• Title/Summary/Keyword: Computing system

Search Result 5,906, Processing Time 0.032 seconds

Service Deployment Strategy for Customer Experience and Cost Optimization under Hybrid Network Computing Environment

  • Ning Wang;Huiqing Wang;Xiaoting Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3030-3049
    • /
    • 2023
  • With the development and wide application of hybrid network computing modes like cloud computing, edge computing and fog computing, the customer service requests and the collaborative optimization of various computing resources face huge challenges. Considering the characteristics of network environment resources, the optimized deployment of service resources is a feasible solution. So, in this paper, the optimal goals for deploying service resources are customer experience and service cost. The focus is on the system impact of deploying services on load, fault tolerance, service cost, and quality of service (QoS). Therefore, the alternate node filtering algorithm (ANF) and the adjustment factor of cost matrix are proposed in this paper to enhance the system service performance without changing the minimum total service cost, and corresponding theoretical proof has been provided. In addition, for improving the fault tolerance of system, the alternate node preference factor and algorithm (ANP) are presented, which can effectively reduce the probability of data copy loss, based on which an improved cost-efficient replica deployment strategy named ICERD is given. Finally, by simulating the random occurrence of cloud node failures in the experiments and comparing the ICERD strategy with representative strategies, it has been validated that the ICERD strategy proposed in this paper not only effectively reduces customer access latency, meets customers' QoS requests, and improves system service quality, but also maintains the load balancing of the entire system, reduces service cost, enhances system fault tolerance, which further confirm the effectiveness and reliability of the ICERD strategy.

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

A Multi-Class Task Scheduling Strategy for Heterogeneous Distributed Computing Systems

  • El-Zoghdy, S.F.;Ghoneim, Ahmed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.117-135
    • /
    • 2016
  • Performance enhancement is one of the most important issues in high performance distributed computing systems. In such computing systems, online users submit their jobs anytime and anywhere to a set of dynamic resources. Jobs arrival and processes execution times are stochastic. The performance of a distributed computing system can be improved by using an effective load balancing strategy to redistribute the user tasks among computing resources for efficient utilization. This paper presents a multi-class load balancing strategy that balances different classes of user tasks on multiple heterogeneous computing nodes to minimize the per-class mean response time. For a wide range of system parameters, the performance of the proposed multi-class load balancing strategy is compared with that of the random distribution load balancing, and uniform distribution load balancing strategies using simulation. The results show that, the proposed strategy outperforms the other two studied strategies in terms of average task response time, and average computing nodes utilization.

Vision and Research Challenges of the Next Generation Knowledge Management Systems : A Pervasive Computing Technology Perspective (편재형 컴퓨팅 기술을 적용한 차세대형 지식경영시스템의 비전과 연구 이슈)

  • Yoo, Keedong;Kwon, Ohbyung
    • Knowledge Management Research
    • /
    • v.10 no.1
    • /
    • pp.1-15
    • /
    • 2009
  • As pervasive computing technology, which aims to get linked to useful knowledge, information or services anytime, anywhere, using any devices and/or artifacts, is proliferating, desirable impacts on knowledge management systems are now available. The pervasive computing technology will potentially enable the knowledge management systems to realize individualization and socialization and ultimately increase the knowledge processing productivity. However, researchers who apply the pervasive computing methodologies to novel way of knowledge management have been very few. These result in unsatisfactory consideration of establishing pervasive knowledge management systems. Hence, the purpose of this paper is to cast the vision of pervasive knowledge management and search for a couple of possible research issues and possibilities. This paper suggests a framework of ubiDSS, an amended knowledge management system for the next generation deploying pervasive and autonomous knowledge acquisition capabilities of ubiquitous computing technologies. Also the CKAM, context-based knowledge acquisition module, is illustrated as a prototype of future knowledge management systems.

  • PDF

Integrated Lighting Enabler System Using M2M Platforms for Enhancing Energy Efficiency

  • Abdurohman, Maman;Putrada, Aji Gautama;Prabowo, Sidik;Wijiutomo, Catur Wirawan;Elmangoush, Asma
    • Journal of Information Processing Systems
    • /
    • v.14 no.4
    • /
    • pp.1033-1048
    • /
    • 2018
  • This paper proposes an integrated lighting enabler system (ILES) based on standard machine-to-machine (M2M) platforms. This system provides common services of end-to-and M2M communication for smart lighting system. It is divided into two sub-systems, namely end-device system and server system. On the server side, the M2M platform OpenMTC is used to receive data from the sensors and send response for activating actuators. At the end-device system, a programmable smart lighting device is connected to the actuators and sensors for communicating their data to the server. Some experiments have been done to prove the system concept. The experiment results show that the proposed integrated lighting enabler system is effective to reduce the power consumption by 25.22% (in average). The proving of significance effect in reducing power consumption is measured by the Wilcoxon method.

