• Title/Summary/Keyword: Computing technology

검색결과 4,129건 처리시간 0.03초

The Security Architecture for Secure Cloud Computing Environment

  • Choi, Sang-Yong;Jeong, Kimoon
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권12호
    • /
    • pp.81-87
    • /
    • 2018
  • Cloud computing is a computing environment in which users borrow as many IT resources as they need to, and use them over the network at any point in time. This is the concept of leasing and using as many IT resources as needed to lower IT resource usage costs and increase efficiency. Recently, cloud computing is emerging to provide stable service and volume of data along with major technological developments such as the Internet of Things, artificial intelligence and big data. However, for a more secure cloud environment, the importance of perimeter security such as shared resources and resulting secure data storage and access control is growing. This paper analyzes security threats in cloud computing environments and proposes a security architecture for effective response.

스마트 클라우드 컴퓨팅의 상호작용 로직 및 알고리즘 (Interaction Logic and Algorithm in Smart Cloud Computing)

  • 이태규;신성윤;이현창
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 춘계학술대회
    • /
    • pp.203-206
    • /
    • 2014
  • 본 논문은 클라우드 컴퓨팅의 정보 상호작용을 최적화시키기 위한 클라우드 시스템 및 가상화 구조를 제시하고, 어떻게 정보를 상호작용해야 하는지에 대한 방법에 대해서 논의하고자 한다. 이러한 정보 상호작용을 통해서 클라우드 시스템의 장점을 극대화시키고 스마트 컴퓨팅 로직의 장점을 결합함으로써 정보화 시스템의 효율적 구성과 사용자 정보서비스의 편의성을 실현시키고자 한다.

  • PDF

Proposal of Electronic Engineering Exploration Learning Operation Using Computing Thinking Ability

  • LEE, Seung-Woo;LEE, Sangwon
    • International Journal of Advanced Culture Technology
    • /
    • 제9권4호
    • /
    • pp.110-117
    • /
    • 2021
  • The purpose of the study is to develop effective teaching methods to strengthen the major learning capabilities of electronic engineering learners through inquiry learning using computing thinking ability. To this end, first, in the electronic engineering curriculum, we performed teaching-learning through an inquiry and learning model related to mathematics, probability, and statistics under the theme of various majors in electronic engineering, focusing on understanding computing thinking skills. Second, an efficient electronic engineering subject inquiry class operation using computing thinking ability was conducted, and electronic engineering-linked education contents based on the components of computer thinking were presented. Third, by conducting a case study on inquiry-style teaching using computing thinking skills in the electronic engineering curriculum, we identified the validity of the teaching method to strengthen major competency. In order to prepare for the 4th Industrial Revolution, by implementing mathematics, probability, statistics-related linkage, and convergence education to foster convergent talent, we tried to present effective electronic engineering major competency enhancement measures and cope with innovative technological changes.

미중 기술패권 경쟁과 양자컴퓨팅 정책 동향 (United States-China Competition for Technological Supremacy in Quantum Computing and Policy Trends)

  • 이선재;정선화;조병선
    • 전자통신동향분석
    • /
    • 제38권4호
    • /
    • pp.47-57
    • /
    • 2023
  • The competition for technological supremacy is unfolding in the high-tech field, and quantum computing can be determinant for economic and security ripple effects. The United States and China, leaders in quantum computing, have developed this field through adequate policies. The United States has fostered quantum computing through government policies and competition among private companies, while China has secured world-class technology through large-scale government investment and attracting foreign talent. In quantum computing, securing talented people is essential to guarantee independent technology development regarding academic attributes and security. We analyze quantum computing policies in the United States and China on a timeline and determine their policy trends. In addition, the policies for securing talent in these countries are reviewed, and the policy effects are compared based on literature analysis. Through the analysis of policy cases between the United States and China, bilateral policy implications for Korea are delineated.

The Security and Privacy Issues of Fog Computing

  • Sultan Algarni;Khalid Almarhabi;Ahmed M. Alghamdi;Asem Alradadi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권4호
    • /
    • pp.25-31
    • /
    • 2023
  • Fog computing diversifies cloud computing by using edge devices to provide computing, data storage, communication, management, and control services. As it has a decentralised infrastructure that is capable of amalgamating with cloud computing as well as providing real-time data analysis, it is an emerging method of using multidisciplinary domains for a variety of applications; such as the IoT, Big Data, and smart cities. This present study provides an overview of the security and privacy concerns of fog computing. It also examines its fundamentals and architecture as well as the current trends, challenges, and potential methods of overcoming issues in fog computing.

Research on the current state of practical applications and limitations of quantum computing technology

  • Jaehyung, Kim
    • 한국컴퓨터정보학회논문지
    • /
    • 제28권3호
    • /
    • pp.1-9
    • /
    • 2023
  • 본 논문에서는 양자컴퓨팅 기술을 활용해 유의미한 수준의 현실 문제를 해결하는 데 있어서 응용을 어렵게 하는 요인이 무엇인지 도출하고, 관련 연구 동향과 방향성을 제시한다. 이를 위해, 양자컴퓨팅 기술을 응용하는 일의 어려움을 이해하는 데 필요한 양자 역학의 기본 지식을 컴퓨터공학의 관점에서 정리하고, 현재 상용화된 양자 컴퓨터와 양자 프로그래밍 계층을 문헌을 통해 분석한다. 또한 클라우드 기반 상용 양자컴퓨팅 서비스의 현황과 활용 방안에 대한 분석과정을 통해, 현시점에서 양자컴퓨팅의 실용적 응용을 어렵게 하는 요인으로 양자 컴퓨터 프로그래밍에 대한 진입장벽과 노이즈가 존재하는 중규모 양자 컴퓨터에 대한 제약사항, 아직 성장 중인 오픈소스 생태계, 현실 문제 크기에 대한 시뮬레이션의 어려움의 네 가지 요인을 도출하고 관련 연구에 대한 동향과 방향성을 제시한다. 이를 통해, 양자컴퓨팅 기술의 실용적 응용을 위한 토대를 마련하는 데 기여할 것으로 기대된다.

