• Title/Summary/Keyword: cloud computing system

Search Result 748, Processing Time 0.025 seconds

A Study of Security Risk Analysis for Public IaaS Cloud Certification (공공 IaaS 클라우드 인증제도에 적용할 위험분석 방법에 대한 연구)

  • Kim, Sun-Jib;Kim, Ki-Young
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.9-15
    • /
    • 2015
  • Cloud computing has emerged with promise to decrease the cost of server additional cost and expanding the data storage and ease for computer resource sharing and apply the new technologies. However, Cloud computing also raises many new security concerns due to the new structure of the cloud service models. Therefore, several cloud service certification system were performed in the world in order to meet customers need which is the safe and reliable cloud service. This paper we propose the new risk analysis method different compare with existing method for secure the reliability of certification considering public IaaS(Infrastructure as a Service) cloud service properties.

Study on Designation of Non-Critical Information Processing System for Financial Company Cloud Computing Activation (금융회사 클라우드 활성화를 위한 비중요정보처리시스템 지정방안 연구)

  • Chang, Myong-do;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.889-903
    • /
    • 2018
  • Cloud computing has been activated globally due to the demands of the 4th industrial revolution and the efficient use of IT resources, and domestic usage is also increasing due to legislation and related laws. However, domestic financial companies are subject to various regulations due to the importance of their information and the ripple effects of accidents such as outflows. Only non-critical information processing systems that handle non-critical information are allowed to use cloud computing. Financial companies are required to set specific criteria and judgment to distinguish them. In this paper, we propose a method to enable the financial company cloud computing to be more active by specifying the ambiguous non - essential information processing system designation standard and making it easier to designate.

Public Key based Secure Data Management Scheme for the Cloud Data Centers in Public Institution (공공기관 클라우드 데이터 센터에 활용 가능한 공개키 기반의 안전한 데이터 관리 기법)

  • Wi, Yukyeong;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.467-477
    • /
    • 2013
  • The cloud computing has propagated rapidly and thus there is growing interest on the introduction of cloud services in the public institution. Accordingly, domestic public institution are adoption of cloud computing impose and devise a plan. In addition, more specifically, is building a cloud computing system in the public institution. However, solutions to various security threats(e.g., availability invasion of storage, access by unauthorized attacker, data downloaded from uncertain identifier, decrease the reliability of cloud data centers and so on) is required. For the introduction and revitalize of cloud services in the public institution. Therefore, in this paper, we propose a public key based secure data management scheme for the cloud data centers in public institution. Thus, the use of cloud computing in the public institutions, the only authorized users have access to the data center. And setting for importance and level of difficulty of public data management enables by systematic, secure, and efficient. Thus, cloud services for public institution to improve the overall security and convenience.

Digital Forensics Framework for Cloud Computing (클라우드 환경을 고려한 디지털 포렌식 프레임워크)

  • Lee, Chang-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.1
    • /
    • pp.63-68
    • /
    • 2013
  • Recently, companies seek a way to overcome their financial crisis by reducing costs in the field of IT. In such a circumstance, cloud computing is rapidly emerging as an optimal solution to the crisis. Even in a digital forensic investigation, whether users of an investigated system have used a cloud service is a very important factor in selecting additional investigated subjects. When a user has used cloud services, such as Daum Cloud and Google Docs, it is possible to connect to the could service from a remote place by acquiring the user's log-in information. In such a case, evidence data should be collected from the remote place for an efficient digital forensic investigation, and it is needed to conduct research on the collection and analysis of data from various kinds of cloud services. Thus, this study suggested a digital forensic framework considering cloud environments by investigating collection and analysis techniques for each cloud service.

A Study on the Technology Acceptance Factors of the Public Cloud Computing Services (공공 클라우드 컴퓨팅 서비스의 기술수용 결정요인 연구)

  • Kim, Dae Ho;Kim, Tae Hyung
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.2
    • /
    • pp.93-106
    • /
    • 2013
  • Cloud computing services have became an hot issues in business fields while the IT-related global company such as Amazon, MS, and Google took part in. The cloud computing makes it possible to share in the form of outsourcing of hardware and software through the Internet, to build a distributed computing environment via multiple terminals, and to reduce the cost using open source. Such a cloud computing services have not shown any significant growth in Korea yet compared to other countries. Therefore, in this study focusing on public cloud computing services, it is intended to analyze the determinants of public cloud computing services using the technology model. Thus, for users using public cloud services, we conducted a questionnaire survey from the beginning of January 2013 to the end of February 2013. And we derived a research model based on the Technology Acceptance Model(TAM). As a result of this study, it shows that personal aspects significantly impacts on the perceived usability, service aspects, systems aspects, and the intent of the technology acceptances. System aspects significantly effect on the intent of technology acceptances. Perceived usability significantly effects on the service aspects and the systems aspects. The main factors effecting on the intent of the technology acceptances are system aspects and perceived usability in order. And it shows that the personal aspects decreases the intent of the technology acceptances.

