근무 환경 강화 연구)

  • Kim, Hyunwoo;Lee, Junhyeok;Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.25-30
    • /
    • 2021
  • Due to the current COVID-19 pandemic, companies and institutions are introducing virtual desktop technology, one of the logical network separation technologies, to establish a safe working environment in a situation where remote work is provided. With the introduction of virtual desktop technology, companies and institutions can operate the network separation environment more safely and effectively, and can access the business network quickly and safely to increase work efficiency and productivity. However, when introducing virtual desktop technology, there is a cost problem of high-spec server, storage, and license, and it is necessary to supplement in terms of operation and management. As a countermeasure to this, companies and institutions are shifting to cloud computing-based technology, virtual desktop service (DaaS, Desktop as a Service). However, in the virtual desktop service, which is a cloud computing-based technology, the shared responsibility model is responsible for user access control and data security. In this paper, based on the shared responsibility model in the virtual desktop service environment, we propose a cloud-based hardware security module (Cloud HSM) and edge-DRM proxy as an improvement method for user access control and data security.

A Study on the Development of Operator Training Methods for a Cloud-Based Vessel Traffic Service Platform (클라우드 기반 차세대 VTS 통합플랫폼 도입에 따른 교육과정 개발에 관한 연구)

  • Min Jung;Jeong-Ho Kim;Eun-Kyu Jang;Sek-Han Bae
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.7
    • /
    • pp.939-949
    • /
    • 2023
  • In South Korea, a cloud-based vessel traffic service (Cloud VTS) system integrating the fourth industrial revolution technologies such as cloud and AI is currently under development in contrast to the existing VTS systems. A pilot center for at Busan VTS is being established based on differentiated technology and operational programs. The roles of operators and maintenance personnel who operate the innovative Cloud VTS system must be redefined. Additionally, a demand exists for the development of new educational programs to ensure the smooth operation of the Cloud VTS. Therefore, this study introduces the development details of a Cloud VTS system and explores educational strategies aimed at operators and maintenance personnel to ensure its safe operation.

Prospects and Challenges of Implementing Cloud Accounting in Bangladesh

  • SAHA, Trina;DAS, Sumon Kumar;RAHMAN, Md. Moshiur;SIDDIQUE, Fahimul Kader;UDDIN, Mohammad Gias
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.12
    • /
    • pp.275-282
    • /
    • 2020
  • The objectives of this study are to understand the meaning of cloud accounting, to investigate whether it is favorable for performance of the organization and what are the challenges if a country like Bangladesh wants to implement it. Primary data have been collected from 300 respondents selected from the field of accounting, such as accountants, accounting graduates of different universities, teachers and bankers. To measure the reliability and validity of the sample size and data, KMO and Bartlett's test have been adopted and the results proved to be reliable and valid for the study. Regression analysis has been done to find out the positive impact of cloud accounting on organizational performance and negative impact of cloud accounting on existing accounting system of the organization. The results of regression analysis supported our alternative hypotheses that cloud accounting can improve organizational performance, but it has also some negative impacts. Descriptive statistics have been used to find out the probable challenges that may be faced by organizations that want to implement it. This is a pioneering study because there is little research on this topic, thus it is expected to develop awareness about cloud accounting in field of accounting in Bangladesh.

A Study on Security of Virtualization in Cloud Computing Environment for Convergence Services (융합서비스를 위한 클라우드 컴퓨팅 환경에서 가상화 보안에 관한 연구)

  • Lee, Bo-Kyung
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.93-99
    • /
    • 2014
  • Cloud computing refers to borrow IT resources as needed by leveraging Internet technology and pay as much as you used by supporting real-time scalability depending on the service load. Virtualization which is the main technology of cloud computing is a technology that server, storage and hardware are regarded as not separate system but one system area and are allocated as needed. However, the security mechanisms provided by virtualized environments are difficult to cope with the traditional security mechanisms, having basic levels of visibility, control and audit function, on which the server is designed to monitor the traffic between the servers. In this paper, the security vulnerabilities of virtualization are analysed in the cloud computing environment and cloud virtualization security recommendations are proposed.

A NEW METHOD OF MASKING CLOUD-AFFECTED PIXELS IN OCEAN COLOR IMAGERY BASED ON SPECTRAL SHAPE OF WATER REFLECTANCE

  • Fukushima, Hajime;Tamura, Jin;Toratani, Mitsuhiro;Murakami, Hiroshi
    • Proceedings of the KSRS Conference
    • /
    • v.1
    • /
    • pp.25-28
    • /
    • 2006
  • We propose a new method of masking cloud-affected pixels in satellite ocean color imageries such as of GLI. Those pixels, mostly found around cloud pixels or in scattered cloud area, have anomalous features in either in chlorophyll-a estimate or in water reflectance. This artifact is most likely caused by residual error of inter-band registration correction. Our method is to check the pixel-wise 'soundness' of the spectral water reflectance Rw retrieved after the atmospheric correction. First, we define two spectral ratio between water reflectance, IRR1 and IRR2, each defined as RW(B1)/RW (B3) RW (B3) and as RW (B2)/RW(B4) respectively, where $B1{\sim}B4$ stand for 4 consecutive visible bands. We show that an almost linear relation holds over log-scaled IRR1 and IRR2 for shipmeasured RW data of SeaBAM in situ data set and for GLI cloud-free Level 2 sub-scenes. The method we propose is to utilize this nature, identifying those pixels that show significant discrepancy from that relationship. We apply this method to ADEOS-II/GLI ocean color data to evaluate the performance over Level-2 data, which includes different water types such as case 1, turbid case 2 and coccolithophore bloom waters.

  • PDF