• Title/Summary/Keyword: Research Challenges in the Cloud

Search Result 50, Processing Time 0.024 seconds

Cryptography in the Cloud: Advances and Challenges

  • Boyd, Colin
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.17-23
    • /
    • 2013
  • Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.

Research on Convergence of Internet-of-Things and Cloud Computing (사물인터넷과 클라우드 컴퓨팅의 융합에 대한 연구)

  • Choi, Kyung;Kim, Mihui
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.5
    • /
    • pp.1-12
    • /
    • 2016
  • Internet of Things (IoTs) technologies have been computerized information generated from a variety of objects and humans, and have been applied to various fields by connecting via the Internet. In order to compensate for the marginal characteristics of IoT smart devices, such as low-power, limited processing and capacities, combining IoT and cloud computing technologies is now established itself as one of the paradigms. In this paper, we look at the definition, features and services of IoT and cloud computing technology, and we investigate and analyze the conversing needs of IoT and could computing, existing conversion paradigms, convergence cases, and platforms. In results, there are challenges to be solved, even though the cloud technologies complement a number of restrictions of IoT and offer various advantages such as scalability, interoperability, reliability, efficiency, availability, security, ease of access, ease of use, and reduced cost of deployment. We analyze the new research issues of convergence paradigm, and finally suggest a research challenges for convergence.

Design of Distributed Cloud System for Managing large-scale Genomic Data

  • Seine Jang;Seok-Jae Moon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.119-126
    • /
    • 2024
  • The volume of genomic data is constantly increasing in various modern industries and research fields. This growth presents new challenges and opportunities in terms of the quantity and diversity of genetic data. In this paper, we propose a distributed cloud system for integrating and managing large-scale gene databases. By introducing a distributed data storage and processing system based on the Hadoop Distributed File System (HDFS), various formats and sizes of genomic data can be efficiently integrated. Furthermore, by leveraging Spark on YARN, efficient management of distributed cloud computing tasks and optimal resource allocation are achieved. This establishes a foundation for the rapid processing and analysis of large-scale genomic data. Additionally, by utilizing BigQuery ML, machine learning models are developed to support genetic search and prediction, enabling researchers to more effectively utilize data. It is expected that this will contribute to driving innovative advancements in genetic research and applications.

Analyzing XR(eXtended Reality) Trends in South Korea: Opportunities and Challenges

  • Sukchang Lee
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.2
    • /
    • pp.221-226
    • /
    • 2024
  • This study used text mining, a big data analysis technique, to explore XR trends in South Korea. For this research, I utilized a big data platform called BigKinds. I collected data focusing on the keyword 'XR', spanning approximately 14 years from 2010 to 2024. The gathered data underwent a cleansing process and was analyzed in three ways: keyword trend analysis, relational analysis, and word cloud. The analysis identified the emergence and most active discussion periods of XR, with XR devices and manufacturers emerging as key keywords.

A Study on trend Analysis and Future Prospects of Cloud Game Industry - Focus on Device, Platform, Contents - (클라우드 게임산업 동향분석 및 전망에 관한 연구 - 디바이스, 플랫폼, 콘텐츠를 중심으로 -)

  • Doo, Ill Chul;Baek, Jae Yong;Shin, Hyun Wook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.181-195
    • /
    • 2014
  • The game Industry has been a major leader in business world with its size and volume in terms of profit and culture contents, and ever increasing at the moment. Cloud Game has appeared as a new, combined game format, playable on smart TV and smart phone with its upgraded storage size and fast spreading N-screen. This research studies the present reality of the cloud industry by focusing on three categories which are device type, Platform, and game contents consequently in order to determine the future prospect of cloud games. First, the cloud game business will thrive as devices such as smart TV and smart phone are used widely. Second, the cloud game industry will have a new era when OS systems of Platform are united effectively. Third, the previous platform holders will have to face new challenges brought up by cloud games' service providers. Forth, the gamer, developer, and service provider need each other in order to widen the spectrum of business in cloud game industry.

Security in Network Virtualization: A Survey

  • Jee, Seung Hun;Park, Ji Su;Shon, Jin Gon
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.801-817
    • /
    • 2021
  • Network virtualization technologies have played efficient roles in deploying cloud, Internet of Things (IoT), big data, and 5G network. We have conducted a survey on network virtualization technologies, such as software-defined networking (SDN), network functions virtualization (NFV), and network virtualization overlay (NVO). For each of technologies, we have explained the comprehensive architectures, applied technologies, and the advantages and disadvantages. Furthermore, this paper has provided a summarized view of the latest research works on challenges and solutions of security issues mainly focused on DDoS attack and encryption.

