• 제목/요약/키워드: Cloud-technology

검색결과 1,898건 처리시간 0.028초

A Study of Resource Utilization Improvement on Cloud Testing Platform

  • Kuo, Jong-Yih;Lin, Hui-Chi;Liu, Chien-Hung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권7호
    • /
    • pp.2434-2454
    • /
    • 2021
  • This paper developed the software testing factory-cloud testing platform (STF-CTP) to address the software compatible issues in various smart devices. Software developers who only require uploading the application under test (AUT) and test script can test plenty of smart devices in STF-CTP. The challenge for the cloud test platform is how to optimize the resource and increase the performance in the limited resource. This paper proposed a new scheduling mechanism and a new process of the system operation which is based on the OpenStack platform. We decrease about 40% memory usage of OpenStack server, increase 3% to 10% Android device usage of STF-CTP, enhance about 80% test job throughput and reduces about 40% test job average waiting time.

Point Cloud Measurement Using Improved Variance Focus Measure Operator

  • Yeni Li;Liang Hou;Yun Chen;Shaoqi Huang
    • Current Optics and Photonics
    • /
    • 제8권2호
    • /
    • pp.170-182
    • /
    • 2024
  • The dimensional accuracy and consistency of a dual oil circuit centrifugal fuel nozzle are important for fuel distribution and combustion efficiency in an engine combustion chamber. A point cloud measurement method was proposed to solve the geometric accuracy detection problem for the fuel nozzle. An improved variance focus measure operator was used to extract the depth point cloud. Compared with other traditional sharpness evaluation functions, the improved operator can generate the best evaluation curve, and has the least noise and the shortest calculation time. The experimental results of point cloud slicing measurement show that the best window size is 24 × 24 pixels. In the height measurement experiment of the standard sample block, the relative error is 2.32%, and in the fuel nozzle cone angle measurement experiment, the relative error is 2.46%, which can meet the high precision requirements of a dual oil circuit centrifugal fuel nozzle.

클라우드 컴퓨팅 보안의 취약성에 관한 연구 (A study on the vulnerability of the Cloud computing security)

  • 전정훈
    • 정보보호학회논문지
    • /
    • 제23권6호
    • /
    • pp.1239-1246
    • /
    • 2013
  • 최근 클라우드 컴퓨팅 기술은 전 세계적으로 중요한 이슈로 부각되고 있으며, 기술과 서비스에 있어, 많은 주목을 받고 있다. 그러나 클라우드 컴퓨팅의 긍정적인 측면과는 달리, 여러 취약점들로 인해, 해킹기술의 진화에 따른 다양한 공격과 피해가 예상되고 있다. 따라서 본 논문은 클라우드 컴퓨팅의 위협과 취약성에 대해 실험 및 사례연구를 통해 관리 모델들을 분석함으로써, 향후, 클라우드 컴퓨팅의 보안 설계와 성능 향상을 위한 자료로 활용될 것으로 기대한다.

Energy Efficient Software Development Techniques for Cloud based Applications

  • Aeshah A. Alsayyah;Shakeel Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • 제23권7호
    • /
    • pp.119-130
    • /
    • 2023
  • Worldwide organizations use the benefits offered by Cloud Computing (CC) to store data, software and programs. While running hugely complicated and sophisticated software on cloud requires more energy that causes global warming and affects environment. Most of the time energy consumption is wasted and it is required to explore opportunities to reduce emission of carbon in CC environment to save energy. Many improvements can be done in regard to energy efficiency from the software perspective by considering and paying attention on the energy consumption aspects of software's that run on cloud infrastructure. The aim of the current research is to propose a framework with an additional phase called parameterized development phase to be incorporated along with the traditional Software Development Life cycle (SDLC) where the developers need to consider the suggested techniques during software implementation to utilize low energy for running software on the cloud and contribute in green computing. Experiments have been carried out and the results prove that the suggested techniques and methods has enabled in achieving energy consumption.

Cloud of Things (CoTs): Security Threats and Attacks

  • Almtrafi, Sara Mutlaq;Alkhudadi, Bdour Abduallatif;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.229-237
    • /
    • 2021
  • Cloud of things (CoTs) is a newer idea which combines cloud computing (CC) with the Internet of Things (IoT). IoT capable of comprehensively producing data, and cloud computing can be presented pathways that allow for the progression towards specific destinations. Integrating these technologies leads to the formation of a separate element referred to as the Cloud of Things (CoTs). It helps implement ideas that make businesses more efficient. This technology is useful for monitoring a device or a machine and managing or connecting them. Since there are a substantial amount of machines that can run the IoT, there is now more data available from the IoT that would have to be stored on a local basis for a provisional period, and this is impossible. CoTs is used to help manage and analyze data to additionally create usable information by permitting and applying the development of advanced technology. However, combining these elements has a few drawbacks in terms of how secure the process is. This investigation aims to recent study literature from the past 3 years that talk about how secure the technology is in terms of protecting by authentication, reliability, availability, confidentiality, and access control. Additionally, this investigation includes a discussion regarding some kinds of potential attacks when using Cloud of Things. It will also cover what the various authors recommend and conclude with as well as how the situation can be approached to prevent an attack.

