• Title/Summary/Keyword: OwnCloud

Search Result 92, Processing Time 0.023 seconds

Experience in Practical Implementation of Abstraction Interface for Integrated Cloud Resource Management on Multi-Clouds

  • Kim, Huioon;Kim, Hyounggyu;Chun, Kyungwon;Chung, Youngjoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.18-38
    • /
    • 2017
  • Infrastructure-as-a-Service (IaaS) clouds provide infrastructure as a pool of virtual resources, and the public IaaS clouds, e.g. Amazon Web Service (AWS) and private IaaS cloud toolkits, e.g. OpenStack, CloudStack, etc. provide their own application programming interfaces (APIs) for managing the cloud resources they offer. The heterogeneity of the APIs, however, makes it difficult to access and use the multiple cloud services concurrently and collectively. In this paper, we explore previous efforts to solve this problem and present our own implementation of an integrated cloud API, which can make it possible to access and use multiple clouds collectively in a uniform way. The implemented API provides a RESTful access and hides underlying cloud infrastructures from users or applications. We show the implementation details of the integrated API and performance evaluation of it comparing the proprietary APIs based on our cloud testbed. From the evaluation results, we could conclude that the overhead imposed by our interface is negligibly small and can be successfully used for multi-cloud access.

A Secure Social Networking Site based on OAuth Implementation

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.308-315
    • /
    • 2016
  • With the advancement in the area of cloud storage services as well as a tremendous growth of social networking sites, permission for one web service to act on the behalf of another has become increasingly vital as social Internet services such as blogs, photo sharing, and social networks. With this increased cross-site media sharing, there is a upscale of security implications and hence the need to formulate security protocols and considerations. Recently, OAuth, a new protocol for establishing identity management standards across services, is provided as an alternative way to share the user names and passwords, and expose personal information to attacks against on-line data and identities. Moreover, OwnCloud provides an enterprise file synchronizing and sharing that is hosted on user's data center, on user's servers, using user's storage. We propose a secure Social Networking Site (SSN) access based on OAuth implementation by combining two novel concepts of OAuth and OwnCloud. Security analysis and performance evaluation are given to validate the proposed scheme.

Monitoring of Virtual Machines in the Eucalyptus Cloud

  • Nandimandalam, Mohan Krishna Varma;Choi, Eunmi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.169-171
    • /
    • 2013
  • Cloud computing provides access to big volumes of data and computational resources through various services. Cloud computing also supports to process these volumes of data using set of computers. Cloud computing can satisfy resource requirements through virtualization technology. Eucalyptus is an open source cloud computing environment helps the users to setup their own private cloud based on virtualization. In this paper, monitoring of virtual machines is explained with the eucalyptus cloud setup.

Cryptography in the Cloud: Advances and Challenges

  • Boyd, Colin
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.17-23
    • /
    • 2013
  • Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.

Multi-cloud Technology Introduction and Research Trends (멀티 클라우드 기술 개요 및 연구 동향)

  • Kim, B.S.;Jung, Y.W.;Oh, B.T.;Kim, S.Y.;Son, S.;Seo, J.H.;Bae, S.J.;Lee, G.C.;Kang, D.J.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.3
    • /
    • pp.45-54
    • /
    • 2020
  • The cloud computing industry has focused on establishing a cloud-based business environment for enterprises with efforts to convert using their own on-premise computing infrastructures to using cloud services. With these efforts, using cloud services has become natural, especially for the IT industry. The cloud computing industry is moving toward proliferation of the cloud computing environment into various evolving industries. Along with industrial trends, new technical trends such as edge computing and multi-cloud are emerging. These trends are expected to create new business models and develop related service ecosystems, providing new opportunities for service providers and new experiences for users. A mong those emerging technologies, multi-cloud technology is expected to realize unlimited global cloud computing resources by unifying cloud resources from multiple public cloud service providers. In this paper, we introduce the concept and related trends of multi-cloud technology. Subsequently, we analyze the main functionalities and several use cases of multi-cloud technology. Finally, we summarize the effects and usefulness of multi-cloud technology in the domestic cloud industry.

A Study on Authentication Technology of Cloud Service Broker (클라우드 서비스 브로커 인증 기술에 관한 연구)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.321-323
    • /
    • 2016
  • The current cloud system is not compatible as low interoperability between cloud systems because they build up cloud environments with their own way. For example, users who are using Google's cloud system, it will not be able to use the cloud system of MS (Microsoft). To solve these problems, CSB (Cloud Service Broker) technology appeared, but solves interoperability problems between cloud systems require circumstances to develop and still much research. In this study, in the CSB, which has appeared as a service intermediary technology of heterogeneous distributed cloud environment (Cloud Service Broker) technology, to study authentication system, which is a fundamental problem to be solved of the interoperability of the cloud user.

