• Title/Summary/Keyword: Utility computing

Search Result 104, Processing Time 0.075 seconds

How do multilevel privacy controls affect utility-privacy trade-offs when used in mobile applications?

  • Kim, Seung-Hyun;Ko, In-Young
    • ETRI Journal
    • /
    • v.40 no.6
    • /
    • pp.813-823
    • /
    • 2018
  • In existing mobile computing environments, users need to choose between their privacy and the services that they can receive from an application. However, existing mobile platforms do not allow users to perform such trade-offs in a fine-grained manner. In this study, we investigate whether users can effectively make utility-privacy trade-offs when they are provided with a multilevel privacy control method that allows them to recognize the different quality of service that they will receive from an application by limiting the disclosure of their private information in multiple levels. We designed a research model to observe users' utility-privacy trade-offs in accordance with the privacy control methods and other factors such as the trustworthiness of an application, quality level of private information, and users' privacy preferences. We conducted a user survey with 516 participants and found that, compared with the existing binary privacy controls, both the service utility and the privacy protection levels were significantly increased when the users used the multilevel privacy control method.

A cache placement algorithm based on comprehensive utility in big data multi-access edge computing

  • Liu, Yanpei;Huang, Wei;Han, Li;Wang, Liping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.3892-3912
    • /
    • 2021
  • The recent rapid growth of mobile network traffic places multi-access edge computing in an important position to reduce network load and improve network capacity and service quality. Contrasting with traditional mobile cloud computing, multi-access edge computing includes a base station cooperative cache layer and user cooperative cache layer. Selecting the most appropriate cache content according to actual needs and determining the most appropriate location to optimize the cache performance have emerged as serious issues in multi-access edge computing that must be solved urgently. For this reason, a cache placement algorithm based on comprehensive utility in big data multi-access edge computing (CPBCU) is proposed in this work. Firstly, the cache value generated by cache placement is calculated using the cache capacity, data popularity, and node replacement rate. Secondly, the cache placement problem is then modeled according to the cache value, data object acquisition, and replacement cost. The cache placement model is then transformed into a combinatorial optimization problem and the cache objects are placed on the appropriate data nodes using tabu search algorithm. Finally, to verify the feasibility and effectiveness of the algorithm, a multi-access edge computing experimental environment is built. Experimental results show that CPBCU provides a significant improvement in cache service rate, data response time, and replacement number compared with other cache placement algorithms.

Infra Service Model for Usage-based IT service in Public Sector (공공부문의 사용량기반 IT서비스를 위한 인프라서비스 모델에 관한 연구)

  • Ra, Jong-Hei;Lee, Sang-Hak;Moon, Sung-Jun;Han, In-Jong
    • Journal of Digital Convergence
    • /
    • v.7 no.4
    • /
    • pp.43-56
    • /
    • 2009
  • The concept causing all the fuss is "the utility computing or the usage-based IT service", which now represents the future for IT asset in all aspects of the way they work in business, the commercial and public sector. The core of "utility computing or usage-based IT service" is changing the IT assert from "ownership" to "borrowing", which enables managers to get greater utilization of data-centre resources at lower operating costs. This trend is spreaded in public sector centering the Governmental Internet data Center of Korea(NCIA). So, it has need to make an usage-based IT service model that is suitable for public sector. In this paper, we propose the usage-based IT service model that is composed of IT service framework, service pricing model and IT service architecture.

  • PDF

A Case Study on the Information System Outsourcing based on the Utility Computing Concept (유틸리티 컴퓨팅(Utility Computing) 개념에 입각한 정보시스템 아웃소싱 사례에 대한 연구)

  • Hong, Hyun-Gi
    • Information Systems Review
    • /
    • v.7 no.2
    • /
    • pp.213-228
    • /
    • 2005
  • Due to the rapid progress of IT utilization, many firms have been perplexed how to increase the productivity and efficiency of the Information System and also to reduce the Total Cost of Ownership (TCO) of IS Organization. This paper employs the lens of the competitive advantages through Information System Outsourcing (ISO) arrangement. And also the concept of the "Utility Computing" of IBM-VNS. The Information Outsourcing System(ISO) is the fully or partly endorsed IT Outsourcing method, that supplies IT infrastructure, application system and system maintenance service, as well for the company networks. Many companies have implemented their own Information System. But some of the projects were not successfully carried out. We found many reasons for such a unsatisfaction with the quality of the new Information system. In this paper we select the "HanGlas Group" as the Case Study for Information System Outsourcing to overcome such difficulties. Through this Case Study we will learn the positive and negative aspects of ISO based on Utility Computing.

A Hybrid K-anonymity Data Relocation Technique for Privacy Preserved Data Mining in Cloud Computing

  • S.Aldeen, Yousra Abdul Alsahib;Salleh, Mazleena
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.51-58
    • /
    • 2016
  • The unprecedented power of cloud computing (CC) that enables free sharing of confidential data records for further analysis and mining has prompted various security threats. Thus, supreme cyberspace security and mitigation against adversaries attack during data mining became inevitable. So, privacy preserving data mining is emerged as a precise and efficient solution, where various algorithms are developed to anonymize the data to be mined. Despite the wide use of generalized K-anonymizing approach its protection and truthfulness potency remains limited to tiny output space with unacceptable utility loss. By combining L-diversity and (${\alpha}$,k)-anonymity, we proposed a hybrid K-anonymity data relocation algorithm to surmount such limitation. The data relocation being a tradeoff between trustfulness and utility acted as a control input parameter. The performance of each K-anonymity's iteration is measured for data relocation. Data rows are changed into small groups of indistinguishable tuples to create anonymizations of finer granularity with assured privacy standard. Experimental results demonstrated considerable utility enhancement for relatively small number of group relocations.