BCOR 접근법을 이용한 클라우드 컴퓨팅 도입의 의사결정 요인에 관한 연구 (A Study on Decision Making Factors of Cloud Computing Adoption Using BCOR Approach)

  • 이영찬;당응웬하인
    • 한국IT서비스학회지
    • /
    • 제11권1호
    • /
    • pp.155-171
    • /
    • 2012
  • With the continuous and outstanding development of information technology(IT), human being is coming to the new computing era which is called cloud computing. This era brings lots of huge benefits also at the same time release the resources of IT infrastructure and data boom for man. In the future no longer, most of IT service providers, enterprises, organizations and systems will adopt this new computing model. There are three main deployment models in cloud computing including public cloud, private cloud and hybrid cloud; each one also has its own cons and pros. While implementing any kind of cloud services, customers have to choose one of three above deployment models. Thus, our paper aims to represent a practical framework to help the adopter select which one will be the best suitable deployment model for their requirements by evaluating each model comprehensively. The framework is built by applying the analytic hierarchy process(AHP), namely benefit-cost-opportunity-risk(BCOR) model as a powerful and effective tool to serve the problem. The gained results hope not only to provide useful information for the readers but also to contribute valuable knowledge to this new area. In addition, it might support the practitioners' effective decision making process in case they meet the same issue and have a positive influence on the increase of right decision for the organization.

Cloud Attack Detection with Intelligent Rules

  • Pradeepthi, K.V;Kannan, A
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권10호
    • /
    • pp.4204-4222
    • /
    • 2015
  • Cloud is the latest buzz word in the internet community among developers, consumers and security researchers. There have been many attacks on the cloud in the recent past where the services got interrupted and consumer privacy has been compromised. Denial of Service (DoS) attacks effect the service availability to the genuine user. Customers are paying to use the cloud, so enhancing the availability of services is a paramount task for the service provider. In the presence of DoS attacks, the availability is reduced drastically. Such attacks must be detected and prevented as early as possible and the power of computational approaches can be used to do so. In the literature, machine learning techniques have been used to detect the presence of attacks. In this paper, a novel approach is proposed, where intelligent rule based feature selection and classification are performed for DoS attack detection in the cloud. The performance of the proposed system has been evaluated on an experimental cloud set up with real time DoS tools. It was observed that the proposed system achieved an accuracy of 98.46% on the experimental data for 10,000 instances with 10 fold cross-validation. By using this methodology, the service providers will be able to provide a more secure cloud environment to the customers.

스마트워크를 지원하는 클라우드 컴퓨팅의 사용의도 분석 : TAM-TTF 모델 관점 (The Effect of Smart Work and Cloud Computing Fit on Intention to use Cloud Computing Based on TAM-TTF Model)

  • 배경은;서창교
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제31권2호
    • /
    • pp.63-88
    • /
    • 2022
  • Purpose The purpose of this study is to empirically analyze the factors affecting the intention to use cloud computing in the smart work environment. This study is meaningful in that it examines the characteristics of smart work and the fit of cloud computing characteristics, and it is a study that reveals the factors affecting the intention to use cloud computing by applying the integrated model of TTF and TAM. Design/methodology/approach In order to understand the factors affecting the intention to use cloud computing in the smart work environment, a research model that integrates TTF and TAM with the hypothesis was proposed. In order to verify the research hypothesis, this study conducted a survey on individuals with experience in smart work and cloud computing. And with the data 280 collected in the survey, path analysis was performed using the PLS structural equation. Findings As a result, it was found that task characteristics and technology characteristics had a positive (+) effect on task-skill fit, and task-skill fit had a positive (+) effect on perceived ease of use and usefulness. Also, task-skill fit, perceived ease of use, and perceived usefulness were found to have a positive (+) effect on intention to use.

A Review of Security and Privacy of Cloud Based E-Healthcare Systems

  • Faiza Nawaz;Jawwad Ibrahim;Maida Junaid
    • International Journal of Computer Science & Network Security
    • /
    • 제24권6호
    • /
    • pp.153-160
    • /
    • 2024
  • Information technology plays an important role in healthcare. The cloud has several applications in the fields of education, social media and medicine. But the advantage of the cloud for medical reasons is very appropriate, especially given the large volume of data generated by healthcare organizations. As in increasingly health organizations adopting towards electronic health records in the cloud which can be accessed around the world for various health issues regarding references, healthcare educational research and etc. Cloud computing has many advantages, such as "flexibility, cost and energy savings, resource sharing and rapid deployment". However, despite the significant benefits of using the cloud computing for health IT, data security, privacy, reliability, integration and portability are some of the main challenges and obstacles for its implementation. Health data are highly confidential records that should not be made available to unauthorized persons to protect the security of patient information. In this paper, we discuss the privacy and security requirement of EHS as well as privacy and security issues of EHS and also focus on a comprehensive review of the current and existing literature on Electronic health that uses a variety of approaches and procedures to handle security and privacy issues. The strengths and weaknesses of some of these methods were mentioned. The significance of security issues in the cloud computing environment is a challenge.