• Title/Summary/Keyword: Computing as a Service

Search Result 1,483, Processing Time 0.042 seconds

Design of Standard Metadata Schema for Computing Resource Management (컴퓨팅 리소스 관리를 위한 표준 메타데이터 스키마 설계)

  • Lee, Mikyoung;Cho, Minhee;Song, Sa-Kwang;Yim, Hyung-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.433-435
    • /
    • 2022
  • In this paper, we introduce a computing resource standard metadata schema design plan for registering, retrieving, and managing computing resources used for research data analysis and utilization in the Korea Research Data Commons(KRDC). KRDC is a joint utilization system of research data and computing resources to maximize the sharing and utilization of research data. Computing resources refer to all resources in the computing environment, such as analysis infrastructure and analysis software, necessary to analyze and utilize research data used in the entire research process. The standard metadata schema for KRDC computing resource management is designed by considering common attributes for computing resource management and other attributes according to each computing resource feature. The standard metadata schema for computing resource management consists of a computing resource metadata schema and a computing resource provider metadata schema. In addition, the metadata schema of computing resources and providers was designed as a service schema and a system schema group according to their characteristics. The standard metadata schema designed in this paper is used for computing resource registration, retrieval, management, and workflow services for computing resource providers and computing resource users through the KRDC web service, and is designed in a scalable form for various computing resource links.

  • PDF

A Study on Reuse Technique of Software for SaaS Using Process Algebra

  • Hwang, Chigon;Shin, Hyoyoung;Lee, Jong-Yong;Jung, Kyedong
    • International journal of advanced smart convergence
    • /
    • v.3 no.2
    • /
    • pp.6-9
    • /
    • 2014
  • SaaS provides software hosted on the cloud computing in a form of service. Thus, it enables the extension of service functions by combining or reusing the existing software. As an analysis technique, this paper suggests a method of verifying the reusability of a process by analyzing it with the process algebra. The suggested method can confirm the reusability of existing software, ensure the consistency of modifications by tenants or requests, and provide probabilities of combining processes.

A Mathematical Programming Approach for Cloud Service Brokerage (클라우드 서비스 중개를 위한 수리과학 모형연구)

  • Chang, Byeong-Yun;Abate, Yabibal Afework;Yoon, Seung Hyun;Seo, Dong-Won
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.4
    • /
    • pp.143-150
    • /
    • 2014
  • Cloud computing is fast becoming the wave of the future for both home and business computing. Because of this growing acceptance, we can expect an explosion of diverse cloud service providers in the coming years. However, the cloud is not a single entity, rather it is a set of many disconnected islands of application (SaaS), infrastructure (IaaS), and different platform (PaaS) services. Cloud brokering mechanisms are essential to transform the heterogeneous cloud market into a commodity-like service. Cloud service brokers (CSBs) are the new form of business entities to help to aggregate the scattered set of cloud services and make conveniently available to their diverse users. CSBs can reserve a certain percentage of their clients' (users') demand and satisfy the remaining portion in an on-demand basis. In doing so, they need to minimize cost of both reserved and on-demand instances as well as the distance of a link between the cloud service provider (CSP) and the user. The study proposes a reservation approach with a mixed integer model to optimizes the cloud service cost and quality.

Task Migration in Cooperative Vehicular Edge Computing (협력적인 차량 엣지 컴퓨팅에서의 태스크 마이그레이션)

  • Moon, Sungwon;Lim, Yujin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.12
    • /
    • pp.311-318
    • /
    • 2021
  • With the rapid development of the Internet of Things(IoT) technology recently, multi-access edge computing(MEC) is emerged as a next-generation technology for real-time and high-performance services. High mobility of users between MECs with limited service areas is considered one of the issues in the MEC environment. In this paper, we consider a vehicle edge computing(VEC) environment which has a high mobility, and propose a task migration algorithm to decide whether or not to migrate and where to migrate using DQN, as a reinforcement learning method. The objective of the proposed algorithm is to improve the system throughput while satisfying QoS(Quality of Service) requirements by minimizing the difference between queueing delays in vehicle edge computing servers(VECSs). The results show that compared to other algorithms, the proposed algorithm achieves approximately 14-49% better QoS satisfaction and approximately 14-38% lower service blocking rate.

Fine Grained Security in Cloud with Cryptographic Access Control

  • Aparna Manikonda;Nalini N
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.123-127
    • /
    • 2024
  • Cloud computing services has gained increasing popularity in recent years for supporting various on demand and scalable services for IT consumers where there is a need of less investment towards infrastructure. While storage architecture of cloud enjoys a more robust and fault-tolerant cloud computing network, such architecture also poses a number of security challenges especially when applied in applications related to social networks, Financial transactions, etc. First, as data are stored and maintained by individual virtual machines so Cloud resources are prone to hijacked. Such attacks allow attackers to create, modify and delete machine images, and change administrative passwords and settings successfully. hence, it is significantly harder to ensure data security. Second, Due to dynamic and shared nature of the Cloud, data may be compromised in many ways. Last but not least, Service hijacking may lead to redirect client to an illegitimate website. User accounts and service instances could in turn make a new base for attackers. To address the above challenges, we propose in this paper a distributed data access control scheme that is able to fulfil fine-grained access control over cloud data and is resilient against strong attacks such as compromise and user colluding. The proposed framework exploits a novel cryptographic primitive called attribute-based encryption (ABE), tailors, and adapts it for cloud computing with respect to security requirements