Hierarchical Resource Management Framework and Multi-hop Task Scheduling Decision for Resource-Constrained VEC Networks

  • Hu, Xi;Zhao, Yicheng;Huang, Yang;Zhu, Chen;Yao, Jun;Fang, Nana
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3638-3657
    • /
    • 2022
  • In urban vehicular edge computing (VEC) environments, one edge server always serves many task requests in its coverage which results in the resource-constrained problem. To resolve the problem and improve system utilization, we first design a general hierarchical resource management framework based on typical VEC network structures. Following the framework, a specific interacting protocol is also designed for our decision algorithm. Secondly, a greedy bidding-based multi-hop task scheduling decision algorithm is proposed to realize effective task scheduling in resource-constrained VEC environments. In this algorithm, the goal of maximizing system utility is modeled as an optimization problem with the constraints of task deadlines and available computing resources. Then, an auction mechanism named greedy bidding is used to match task requests to edge servers in the case of multiple hops to maximize the system utility. Simulation results show that our proposal can maximize the number of tasks served in resource constrained VEC networks and improve the system utility.

Edge Computing Task Offloading of Internet of Vehicles Based on Improved MADDPG Algorithm

  • Ziyang Jin;Yijun Wang;Jingying Lv
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.2
    • /
    • pp.327-347
    • /
    • 2024
  • Edge computing is frequently employed in the Internet of Vehicles, although the computation and communication capabilities of roadside units with edge servers are limited. As a result, to perform distributed machine learning on resource-limited MEC systems, resources have to be allocated sensibly. This paper presents an Improved MADDPG algorithm to overcome the current IoV concerns of high delay and limited offloading utility. Firstly, we employ the MADDPG algorithm for task offloading. Secondly, the edge server aggregates the updated model and modifies the aggregation model parameters to achieve optimal policy learning. Finally, the new approach is contrasted with current reinforcement learning techniques. The simulation results show that compared with MADDPG and MAA2C algorithms, our algorithm improves offloading utility by 2% and 9%, and reduces delay by 29.6%.

Analysis of Worldwide Review on Cloud Computing (클라우드 컴퓨팅에 대한 국내외 동향 분석)

  • Leem, Young-Moon;Hwang, Young-Seob
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2009.11a
    • /
    • pp.411-415
    • /
    • 2009
  • There are some definitions of cloud computing but it can be defined as utilization of personal computers, servers and softwares in one cluster for approaches to the use of shared computing resources. Nowadays the applications of cloud computing are rapidly increasing because of its merits on economic aspect, connectivity convenience, storage space and so on. The main objective of this paper is to find an effective methodology as an initial stage for applications of cloud computing in a real life. Therefore this paper addresses worldwide reviews on cloud computing.

  • PDF

An Application Case of Utility Tag-based Convention Service System: Cosmetics and Beauty Expo, Osong Korea 2013 (다양한 유틸리티 태그를 활용한 컨벤션 서비스 시스템 적용 사례: 2013 오송 화장품·뷰티 세계박람회를 중심으로)

  • Choi, Myoung Hee;Jun, Jungho;Kang, Heegoo;Lee, Kyoung Jun
    • Information Systems Review
    • /
    • v.15 no.3
    • /
    • pp.111-128
    • /
    • 2013
  • Conventions play important roles as tools for effective marketing. It will be able to understand the changes of particular industry's market, develop a new market and potential clients, and get a chance such as strategic network constructing. To support effective viewing of visitors, conventions have introduced a variety of ubiquitous computing technologies. This study introduces a case of applying the Utility Tag-based convention service system at the Cosmetics & Beauty Expo, Osong Korea 2013. The Utility Tag-based convention service system is constructed total three systems: (1) NFC Tag Management System; allowing effective access and management of NFC tags in various locations and objects, (2) Information Provide System; allowing participating vendors to manage information they want to provide information to visitors, and (3) Utility Tags; providing a variety of service to visitors for effective viewing in exhibition/convention space. This study first explores literature review and applying case related to ubiquitous computing in this field and introduces Applying an Utility Tag-based convention service system. In addition, we analyze visitors' behaviors and association rules by take advantage of collected touch data, present various possible for applications of the Utility Tag-based convention service system.

  • PDF

An Exhaustive Review on Security Issues in Cloud Computing

  • Fatima, Shahin;Ahmad, Shish
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3219-3237
    • /
    • 2019
  • The Cloud Computing is growing rapidly in the current IT industry. Cloud computing has become a buzzword in relation to Grid & Utility computing. It provides on demand services to customers and customers will pay for what they get. Various "Cloud Service Provider" such as Microsoft Azure, Google Web Services etc. enables the users to access the cloud in cost effective manner. However, security, privacy and integrity of data is a major concern. In this paper various security challenges have been identified and the survey briefs the comprehensive overview of various security issues in cloud computing. The classification of security issues in cloud computing have been studied. In this paper we have discussed security challenges in cloud computing and also list recommended methods available for addressing them in the literature.