• Title/Summary/Keyword: cloud computing systems

Search Result 602, Processing Time 0.024 seconds

Cost Efficient Virtual Machine Brokering in Cloud Computing (가격 효율적인 클라우드 가상 자원 중개 기법에 대한 연구)

  • Kang, Dong-Ki;Kim, Seong-Hwan;Youn, Chan-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.7
    • /
    • pp.219-230
    • /
    • 2014
  • In the cloud computing environment, cloud service users purchase and use the virtualized resources from cloud resource providers on a pay as you go manner. Typically, there are two billing plans for computing resource allocation adopted by large cloud resource providers such as Amazon, Gogrid, and Microsoft, on-demand and reserved plans. Reserved Virtual Machine(VM) instance is provided to users based on the lengthy allocation with the cheaper price than the one of on-demand VM instance which is based on shortly allocation. With the proper mixture allocation of reserved and on-demand VM corresponding to users' requests, cloud service providers are able to reduce the resource allocation cost. To do this, prior researches about VM allocation scheme have been focused on the optimization approach with the users' request prediction techniques. However, it is difficult to predict the expected demands exactly because there are various cloud service users and the their request patterns are heavily fluctuated in reality. Moreover, the previous optimization processing techniques might require unacceptable huge time so it is hard to apply them to the current cloud computing system. In this paper, we propose the cloud brokering system with the adaptive VM allocation schemes called A3R(Adaptive 3 Resource allocation schemes) that do not need any optimization processes and kinds of prediction techniques. By using A3R, the VM instances are allocated to users in response to their service demands adaptively. We demonstrate that our proposed schemes are able to reduce the resource use cost significantly while maintaining the acceptable Quality of Service(QoS) of cloud service users through the evaluation results.

Impact Assessment of Climate Change by Using Cloud Computing (클라우드 컴퓨팅을 이용한 기후변화 영향평가)

  • Kim, Kwang-S.
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.13 no.2
    • /
    • pp.101-108
    • /
    • 2011
  • Climate change could have a pronounced impact on natural and agricultural ecosystems. To assess the impact of climate change, projected climate data have been used as inputs to models. Because such studies are conducted occasionally, it would be useful to employ Cloud computing, which provides multiple instances of operating systems in a virtual environment to do processing on demand without building or maintaining physical computing resources. Furthermore, it would be advantageous to use open source geospatial applications in order to avoid the limitations of proprietary software when Cloud computing is used. As a pilot study, Amazon Web Service ? Elastic Compute Cloud (EC2) was used to calculate the number of days with rain in a given month. Daily sets of climate projection data, which were about 70 gigabytes in total, were processed using virtual machines with a customized database transaction application. The application was linked against open source libraries for the climate data and database access. In this approach, it took about 32 hours to process 17 billion rows of record in order to calculate the rain day on a global scale over the next 100 years using ten clients and one server instances. Here I demonstrate that Cloud computing could provide the high level of performance for impact assessment studies of climate change that require considerable amount of data.

Future Trends of Blockchain and Crypto Currency: Challenges, Opportunities, and Solutions

  • Sung, Yunsick;Park, James J.(Jong Hyuk)
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.457-463
    • /
    • 2019
  • The blockchain and crypto currency has become one of the most essential components of a communication network in the recent years. Through communication networking, we browse the internet, make VoIP phone calls, have video conferences and check e-mails via computers. A lot of researches are being conducting to address the blockchain and crypto currency challenges in communication networking and provide corresponding solutions. In this paper, a diverse kind of novel research works in terms of mechanisms, techniques, architectures, and frameworks have been proposed to provide possible solutions against the existing challenges in the communication networking. Such novel research works involve thermal load capacity techniques, intelligent sensing mechanism, secure cloud computing system communication algorithm for wearable healthcare systems, sentiment analysis, optimized resources.

Distributed Denial of Service Defense on Cloud Computing Based on Network Intrusion Detection System: Survey

  • Samkari, Esraa;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.67-74
    • /
    • 2022
  • One type of network security breach is the availability breach, which deprives legitimate users of their right to access services. The Denial of Service (DoS) attack is one way to have this breach, whereas using the Intrusion Detection System (IDS) is the trending way to detect a DoS attack. However, building IDS has two challenges: reducing the false alert and picking up the right dataset to train the IDS model. The survey concluded, in the end, that using a real dataset such as MAWILab or some tools like ID2T that give the researcher the ability to create a custom dataset may enhance the IDS model to handle the network threats, including DoS attacks. In addition to minimizing the rate of the false alert.

A Design of Security Structure in Bare Metal Hypervisor for Virtualized Internal Enviroment of Cloud Service (클라우드 서비스 가상화 내부 환경을 위한 BareMetal Hypervisor 기반 보안 구조 설계)

  • Choi, Do-Hyeon;You, Han-Na;Park, Tae-Seung;Do, Kyoung-Hwa;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.7
    • /
    • pp.526-534
    • /
    • 2013
  • With rapid rise of virtualization technology from diverse types of cloud computing service, security problems such as data safety and reliability are the issues at stake. Since damage in virtualization layer of cloud service can cause damage on all host (user) tasks, Hypervisor that provides an environment for multiple virtual operating systems can be a target of attackers. This paper propose a security structure for protecting Hypervisor from hacking and malware infection.

