• Title/Summary/Keyword: Cloud-technology

Search Result 1,869, Processing Time 0.029 seconds

Client Technology on a Server for Mobile Cloud

  • Nguyen, Tien-Dung;Biao, Song;Wei, Tang;Lee, Jun-Hyung;Huh, Eui-Nam
    • Information and Communications Magazine
    • /
    • v.28 no.10
    • /
    • pp.3-10
    • /
    • 2011
  • The increasing ubiquity of wireless networks and decreasing cost of hardware is fueling a proliferation of mobile devices. These devices are enabling a new revolution in mobile technology, not only running locally on them, but running on cloud as a service as well. From web browsing, email, or video conferencing, presentations to movie and music entertainment or games, multimedia applications, mobile cloud enables providing such diverse applications. Many technologies have been designed to address the limited hardware and performance in thin client PC. However, with the assorted network and graphic condition, those proposed technologies is obligated to alter aim to adapt mobile cloud. In this paper, we provide a survey of client technology on a Server that can be sufficed the requirements of Mobile Cloud. We also analyze each technology and classify with its individual difficulties and challenges.

An Exploratory Study on the Derivation of Characteristics of Personal Cloud Computing (개인용 클라우드 컴퓨팅의 특성 도출에 관한 탐색적 연구)

  • Moon, Hye Young;Ryu, Jae Hong;Choi, Jinho
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.2
    • /
    • pp.57-68
    • /
    • 2013
  • Recently, cloud computing has been viewed as a technology of great influence. Despite the importance of personal cloud services, the majority of cloud computing studies has been focused on an enterprise level. Therefore, in this research, we list variables of personal cloud computing characteristics (accessibility, storage, trust, perceived ease of use, availability) from preceding research done on an enterprise level. So, through pilot testing, we analyze whether examined characteristic variables affect the intention to use personal cloud computing. Next, we investigate the relevancy between user characteristics, including gender, age, and occupation, and the usage rate of personal cloud computing. Lastly, we implement an analysis of variance in order to speculate whether there is any difference between the five characteristic variables in using personal cloud computing between cloud service enterprises. For empirical testing people with experience in personal cloud computing are surveyed. Frequency analysis, exploratory factor analysis, internal consistency analysis, T-test, ANOVA, and multiple regression analysis are implemented with 325 valid samples. The analysis results are as follows: First, among user characteristic variables, 'occupation' shows a significant relationship with cloud service usage, Second, between cloud service enterprises, all five characteristic variables of 'Naver N Drive' are thoroughly evaluated and 'Google Drive' receives a high evaluation in availability and accessibility. Third and finally, all of the selected characteristic variables affect the intention to use personal cloud computing. However, availability is identified to be the most important factor. This research will serve as a reference to enterprises for the practical implementation of personal cloud computing service.

A Study of the Efficient Cloud Migration Technique and Process based on Open Source Software (오픈 소스 기반의 효율적인 클라우드 마이그레이션 절차에 관한 연구)

  • Park, In-Geun;Lee, Eun-Seok;Park, Jong-Kook;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.280-283
    • /
    • 2014
  • Cloud Computing virtualizes logical resources like cpu, memory and disks etcs from physical machines. This virtualization technology increases computing resource utilization and supports dynamic resource allocations. Because of these benefits, global cloud computing services like Amazon AWS, Google Cloud and Apple iCloud are prevalent. With this cloud Computing services, there has been a request about cloud migration between different cloud environments. If one service which operates in a cloud computing environment wants to migrate to another cloud environment, there should have been a compitability between two different cloud environment. but even global cloud computing services do not support this compitability. In this paper, we suggest a process and technology to cloud migrations based on open sources.

  • PDF

Challenges and Issues of Resource Allocation Techniques in Cloud Computing

  • Abid, Adnan;Manzoor, Muhammad Faraz;Farooq, Muhammad Shoaib;Farooq, Uzma;Hussain, Muzammil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.2815-2839
    • /
    • 2020
  • In a cloud computing paradigm, allocation of various virtualized ICT resources is a complex problem due to the presence of heterogeneous application (MapReduce, content delivery and networks web applications) workloads having contentious allocation requirements in terms of ICT resource capacities (resource utilization, execution time, response time, etc.). This task of resource allocation becomes more challenging due to finite available resources and increasing consumer demands. Therefore, many unique models and techniques have been proposed to allocate resources efficiently. However, there is no published research available in this domain that clearly address this research problem and provides research taxonomy for classification of resource allocation techniques including strategic, target resources, optimization, scheduling and power. Hence, the main aim of this paper is to identify open challenges faced by the cloud service provider related to allocation of resource such as servers, storage and networks in cloud computing. More than 70 articles, between year 2007 and 2020, related to resource allocation in cloud computing have been shortlisted through a structured mechanism and are reviewed under clearly defined objectives. Lastly, the evolution of research in resource allocation techniques has also been discussed along with salient future directions in this area.

