• Title/Summary/Keyword: Microsoft Azure Cloud

Search Result 8, Processing Time 0.021 seconds

Small and Medium-Sized Construction Company ERP Construction(fERP) (Cloud 기반의 중소건설 사용 현장중심 ERP 개발(fERP))

  • Shin, Seong-Yoon;Lee, Hyun-Chang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.47-48
    • /
    • 2017
  • 본 논문에서는 Microsoft Azure 플랫폼의 Azure PowerShell, Azure CLI(Command Line Interface), REST API를 활용하여 클라우드 기반 서비스 포털과 관리 포털을 개발함으로서 중소건설사에서 건설현장의 공사원가 관리 및 일일 관리를 위한 모듈과 서비스 제공을 위해 필요한 서비스 포털 및 관리 포털과 제품 관리 모듈 등 클라우드 서비스 구축 수행하였다.

  • PDF

Performance Evaluation of IoT Cloud Platforms for Smart Buildings (스마트 빌딩을 위한 IoT 클라우드 플랫폼의 성능 평가)

  • Park, Jung Kyu;Park, Eun Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.664-671
    • /
    • 2020
  • A Smart Building, one that uses automated processes to control its operations, refers in this study to one that uses both Internet of Things (IoT) devices and cloud services software. Cloud service providers (e.g. Amazon, Google, and Microsoft) have recently providedIoT cloud platform application services on IoT devices. According to Postscapes, there are now 152 IoT cloud platforms. Choosing one for a smart building is challenging. We selected Microsoft Azure IoT Hub and Amazon's AWS (Amazon Web Services) IoT. The two platforms were evaluated and selected from a smart building perspective. Each prototype was evaluated on two different IoTplatforms, assuming a typical smart building scenario. The selection was based on information and experience gained from developing the prototype system using the IoT cloud platform. The assessment made in this evaluation may be used to select an IoTcloud platform for smart buildings in the future.

A Deep Learning Approach for Intrusion Detection

  • Roua Dhahbi;Farah Jemili
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.89-96
    • /
    • 2023
  • Intrusion detection has been widely studied in both industry and academia, but cybersecurity analysts always want more accuracy and global threat analysis to secure their systems in cyberspace. Big data represent the great challenge of intrusion detection systems, making it hard to monitor and analyze this large volume of data using traditional techniques. Recently, deep learning has been emerged as a new approach which enables the use of Big Data with a low training time and high accuracy rate. In this paper, we propose an approach of an IDS based on cloud computing and the integration of big data and deep learning techniques to detect different attacks as early as possible. To demonstrate the efficacy of this system, we implement the proposed system within Microsoft Azure Cloud, as it provides both processing power and storage capabilities, using a convolutional neural network (CNN-IDS) with the distributed computing environment Apache Spark, integrated with Keras Deep Learning Library. We study the performance of the model in two categories of classification (binary and multiclass) using CSE-CIC-IDS2018 dataset. Our system showed a great performance due to the integration of deep learning technique and Apache Spark engine.

Development and Performance Assessment of the Nakdong River Real-Time Runoff Analysis System Using Distributed Model and Cloud Service (분포형 모형과 클라우드 서비스를 이용한 낙동강 실시간 유출해석시스템 개발 및 성능평가)

