• 제목/요약/키워드: Computing technology

검색결과 4,154건 처리시간 0.03초

A Novel Methodology for Auditing the Threats in Cloud Computing - A Perspective based on Cloud Storage

  • Nasreen Sultana Quadri;Kusum Yadav;Yogesh Kumar Sharma
    • International Journal of Computer Science & Network Security
    • /
    • 제24권2호
    • /
    • pp.124-128
    • /
    • 2024
  • Cloud computing is a technology for delivering information in which resources are retrieved from the internet through a web-based tools and applications, rather than a direct connection with the server. It is a new emerging computing based technology in which any individual or organization can remotely store or access the information. The structure of cloud computing allows to store and access various information as long as an electronic device has access to the web. Even though various merits are provided by the cloud from the cloud provides to cloud users, it suffers from various flaws in security. Due to these flaws, data integrity and confidentiality has become a challenging task for both the storage and retrieval process. This paper proposes a novel approach for data protection by an improved auditing based methodology in cloud computing especially in the process of cloud storage. The proposed methodology is proved to be more efficient in auditing the threats while storing data in the cloud computing architecture.

분산 및 에지 클라우드 기술 표준 동향 (Technology Standard Trends in Distributed and Edge Cloud Computing)

  • 인민교;이강찬;이승윤
    • 전자통신동향분석
    • /
    • 제39권3호
    • /
    • pp.69-78
    • /
    • 2024
  • Cloud computing technology based on centralized high-performance computing has brought about major changes across the information technology industry and led to new paradigms. However, with the rapid development of the industry and increasing need for mass generation and real-time processing of data across various fields, centralized cloud computing is lagging behind the demand. This is particularly critical in emerging technologies such as autonomous driving, the metaverse, and augmented/virtual reality that require the provision of services with ultralow latency for real-time performance. To address existing limitations, distributed and edge cloud computing technologies have recently gained attention. These technologies allow for data to be processed and analyzed closer to their point of generation, substantially reducing the response times and optimizing the network bandwidth usage. We describe distributed and edge cloud computing technologies and explore the latest trends in their standardization.

유비쿼터스 서비스의 역기능 분석 및 방지를 위한 제언 (A Proposal on Analyzing and Preventing Adverse Effects of Ubiquitous Services)

  • 강민철;곽수환;김창수
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제19권4호
    • /
    • pp.87-109
    • /
    • 2010
  • The ubiquitous computing & technology is to make passive IT machinery as the smart-object to solve the problems of information management. These ubiquitous devices can be a concierge of humans lives. In addition, the ubiquitous computing & technology added with Pro-Active processing technology is the intellectual automatic process capacity that probably enhance quality of human's life. Although the social influencing power of ubiquitous computing technology is so critical, research on the social impact of ubiquitous has been studied insufficiently. And, we also need the countermeasures to protect the societies from the side effect of the ubiquitous computing technology. The purpose of this research is to minimize the loss which comes from the new ubiquitous society, by presenting the technological and systematic alternatives and by researching the various side effects. This research suggests the proper alternatives by reviewing and by researching the adverse effects of the ubiquitous computing technology.

Enhancing air traffic management efficiency through edge computing and image-aided navigation

  • Pradum Behl;S. Charulatha
    • Advances in aircraft and spacecraft science
    • /
    • 제11권1호
    • /
    • pp.33-53
    • /
    • 2024
  • This paper presents a comprehensive investigation into the optimization of Flight Management Systems (FMS) with a particular emphasis on data processing efficiency by conducting a comparative study with conventional methods to edge-computing technology. The objective of this research is twofold. Firstly, it evaluates the performance of FMS navigation systems using conventional and edge computing methodologies. Secondly, it aims to extend the boundaries of knowledge in edge-computing technology by conducting a rigorous analysis of terrain data and its implications on flight path optimization along with communication with ground stations. The study employs a combination of simulation-based experimentation and algorithmic computations. Through strategic intervals along the flight path, critical parameters such as distance, altitude profiles, and flight path angles are dynamically assessed. Additionally, edge computing techniques enhance data processing speeds, ensuring adaptability to various scenarios. This paper challenges existing paradigms in flight management and opens avenues for further research in integrating edge computing within aviation technology. The findings presented herein carry significant implications for the aviation industry, ranging from improved operational efficiency to heightened safety measures.

