• Title/Summary/Keyword: cloud computing service

Search Result 777, Processing Time 0.024 seconds

MS Load Balancing Algorithm in Cloud Computing

  • Ankita Gupta;Ranu Lal Chouhan
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.157-161
    • /
    • 2024
  • Cloud computing becomes an important technology for distributed computing and parallel computing. Cloud computing provides various facility like to share resources, software packages, information, storage and many different applications depending on user demand at any time and at any place. It provides an extensive measure for computing and storage. A service provided by it to user follows pay-as-you-go model. Although it provides many facilities still there is some problem which are resource discovery, fault tolerance, load balancing, and security. Out of these Load balancing is the main challenges. There are many techniques which used to distribute wor9kload or task equally across the servers. This paper includes cloud computing, cloud computing architecture, virtualization and MS load balancing technique which provide enhanced load balancing.

A Prototype BIM Server based viewer for Cloud Computing BIM Services (클라우드 컴퓨팅 기반 BIM 서비스를 위한 BIM 서버 기반의 뷰어 개발)

  • Yoon, Su-Won;Kim, Byung-Kon;Choi, Jong-Moon;Kwon, Soon-Wook
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.4
    • /
    • pp.1719-1730
    • /
    • 2013
  • Recently BIM technology has been expanded for using in construction project. However its spread has been delayed than the initial expectations, due to the high-cost of BIM infrastructure development, the lack of regulations, the lack of process and so forth. Therefore, this research proposes the cloud computing based BIM service for saving the cost of BIM infrastructure development and providing various BIM Services to meet the domestic process. In order to achieve this, we perform a survey on the cloud computing based BIM service and develope the prototype system as the core technology of proposed service. The developed the prototype system consists of the IFC based BIM server for IaaS (Infrastructure as a Service) and the viewer for SaaS (Software as a Service). This research also conducts the performance test for their applicability and verifies that the results of this research can be used as core components in the cloud computing based BIM service.

A Survey on Predicting Workloads and Optimising QoS in the Cloud Computing

  • Omar F. Aloufi;Karim Djemame;Faisal Saeed;Fahad Ghabban
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.59-66
    • /
    • 2024
  • This paper presents the concept and characteristics of cloud computing, and it addresses how cloud computing delivers quality of service (QoS) to the end-user. Next, it discusses how to schedule one's workload in the infrastructure using technologies that have recently emerged such as Machine Learning (ML). That is followed by an overview of how ML can be used for resource management. This paper then looks at the primary goal of this project, which is to outline the benefits of using ML to schedule upcoming demands to achieve QoS and conserve energy. In this survey, we reviewed the research related to ML methods for predicting workloads in cloud computing. It also provides information on the approaches to elasticity, while another section discusses the methods of prediction used in previous studies and those that used in this field. The paper concludes with a summary of the literature on predicting workloads and optimising QoS in the cloud computing.

Cloud Computing Strategy Recommendations for Korean Public Organizations: Based on U.S. Federal Institutions' Cloud Computing Adoption Status and SDLC Initiative (한국의 공공기관 클라우드 컴퓨팅 도입 활성화 전략: 미국 연방 공공기관 클라우드 컴퓨팅 도입현황 시사점 및 시스템 개발 수명주기(SDLC) 프로세스 전략을 중심으로)

  • Kang, Sang-Baek Chris
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.103-126
    • /
    • 2015
  • Compared to other countries, cloud computing in Korea is not popular especially in the government sector. One of the reasons for the current not-fully-blossomed situation is partly by early investment in huge government datacenters under Korea's e-government initiative; let alone, there was no strong control tower as well as no enforcing law and ordinances for driving such cloud computing initiative. However, in 2015 March 'Cloud Computing and Privacy Security Act' (hereinafter, Cloud Act) had been passed in the Parliament and from September 2015 Cloud Act was deployed in Korea. In U.S., FedRAMP (Federal Risk Assessment and Management Program) along with Obama Adminstration's 'Cloud First' strategy for U.S. federal institutions is the key momentum for federal cloud computing adoption. In 2015 January, U.S. Congressional Research Service (CRS) has published an extensive monitoring report for cloud computing in U.S. federal institutions. The CRS report which monitored U.S. government cloud computing implementation is indeed a good guideline for Korean government cloud computing services. For this reason, the purpose of the study is to (1) identify important aspects of the enacted Korean Cloud Act, (2) describe recent U.S. federal government cloud computing status, (3) suggest strategy and key strategy factors for facilitating cloud adoption in public organizations reflecting SDLC strategy, wherein.

