• Title/Summary/Keyword: Research Challenges in the Cloud

Search Result 50, Processing Time 0.024 seconds

A study on Cloud Security based on Network Virtualization (네트워크 가상화 기반 클라우드 보안 구성에 관한 연구)

  • Sang-Beom Hong;Sung-Cheol Kim;Mi-Hwa Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • In the cloud computing environment, servers and applications can be set up within minutes, and recovery in case of fail ures has also become easier. Particularly, using virtual servers in the cloud is not only convenient but also cost-effective compared to the traditional approach of setting up physical servers just for temporary services. However, most of the und erlying networks and security systems that serve as the foundation for such servers and applications are primarily hardwa re-based, posing challenges when it comes to implementing cloud virtualization. Even within the cloud, there is a growing need for virtualization-based security and protection measures for elements like networks and security infrastructure. This paper discusses research on enhancing the security of cloud networks using network virtualization technology. I configured a secure network by leveraging virtualization technology, creating virtual servers and networks to provide various security benefits. Link virtualization and router virtualization were implemented to enhance security, utilizing the capabilities of virt ualization technology. The application of virtual firewall functionality to the configured network allowed for the isolation of the network. It is expected that based on these results, there will be a contribution towards overcoming security vulnerabil ities in the virtualized environment and proposing a management strategy for establishing a secure network.

Task Scheduling in Fog Computing - Classification, Review, Challenges and Future Directions

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.89-100
    • /
    • 2022
  • With the advancement in the Internet of things Technology (IoT) cloud computing, billions of physical devices have been interconnected for sharing and collecting data in different applications. Despite many advancements, some latency - specific application in the real world is not feasible due to existing constraints of IoT devices and distance between cloud and IoT devices. In order to address issues of latency sensitive applications, fog computing has been developed that involves the availability of computing and storage resources at the edge of the network near the IoT devices. However, fog computing suffers from many limitations such as heterogeneity, storage capabilities, processing capability, memory limitations etc. Therefore, it requires an adequate task scheduling method for utilizing computing resources optimally at the fog layer. This work presents a comprehensive review of different task scheduling methods in fog computing. It analyses different task scheduling methods developed for a fog computing environment in multiple dimensions and compares them to highlight the advantages and disadvantages of methods. Finally, it presents promising research directions for fellow researchers in the fog computing environment.

A Systematic Literature Review on Security Challenges In Image Encryption Algorithms for Medical Images

  • Almalki, Nora;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.75-82
    • /
    • 2022
  • Medical data is one of the data that must be kept in safe containers, far from intrusion, viewing and modification. With the technological developments in hospital systems and the use of cloud computing, it has become necessary to save, encrypt and even hide data from the eyes of attackers. Medical data includes medical images, whether they are x-ray images of patients or others, or even documents that have been saved in the image format. In this review, we review the latest research and the latest tools and algorithms that are used to protect, encrypt and hide these images, and discuss the most important challenges facing these areas.

A Study of E-commerce-based Capabilities of Small Firms with Cloud Computing Techniques

  • Zhou, Xuesong;Kim, Kyung-Tae
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.4
    • /
    • pp.21-36
    • /
    • 2020
  • E-commerce represents the acquisition and sale, or the transmission of funds or data through an electronic platform. E-commerce is a paradigm shift that influences marketers and customers to improve current market processes. The significant challenges in e-commerce are the accuracy and performance factors during a business transaction, which has been substantially enhanced using Cloud Computing Techniques (CCT). The growth of e-commerce management has been increased due to massive internet penetration, and particularly small and emerging companies are increasingly using this alternative as a differentiated business model. E-commerce has significant environmental impacts and highly utilized in today's market scenario. Further, the replacement has not been thoroughly explored. Current research has been carried out to describe the e-commerce scenario to analyze market trends. This study further discusses the essential variables to the performance of market models for e-commerce. For example, e-procurement of products/services, electronic supply chain management, e-distribution and selling support (supplier connections, e-fulfilment) and online e-auctions (transactional) can represent important e-commerce capabilities, which can contribute to marketing strategy implementation effectiveness, resulting in higher export performance.

