• Title/Summary/Keyword: Private Cloud Computing

Search Result 74, Processing Time 0.022 seconds

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

Building a Private Cloud-Computing System for Greenhouse Control

  • Kim, JoonYong;Lee, Chun Gu;Park, Dong-Hyeok;Park, Heun Dong;Rhee, Joong-Yong
    • Journal of Biosystems Engineering
    • /
    • v.43 no.4
    • /
    • pp.440-444
    • /
    • 2018
  • Purpose: Cloud-computing technology has several advantages, including maintenance, management, accessibility, and computing power. A greenhouse-control system utilizing these advantages was developed using a private cloud-computing system. Methods: A private cloud needs a collection of servers and a suite of software tools to monitor and control cloud-computing resources. In this study, a server farm, operated by OpenStack as a cloud platform, was constructed using servers, and other network devices. Results: The greenhouse-control system was developed according to the fundamental cloud service models: infrastructure as a service, platform as a service, and software as a service. This system has four additional advantages - security, control function, public data use, and data exchange. There are several considerations that must be addressed, such as service level agreement, data ownership, security, and the differences between users. Conclusions: When the advantages are utilized and the considerations are addressed, cloud-computing technology will be beneficial for agricultural use.

Cloud computing Issues and Security measure (클라우드 컴퓨팅 보안 대책 연구)

  • Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.31-35
    • /
    • 2015
  • Cloud computing is internet-based computing technology. This is a form for exchanging service focused on the Internet. Because Cost is saved and use is easy there's a tendency that many companies are using. Cloud is in the form of a public cloud and private cloud and hybrid cloud. The service model is SaaS, PaaS, IaaS. Cloud computing use is simple but it has a security vulnerability. In particular, there is a vulnerability in virtualization and centralized information. In order to overcome this new security technology is to be developed. In particular, network security technology and authentication technology should be developed. Another way to overcome security responsibilities must be clearly and policies should be unified.

  • PDF

One Improved RLWE-based FHE and Fast Private Information Retrieval

  • Song, Wei-Tao;Hu, Bin;Zhao, Xiu-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6260-6276
    • /
    • 2019
  • With the rapid development of cloud computing, it raises real questions on privacy protection, which greatly limits the use of cloud computing. However, fully homomorphic encryption (FHE) can make cloud computing consistent with privacy. In this paper, we propose a simpler FHE scheme based on ring LWE problem, with a smaller size of ciphertext and a lower noise-expansion factor for homomorphic multiplication. Then based on our optimized RLWE-based FHE scheme, we propose a fast single-database private information retrieval protocol, combining with batching and number theoretic transform technology.

Monitoring of Virtual Machines in the Eucalyptus Cloud

  • Nandimandalam, Mohan Krishna Varma;Choi, Eunmi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.169-171
    • /
    • 2013
  • Cloud computing provides access to big volumes of data and computational resources through various services. Cloud computing also supports to process these volumes of data using set of computers. Cloud computing can satisfy resource requirements through virtualization technology. Eucalyptus is an open source cloud computing environment helps the users to setup their own private cloud based on virtualization. In this paper, monitoring of virtual machines is explained with the eucalyptus cloud setup.

Digital Forensic Investigation of Virtual Desktop Infrastructure (가상 데스크톱 환경에 대한 디지털 포렌식 연구)

  • Jang, Sanghee;Kim, Deunghwa;Park, Jungheum;Kang, Cheulhoon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.203-212
    • /
    • 2013
  • Recently, cloud computing is one of the parts showing the biggest growth in the IT market and is expected to continue to grow into. Especially, many companies are adopting virtual desktop infrastructure as private cloud computing to achieve in saving the cost and enhancing the efficiency of the servers. However, current digital forensic investigation methodology of cloud computing is not systematized scientifically and technically. To do this, depending on the type of each cloud computing services, digital evidence collection system for the legal enforcement should be established. In this paper, we focus on virtual desktop infrastructure as private cloud computing and introduce the most widely used around the world desktop virtualization solutions of VMware, Citrix, and Microsoft. And We propose digital forensic investigation methodology for private cloud computing that is constructed by these solutions.

