• Title/Summary/Keyword: Computing as a Service

Search Result 1,474, Processing Time 0.024 seconds

Design of StraaS(streaming as a service) based on Cloud Computing (클라우드 컴퓨팅 기반 스트리밍 서비스(StraaS)의 설계)

  • Cha, Byung-Rae;Sim, Su-Jeong;Kim, Yong-Il
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.2
    • /
    • pp.330-339
    • /
    • 2012
  • In this paper, we define and design the Streaming as a Service (StraaS) to support streaming service based on cloud computing. And we describe the various function and security to StraaS service. Specially, we introduce KS-MMA(Key-generation System for Multilateral Matching Authentication) and SIES(Searchable Image Encryption System) as security function for streaming service and cloud computing.

Applying Ubi-SERVQUAL to Assessing the Quality of Ubiquitous Service Scenarios (Ubi-SERVQUAL을 활용한 시나리오상의 유비쿼터스 서비스 품질 평가)

  • Kwon, Oh-Byung;Kim, Ji-Hoon
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.32 no.1
    • /
    • pp.1-13
    • /
    • 2007
  • Nowadays, ubiquitous computing services begin to be suggested from a few domains such as supply chain, logistics, and location-based services. However, to what extent the services will be successful is hard to be estimated, mainly because a sophisticated service evaluation method focusing on the ubiquitous computing perspective has not been supplied. Hence, this paper alms to build a model to assess the quality of ubiquitous computing service. To do so, an amended model, Ubi-SERVQUAL, is applied to assess the service quality mentioned in ubiquitous computing scenarios. According to the Ubi-SERVQUAL, we found that an actual service with higher quality should consider reliability. responsiveness, assurance and empathy in order to increase customer satisfaction, computer system's intimacy with users and trust.

Task Distribution Scheme based on Service Requirements Considering Opportunistic Fog Computing Nodes in Fog Computing Environments (포그 컴퓨팅 환경에서 기회적 포그 컴퓨팅 노드들을 고려한 서비스 요구사항 기반 테스크 분배 방법)

  • Kyung, Yeunwoong
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.1
    • /
    • pp.51-57
    • /
    • 2021
  • In this paper, we propose a task distribution scheme in fog computing environment considering opportunistic fog computing nodes. As latency is one of the important performance metric for IoT(Internet of Things) applications, there have been lots of researches on the fog computing system. However, since the load can be concentrated to the specific fog computing nodes due to the spatial and temporal IoT characteristics, the load distribution should be considered to prevent the performance degradation. Therefore, this paper proposes a task distribution scheme which considers the static as well as opportunistic fog computing nodes according to their mobility feature. Especially, based on the task requirements, the proposed scheme supports the delay sensitive task processing at the static fog node and delay in-sensitive tasks by means of the opportunistic fog nodes for the task distribution. Based on the performance evaluation, the proposed scheme shows low service response time compared to the conventional schemes.

Analyzing the Challenges for Cloud Computing Business Dissemination in the Service Provider's Perspective (클라우드 컴퓨팅 시장 확산을 위한 공급자 관점의 선결요인)

  • Park, Soo Kyung;Cho, Ji Yeon;Lee, Bong Gyou
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.99-116
    • /
    • 2015
  • The concept of Cloud computing has been introduced in the IT field over 10 years and industry has been expanding constantly. However, compare to the maturity of global market, Korea cloud computing industry is only in the early stage. Even the Korea has advantages in technology infrastructure; the pace of Korea cloud computing market growth is taking a serious downturn. Under these circumstances, it is needed to be discussing that strategy for expanding the cloud computing market size and for sustaining global competitiveness of local companies. Previous studies on plans for Korea cloud computing market has been conducted since 2009 and most of them are tend to examined in demand perspective. Thus, this study aims at identifying the priority of business challenges for making better performance in the market with service provider aspects. To analyze the important factors in the providing cloud computing service, ANP methodology was applied in this study. The network model including five clusters, security, stability, performance, consumer, and institution, was defined through literature review and expert survey was conducted to collect data. As a result of ANP analysis, 'Securing service reliability' was analyzed as the most important factor and followed by 'Preparing the range of legal liability', 'Preventing personal information leakage' and 'Preventing confidential information data leakage.' The priority of result indicates that service provider needs to focus on to make the secured service environment. This study has significance on analyzing the priority of business challenges in the service provider perspective. This study will provide useful guidelines to for establishing strategies in cloud computing market.

Ubiquitous Service Platform using Contextual Information

  • Yoon, Hyung-Min;Jeong, Seong-Hun;Kwon, Oh-Young;Han, Tack-Don
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.231-235
    • /
    • 2003
  • Network infrastructure has spread to an unprecedented extent and is used in various computing devices, such as smart appliances, smart phones, and embedded devices with sensors, which have all been appearing in the computing environment. To accommodate this trend, for a more intelligent service environment, the service platform needs to have abilities that facilitate the operation between services, dynamically share distributed computing resources, and manage appropriate contextual information. We have simulated a service platform to provide intelligent services using contextual information after having implemented the context management service. The context management service gathers raw contextual information from sensors and stores these in the context database. For a consistent basis of contextual information, time and location are used as the key values of the contextual information. The context management service also performs normalization to provide computable contextual information to context-aware applications. In this paper, a service platform based on Jini technology is proposed for constructing an interoperable, dynamic, and . intelligent service environment using contextual information.