Building On/off Attacks Detector for Effective Trust Evaluation in Cloud Services Environment

  • SALAH T. ALSHAMMARI;AIIAD ALBESHRI;KHALID ALSUBHI
    • International Journal of Computer Science & Network Security
    • /
    • 제24권7호
    • /
    • pp.101-107
    • /
    • 2024
  • Cloud computing is a widely used technology that has changed the way people and organizations store and access information. This technology is quite versatile, which is why extensive amounts of data can be stored in the cloud. Furthermore, businesses can access various services over the cloud without having to install applications. However, the cloud computing services are provided over a public domain, which means that both trusted and non-trusted users can access the services. Though there are several advantages of cloud computing services, especially to business owners, various challenges are also posed in terms of the privacy and security of information and online services. A kind of threat that is widely faced in the cloud environment is the on/off attack. In this kind of attack, a few entities exhibit proper behavior for a given time period to develop a highly a positive reputation and gather trust, after which they exhibit deception. A viable solution is provided by the given trust model for preventing the attacks. This method works by providing effective security to the cloud services by identifying malicious and inappropriate behaviors through the application of trust algorithms that can identify on-off attacks.

엣지 컴퓨팅 기술 동향 (Trends in Edge Computing Technology)

  • 홍정하;이강찬;이승윤
    • 전자통신동향분석
    • /
    • 제35권6호
    • /
    • pp.78-87
    • /
    • 2020
  • With the evolution of the Internet of Things (IoT), a computing paradigm shift from cloud to edge computing is rapidly taking place to effectively manage the rapidly increasing volume of data generated by various IoT devices. Edge computing is computing that occurs at or near the physical location of a user or data source. Placing computing services closer to these locations allows users to benefit from faster and more reliable services, and enterprises can take advantage of the flexibility of hybrid cloud computing. This paper describes the concept and main benefits of edge computing and presents the trends and future prospects for edge computing technology.

Task Scheduling on Cloudlet in Mobile Cloud Computing with Load Balancing

  • Poonam;Suman Sangwan
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.73-80
    • /
    • 2023
  • The recent growth in the use of mobile devices has contributed to increased computing and storage requirements. Cloud computing has been used over the past decade to cater to computational and storage needs over the internet. However, the use of various mobile applications like Augmented Reality (AR), M2M Communications, V2X Communications, and the Internet of Things (IoT) led to the emergence of mobile cloud computing (MCC). All data from mobile devices is offloaded and computed on the cloud, removing all limitations incorporated with mobile devices. However, delays induced by the location of data centers led to the birth of edge computing technologies. In this paper, we discuss one of the edge computing technologies, i.e., cloudlet. Cloudlet brings the cloud close to the end-user leading to reduced delay and response time. An algorithm is proposed for scheduling tasks on cloudlet by considering VM's load. Simulation results indicate that the proposed algorithm provides 12% and 29% improvement over EMACS and QRR while balancing the load.

유비쿼터스 디바이스 기술동향과 연구실태에 관한 조사 (A Study on Technology Trends and Researches for Ubiquitous Devices)

  • 진태석
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2008년도 추계종합학술대회 B
    • /
    • pp.836-841
    • /
    • 2008
  • 21세기를 들어서면서 본격적으로 차세대 IT패러다임으로 등장한 유비쿼터스(Ubiquitous) 분야는 정보기술의 패러다임이 PC와 인터넷 중심에서 유비쿼터스로 이동하면서 미래 유비쿼터스 시장을 선점하기 위한 세계 주요국가와 IT기업들이 치열한 전쟁터로 인식되고 있다. 본 연구에서는 유비쿼터스 디바이스에 관련된 국내외 기술 및 연구동향을 알아보고, 유비 쿼터스 사회의 진화에 따른 미래효과와 그에 따른 연구방향 등을 살펴보도록 한다.

  • PDF

Five Forces Model of Computational Power: A Comprehensive Measure Method

  • Wu, Meixi;Guo, Liang;Yang, Xiaotong;Xie, Lina;Wang, Shaopeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권7호
    • /
    • pp.2239-2256
    • /
    • 2022
  • In this paper, a model is proposed to comprehensively evaluate the computational power. The five forces model of computational power solves the problem that the measurement units of different indexes are not unified in the process of computational power evaluation. It combines the bidirectional projection method with TOPSIS method. This model is more scientific and effective in evaluating the comprehensive situation of computational power. Lastly, an example shows the validity and practicability of the model.