• 제목/요약/키워드: cloud based computing

검색결과 1,016건 처리시간 0.03초

Trends and Analysis of 4G Wireless User Access Networks Issues (4G 무선가입자망 구축 동향 및 고도화 방안)

  • Hwang, Ho-Young;Hong, Jung-Wan;Kim, Seung-Cheon;Roh, Kwang-Hyun
    • The Journal of Society for e-Business Studies
    • /
    • 제16권3호
    • /
    • pp.145-158
    • /
    • 2011
  • Recently, the rapidly increased use of smartphone devices provides both opportunity and problems at the same time to the telecom companies in domestic and world wide. It provides a great opportunity to overcome the market stagnation of the existing voice- centric communications, and also problems of building a highly efficient new wireless access networks to accommodate huge volume of data traffic among smart devices. Facing with the age of keen competition, telecom companies have two kinds of strategies for network transition; a strategy of building uniform LTE -based 4G networks as fast as possible, and a hybrid network enhancement strategy compounding 3G and 4G networks using HSP A+, WiFi, cloud computing, etc. It is difficult to predict which strategy will have more successful outcome in the near future. This paper studies the trends and issues of network enhancement policies and transition strategies to the 4G network era, and tries to draw appropriate and efficient ways for network enhancement and operation.

Analysis of Regulations and Legal Systems for Making Better Use of Administrative Information (행정정보의 효율적인 활용을 위한 법.규제 분석)

  • Kim, Taisiya;Kim, Bo-Ra-Mi;Lee, Bong-Gyou
    • The Journal of Society for e-Business Studies
    • /
    • 제16권3호
    • /
    • pp.211-224
    • /
    • 2011
  • Since appearance of smart devices and cloud computing services, the social and economical values of administrative information have been magnified as valuable information. In order to make better use of various administrative information by diverse government organizations efficiently and effectively, information sharing based on legal systems is essential because of several obstacles including privacy. To suggest practical ways for using administrative information, this study categorized the administrative information sharing process, and analyzed the regulations and legal systems that are contradictory to the regulations. The result of analysis appears that there is a need of legislative base for well-defined business use of information, and a need of the organizations, that available to collect and manufacture the information. The results of this study can be expected to make legislation contributions not only for industries, but also by suggesting the policy making and guidelines to protect privacy and improve the quality of citizens' life.

Establishing a Sustainable Future Smart Education System (지속가능한 미래형 스마트교육 시스템 구축 방안)

  • Park, Ji-Hyeon;Choi, Jae-Myeong;Park, Byoung-Lyoul;Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • 제16권3호
    • /
    • pp.495-503
    • /
    • 2012
  • As modern society rapidly changes, the field of education has also developed speedily. Since Edunet system developed in 1996, many different systems are developing continuously such as Center for Teaching and Learning, cyber home learning systems, diagnosis prescribing systems, video systems, teaching and counseling, and study management systems. However, the aforementioned systems have had not great response from the educational consumers due to a lack of interconnection. There are several reasons for it. One of the reasons is that program administrators did not carefully consider the continuity of each programs but established a brand new system whenever they need rather than predict or consider the future needs. The suitable system for smart education should be one big integrated system based on many different data analysis and processing. The system should also supply educational consumers various and useful information by adopting the idea of bigdata rather than a single sign on system connecting each independent system. The cloud computing system should be established as a system that can be managed not as simple compiled files and application programs but as various contents and DATA.

Research on Software Classification System based on an Integrated Software Industry (융합소프트웨어산업에 따른 소프트웨어 분류체계에 관한 연구)

  • Yang, Hyo-Sik;Jeon, In-Oh
    • Journal of Digital Convergence
    • /
    • 제11권4호
    • /
    • pp.91-99
    • /
    • 2013
  • While there is the active integration of various industries, a convergence of the software and knowledge service industries including software used in finance and counseling products is creating the necessity to include software industry utilization sectors aside from covering only software products and service production activities. Furthermore, to cope with the radical environment changes in the software industry when it comes to categorizing mobile and cloud computing areas into a software and classification system, we are at a point where there is a need to establish a directional nature on what should be included. In order to establish an integrated classification of newly introduced technologies, products and services, this paper aims to discover areas not included in the classification standard because of the ecological characteristics of the software. It also wants to differentiate the classification system and identify its incomplete areas such as the lack of connections within the system to ultimately establish such for newly surfacing software fields.

Designing Mutual Cooperation Security Model for IP Spoofing Attacks about Medical Cluster Basis Big Data Environment (의료클러스터 기반의 빅 데이터 환경에 대한 IP Spoofing 공격 발생시 상호협력 보안 모델 설계)

  • An, Chang Ho;Baek, Hyun Chul;Seo, Yeong Geon;Jeong, Won Chang;Park, Jae Heung
    • Convergence Security Journal
    • /
    • 제16권7호
    • /
    • pp.21-29
    • /
    • 2016
  • Our society is currently exposed to environment of various information that is exchanged real time through networks. Especially regarding medical policy, the government rushes to practice remote medical treatment to improve the quality of medical services for citizens. The remote medical practice requires establishment of medical information based on big data for customized treatment regardless of where patients are. This study suggests establishment of regional medical cluster along with defense and protection cooperation models that in case service availability is harmed, and attacks occur, the attacks can be detected, and proper measures can be taken. For this, the study suggested forming networks with nationwide local government hospitals as regional virtual medical cluster bases by the same medical information system. The study also designed a mutual cooperation security model that can real time cope with IP Spoofing attack that can occur in the medical cluster and DDoS attacks accordingly, so that the limit that sole system and sole security policy have can be overcome.

