• Title/Summary/Keyword: Computing as a Service

Search Result 1,483, Processing Time 0.026 seconds

An Overview of Data Security Algorithms in Cloud Computing

  • D. I. George Amalarethinam;S. Edel Josephine Rajakumari
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.65-72
    • /
    • 2023
  • Cloud Computing is one of the current research areas in computer science. Recently, Cloud is the buzz word used everywhere in IT industries; It introduced the notion of 'pay as you use' and revolutionized developments in IT. The rapid growth of modernized cloud computing leads to 24×7 accessing of e-resources from anywhere at any time. It offers storage as a service where users' data can be stored on a cloud which is managed by a third party who is called Cloud Service Provider (CSP). Since users' data are managed by a third party, it must be encrypted ensuring confidentiality and privacy of the data. There are different types of cryptographic algorithms used for cloud security; in this article, the algorithms and their security measures are discussed.

A Specification and Exchange Method for Supporting SLA in SaaS Environment (SaaS 환경에서 SLA 보장을 위한 명세 및 교환 방법)

  • Nam, Taewoo;Kang, Taejun;Jang, Moonsoo;An, Youngmin;Yeom, Keunhyuk
    • Journal of Software Engineering Society
    • /
    • v.26 no.2
    • /
    • pp.45-52
    • /
    • 2013
  • A cloud computing service provider must assure Service Level Agreement (SLA) to provide reliable and consistent quality of service to a user. The SLA is a contract between the user and the service provider that connects to assure constant level such as availability to target provided service. The cloud computing is classified into IaaS, PaaS, and SaaS according to IT resources of the various cloud service. The existing SLA is difficult to reflect quality factors of service because it only considers factors about the physical Network environment. In this paper, we suggest the UDDI-based interchange process with the architecture and the specification language having a XML schema for the SLA specification. The quality requirements of SaaS are defined by a proposed specification language in the cloud environment. It is stored in the repository of a quality specification and exchanged on during the service binding time based on the exchange architecture.

  • PDF

The Construction and Utilization of Cloud Computing Environment with Openstack (Openstack을 이용한 Cloud Computing 환경 구축 및 활용)

  • Kim, YoungHoon;Ji, Hoyoung;Moon, BongKyo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.60-63
    • /
    • 2017
  • Cloud Computing 환경은 사용자로 하여금 네트워크를 통하여 운영플랫폼, 저장매체 등이 운영 가능한 컴퓨터 자원을 신속하게 이용할 수 있는 컴퓨팅 환경이다. 이 환경을 이용하여 사용자들에게 가상의 컴퓨팅 공간을 만들어 resource를 사용하게 만들어주는 Iaas(Infrastructure as a Service)가 급증하고 있다. OpenStack은 Cloud Computing 환경을 이용하여 사용자로 하여금 *aaS제공을 가능하게 해주는 오픈소스 소프트웨어 프로젝트이다. 이 연구는 Openstack을 활용하여 Cloud환경을 구축하고, 이를 활용 하는 방안에 대한 연구이다. GitLab를 이용한 GitLab Service Launching을 시도하고, Hadoop을 통하여 Cloud 환경을 활용한 분산처리 시스템을 구현, Cloud의 활용 방안을 탐구한다.

A Proposal of Features of Cloud Computing Service for BIM based Architectural Design Management (BIM 기반 건축설계 관리 지원을 위한 클라우드 컴퓨팅 서비스 기능 제안)

  • An, Min-Gyu;Choi, Jong-Moon;Lee, Jaewook;Yoon, Su-Won
    • Journal of KIBIM
    • /
    • v.4 no.2
    • /
    • pp.17-24
    • /
    • 2014
  • Recently, there have been various attempts for the adoption and spread of Building Information Modeling (BIM) in the construction industry. However, the spread of BIM has been less satisfied than expected, because of the insufficient, expensive hardware and software for the authoring, analysis and so forth. As a solution to resolve the obstacles, the applications of cloud computing technology to BIM have been introduced. Due to the vendor-dependent functions and lack of verification on the work process, the spread of cloud-based BIM has been limited in Korea. Therefore, this study proposes the functions of cloud computing services which can support BIM-based design processes through the review of practitioners, questionnaire survey and analysis of design process.

A Study on the Business Service Design in Ubiquitous Computing:the Case Study in Bookstore (유비쿼터스 비즈니스 서비스 설계 사례연구 : 대형 도서매장을 중심으로)

  • Kim, Kyung-Kyu;Chang, Hang-Bae;Kim, Heung-Gook;Kwon, Hyuk-Jun
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.2
    • /
    • pp.165-179
    • /
    • 2008
  • In this study we designed the killer services for the scene of bookstore in ubiquitous computing. To achieve this study, we have explored the unmet needs of employees and users in bookstores and examined whether the unmet needs could be served by the resources and capabilities of ubiquitous computing. Then we have extracted detailed killer services that includes value propositions and resource map by using statistical methodology. Finally, the killer services were designed to serve employees and users in bookstores with the service architecture. The result of this study will be applied to develop new business model in ubiquitous computing as the basic research.