An Overview of Mobile Edge Computing: Architecture, Technology and Direction

  • Rasheed, Arslan;Chong, Peter Han Joo;Ho, Ivan Wang-Hei;Li, Xue Jun;Liu, William
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.4849-4864
    • /
    • 2019
  • Modern applications such as augmented reality, connected vehicles, video streaming and gaming have stringent requirements on latency, bandwidth and computation resources. The explosion in data generation by mobile devices has further exacerbated the situation. Mobile Edge Computing (MEC) is a recent addition to the edge computing paradigm that amalgamates the cloud computing capabilities with cellular communications. The concept of MEC is to relocate the cloud capabilities to the edge of the network for yielding ultra-low latency, high computation, high bandwidth, low burden on the core network, enhanced quality of experience (QoE), and efficient resource utilization. In this paper, we provide a comprehensive overview on different traits of MEC including its use cases, architecture, computation offloading, security, economic aspects, research challenges, and potential future directions.

Automated Water Surface Extraction in Satellite Images Using a Comprehensive Water Database Collection and Water Index Analysis

  • Anisa Nur Utami;Taejung Kim
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.4
    • /
    • pp.425-440
    • /
    • 2023
  • Monitoring water surface has become one of the most prominent areas of research in addressing environmental challenges.Accurate and automated detection of watersurface in remote sensing imagesis crucial for disaster prevention, urban planning, and water resource management, particularly for a country where water plays a vital role in human life. However, achieving precise detection poses challenges. Previous studies have explored different approaches,such as analyzing water indexes, like normalized difference water index (NDWI) derived from satellite imagery's visible or infrared bands and using k-means clustering analysis to identify land cover patterns and segment regions based on similar attributes. Nonetheless, challenges persist, notably distinguishing between waterspectralsignatures and cloud shadow or terrain shadow. In thisstudy, our objective is to enhance the precision of water surface detection by constructing a comprehensive water database (DB) using existing digital and land cover maps. This database serves as an initial assumption for automated water index analysis. We utilized 1:5,000 and 1:25,000 digital maps of Korea to extract water surface, specifically rivers, lakes, and reservoirs. Additionally, the 1:50,000 and 1:5,000 land cover maps of Korea aided in the extraction process. Our research demonstrates the effectiveness of utilizing a water DB product as our first approach for efficient water surface extraction from satellite images, complemented by our second and third approachesinvolving NDWI analysis and k-means analysis. The image segmentation and binary mask methods were employed for image analysis during the water extraction process. To evaluate the accuracy of our approach, we conducted two assessments using reference and ground truth data that we made during this research. Visual interpretation involved comparing our results with the global surface water (GSW) mask 60 m resolution, revealing significant improvements in quality and resolution. Additionally, accuracy assessment measures, including an overall accuracy of 90% and kappa values exceeding 0.8, further support the efficacy of our methodology. In conclusion, thisstudy'sresults demonstrate enhanced extraction quality and resolution. Through comprehensive assessment, our approach proves effective in achieving high accuracy in delineating watersurfaces from satellite images.

A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment

  • Yiran, Zhang;Huizheng, Geng;Yanyan, Xu;Li, Su;Fei, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.450-470
    • /
    • 2023
  • Traditional cloud computing faces some challenges such as huge energy consumption, network delay and single point of failure. Edge computing is a typical distributed processing platform which includes multiple edge servers closer to the users, thus is more robust and can provide real-time computing services. Although outsourcing data to edge servers can bring great convenience, it also brings serious security threats. In order to provide image retrieval while ensuring users' data privacy, a privacy preserving image retrieval scheme in edge environment is proposed. Considering the distributed characteristics of edge computing environment and the requirement for lightweight computing, we present a privacy-preserving image retrieval scheme in edge computing environment, which two or more "honest but curious" servers retrieve the image quickly and accurately without divulging the image content. Compared with other traditional schemes, the scheme consumes less computing resources and has higher computing efficiency, which is more suitable for resource-constrained edge computing environment. Experimental results show the algorithm has high security, retrieval accuracy and efficiency.