  • PDF

Validation of Cloud Robotics System in 5G MEC for Remote Execution of Robot Engines (5G MEC 기반 로봇 엔진 원격 구동을 위한 클라우드 로보틱스 시스템 구성 및 실증)

  • Gu, Sewan;Kang, Sungkyu;Jeong, Wonhong;Moon, Hyungil;Yang, Hyunseok;Kim, Youngjae
    • The Journal of Korea Robotics Society
    • /
    • v.17 no.2
    • /
    • pp.118-123
    • /
    • 2022
  • We implemented a real-time cloud robotics application by offloading robot navigation engine over to 5G Mobile Edge Computing (MEC) sever. We also ran a fleet management system (FMS) in the server and controlled the movements of multiple robots at the same time. The mobile robots under the test were connected to the server through 5G SA network. Public 5G network, which is already commercialized, has been temporarily modified to support this validation by the network operator. Robot engines are containerized based on micro-service architecture and have been deployed using Kubernetes - a container orchestration tool. We successfully demonstrated that mobile robots are able to avoid obstacles in real-time when the engines are remotely running in 5G MEC server. Test results are compared with 5G Public Cloud and 4G (LTE) Public Cloud as well.

A Comparative Analysis of Domestic and Foreign Docker Container-Based Research Trends (국내·외 도커 컨테이너 기반 연구 동향 비교 분석)

  • Bae, Sun-Young
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.742-753
    • /
    • 2022
  • Cloud computing, which is rapidly growing as one of the core technologies of the 4th industrial revolution, has become the center of global IT trend change, and Docker, a container-based open source platform, is the mainstream for virtualization technology for cloud computing. Therefore, in this paper, research trends based on Docker containers were compared and analyzed, focusing on studies published from March 2013 to July 2022. As a result of the study, first, the number of papers published by year, domestic and foreign research were steadily increasing. Second, the keywords of the study, in domestic research, Docker, Docker Containers, and Containers were in the order, and in foreign research, Cloud Computing, Containers, and Edge Computing were in the order. Third, in the frequency of publishing institutions to estimate research trends, the utilization was the highest in two papers of the Korean Next Generation Computer Society and the Korean Computer Accounting Society. In the overseas research, IEEE Communications Surveys & Tutorials, IEEE Access, and Computer were in the order. Fourth, in the research method, experiments 78(26.3%) and surveys 32(10.8%) were conducted in domestic research. In foreign research, experiments 128(43.1%) and surveys 59(19.9%) were conducted. In the experiment of implementation research, In domestic research, System 25(8.4%), Algorithm 24(8.1%), Performance Measurement and Improvement 16(5.4%) were in the order, In foreign research, Algorithm 37(12.5%), Performance Measurement and Improvement 17(9.1%), followed by Framework 26(8.8%). Through this, it is expected that it will be used as basic data that can lead the research direction of Docker container-based cloud computing such as research methods, research topics, research fields, and technology development.

A Digital Media Service System Supporting Multi-DRM in the Cloud (클라우드 환경에서 멀티 DRM을 지원하는 디지털 미디어 서비스 시스템)

  • Cho, Dueckyoun;Hwang, Seogchan;Jeong, Gunho;Lim, Hyeongmin
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.4
    • /
    • pp.765-773
    • /
    • 2016
  • As multimedia content technology developed, there are many cases that service contents are being provided in many different ways in the cloud-based media service system. A DRM is a technology that can enhance the copyright of the digital content by providing right information. It is available on a single platform and has a problem that the additional cost when the platform is changing. In this paper, we propose a media service system based on cloud computing. It can be used on multiple platforms at the same time by applying a number of DRM for digital contents, and allows use of a new authentication for another platform without any additional cost.

An Efficient Dynamic Resource Allocation Scheme for Thin-Client Mobile in Cloud Environment (클라우드 환경의 Thin-Client 모바일을 위한 동적 자원 분배 기술)

  • Lee, Jun-Hyung;Huh, Eui-Nam
    • The KIPS Transactions:PartA
    • /
    • v.19A no.3
    • /
    • pp.161-168
    • /
    • 2012
  • The study of Cloud based system is emerging to become the core technology in IT field due to the tremendous growth of Cloud Computing. Researches to deliver applications to Thin-Client based mobile virtual machine and Desktop as a Service(DaaS) using Cloud Computing are conducted actively. In this paper, we propose a Cloud system to run the mobile application in the mobile Thin-Client device and resource allocation mechanism Dynamic Resource Allocation Manager for Mobile Application(DRAMMA). Thus, through performance check, we show DRAMMA has improved the utilization of Cloud system, less migration of virtual machines and decreased the error rate of resource allocation. Also our proposed system delivers service more efficiently than the previous resource allocation algorithm.

Information Security Research for Smartwork System (Smartwork System을 위한 정보보호연구)

  • Cheon, Jae-Hong;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.323-325
    • /
    • 2016
  • Computing loud arrival times were, important data Clouding and, without being limited to the device, may process the information. Recently, work environment and improved access to Cloud and Mobile, this decision has been made to take effect immediately. However, when such important decisions of the government, the security is required. In this paper, we study the network access and control in IoT, Cloud, Bigdata, Smartwork System applied to Mobile. Study the authentication, authorization, and security for each security level Level of Service to connect to the DB information. Research of this paper will be used as the basis for the information processing and decision-making system design and construction of public institutions and agencies as important information for the protection Smartwork System.

  • PDF