  • PDF

Business Continuity and Data Backup in Cloud Computing Service and Architecture Study for Data Availability Zone (비즈니스 연속성을 위한 클라우드 컴퓨팅 서비스에서의 데이터 백업과 데이터 가용영역 아키텍쳐 연구)

  • Park, Young-ho;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2305-2309
    • /
    • 2016
  • Cloud Computing Service should support efficiency and stability. United States of America, for example, provides FedRAMP (Federal Risk and Authorization Management Program) accreditation to certify cloud computing service and hence growth of computing service industry is giving benefits of cost reduction and efficiency to companies. However, the use of computing service brings more risk than ever. Because cloud computing holds all the data of multiple companies, problems such as hacking bring out control loss of service and as a result total data of companies can be lost. Unfortunately, cloud computing certification programs do not have any good solutions for this data loss and companies may lose all the important data without any proper data backup. This paper studies such problems in terms of backup problem and provides Data Availability Zone solution for recovery and safe saving of data so that computing service can offer better efficiency and stability.

System Access Control Technique for Secure Cloud Computing

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.67-76
    • /
    • 2019
  • Along with the diversification of digital content services using wired/wireless networks, the market for the construction of base systems is growing rapidly. Cloud computing services are recognized for a reasonable cost of service and superior system operations. Cloud computing is convenient as far as system construction and maintenance are concerned; however, owing to the security risks associated with the system construction of actual cloud computing service, the ICT(Information and Communications Technologies) market is lacking regardless of its many advantages. In this paper, we conducted an experiment on a cloud computing security enhancement model to strengthen the security aspect of cloud computing and provide convenient services to the users. The objective of this study is to provide secure services for system operation and management while providing convenient services to the users. For secure and convenient cloud computing, a single sign-on (SSO) technique and a system access control technique are proposed. For user authentication using SSO, a security level is established for each user to facilitate the access to the system, thereby designing the system in such a manner that the rights to access resources of the accessed system are not abused. Furthermore, using a user authentication ticket, various systems can be accessed without a reauthorization process. Applying the security technique to protect the entire process of requesting, issuing, and using a ticket against external security threats, the proposed technique facilitates secure cloud computing service.

Many-objective joint optimization for dependency-aware task offloading and service caching in mobile edge computing

  • Xiangyu Shi;Zhixia Zhang;Zhihua Cui;Xingjuan Cai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1238-1259
    • /
    • 2024
  • Previous studies on joint optimization of computation offloading and service caching policies in Mobile Edge Computing (MEC) have often neglected the impact of dependency-aware subtasks, edge server resource constraints, and multiple users on policy formulation. To remedy this deficiency, this paper proposes a many-objective joint optimization dependency-aware task offloading and service caching model (MaJDTOSC). MaJDTOSC considers the impact of dependencies between subtasks on the joint optimization problem of task offloading and service caching in multi-user, resource-constrained MEC scenarios, and takes the task completion time, energy consumption, subtask hit rate, load variability, and storage resource utilization as optimization objectives. Meanwhile, in order to better solve MaJDTOSC, a many-objective evolutionary algorithm TSMSNSGAIII based on a three-stage mating selection strategy is proposed. Simulation results show that TSMSNSGAIII exhibits an excellent and stable performance in solving MaJDTOSC with different number of users setting and can converge faster. Therefore, it is believed that TSMSNSGAIII can provide appropriate sub-task offloading and service caching strategies in multi-user and resource-constrained MEC scenarios, which can greatly improve the system offloading efficiency and enhance the user experience.

An Exploratory Study on the Cloud Computing Services: Issues and Suggestion for The Success

  • Lee, Jong Un;Seo, Kyung Jin;Kim, Hee-Woong
    • Asia pacific journal of information systems
    • /
    • v.24 no.4
    • /
    • pp.473-491
    • /
    • 2014
  • There is a growing interest for 'Cloud computing' to cut costs, and help the users focus on their core business instead of being impeded by IT obstacles. As it became IT version 3.0 which represents the era of cloud services and the dominance of a new kind of IT service provider, cloud service providers (CSPs)' role is more critical as a trusted IT advisor to include cloud migration and integration expertise. However, previous literatures related to cloud computing service have mainly analyzed from customers, although it is hard for customers to totally understand the complex and diverse cloud ecosystem. Therefore, it is an urgent task to mitigate the inhibitory factors in providing the cloud services for activating cloud industry. This study, an exploratory research based on interviews, has derived factors of promoting and hindering the activation of cloud computing from the provider's perspective, and has analyzed a sequence of cause and effect for each factor. For this, the casual loop diagram was developed to deduce key issues, and propose an alternative. The results of this study are expected to help activate 'Cloud computing' in Korea by minimizing the potential negative effects of activating 'Cloud computing' industry.

A Study on RFID System with Secure Service Availability for Ubiquitous Computing

  • Seo, Dae-Hee;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.96-101
    • /
    • 2005
  • Spotlighted as an innovative information technology environment, ubiquitous computing has been actively researched on recently. Especially, domestic and global researches focus on the RFID system, which is being eyed to replace the existing bar-code system. As an essential technology for ubiquitous computing, the RFID system can be applied for various purposes. The security issues of the RFID system focus on how the low-priced tag type could have reasonable price competitiveness. The Auto-ID Center in the U.S. is spearheading the research on distribution service and omni-directional security. As for Japan, the researches on omni-directional security and EPC application are necessary in securing the technology for ubiquitous computing with support from the Ministry of Public Management Home Affairs, Posts, and Telecommunication. In this paper, a method of ensuring the availability of the RFID system service will be presented based on the ubiquitous computing environment with the existing omni-directional security and user-friendly interface. While the existing researches focus on the RF reader system and tag-based security, this paper's suggestion also considers the availability of a sen ice to suggest ways of increasing the practical usage of a low-priced RF tag.