• Title/Summary/Keyword: Multi-Cloud

Search Result 389, Processing Time 0.027 seconds

Open Source Cloud Computing: An Experience Case of Geo-based Image Handling in Amazon Web Services

  • Lee, Ki-Won
    • Korean Journal of Remote Sensing
    • /
    • v.28 no.3
    • /
    • pp.337-346
    • /
    • 2012
  • In the view from most application system developers and users, cloud computing becomes popular in recent years and is still evolving. But in fact it is not easy to reach at the level of actual operations. Despite, it is known that the cloud in the practical stage provides a new pattern for deploying a geo-spatial application. However, domestically geo-spatial application implementation and operation based on this concept or scheme is on the beginning stage. It is the motivation of this works. Although this study is an introductory level, a simple and practical processed result was presented. This study was carried out on Amazon web services platform, as infrastructure as a service in the geo-spatial areas. Under this environment, cloud instance, a web and mobile system being previously implemented in the multi-layered structure for geo-spatial open sources of database and application server, was generated. Judging from this example, it is highly possible that cloud services with the functions of geo-processing service and large volume data handling are the crucial point, leading a new business model for civilian remote sensing application and geo-spatial enterprise industry. The further works to extend geo-spatial applications in cloud computing paradigm are left.

Cloud-based Satellite Image Processing Service by Open Source Stack: A KARI Case

  • Lee, Kiwon;Kang, Sanggoo;Kim, Kwangseob;Chae, Tae-Byeong
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.4
    • /
    • pp.339-350
    • /
    • 2017
  • In recent, cloud computing paradigm and open source as a huge trend in the Information Communication Technology (ICT) are widely applied, being closely interrelated to each other in the various applications. The integrated services by both technologies is generally regarded as one of a prospective web-based business models impacting the concerned industries. In spite of progressing those technologies, there are a few application cases in the geo-based application domains. The purpose of this study is to develop a cloud-based service system for satellite image processing based on the pure and full open source. On the OpenStack, cloud computing open source, virtual servers for system management by open source stack and image processing functionalities provided by OTB have been built or constructed. In this stage, practical image processing functions for KOMPSAT within this service system are thresholding segmentation, pan-sharpening with multi-resolution image sets, change detection with paired image sets. This is the first case in which a government-supporting space science institution provides cloud-based services for satellite image processing functionalities based on pure open source stack. It is expected that this implemented system can expand with further image processing algorithms using public and open data sets.

PreBAC: a novel Access Control scheme based Proxy Re-Encryption for cloud computing

  • Su, Mang;Wang, Liangchen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2754-2767
    • /
    • 2019
  • Cloud computing is widely used in information spreading and processing, which has provided a easy and quick way for users to access data and retrieve service. Generally, in order to prevent the leakage of the information, the data in cloud is transferred in the encrypted form. As one of the traditional security technologies, access control is an important part for cloud security. However, the current access control schemes are not suitable for cloud, thus, it is a vital problem to design an access control scheme which should take account of complex factors to satisfy the various requirements for cipher text protection. We present a novel access control scheme based on proxy re-encryption(PRE) technology (PreBAC) for cipher text. It will suitable for the protection of data confidently and information privacy. At first, We will give the motivations and related works, and then specify system model for our scheme. Secondly, the algorithms are given and security of our scheme is proved. Finally, the comparisons between other schemes are made to show the advantages of PreBAC.

Concurrency Control Method to Provide Transactional Processing for Cloud Data Management System

  • Choi, Dojin;Song, Seokil
    • International Journal of Contents
    • /
    • v.12 no.1
    • /
    • pp.60-64
    • /
    • 2016
  • As new applications of cloud data management system (CDMS) such as online games, cooperation edit, social network, and so on, are increasing, transaction processing capabilities for CDMS are required. Several transaction processing methods for cloud data management system (CDMS) have been proposed. However, existing transaction processing methods have some problems. Some of them provide limited transaction processing capabilities. Some of them are hard to be integrated with existing CDMSs. In this paper, we proposed a new concurrency control method to support transaction processing capability for CDMS to solve these problems. The proposed method was designed and implemented based on Spark, an in-memory distributed processing framework. It uses RDD (Resilient Distributed Dataset) model to provide fault tolerant to data in the main memory. In our proposed method, database stored in CDMS is loaded to main memory managed by Spark. The loaded data set is then transformed to RDD. In addition, we proposed a multi-version concurrency control method through immutable characteristics of RDD. Finally, we performed experiments to show the feasibility of the proposed method.

Resource-efficient load-balancing framework for cloud data center networks

  • Kumar, Jitendra;Singh, Ashutosh Kumar;Mohan, Anand
    • ETRI Journal
    • /
    • v.43 no.1
    • /
    • pp.53-63
    • /
    • 2021
  • Cloud computing has drastically reduced the price of computing resources through the use of virtualized resources that are shared among users. However, the established large cloud data centers have a large carbon footprint owing to their excessive power consumption. Inefficiency in resource utilization and power consumption results in the low fiscal gain of service providers. Therefore, data centers should adopt an effective resource-management approach. In this paper, we present a novel load-balancing framework with the objective of minimizing the operational cost of data centers through improved resource utilization. The framework utilizes a modified genetic algorithm for realizing the optimal allocation of virtual machines (VMs) over physical machines. The experimental results demonstrate that the proposed framework improves the resource utilization by up to 45.21%, 84.49%, 119.93%, and 113.96% over a recent and three other standard heuristics-based VM placement approaches.