Services Quality Improvement through Control Management Cloud-Based SLA

  • Abel Adane
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.89-94
    • /
    • 2023
  • Cloud-based technology is used in different organizations around the world for various purposes. Using this technology, the service providers provide the service mainly SaaS, PaaS and while the cloud service consumer consumes the services by paying for the service they used or accessed by the principle of "pay per use". The customer of the services can get any services being at different places or locations using different machines or electronic devices. Under the conditions of being well organized and having all necessary infrastructures, the services can be accessed suitably. The identified problem in this study is that cloud providers control and monitor the system or tools by ignoring the calculation and consideration of various faults made from the cloud provider side during service delivery. There are currently problems with ignoring the consumer or client during the monitoring and mentoring system for cloud services consumed at the customer or client level by SLA provisions. The new framework was developed to address the above-mentioned problems. The framework was developed as a unified modeling language. Eight basic components are used to develop the framework. For this research, the researcher developed a prototype by using a selected cloud tool to simulate and java programming language to write a code as well as MySQL to store data during SLA. The researcher used different criteria to validate the developed framework i.e. to validate SLA that is concerned with a cloud service provider, validate what happened when the request from the client-side is less than what is specified in SLA and above what is specified in SLA as well as implementing the monitoring mechanism using the developed Monitoring component. The researcher observed that with the 1st and 3rd criteria the service level agreement was violated and this indicated that if the Service level agreement is monitored or managed only by cloud service prover, there is a violation of LSA. Therefore, the researcher recommended that the service level agreement be managed by both cloud service providers and service consumers in the cloud computing environment.

Study on Security Considerations in the Cloud Computing (클라우드 컴퓨팅에서의 보안 고려사항에 관한 연구)

  • Park, Choon-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.3
    • /
    • pp.1408-1416
    • /
    • 2011
  • Cloud computing provides not only cost savings and efficiencies for computing resources, but the ability to expend and enhance services. However, cloud service users(enterprisers) are very concerned about the risks created by the characteristics of cloud computing. In this paper, we discuss major concerns about cloud computing environments including concerns regarding security. We also analyze the security concerns specifically, identify threats to cloud computing, and propose general countermeasures to reduce the security risks.

The Security Architecture for Secure Cloud Computing Environment

  • Choi, Sang-Yong;Jeong, Kimoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.81-87
    • /
    • 2018
  • Cloud computing is a computing environment in which users borrow as many IT resources as they need to, and use them over the network at any point in time. This is the concept of leasing and using as many IT resources as needed to lower IT resource usage costs and increase efficiency. Recently, cloud computing is emerging to provide stable service and volume of data along with major technological developments such as the Internet of Things, artificial intelligence and big data. However, for a more secure cloud environment, the importance of perimeter security such as shared resources and resulting secure data storage and access control is growing. This paper analyzes security threats in cloud computing environments and proposes a security architecture for effective response.

User Authentication Technology Using Multi-Blocks in the Cloud Computing Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.139-146
    • /
    • 2020
  • Cloud computing technology provides economic and efficient system operation and management features to deal with rapidly changing IT technologies. However, this is less used in institutes and companies due to low security of cloud computing service. It is recognized that storing and managing important information, which is confidential in external systems is vulnerable to security threats. In order to enhance security of this cloud computing service, this paper suggests a system and user authentication reinforcement model. The suggested technology guarantees integrity of user authentication information and provides users with convenience by creating blocks for each cloud service and connecting service blocks with chains. The block chain user authentication model offers integrity assurance technology of block chains and system access convenience for SSO users. Even when a server providing cloud computing is invaded, this prevents chained invasions not to affect other systems.

A Study on Data Movement Method between For for Cloud Computing (클라우드를 위한 포그 간의 데이터 이동 기법에 관한 연구)

  • Hwang, Chi-Gon;Yoon, Chang-Pyo;Lee, Hae-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.294-296
    • /
    • 2017
  • Cloud computing is a computing technique that uploads all the data from a cloud node to a cloud server and provides it to users as a service. This is difficult to provide services in real time depending on the network conditions. This is because it is necessary to download information to the remote site through the network, not the local area, and to download additional services to provide services in the cloud. So fog computing has been proposed as an alternative. In this paper, we propose an efficient data exchange technique between cloud, fog and user. The proposed fog provides services to users and collects and processes data. The cloud is responsible for the flow of data exchange and control between the fog. We propose a standard method for data exchange. The application for this is to process and service the information generated by the BAN (Body Area Network) in the fog, and the cloud serves as a mediator. This can resolve data heterogeneity between devices or services and provide efficient data movement.

  • PDF

An Attack-based Filtering Scheme for Slow Rate Denial-of-Service Attack Detection in Cloud Environment

  • Gutierrez, Janitza Nicole Punto;Lee, Kilhung
    • Journal of Multimedia Information System
    • /
    • v.7 no.2
    • /
    • pp.125-136
    • /
    • 2020
  • Nowadays, cloud computing is becoming more popular among companies. However, the characteristics of cloud computing such as a virtualized environment, constantly changing, possible to modify easily and multi-tenancy with a distributed nature, it is difficult to perform attack detection with traditional tools. This work proposes a solution which aims to collect traffic packets data by using Flume and filter them with Spark Streaming so it is possible to only consider suspicious data related to HTTP Slow Rate Denial-of-Service attacks and reduce the data that will be stored in Hadoop Distributed File System for analysis with the FP-Growth algorithm. With the proposed system, we also aim to address the difficulties in attack detection in cloud environment, facilitating the data collection, reducing detection time and enabling an almost real-time attack detection.