A Study on Networking Technology for Cloud Data Centers (클라우드 데이터센터를 위한 네트워킹 기술에 관한 연구)

  • Choi, Jung-Yul
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.235-243
    • /
    • 2016
  • Legacy data centers are transforming toward cloud data centers according to the advance of mobile and Internet of Things technology, processing of big data, and development of cloud computing technology. The goal of cloud data centers is to efficiently manage energy and facility, and to rapidly provide service demands to users by operating virtualized ICT(Information and Communication Technology) resources. Accordingly, it requires to configure and operate networks for efficiently providing virtualized ICT resources. This paper analyzes networking technologies suitable for cloud data centers and presents ways to efficiently operate the data center.

A Study on The Construction of Cloud BIM-based Medical Facility Design Support System (클라우드 BIM 기반 의료시설 설계지원 시스템 구축에 관한 연구)

  • Jung, Sung-Ho;Lee, Byung-Soo;Choi, Yoon-Ki
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.6
    • /
    • pp.39-46
    • /
    • 2019
  • In the 21st century, medical facility projects are required to operate appropriate digital technologies as the development of technology and the interests of various participants become more complex. In order for architects to successfully lead negotiations among various stakeholder groups, it is necessary to plan for effective communication through appropriate design reflecting their opinions and coordination of conflicts. For this purpose, building information modeling (BIM), which is a method of designing based on knowledge information related to medical facilities in the building database, can respond to change of order promptly and minimizes the occurrence of design errors can do. Recently, BIM technology and cloud computing technology in ICT have been combined and research on cloud BIM has been actively carried out. The use of cloud computing technology in BIM-based healthcare facility projects can effectively support decision making among project participants and has the advantage of sharing and collaborating on various forms of information generated during the design process, regardless of location and time. Therefore, the purpose of this study is to build of system that can support the design of medical facility using cloud computing technology in BIM.

A Novel Smart Contract based Optimized Cloud Selection Framework for Efficient Multi-Party Computation

  • Haotian Chen;Abir EL Azzaoui;Sekione Reward Jeremiah;Jong Hyuk Park
    • Journal of Information Processing Systems
    • /
    • v.19 no.2
    • /
    • pp.240-257
    • /
    • 2023
  • The industrial Internet of Things (IIoT) is characterized by intelligent connection, real-time data processing, collaborative monitoring, and automatic information processing. The heterogeneous IIoT devices require a high data rate, high reliability, high coverage, and low delay, thus posing a significant challenge to information security. High-performance edge and cloud servers are a good backup solution for IIoT devices with limited capabilities. However, privacy leakage and network attack cases may occur in heterogeneous IIoT environments. Cloud-based multi-party computing is a reliable privacy-protecting technology that encourages multiparty participation in joint computing without privacy disclosure. However, the default cloud selection method does not meet the heterogeneous IIoT requirements. The server can be dishonest, significantly increasing the probability of multi-party computation failure or inefficiency. This paper proposes a blockchain and smart contract-based optimized cloud node selection framework. Different participants choose the best server that meets their performance demands, considering the communication delay. Smart contracts provide a progressive request mechanism to increase participation. The simulation results show that our framework improves overall multi-party computing efficiency by up to 44.73%.

A Framework for Establishing Cloud Service Certification Systems (클라우드 서비스 인증제도 수립을 위한 프레임워크)

  • Seo, Kwang-Kyu
    • Informatization Policy
    • /
    • v.18 no.1
    • /
    • pp.24-44
    • /
    • 2011
  • The evolution of cloud computing over the past few years is potentially one of the major advances in information technology. However, if cloud computing is to achieve its potential, there needs to be a clear identification and understanding of the various issues involved, both from the perspectives of the providers and the consumers of the technology. While a lot of research is currently taking place in the technology itself, there is an equally urgent need for understanding the business-related issues surrounding cloud computing service. As more and more information on individuals and companies are placed in the cloud service, concerns are beginning to grow about just how safe and reliable an environment it is. For successful implementation of cloud services, it is necessary to establish the certification systems to ensure the safety and reliability of cloud services. This paper provides a safe and reliable framework for cloud service certification systems. In order to develop it, the critical issues related to service quality and certification of cloud services have been identified and the systematic framework for certification systems of cloud services and service provider domains have been developed. An evaluation method for the developed certification systems is also proposed.

  • PDF

A Study on Access Control Technique for Provision of Cloud Service in SSO-based Environment

  • Eun-Gyeom Jang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.11
    • /
    • pp.73-80
    • /
    • 2023
  • In this paper, a technology to protect important information from access in order to revitalize the cloud service market. A technology is proposed to solve the risk of leakage of important confidential and personal information stored in cloud systems, which is one of the various obstacles to the cloud service market. To protect important information, access control rights to cloud resources are granted to cloud service providers and general users. The system administrator has superuser authority to maintain and manage the system. Client computing services are managed by an external cloud service provider, and information is also stored in an external system. To protect important in-house information within the company, all users, it was designed to provide access authority with users including cloud service providers, only after they are authenticated. It is expected that the confidentiality of cloud computing resources and service reliability achieved through the proposed access control technology will contribute to revitalizing the cloud service market.

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.