A Case study on the Utilization of Emulation Based Network Testbeds (에뮬레이션 기반 테스트베드 활용 사례 연구)

  • Lee, Minsun;Yoo, Kwan-Jong
    • Journal of the Korea Convergence Society
    • /
    • 제9권9호
    • /
    • pp.61-67
    • /
    • 2018
  • Emulab software was developed by the team of University of Utah and it has been replicated at dozens of other sites in the world. Although KREONET Emulab, which established by the Korea Institute of Science and Technology Information, has only a modest number of compute nodes it has been provided an ideal playground to conduct various research for network protocols, cyber security and convergence research. A testbed is a critical enabler of experimental research and researchers only carry out the experiments that are supported by the testbed. This paper outlines the Utah Emulab's status and use types among the last 10 years of operation results and compares them with the ones with the KREONET Emulab. In addition, Testbed-as-a-Service(TaaS) is discussed to upgrade the testbed for the convergence research community services.

Software Engineering Research Trends Meta Analyzing for Safety Software Development on IoT Environment (IoT 환경에서 안전한 소프트웨어 개발을 위한 소프트웨어공학 메타분석)

  • Kim, Yanghoon;Park, Wonhyung;Kim, Guk-boh
    • Convergence Security Journal
    • /
    • 제15권4호
    • /
    • pp.11-18
    • /
    • 2015
  • The new environments arrive such as ICT convergence, cloud computing, and big data, etc., how to take advanta ge of the existing software engineering technologies has become an important key. In addition, the importance of re quirement analysis for secure software and design phase has been shown in the IoT environment While the existing studies have focused on the utilization of the technique applied to IoT environment, the studies for enhancing analys is and design, the prerequisite steps for safely appling these techniques to the site, have been insufficient. So, we tr y to organize research trends based on software engineering and analyze their relationship in this paper. In detail, w e classify the research trends of software engineering to perform research trends meta-analysis, and analyze an ann ual development by years. The flow of the major research is identified by analyzing the correlation of the key word s. We propose the strategies for enhancing the utilization of software engineering techniques to develop high-quality software in the IoT environment.

A Study on Security Improvement in Hadoop Distributed File System Based on Kerberos (Kerberos 기반 하둡 분산 파일 시스템의 안전성 향상방안)

  • Park, So Hyeon;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제23권5호
    • /
    • pp.803-813
    • /
    • 2013
  • As the developments of smart devices and social network services, the amount of data has been exploding. The world is facing Big data era. For these reasons, the Big data processing technology which is a new technology that can handle such data has attracted much attention. One of the most representative technologies is Hadoop. Hadoop Distributed File System(HDFS) designed to run on commercial Linux server is an open source framework and can store many terabytes of data. The initial version of Hadoop did not consider security because it only focused on efficient Big data processing. As the number of users rapidly increases, a lot of sensitive data including personal information were stored on HDFS. So Hadoop announced a new version that introduces Kerberos and token system in 2009. However, this system is vulnerable to the replay attack, impersonation attack and other attacks. In this paper, we analyze these vulnerabilities of HDFS security and propose a new protocol which complements these vulnerabilities and maintains the performance of Hadoop.

Point Set Denoising Using a Variational Bayesian Method (변분 베이지안 방법을 이용한 점집합의 오차제거)

  • Yoon, Min-Cheol;Ivrissimtzis, Ioannis;Lee, Seung-Yong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제14권5호
    • /
    • pp.527-531
    • /
    • 2008
  • For statistical modeling, the model parameters are usually estimated by maximizing a probability measure, such as the likelihood or the posterior. In contrast, a variational Bayesian method treats the parameters of a model as probability distributions and computes optimal distributions for them rather than values. It has been shown that this approach effectively avoids the overfitting problem, which is common with other parameter optimization methods. This paper applies a variational Bayesian technique to surface fitting for height field data. Then, we propose point cloud denoising based on the basic surface fitting technique. Validation experiments and further tests with scan data verify the robustness of the proposed method.

Design of Machine Learning based Smart Service Abstraction Layer for Future Network Provisioning (미래 네트워크 제공을 위한 기계 학습 기반 스마트 서비스 추상화 계층 설계)

  • Vu, Duc Tiep;N., Gde Dharma;Kim, Kyungbaek;Choi, Deokjai
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2016년도 추계학술발표대회
    • /
    • pp.114-116
    • /
    • 2016
  • Recently, SDN and NFV technology have been developed actively and provide enormous flexibility of network provisioning. The future network services would generally involve many different types of services such as hologram games, social network live streaming videos and cloud-computing services, which have dynamic service requirements. To provision networks for future services dynamically and efficiently, SDN/NFV orchestrators must clearly understand the service requirements. Currently, network provisioning relies heavily on QoS parameters such as bandwidth, delay, jitter and throughput, and those parameters are necessary to describe the network requirements of a service. However it is often difficult for users to understand and use them proficiently. Therefore, in order to maintain interoperability and homogeneity, it is required to have a service abstraction layer between users and orchestrators. The service abstraction layer analyzes ambiguous user's requirements for the desired services, and this layer generates corresponding refined services requirements. In this paper, we present our initial effort to design a Smart Service Abstraction Layer (SmSAL) for future network architecture, which takes advantage of machine learning method to analyze ambiguous and abstracted user-friendly input parameters and generate corresponding network parameters of the desired service for better network provisioning. As an initial proof-of-concept implementation for providing viability of the proposed idea, we implemented SmSAL with a decision tree model created by learning process with previous service requests in order to generate network parameters related to various audio and video services, and showed that the parameters are generated successfully.