Parents' Perceptions of Cognitive Rehabilitation for Children With Developmental Disabilities: A Mixed-Method Approach of Phenomenological Methodology and Word Cloud Analysis (발달장애 아동 부모의 인지재활 경험에 대한 질적 연구: 워드 클라우드 분석과 현상학적 연구 방법 혼합설계)

  • Ju, Yu-Mi;Kim, Young-Geun;Lee, Hee-Ryoung;Hong, Seung-Pyo;Han, Dae-Sung
    • Therapeutic Science for Rehabilitation
    • /
    • v.13 no.1
    • /
    • pp.49-63
    • /
    • 2024
  • Objective : The purpose of this study was to investigate parental perspectives on cognitive rehabilitation using a combination of phenomenological research methodology and word cloud analysis. Methods : Interviews were conducted with five parents of children with developmental disabilities. Word cloud analysis was conducted using Python, and five researchers analyzed the meaning units and themes using phenomenological methods. Words with high frequency were considered as a heuristic tool. Results : A total of 43 meaning units and nine components related to the phenomenon of cognitive rehabilitation were derived, and three themes were finalized. The main themes encompassed the definition of cognitive rehabilitation, challenges associated with cognitive rehabilitation, and factors influencing the selection of a cognitive rehabilitation institute. Cognitive rehabilitation emerged as a treatment focused on improving learning, daily functioning, and cognitive abilities in children with developmental disabilities. The perceived issues with cognitive rehabilitation pertained to treatment methods, therapist expertise, and associated costs. In addition, parents highlighted the importance of therapist expertise, humane personality, and affordability of cost and schedule when choosing a cognitive rehabilitation institute. Conclusion : Parents expressed expectations for substantial improvements in their children's daily functioning through cognitive rehabilitation. However, challenges were identified in clinical practices. Going forward, we expect that cognitive rehabilitation will evolve into a better therapeutic support service addressing the concerns raised by parents.

Identifying Barriers to Big Data Analytics: Design-Reality Gap Analysis in Saudi Higher Education

  • AlMobark, Bandar Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.261-266
    • /
    • 2021
  • The spread of cloud computing, digital computing, and the popular social media platforms have led to increased growth of data. That growth of data results in what is known as big data (BD), which seen as one of the most strategic resources. The analysis of these BD has allowed generating value from massive raw data that helps in making effective decisions and providing quality of service. With Vision 2030, Saudi Arabia seeks to invest in BD technologies, but many challenges and barriers have led to delays in adopting BD. This research paper aims to search in the state of Big Data Analytics (BDA) in Saudi higher education sector, identify the barriers by reviewing the literature, and then to apply the design-reality gap model to assess these barriers that prevent effective use of big data and highlights priority areas for action to accelerate the application of BD to comply with Vision 2030.

Development of Deep Learning-based Automatic Classification of Architectural Objects in Point Clouds for BIM Application in Renovating Aging Buildings (딥러닝 기반 노후 건축물 리모델링 시 BIM 적용을 위한 포인트 클라우드의 건축 객체 자동 분류 기술 개발)

  • Kim, Tae-Hoon;Gu, Hyeong-Mo;Hong, Soon-Min;Choo, Seoung-Yeon
    • Journal of KIBIM
    • /
    • v.13 no.4
    • /
    • pp.96-105
    • /
    • 2023
  • This study focuses on developing a building object recognition technology for efficient use in the remodeling of buildings constructed without drawings. In the era of the 4th industrial revolution, smart technologies are being developed. This research contributes to the architectural field by introducing a deep learning-based method for automatic object classification and recognition, utilizing point cloud data. We use a TD3D network with voxels, optimizing its performance through adjustments in voxel size and number of blocks. This technology enables the classification of building objects such as walls, floors, and roofs from 3D scanning data, labeling them in polygonal forms to minimize boundary ambiguities. However, challenges in object boundary classifications were observed. The model facilitates the automatic classification of non-building objects, thereby reducing manual effort in data matching processes. It also distinguishes between elements to be demolished or retained during remodeling. The study minimized data set loss space by labeling using the extremities of the x, y, and z coordinates. The research aims to enhance the efficiency of building object classification and improve the quality of architectural plans by reducing manpower and time during remodeling. The study aligns with its goal of developing an efficient classification technology. Future work can extend to creating classified objects using parametric tools with polygon-labeled datasets, offering meaningful numerical analysis for remodeling processes. Continued research in this direction is anticipated to significantly advance the efficiency of building remodeling techniques.