Exploring Working Group's Psychological Subjectivity on Public Smart Work Services in a Cloud-based Social Networking

  • Kim, Ki Youn;Song, In Kuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4748-4762
    • /
    • 2020
  • Recently, the COVID 19 pandemic has affected on our daily lives and society in many ways. Specifically, it has brought rapid changes in the working environment from office working to smart telecommuting. In addition, cloud computing technology and services not only provided ubiquitous access, but also led to a sharing of information, internal-external communication channels, telework, and innovative smart work for the business process. As a result, smart work services based on social cloud networking have spread to the public sector. However, existing academic research examining smart work merely remains to focus on the theoretical conceptualization or to deal with merely several examples of private views. Best practices of smart work services based on cloud computing technology in the public field rarely exists. Moreover, many studies have been differently measured the values of smart work for private and public sectors depending on organizational singularities. Therefore, the study aims to define new theoretical implications and to explore future business strategies and policy directions based on a technical working group's personal psychological subjectivity. The research applied Q methodology, and selected five public organizations in Korea, that they have adopted or currently plan to adopt some part of smart work services.

Autonomy for Smart Manufacturing (스마트 매뉴팩처링을 위한 자율화)

  • Park, Hong-Seok;Tran, Ngoc-Hien
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.31 no.4
    • /
    • pp.287-295
    • /
    • 2014
  • Smart manufacturing (SM) considered as a new trend of modern manufacturing helps to meet objectives associated with the productivity, quality, cost and competiveness. It is characterized by decentralized, distributed, networked compositions of autonomous systems. The model of SM is inherited from the organization of the living systems in biology and nature such as ant colony, school of fish, bee's foraging behaviors, and so on. In which, the resources of the manufacturing system are considered as biological organisms, which are autonomous entities so that the manufacturing system has the advanced characteristics inspired from biology such as self-adaptation, self-diagnosis, and self-healing. To prove this concept, a cloud machining system is considered as research object in which internet of things and cloud computing are used to integrate, organize and allocate the machining resources. Artificial life tools are used for cooperation among autonomous elements in the cloud machining system.

Leveraged BMIS Model for Cloud Risk Control

  • Song, YouJin;Pang, Yasheng
    • Journal of Information Processing Systems
    • /
    • v.10 no.2
    • /
    • pp.240-255
    • /
    • 2014
  • Cloud computing has increasingly been drawing attention these days. Each big company in IT hurries to get a chunk of meat that promises to be a whopping market in the future. At the same time, information is always associated with security and risk problems. Nowadays, the handling of these risks is no longer just a technology problem, with a good deal of literature focusing on risk or security management and framework in the information system. In this paper, we find the specific business meaning of the BMIS model and try to apply and leverage this model to cloud risk. Through a previous study, we select and determine the causal risk factors in cloud service, which are also known as CSFs (Critical Success Factors) in information management. Subsequently, we distribute all selected CSFs into the BMIS model by mapping with ten principles in cloud risk. Finally, by using the leverage points, we try to leverage the model factors and aim to make a resource-optimized, dynamic, general risk control business model for cloud service providers.

A Study on Access Control Technique for Provision of Cloud Service in SSO-based Environment

  • Eun-Gyeom Jang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.11
    • /
    • pp.73-80
    • /
    • 2023
  • In this paper, a technology to protect important information from access in order to revitalize the cloud service market. A technology is proposed to solve the risk of leakage of important confidential and personal information stored in cloud systems, which is one of the various obstacles to the cloud service market. To protect important information, access control rights to cloud resources are granted to cloud service providers and general users. The system administrator has superuser authority to maintain and manage the system. Client computing services are managed by an external cloud service provider, and information is also stored in an external system. To protect important in-house information within the company, all users, it was designed to provide access authority with users including cloud service providers, only after they are authenticated. It is expected that the confidentiality of cloud computing resources and service reliability achieved through the proposed access control technology will contribute to revitalizing the cloud service market.

Managing Deadline-constrained Bag-of-Tasks Jobs on Hybrid Clouds with Closest Deadline First Scheduling

  • Wang, Bo;Song, Ying;Sun, Yuzhong;Liu, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.2952-2971
    • /
    • 2016
  • Outsourcing jobs to a public cloud is a cost-effective way to address the problem of satisfying the peak resource demand when the local cloud has insufficient resources. In this paper, we studied the management of deadline-constrained bag-of-tasks jobs on hybrid clouds. We presented a binary nonlinear programming (BNP) problem to model the hybrid cloud management which minimizes rent cost from the public cloud while completes the jobs within their respective deadlines. To solve this BNP problem in polynomial time, we proposed a heuristic algorithm. The main idea is assigning the task closest to its deadline to current core until the core cannot finish any task within its deadline. When there is no available core, the algorithm adds an available physical machine (PM) with most capacity or rents a new virtual machine (VM) with highest cost-performance ratio. As there may be a workload imbalance between/among cores on a PM/VM after task assigning, we propose a task reassigning algorithm to balance them. Extensive experimental results show that our heuristic algorithm saves 16.2%-76% rent cost and improves 47.3%-182.8% resource utilizations satisfying deadline constraints, compared with first fit decreasing algorithm, and that our task reassigning algorithm improves the makespan of tasks up to 47.6%.