  • KIM, Gil-Ho;CHOI, Yun-Seok;WON, Young-Jin;KIM, Kyung-Tak
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.20 no.3
    • /
    • pp.12-26
    • /
    • 2017
  • The objective of this study was to develop a runoff analysis system of the Nakdong River watershed using the GRM (Grid-based Rainfall-runoff Model), a physically-based distributed rainfall-runoff model, and to assess the system run time performance according to Microsoft Azure VM (Virtual Machine) settings. Nakdong River watershed was divided into 20 sub-watersheds, and GRM model was constructed for each subwatershed. Runoff analysis of each watershed was calculated in separated CPU process that maintained the upstream and downstream topology. MoLIT (Ministry of Land, Infrastructure and Transport) real-time radar rainfall and dam discharge data were applied to the analysis. Runoff analysis system was run in Azure environment, and simulation results were displayed through web page. Based on this study, the Nakdong River real-time runoff analysis system, which consisted of a real-time data server, calculation node (Azure), and user PC, could be developed. The system performance was more dependent on the CPU than RAM. Disk I/O and calculation bottlenecks could be resolved by distributing disk I/O and calculation processes, respectively, and simulation runtime could thereby be decreased. The study results could be referenced to construct a large watershed runoff analysis system using a distributed model with high resolution spatial and hydrological data.

Flexible Crypto System for IoT and Cloud Service (IoT와 클라우드 서비스를 위한 유연한 암호화 시스템)

  • Kim, SeokWoo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.1
    • /
    • pp.15-23
    • /
    • 2016
  • As various IoT devices appear recently, Cloud Services such as DropBox, Amazon S3, Microsoft Azure Storage, etc are widely use for data sharing across the devices. Although, cryptographic algorithms like AES is prevalently used for data security, there is no mechanisms to allow selectively and flexibly use wider spectrum of lightweight cryptographic algorithms such as LEA, SEED, ARIA. With this, IoT devices with lower computation power and limited battery life will suffer from overly expensive workload and cryptographic operations are slower than what is enough. In this paper, we designed and implemented a CloudGate that allows client programs of those cloud services to flexibly select a cryptographic algorithms depending on the required security level. By selectively using LEA lightweight algorithms, we could achieve the cryptographic operations could be maximum 1.8 faster and more efficient than using AES.

An Exhaustive Review on Security Issues in Cloud Computing

  • Fatima, Shahin;Ahmad, Shish
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3219-3237
    • /
    • 2019
  • The Cloud Computing is growing rapidly in the current IT industry. Cloud computing has become a buzzword in relation to Grid & Utility computing. It provides on demand services to customers and customers will pay for what they get. Various "Cloud Service Provider" such as Microsoft Azure, Google Web Services etc. enables the users to access the cloud in cost effective manner. However, security, privacy and integrity of data is a major concern. In this paper various security challenges have been identified and the survey briefs the comprehensive overview of various security issues in cloud computing. The classification of security issues in cloud computing have been studied. In this paper we have discussed security challenges in cloud computing and also list recommended methods available for addressing them in the literature.

Securing Sensitive Data in Cloud Storage (클라우드 스토리지에서의 중요데이터 보호)

  • Lee, Shir-Ly;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.

Selection of Optimal Variables for Clustering of Seoul using Genetic Algorithm (유전자 알고리즘을 이용한 서울시 군집화 최적 변수 선정)

  • Kim, Hyung Jin;Jung, Jae Hoon;Lee, Jung Bin;Kim, Sang Min;Heo, Joon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.22 no.4
    • /
    • pp.175-181
    • /
    • 2014
  • Korean government proposed a new initiative 'government 3.0' with which the administration will open its dataset to the public before requests. City of Seoul is the front runner in disclosure of government data. If we know what kind of attributes are governing factors for any given segmentation, these outcomes can be applied to real world problems of marketing and business strategy, and administrative decision makings. However, with respect to city of Seoul, selection of optimal variables from the open dataset up to several thousands of attributes would require a humongous amount of computation time because it might require a combinatorial optimization while maximizing dissimilarity measures between clusters. In this study, we acquired 718 attribute dataset from Statistics Korea and conducted an analysis to select the most suitable variables, which differentiate Gangnam from other districts, using the Genetic algorithm and Dunn's index. Also, we utilized the Microsoft Azure cloud computing system to speed up the process time. As the result, the optimal 28 variables were finally selected, and the validation result showed that those 28 variables effectively group the Gangnam from other districts using the Ward's minimum variance and K-means algorithm.