A Review of Security and Privacy of Cloud Based E-Healthcare Systems

  • Faiza Nawaz;Jawwad Ibrahim;Maida Junaid
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.153-160
    • /
    • 2024
  • Information technology plays an important role in healthcare. The cloud has several applications in the fields of education, social media and medicine. But the advantage of the cloud for medical reasons is very appropriate, especially given the large volume of data generated by healthcare organizations. As in increasingly health organizations adopting towards electronic health records in the cloud which can be accessed around the world for various health issues regarding references, healthcare educational research and etc. Cloud computing has many advantages, such as "flexibility, cost and energy savings, resource sharing and rapid deployment". However, despite the significant benefits of using the cloud computing for health IT, data security, privacy, reliability, integration and portability are some of the main challenges and obstacles for its implementation. Health data are highly confidential records that should not be made available to unauthorized persons to protect the security of patient information. In this paper, we discuss the privacy and security requirement of EHS as well as privacy and security issues of EHS and also focus on a comprehensive review of the current and existing literature on Electronic health that uses a variety of approaches and procedures to handle security and privacy issues. The strengths and weaknesses of some of these methods were mentioned. The significance of security issues in the cloud computing environment is a challenge.

Resource Management in 5G Mobile Networks: Survey and Challenges

  • Chien, Wei-Che;Huang, Shih-Yun;Lai, Chin-Feng;Chao, Han-Chieh
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.896-914
    • /
    • 2020
  • With the rapid growth of network traffic, a large number of connected devices, and higher application services, the traditional network is facing several challenges. In addition to improving the current network architecture and hardware specifications, effective resource management means the development trend of 5G. Although many existing potential technologies have been proposed to solve the some of 5G challenges, such as multiple-input multiple-output (MIMO), software-defined networking (SDN), network functions virtualization (NFV), edge computing, millimeter-wave, etc., research studies in 5G continue to enrich its function and move toward B5G mobile networks. In this paper, focusing on the resource allocation issues of 5G core networks and radio access networks, we address the latest technological developments and discuss the current challenges for resource management in 5G.

The Development and Application of Cloud Computing-based BPM-ERP System for Small and Medium Marine Equipment Makers (중소 조선기자재 업체를 위한 클라우드 컴퓨팅기반 BPM-ERP 시스템 개발 및 적용)

  • Jung, Dong-Gyu;Cho, Chi-Woon;Nam, Yong-Sic
    • IE interfaces
    • /
    • v.23 no.2
    • /
    • pp.126-138
    • /
    • 2010
  • Marine equipment makers today face a multitude of challenges including the needs of an internal system for easy management of their business processes and a collaboration system to streamline communications with the parent company, increasing product complexity and heightened requirements for information technology. In this research, a BPM-ERP system called Biz $Tower^{(R)}$ was implemented based on cloud computing for especially, small and medium marine equipment makers to standardize and visualize the entire business process from order placement to release. This system also provides their parent company with visibility into the status of orders and user can easily access the system on the web at a low price through cloud computing service. Thus far, this paper demonstrates the applicability of Biz $Tower^{(R)}$ to improve management visibility, process performance, and collaboration with the parent company for small and medium marine equipment makers.

Research on Personalized Course Recommendation Algorithm Based on Att-CIN-DNN under Online Education Cloud Platform

  • Xiaoqiang Liu;Feng Hou
    • Journal of Information Processing Systems
    • /
    • v.20 no.3
    • /
    • pp.360-374
    • /
    • 2024
  • A personalized course recommendation algorithm based on deep learning in an online education cloud platform is proposed to address the challenges associated with effective information extraction and insufficient feature extraction. First, the user potential preferences are obtained through the course summary, course review information, user course history, and other data. Second, by embedding, the word vector is turned into a low-dimensional and dense real-valued vector, which is then fed into the compressed interaction network-deep neural network model. Finally, considering that learners and different interactive courses play different roles in the final recommendation and prediction results, an attention mechanism is introduced. The accuracy, recall rate, and F1 value of the proposed method are 0.851, 0.856, and 0.853, respectively, when the length of the recommendation list K is 35. Consequently, the proposed strategy outperforms the comparison model in terms of recommending customized course resources.