• Title/Summary/Keyword: Cloud-technology

Search Result 1,887, Processing Time 0.029 seconds

LDBAS: Location-aware Data Block Allocation Strategy for HDFS-based Applications in the Cloud

  • Xu, Hua;Liu, Weiqing;Shu, Guansheng;Li, Jing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.204-226
    • /
    • 2018
  • Big data processing applications have been migrated into cloud gradually, due to the advantages of cloud computing. Hadoop Distributed File System (HDFS) is one of the fundamental support systems for big data processing on MapReduce-like frameworks, such as Hadoop and Spark. Since HDFS is not aware of the co-location of virtual machines in the cloud, the default scheme of block allocation in HDFS does not fit well in the cloud environments behaving in two aspects: data reliability loss and performance degradation. In this paper, we present a novel location-aware data block allocation strategy (LDBAS). LDBAS jointly optimizes data reliability and performance for upper-layer applications by allocating data blocks according to the locations and different processing capacities of virtual nodes in the cloud. We apply LDBAS to two stages of data allocation of HDFS in the cloud (the initial data allocation and data recovery), and design the corresponding algorithms. Finally, we implement LDBAS into an actual Hadoop cluster and evaluate the performance with the benchmark suite BigDataBench. The experimental results show that LDBAS can guarantee the designed data reliability while reducing the job execution time of the I/O-intensive applications in Hadoop by 8.9% on average and up to 11.2% compared with the original Hadoop in the cloud.

A Study on Project Performance in Cloud Computing : Focus on User Experience of GoogleDocs (클라우드 컴퓨팅 환경에서의 프로젝트 수행 성과에 관한 연구 : GoogleDocs 사용 경험을 중심으로)

  • Woo, Hyeok-Jun;Shim, Jeong-Hyun;Lee, Jung-Hoon
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.1
    • /
    • pp.71-100
    • /
    • 2011
  • There are expectations about future internet technology with IT development by end-users. Cloud computing is attracted to satisfy those demands. However, adoption of cloud computing is not active that much. Therefore, this study verified how cloud computing environment affects performance of team project. We conducted empirical study on performance of team project with cloud computing as technology tool focusing on Task-Technology Fit Model. We collected samples that were undergraduate and graduate school students and had experience on initial cloud computing such as Google-Docs and Webhard when they conducted team project for assignment. We focused on accessibility and reliability as task-technology fit and those variables treated as first order factor. Result showed that cloud computing is suitable technology tool for team project. This study suggests positive effects of cloud computing for collaboration by proving perceived fit and performance in initial cloud computing.

Generic Costing Scheme Using General Equilibrium Theory for Fair Cloud Service Charging

  • Hussin, Masnida;Jalal, Siti Fajar;Latip, Rohaya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.58-73
    • /
    • 2021
  • Cloud Service Providers (CSPs) enable their users to access Cloud computing and storage services from anywhere in quick and flexible manners through the Internet. With the basis of 'pay-as-you-go' model, it makes the interactions between CSPs and the users play a vital role in shaping the Cloud computing market. A pool of virtualized and dynamically scalable Cloud services that delivered on demand to the users is associated with guaranteed performance and cost-provisioning. It needed a costing scheme for determining suitable charges in order to secure lease pricing of the Cloud services. However, it is hard to meet the satisfied prices for both CSPs and users due to their conflicting needs. Furthermore, there is lack of Service Level Agreements (SLAs) that allowing the users to take part into price negotiating process. The users may lose their interest to use Cloud services while reducing CSPs profit. Therefore, this paper proposes a generic costing scheme for Cloud services using General Equilibrium Theory (GET). GET helps to formulate the price function for various services' factors to match with various demands from the users. It is initially determined by identifying the market circumstances that a general equilibrium will be hold and reached. Specifically, there are two procedures of agreement made in response to (i) established equilibrium supply and demand, and (ii) service price formed and constructed in a price range. The SLAs in our costing scheme is integrated to satisfy both CSPs and users' needs while minimizing their conflicts. The price ranging strategy is deliberated to provide prices' options to the users with respect their budget limit. Meanwhile, the CSPs can adaptively charge based on users' preferences without losing their profit. The costing scheme is testable and analyzed in multi-tenant computing environments. The results from our simulation experiments demonstrate that the proposed costing scheme provides better users' satisfaction while fostering fairness pricing in the Cloud market.