A Study on the Authentication of Digital Content in Cloud Computing Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.99-106
    • /
    • 2022
  • In this paper, we proposes digital content management technology in a cloud computing environment. proposes digital content management technology in a cloud computing environment. Computing services using networks are basic infrastructure services that cannot be missed in the era of the 4th Industrial Revolution. Financial services, digital content services, and industrial and home network services using smartphones are changing from services in the local area to a cloud service environment where the entire service is possible. Therefore, this study proposed a system to safely support digital content services suitable for cloud computing environments. The proposed system provides convenience and safety for users to access the system, protects the copyright of digital content authors, and provides a secure digital content distribution and management system. The purpose of this study is to stabilize and revitalize the digital content market by providing a digital content distribution structure suitable for the cloud computing environment.

SD-MTD: Software-Defined Moving-Target Defense for Cloud-System Obfuscation

  • Kang, Ki-Wan;Seo, Jung Taek;Baek, Sung Hoon;Kim, Chul Woo;Park, Ki-Woong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.1063-1075
    • /
    • 2022
  • In recent years, container techniques have been broadly applied to cloud computing systems to maximize their efficiency, flexibility, and economic feasibility. Concurrently, studies have also been conducted to ensure the security of cloud computing. Among these studies, moving-target defense techniques using the high agility and flexibility of cloud-computing systems are gaining attention. Moving-target defense (MTD) is a technique that prevents various security threats in advance by proactively changing the main attributes of the protected target to confuse the attacker. However, an analysis of existing MTD techniques revealed that, although they are capable of deceiving attackers, MTD techniques have practical limitations when applied to an actual cloud-computing system. These limitations include resource wastage, management complexity caused by additional function implementation and system introduction, and a potential increase in attack complexity. Accordingly, this paper proposes a software-defined MTD system that can flexibly apply and manage existing and future MTD techniques. The proposed software-defined MTD system is designed to correctly define a valid mutation range and cycle for each moving-target technique and monitor system-resource status in a software-defined manner. Consequently, the proposed method can flexibly reflect the requirements of each MTD technique without any additional hardware by using a software-defined approach. Moreover, the increased attack complexity can be resolved by applying multiple MTD techniques.

Efficient Virtual Machine Placement Considering System Load (시스템 부하를 고려한 효율적인 가상 머신 배치)

  • Jung, Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.2
    • /
    • pp.35-43
    • /
    • 2020
  • Cloud computing integrates computing resources such as servers, storage, and networks with virtualization technology to provide suitable services according to user needs. Due to the structural characteristics of sharing physical resources based on virtualization technology, threats to availability can occur, so it is essential to respond to availability threats in cloud computing. Existing over-provisioning method is not suitable because it can generate idle resources and cause under-provisioning to degrade or disconnect service. System resources must be allocated in real-time according to the system load to guarantee the cloud system's availability. Through appropriate management measures, it is necessary to reduce the system load and increase the performance of the system. This paper analyzes the work response time according to the allocation or migration of virtual machines and discusses an efficient resource management method considering the system load.

Study on Intrusion Detection System under Cloud Computing Environment (클라우드 컴퓨팅 환경을 위한 침입탐지시스템 특징 분석)

  • Yang, Hwan-Seok;Lee, Byoung-Cheon;Yoo, Seung-Jea
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.59-65
    • /
    • 2012
  • Clouding computing which is developing newly as IT and network technology develops become changed to internet and service environment of company. Especially, it can lend IT resource at low costs and no need to build up infra. Clouding computing environment become popular more and more because various computing environment using virtualization is provided. The attack threat range also becomes wider in proportion to broaden various connection ways and service supply range at these clouding computing. Therefore, intrusion detection system which can protect resource from various attack having malignant attempts is necessary. In this study, we analyzed about characteristic of intrusion detection system at cloud computing environment having big damage than other computing environment when intrusion happen by sharing of resource and virtualization.

Ontology Based Semantic Information System for Grid Computing (그리드 컴퓨팅을 위한 온톨로지 기반의 시맨틱 정보 시스템)

  • Han, Byong-John;Kim, Hyung-Lae;Jeong, Chang-Sung
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.87-103
    • /
    • 2009
  • Grid computing is an expanded technology of distributed computing technology to use low-cost and high-performance computing power in various fields. Although the purpose of Grid computing focuses on large-scale resource sharing, innovative applications, and in some case, high-performance orientation, it has been used as conventional distributed computing environment like clustered computer until now because Grid middleware does not have common sharable information system. In order to use Grid computing environment efficiently which consists of various Grid middlewares, it is necessary to have application-independent information system which can share information description and services, and expand them easily. Thus, in this paper, we propose a semantic information system framework based on web services and ontology for Grid computing environment, called WebSIS. It makes application and middleware developer easy to build sharable and extensible information system which is easy to share information description and can provide ontology based platform-independent information services. We present efficient ontology based information system architecture through WebSIS. Discovering appropriate resource for task execution on Grid needs more high-level information processing because Grid computing environment is more complex than other traditional distributed computing environments and has various considerations which are needed for Grid task execution. Thus, we design and implement resource information system and services by using WebSIS which enables high-level information processing by ontology reasoning and semantic-matching, for automation of task execution on Grid.

  • PDF