Variability-based Service Specification Method for Brokering Cloud Services (클라우드 서비스 중개를 위한 가변성 기반의 서비스 명세 기법)

  • An, Youngmin;Park, Joonseok;Yeom, Keunhyuk
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.12
    • /
    • pp.664-669
    • /
    • 2014
  • As the prevalence of cloud computing increases, various cloud service types have emerged, such as IaaS, PaaS, and SaaS. The growth and diversification of these cloud services has also resulted in the development of technology for cloud service brokers (CSBs), which serve as intermediate cloud services that can assist cloud tenants (users) in deploying services that fit their requirements. In order to broker cloud services, CSBs require the specification of structural models in order to facilitate the analysis and search for cloud services. In this study, we propose a variability-based service analysis model (SAM) that can be used to describe various cloud services. This model is based on the concept of variability in the software product line and represents the commonality and variability of cloud services by binding variants to each variation point that exists in the specification, quality, and pricing of the services. We also propose a virtual cloud bank architecture as a CSB that serves as an intermediate to provides tenants with appropriate cloud services based on the SAM.

Privacy Enhanced Data Security Mechanism in a Large-Scale Distributed Computing System for HTC and MTC

  • Rho, Seungwoo;Park, Sangbae;Hwang, Soonwook
    • International Journal of Contents
    • /
    • v.12 no.2
    • /
    • pp.6-11
    • /
    • 2016
  • We developed a pilot-job based large-scale distributed computing system to support HTC and MTC, called HTCaaS (High-Throughput Computing as a Service), which helps scientists solve large-scale scientific problems in areas such as pharmaceutical domains, high-energy physics, nuclear physics and bio science. Since most of these problems involve critical data that affect the national economy and activate basic industries, data privacy is a very important issue. In this paper, we implement a privacy enhanced data security mechanism to support HTC and MTC in a large-scale distributed computing system and show how this technique affects performance in our system. With this mechanism, users can securely store data in our system.

A Grid Service based on OGSA for Process Fault Detection (프로세스 결함 검출을 위한 OGSA 기반 그리드 서비스의 설계 및 구현)

  • Kang, Yun-Hee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.314-317
    • /
    • 2004
  • With the advance of network and software infrastructure, Grid-computing technology on a cluster of heterogeneous computing resources becomes pervasive. Grid computing is required a coordinated use of an assembly of distributed computers, which are linked by WAN. As the number of grid system components increases, the probability of failure in the grid computing is higher than that in a traditional parallel computing. To provide the robustness of grid applications, fault detection is critical and is essential elements in design and implementation. In this paper, a OGSA based process fault-detection services presented to provide high reliability under low network traffic environment.

  • PDF

Data Standardization Method for Quality Management of Cloud Computing Services using Artificial Intelligence (인공지능을 활용한 클라우드 컴퓨팅 서비스의 품질 관리를 위한 데이터 정형화 방법)

  • Jung, Hyun Chul;Seo, Kwang-Kyu
    • Journal of the Semiconductor & Display Technology
    • /
    • v.21 no.2
    • /
    • pp.133-137
    • /
    • 2022
  • In the smart industry where data plays an important role, cloud computing is being used in a complex and advanced way as a convergence technology because it has and fits well with its strengths. Accordingly, in order to utilize artificial intelligence rather than human beings for quality management of cloud computing services, a consistent standardization method of data collected from various nodes in various areas is required. Therefore, this study analyzed technologies and cases for incorporating artificial intelligence into specific services through previous studies, suggested a plan to use artificial intelligence to comprehensively standardize data in quality management of cloud computing services, and then verified it through case studies. It can also be applied to the artificial intelligence learning model that analyzes the risks arising from the data formalization method presented in this study and predicts the quality risks that are likely to occur. However, there is also a limitation that separate policy development for service quality management needs to be supplemented.

An Exhaustive Review on Security Issues in Cloud Computing

  • Fatima, Shahin;Ahmad, Shish
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3219-3237
    • /
    • 2019
  • The Cloud Computing is growing rapidly in the current IT industry. Cloud computing has become a buzzword in relation to Grid & Utility computing. It provides on demand services to customers and customers will pay for what they get. Various "Cloud Service Provider" such as Microsoft Azure, Google Web Services etc. enables the users to access the cloud in cost effective manner. However, security, privacy and integrity of data is a major concern. In this paper various security challenges have been identified and the survey briefs the comprehensive overview of various security issues in cloud computing. The classification of security issues in cloud computing have been studied. In this paper we have discussed security challenges in cloud computing and also list recommended methods available for addressing them in the literature.