An Analysis of Economic Effects of The Cloud Computing Industry (산업연관분석을 이용한 클라우드 컴퓨팅 산업의 경제적 파급효과 분석)

  • Kim, Dong Wook;Ban, Seung Hyun;Leem, Choon Seong
    • Journal of Information Technology Services
    • /
    • v.17 no.3
    • /
    • pp.37-51
    • /
    • 2018
  • Recently, cloud computing market is growing geometrically in both private and public area, and many global companies in various domains have developed and provided cloud computing services. In such situation, Korean government made multiple plans for domestic cloud computing industry. However, most research institutes have focused on market size and status information, which makes actual effectiveness of cloud computing service hard to recognize. In this study, we define cloud computing Industry by rearranging Input-Output table published by the Bank of Korea to use Input-Output Analysis. The Input-Output Analysis was devised in 1963 by Leontief and it is used in many fields of study until now. It produces various coefficients that are able to identify production-inducing effect, value-added effect, labor-inducing effect, front and rear chain effect. The analysis results show that production-inducing effect, front and rear chain effect of cloud computing industry is low compared to other industries. However, cloud computing Industry possesses relatively high value-added effect and labor-inducing effect. It is because industry magnitude of cloud computing is smaller than other industries such as manufacturing, chemical industries. The economic effects of the cloud computing industry are not remarkable, but this result is significant to emerging markets and industries and presents the fresh way of analyzing cloud computing research field.

Cloud Computing Platforms for Big Data Adoption and Analytics

  • Hussain, Mohammad Jabed;Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.290-296
    • /
    • 2022
  • Big Data is a data analysis technology empowered by late advances in innovations and engineering. In any case, big data involves a colossal responsibility of equipment and handling assets, making reception expenses of big data innovation restrictive to little and medium estimated organizations. Cloud computing offers the guarantee of big data execution to little and medium measured organizations. Big Data preparing is performed through a programming worldview known as MapReduce. Normally, execution of the MapReduce worldview requires organized joined stockpiling and equal preparing. The computing needs of MapReduce writing computer programs are frequently past what little and medium measured business can submit. Cloud computing is on-request network admittance to computing assets, given by an external element. Normal arrangement models for cloud computing incorporate platform as a service (PaaS), software as a service (SaaS), framework as a service (IaaS), and equipment as a service (HaaS).

Economic Evaluation of Cloud Computing Investment Alternatives (클라우드 컴퓨팅 투자안의 경제성 평가)

  • Kim, Tae-Ha;Yang, Ji-Youn;Yang, Hee-Dong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.3
    • /
    • pp.121-135
    • /
    • 2011
  • We provide an economic evaluation model to help managers make reasonable decision for the investment in the appropriate type of cloud computing. Cloud computing can be classified into public, private and hybrid architecture and we evaluate their attractiveness using traditional NPV and real option methods. We conduct economic analysis by comparing traditional software delivery model with various types of cloud computing. The work compares each mode of cloud computing against each other using passive NPV and dynamic real-option method. For more objective and conservative evaluation of investment alternatives, we eliminate conventional benefits that are often subjective or hard to measure, and count only the reduction of investment cost and maintenance cost as benefit. We argue that hybrid and public cloud computing can be undervalued without their intrinsic options such as abandonment, expansion and contraction.

A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud

  • Hong, Hanshu;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2394-2406
    • /
    • 2016
  • ABE has become an effective tool for data protection in cloud computing. However, since users possessing the same attributes share the same private keys, there exist some malicious users exposing their private keys deliberately for illegal data sharing without being detected, which will threaten the security of the cloud system. Such issues remain in many current ABE schemes since the private keys are rarely associated with any user specific identifiers. In order to achieve user accountability as well as provide key exposure protection, in this paper, we propose a key-insulated ciphertext policy attribute based encryption with key exposure accountability (KI-CPABE-KEA). In our scheme, data receiver can decrypt the ciphertext if the attributes he owns match with the self-centric policy which is set by the data owner. Besides, a unique identifier is embedded into each user's private key. If a malicious user exposes his private key for illegal data sharing, his identity can be exactly pinpointed by system manager. The key-insulation mechanism guarantees forward and backward security when key exposure happens as well as provides efficient key updating for users in the cloud system. The higher efficiency with proved security make our KI-CPABE-KEA more appropriate for secure data sharing in cloud computing.