A Strategic Grid for Implementing Ubiquitous Computing

  • Yeon, Seung-Jun
    • ETRI Journal
    • /
    • 제29권2호
    • /
    • pp.252-254
    • /
    • 2007
  • This letter offers a general framework representing the most effective strategies for implementing ubiquitous computing, given different levels of organizational information system capacity and business needs. The strategic grid offered here identifies promising movements which may potentially have a significant effect on the future development of ubiquitous computing.

  • PDF

유비쿼터스 컴퓨팅 시스템을 위한 상황인식 구조에 관한 연구 (A study on the Context-Aware Architecture for Ubiquitous on Computing System)

  • 두경민;지삼현;김순국;;이강환
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2007년도 춘계종합학술대회
    • /
    • pp.418-422
    • /
    • 2007
  • Ubiquitous Computing System란, 언제 어디서나 통신 및 컴퓨팅이 가능하고 컴퓨팅 시스템이 상호간에 정보를 공유하고 협력하는 컴퓨팅 시스템이다. 이로써 기존의 컴퓨팅 환경과 같이 사용자와 컴퓨터간의 대화형 상호작용이 아닌 물리적인 환경 상황(Context)등을 시스템이 스스로 인식하고 이를 기반으로 사용자와의 상호 작용을 지원하는 상황인식 기술이 필수적인 요소로 부각되고 있다. Ubiquitous Computing System을 위해 사용자 및 주변 환경의 정보를 감지하는 센서(Sensor) 기술이 필요하다. 하지만 사용자 및 주변 환경으로부터 입력되는 불확실하거나 모호한 상황정보에 대한 표현과 추론에 대한 연구는 부족한 실정이다. 본 논문은 Rule based System을 활용하여 CRS(Context Recognition Switch)라는 새로운 개념을 도입한 Context Aware Architecture를 제시한다. CRS는 유비쿼터스 컴퓨팅 시스템을 위해서는 센서로부터 복합적으로 인지된 사용자 정보 및 주변환경의 정보를 사용자로부터 수동적으로 설정되거나 System의 지속적으로 수집된 정보의 통계 값인 Reference Value와 비교하여, 각 상황에 따른 개별적이고 특화된 서비스를 실행을 하도록 제공한다. 이로써 같은 정보의 입력이 들어와도 그 주변 환경의 상황에 따라 사용자의 필요에 최적화된 실행을 할 수 있다. 마지막으로, Ubiquitous Computing System의 향후 발전 가능성을 예상해고, 본 논문에서 제시한 Context Aware Architecture의 유용성을 짐작해 본다.

  • PDF

Challenges and Issues of Resource Allocation Techniques in Cloud Computing

  • Abid, Adnan;Manzoor, Muhammad Faraz;Farooq, Muhammad Shoaib;Farooq, Uzma;Hussain, Muzammil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권7호
    • /
    • pp.2815-2839
    • /
    • 2020
  • In a cloud computing paradigm, allocation of various virtualized ICT resources is a complex problem due to the presence of heterogeneous application (MapReduce, content delivery and networks web applications) workloads having contentious allocation requirements in terms of ICT resource capacities (resource utilization, execution time, response time, etc.). This task of resource allocation becomes more challenging due to finite available resources and increasing consumer demands. Therefore, many unique models and techniques have been proposed to allocate resources efficiently. However, there is no published research available in this domain that clearly address this research problem and provides research taxonomy for classification of resource allocation techniques including strategic, target resources, optimization, scheduling and power. Hence, the main aim of this paper is to identify open challenges faced by the cloud service provider related to allocation of resource such as servers, storage and networks in cloud computing. More than 70 articles, between year 2007 and 2020, related to resource allocation in cloud computing have been shortlisted through a structured mechanism and are reviewed under clearly defined objectives. Lastly, the evolution of research in resource allocation techniques has also been discussed along with salient future directions in this area.

A Novel Smart Contract based Optimized Cloud Selection Framework for Efficient Multi-Party Computation

  • Haotian Chen;Abir EL Azzaoui;Sekione Reward Jeremiah;Jong Hyuk Park
    • Journal of Information Processing Systems
    • /
    • 제19권2호
    • /
    • pp.240-257
    • /
    • 2023
  • The industrial Internet of Things (IIoT) is characterized by intelligent connection, real-time data processing, collaborative monitoring, and automatic information processing. The heterogeneous IIoT devices require a high data rate, high reliability, high coverage, and low delay, thus posing a significant challenge to information security. High-performance edge and cloud servers are a good backup solution for IIoT devices with limited capabilities. However, privacy leakage and network attack cases may occur in heterogeneous IIoT environments. Cloud-based multi-party computing is a reliable privacy-protecting technology that encourages multiparty participation in joint computing without privacy disclosure. However, the default cloud selection method does not meet the heterogeneous IIoT requirements. The server can be dishonest, significantly increasing the probability of multi-party computation failure or inefficiency. This paper proposes a blockchain and smart contract-based optimized cloud node selection framework. Different participants choose the best server that meets their performance demands, considering the communication delay. Smart contracts provide a progressive request mechanism to increase participation. The simulation results show that our framework improves overall multi-party computing efficiency by up to 44.73%.