A Research about Hybrid Cloud Service Models (하이브리드 클라우드 서비스 모델에 대한 연구)

  • Lee, Jaekyung;Son, Junggab;Eun, Hasoo;Oh, Heekuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.552-555
    • /
    • 2013
  • 클라우드 컴퓨팅은 인터넷 기술을 기반으로 소프트웨어, 스토리지, OS 등의 가상화된 IT 자원 서비스로서 이용한 만큼 비용을 지불하는 방식으로 제공된다. 따라서 이를 이용하는 사용자 또는 조직이 IT 자원의 유지비용을 절감할 수 있는 이점이 있다. 하지만 기존의 단일 클라우드 서비스 모델은 가용성 문제, vendor lock-in 문제 등의 해결하기 어려운 문제점을 가지고 있다. 이에 따라 최근 클라우드 서비스 간 상호작용을 통해 기존 단일 클라우드의 문제를 해결하고자 하는 모델에 대한 연구가 진행되고 있다. 본 논문에서는 앞서 언급한 모델을 hybrid 클라우드 서비스 모델이라 칭한다. 현재까지 hybrid 클라우드 서비스 모델은 multi-cloud, inter-cloud, collaborative-cloud 등 크게 세 가지 형태로 제안되었다. 본 논문에서는 hybrid 클라우드 서비스 모델에 대한 전반적인 내용을 분석하고, 서로 다른 클라우드 서비스 간 상호작용 과정에서 새롭게 발생할 수 있는 보안 문제를 분석한다.

Enhancing cloud computing security: A hybrid machine learning approach for detecting malicious nano-structures behavior

  • Xu Guo;T.T. Murmy
    • Advances in nano research
    • /
    • v.15 no.6
    • /
    • pp.513-520
    • /
    • 2023
  • The exponential proliferation of cutting-edge computing technologies has spurred organizations to outsource their data and computational needs. In the realm of cloud-based computing environments, ensuring robust security, encompassing principles such as confidentiality, availability, and integrity, stands as an overarching imperative. Elevating security measures beyond conventional strategies hinges on a profound comprehension of malware's multifaceted behavioral landscape. This paper presents an innovative paradigm aimed at empowering cloud service providers to adeptly model user behaviors. Our approach harnesses the power of a Particle Swarm Optimization-based Probabilistic Neural Network (PSO-PNN) for detection and recognition processes. Within the initial recognition module, user behaviors are translated into a comprehensible format, and the identification of malicious nano-structures behaviors is orchestrated through a multi-layer neural network. Leveraging the UNSW-NB15 dataset, we meticulously validate our approach, effectively characterizing diverse manifestations of malicious nano-structures behaviors exhibited by users. The experimental results unequivocally underscore the promise of our method in fortifying security monitoring and the discernment of malicious nano-structures behaviors.

A hierarchical property-based multi-level approach method for improves user access control in a cloud environment (클라우드 환경에서 사용자 접근제어를 향상시킨 계층적 속성 기반의 다단계 접근 방법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Choel
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.7-13
    • /
    • 2017
  • In recent years, cloud computing technology has been socially emerged that provides services remotely as various devices are used. However, there are increasing attempts by some users to provide cloud computing services with malicious intent. In this paper, we propose a property - based multi - level hierarchical approach to facilitate authentication access for users accessing servers in cloud environment. The proposed method improves the security efficiency as well as the server efficiency by hierarchically distributing a set of attribute values by replacing the order of the user 's attribute values in the form of bits according to a certain rule. In the performance evaluation, the proposed method shows that the accuracy of authentication according to the number of attributes is higher than that of the existing method by an average of 15.8% or more, and the authentication delay time of the server is decreased by 10.7% on average. As the number of attributes increases, the average overhead change is 8.5% lower than that of the conventional method.

Big Data Architecture Design for the Development of Hyper Live Map (HLM)

  • Moon, Sujung;Pyeon, Muwook;Bae, Sangwon;Lee, Dorim;Han, Sangwon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.34 no.2
    • /
    • pp.207-215
    • /
    • 2016
  • The demand for spatial data service technologies is increasing lately with the development of realistic 3D spatial information services and ICT (Information and Communication Technology). Research is being conducted on the real-time provision of spatial data services through a variety of mobile and Web-based contents. Big data or cloud computing can be presented as alternatives to the construction of spatial data for the effective use of large volumes of data. In this paper, the process of building HLM (Hyper Live Map) using multi-source data to acquire stereo CCTV and other various data is presented and a big data service architecture design is proposed for the use of flexible and scalable cloud computing to handle big data created by users through such media as social network services and black boxes. The provision of spatial data services in real time using big data and cloud computing will enable us to implement navigation systems, vehicle augmented reality, real-time 3D spatial information, and single picture based positioning above the single GPS level using low-cost image-based position recognition technology in the future. Furthermore, Big Data and Cloud Computing are also used for data collection and provision in U-City and Smart-City environment as well, and the big data service architecture will provide users with information in real time.

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.