  • PDF

Design of User Integrated Authentication System in Heterogeneous Distributed Cloud Service Brokerage Environment (이종 분산 클라우드 서비스 브로커리지 환경에서의 사용자 통합 인증 시스템 설계)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2061-2066
    • /
    • 2016
  • Currently, cloud systems are not interoperable due to low interoperability between cloud systems as operators build up cloud environments with their own way. For example, users of the Google cloud system can not use the Microsoft (Microsoft) cloud system unless they go through an additional log-in process. In order for Google cloud system's users to use MS cloud system services, they must log in to the MS cloud system again after logging out of Google cloud system. In order to solve these problems, Cloud Service Broker(CSB) technology has emerged to resolve the interoperability problem between cloud systems, but many researches and developments are still needed. In this paper, we design an integrated user authentication system, which is a fundamental problem of cloud user interoperability among CSB (Cloud Service Broker) technologies, which is emerging as a service intervention technology of heterogeneous distributed cloud environment.

Requirements of Consistency Criteria for Cloud Computing Environments (클라우드 환경에서 응용에 따른 일관성 기준의 요구 사항)

  • Kim, Chi-Yeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.732-735
    • /
    • 2011
  • Cloud computing is a new paradigm that adopts a pay-as-you-go business model. So, clients can ues the various resources, although they have not own the resources. Already, three big players of IT industry, namely Amazon, Google and Microsoft, develop the many applications for cloud computing. In this paper, we describe the data consistency requirements for cloud computing. Data characteristics of cloud computing is replicated, distributed and large-scaled. And consistency and availability of data cannot be satisfied simultaneously. In this paper, we categorized the applications of cloud computing, and describe requirements of consistency criteria for applications. With this result, we can make the base of consistency criteria that can be adapted for cloud computing, in the near future.

  • PDF

A Study on Decision Making Factors of Cloud Computing Adoption Using BCOR Approach (BCOR 접근법을 이용한 클라우드 컴퓨팅 도입의 의사결정 요인에 관한 연구)

  • Lee, Young-Chan;Hanh, Tang Nguyen
    • Journal of Information Technology Services
    • /
    • v.11 no.1
    • /
    • pp.155-171
    • /
    • 2012
  • With the continuous and outstanding development of information technology(IT), human being is coming to the new computing era which is called cloud computing. This era brings lots of huge benefits also at the same time release the resources of IT infrastructure and data boom for man. In the future no longer, most of IT service providers, enterprises, organizations and systems will adopt this new computing model. There are three main deployment models in cloud computing including public cloud, private cloud and hybrid cloud; each one also has its own cons and pros. While implementing any kind of cloud services, customers have to choose one of three above deployment models. Thus, our paper aims to represent a practical framework to help the adopter select which one will be the best suitable deployment model for their requirements by evaluating each model comprehensively. The framework is built by applying the analytic hierarchy process(AHP), namely benefit-cost-opportunity-risk(BCOR) model as a powerful and effective tool to serve the problem. The gained results hope not only to provide useful information for the readers but also to contribute valuable knowledge to this new area. In addition, it might support the practitioners' effective decision making process in case they meet the same issue and have a positive influence on the increase of right decision for the organization.

Real-time Roadmap Generation and Updating Method between Heterogeneous Navigation Systems for Unknown Roads in Cloud Computing Environment (클라우드 환경에서 이기종 네비게이션간 새로운 지도 정보 추출 및 업데이트 방법)

  • Lee, Seung-Gwan;Choi, Jin-Hyuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.179-187
    • /
    • 2011
  • Multiple roadmap DB providers are already available in these days, and try to reduce unknown roads in their own roadmaps. However, cooperation models or Win-Win approaches between roadmap providers are not considered yet. Thus, In this paper, We proposed a cloud-oriented real-time roadmap generation and update method between heterogeneous navigation systems for unknown roads. With the proposed method, the roadmap DB providers update the own roadmap DB for navigation systems in real time. Also, they can provide the complete roadmap without unknown roads to users instantly. Therefore, the proposed method can reduce the costs of an actual traveling test and the maintenance for the roadmap DB provides. Thus, the cloud-oriented roadmap generation method can more efficiently update the unknown road information.