  • PDF

Implementation of Fog Computing Architecture for IoT Service on Hybrid Broadcast Environment (하이브리드 방송 환경에서의 IoT 서비스 지원을 위한 Fog Computing Architecture 구현)

  • Kum, Seung Woo;Lim, Tae-Beom;Park, Jong-Il
    • Journal of Broadcast Engineering
    • /
    • v.22 no.1
    • /
    • pp.107-117
    • /
    • 2017
  • Recently, IoT applications are being deployed in Smart TVs, and these IoT applications are using smart TVs as application platforms rather than broadcast platforms. With the advent of Hybrid broadcast technologies, now it becomes available to develop IoT applications which are coupled to the broadcast information. However, the existing IoT services are not suitable for Hybrid broadcast application since they are built on cloud and require various protocol implementations. In this paper, a Fog Computing-based architecture for hybrid broadcast application is proposed. Instead of accessing IoT services from hybrid broadcast app directly, the proposed architecture places Fog Applet Server between them and distribute loads of hybrid broadcast app to the Fog Applet. The proposed architecture is implemented as a service to control IoT device with hybrid application.

Quantum Computing Impact on SCM and Hotel Performance

  • Adhikari, Binaya;Chang, Byeong-Yun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.1-6
    • /
    • 2021
  • For competitive hotel business, the hotel must have a sound prediction capability to balance the demand and supply of hospitality products. To have a sound prediction capability in the hotel, it should be prepared to be equipped with a new technology such as quantum computing. The quantum computing is a brand new cutting-edge technology. It will change hotel business and even the whole world too. Therefore, we study the impact of quantum computing on supply chain management (SCM) and hotel performance. Toward the goal we have developed the research model including six constructs: quantum (computing) prediction, communication, supplier relationship, service quality, non-financial performance, and financial performance. The result of the study shows a significant influence of quantum (computing) prediction on hotel performance through the mediating role of SCM in the hotel. Quantum prediction is highly significant in enhancing the SCM in the hotel. However, the direct effect between the quantum prediction and hotel performance is not significant. The finding indicates that hotels which would install the quantum computing technology and utilize the quantum prediction could hugely benefit from the performance improvement.

A Technique of Applying Ontology for Service Customization of Android (안드로이드 서비스 커스터마이제이션을 위한 온톨로지 적용 기법)

  • Cho, Eun-Sook;Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.6
    • /
    • pp.2707-2712
    • /
    • 2012
  • Desktop-based computing environment is changed into mobile computing using smart phone and cloud computing providing common behavior and big data by network. Because of this transformation software development and operating environment is changed into heterogeneous distributed environment. As a result, dynamic service composition or changement is required. However, there is few research of techniques supporting service composition or changement dynamically in this situation. This paper suggests a technique for customizing services dynamically of mobile applications based on android platform. Especially we propose a customization technique of service by applying ontology technique to improve sharing and reuse of service. We applied proposed technique into meeting notification system, and obtain that it can be customized into various services such as email, sms, twitter service, and so on.

QSDB: An Encrypted Database Model for Privacy-Preserving in Cloud Computing

  • Liu, Guoxiu;Yang, Geng;Wang, Haiwei;Dai, Hua;Zhou, Qiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.7
    • /
    • pp.3375-3400
    • /
    • 2018
  • With the advent of database-as-a-service (DAAS) and cloud computing, more and more data owners are motivated to outsource their data to cloud database in consideration of convenience and cost. However, it has become a challenging work to provide security to database as service model in cloud computing, because adversaries may try to gain access to sensitive data, and curious or malicious administrators may capture and leak data. In order to realize privacy preservation, sensitive data should be encrypted before outsourcing. In this paper, we present a secure and practical system over encrypted cloud data, called QSDB (queryable and secure database), which simultaneously supports SQL query operations. The proposed system can store and process the floating point numbers without compromising the security of data. To balance tradeoff between data privacy protection and query processing efficiency, QSDB utilizes three different encryption models to encrypt data. Our strategy is to process as much queries as possible at the cloud server. Encryption of queries and decryption of encrypted queries results are performed at client. Experiments on the real-world data sets were conducted to demonstrate the efficiency and practicality of the proposed system.

A Security Protection Framework for Cloud Computing

  • Zhu, Wenzheng;Lee, Changhoon
    • Journal of Information Processing Systems
    • /
    • v.12 no.3
    • /
    • pp.538-547
    • /
    • 2016
  • Cloud computing is a new style of computing in which dynamically scalable and reconfigurable resources are provided as a service over the internet. The MapReduce framework is currently the most dominant programming model in cloud computing. It is necessary to protect the integrity of MapReduce data processing services. Malicious workers, who can be divided into collusive workers and non-collusive workers, try to generate bad results in order to attack the cloud computing. So, figuring out how to efficiently detect the malicious workers has been very important, as existing solutions are not effective enough in defeating malicious behavior. In this paper, we propose a security protection framework to detect the malicious workers and ensure computation integrity in the map phase of MapReduce. Our simulation results show that our proposed security protection framework can efficiently detect both collusive and non-collusive workers and guarantee high computation accuracy.