The Security Establishment for Cloud Computing through CASE Study

  • Choi, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.6
    • /
    • pp.89-99
    • /
    • 2020
  • Cloud computing is rapidly increasing for achieving comfortable computing. Cloud computing has essentially security vulnerability of software and hardware. For achieving secure cloud computing, the vulnerabilities of cloud computing could be analyzed in a various and systematic approach from perspective of the service designer, service operator, the designer of cloud security and certifiers of cloud systems. The paper investigates the vulnerabilities and security controls from the perspective of administration, and systems. For achieving the secure operation of cloud computing, this paper analyzes technological security vulnerability, operational weakness and the security issues in an enterprise. Based on analysis, the paper suggests secure establishments for cloud computing.

Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure

  • Mahajan, Komal;Makroo, Ansuyia;Dahiya, Deepak
    • Journal of Information Processing Systems
    • /
    • v.9 no.3
    • /
    • pp.379-394
    • /
    • 2013
  • Cloud computing is an evolving computing paradigm that has influenced every other entity in the globalized industry, whether it is in the public sector or the private sector. Considering the growing importance of cloud, finding new ways to improve cloud services is an area of concern and research focus. The limitation of the available Virtual Machine Load balancing policies for cloud is that they do not save the state of the previous allocation of a virtual machine to a request from a Userbase and the algorithm requires execution each time a new request for Virtual Machine allocation is received from the Userbase. This problem can be resolved by developing an efficient virtual machine load balancing algorithm for the cloud and by doing a comparative analysis of the proposed algorithm with the existing algorithms.

Cryptography in the Cloud: Advances and Challenges

  • Boyd, Colin
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.17-23
    • /
    • 2013
  • Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.

A Study on Innovation Types of Cloud Companies based on a Meta Model (메타모델 기반의 클라우드 기업의 혁신유형 연구)

  • Seo, Kwang-Kyu
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.3
    • /
    • pp.87-92
    • /
    • 2021
  • Cloud is emerging as a key factor in digital transformation. In particular, the industry is paying attention to cloud as a key factor in economic revitalization after COVID-19. In this economic environment, cloud companies can survive only through continuous innovation. In this study, we propose the innovation types of cloud companies using the meta model, which is a high-level conceptual model that generalizes various corporate activities. The proposed cloud company innovation type applies a conceptual model divided into two axes such as the corporate value chain and the business management layer. The contribution of this study is to provide a basis for research in a new academic field called corporate innovation in the cloud domain, and to provide decision-making tools for diagnosing innovation levels or exploring innovation directions for cloud companies.

A study on the vulnerability and corresponding technique trends of the cloud computing service (클라우드 컴퓨팅 서비스의 취약성과 대응기술 동향에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.17-24
    • /
    • 2013
  • Recently, the cloud computing technology is emerging as an important issue in the world, and In the technology and services has attracted much attention. However, the positive aspects of cloud computing unlike the includes several vulnerabilities. For this reason, the hacking techniques according to the evolution of a variety of attacks and damages is expected. Therefore, this paper will be analyzed through case studies and experiments to the security technology trends of the cloud computing. and In the future, this is expected to be utilized as a basis for the security system design and corresponding technology development.

A Study on Establishment of Cloud Service Provider Partner Management Policy (클라우드 서비스 사업자 파트너 관리 정책 수립에 관한 연구)

  • Park, Wonju;Seo, Kwang-Kyu
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.2
    • /
    • pp.115-120
    • /
    • 2021
  • In Korea, where the world's first cloud computing development law was created, cloud service technology has been developing so far, and the industries to which artificial intelligence and big data technologies can be applied based on this are increasing. It is important for domestic and overseas cloud operators to secure many partners in order to provide optimal services to users. It is also important to systematically develop the partner's technology and discover new partners. In particular, the public, medical, and financial sectors are industrial fields that are difficult for domestic as well as global cloud service providers to expand without the help of partners. This study analyzes partner policies for industries caused by domestic regulations through domestic and foreign cases, and aims to establish partner management policies optimized for the domestic environment.

Development of Cloud-based Game System : Toward Domestic Game Development (클라우드 기반의 게임시스템 개발 : 국내 게임 개발을 중심으로)

  • Han, Sang-geun;Song, Seung-keun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.457-458
    • /
    • 2015
  • Recently, the development of cloud technology, related to service has spread to various fields. In the game field, to develop the N screen services using cloud technology without regard to the performance of the device, there is incresing interest to have been able to play to share any information of user in a variety of platforms. This paper aims to find the feature of game was developed using the cloud technology. After literature on the cloud technology research were reviewed, it is checked to how apply in the currently released cloud based game, based on find the features of the game. We expect to develop the cloud based game with feature of cloud and apply to develop the N screen game in the future.

  • PDF