• Title/Summary/Keyword: cloud computing systems

Search Result 602, Processing Time 0.024 seconds

A Study on the Proposal of the Cloud Based Technology for VoD Systems and Analysis of Economic Effects (양식VoD 시스템에 대한 클라우드 기반 기술을 적용 제안 및 경제적인 효과를 분석 연구)

  • Chae, Jong Soo;Byeon, Sang-Gu;Seo, Chang-Ho;Yang, Jong Won
    • Journal of Korea Entertainment Industry Association
    • /
    • v.5 no.1
    • /
    • pp.149-153
    • /
    • 2011
  • In this study, a configuration method for a cloud technology based VoD system through two different scenarios is proposed. The first scenario virtualizes DMC, content storages for each SO, and stream servers in the conventional VoD system in order to efficiently use the additionally required storage capacity and stream server. In the second scenario, it is proposed that cable broadcasting systems including VoD systems are to be changed as cloud in which the subscriber STB should have minimum programs and storage regions to connect networks, and the operating system and middle ware presented in the existing subscriber STB is moved to the cloud data center. In addition, the comparison of the application of the cloud technology for the cost of changing the existing system to STB and the cost of establishing a cloud VoD system is performed in order to analyze the cost reduction in broadcasting businesses based on the establishment of VoD systems.

An Exploratory Study of Cloud Service Level Agreements - State of the Art Review

  • Saravanan, K.;Rajaram, M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.843-871
    • /
    • 2015
  • Cloud computing evolve as a cost effective business model for IT companies to focus on their core business without perturbing on infrastructure related issues. Hence, major IT firms and Small & Medium Enterprises (SME) are adopting cloud services on rental basis from cloud providers. Cloud Service level agreements (SLA) act as a key liaison between consumers and providers on renting Anything as a Service (AaaS). Design of such an agreement must aim for greater profit to providers as well as assured availability of services to consumers. However in reality, cloud SLA is not satisfying the parties involved because of its inherent complex nature and issues. Also currently most of the agreements are unilateral to favour the provider. This study focuses on comprehensive, 360-degree survey on different aspects of the cloud service agreements. We detailed the life cycle of SLA based on negotiation, different types of SLA, current standards, languages & characteristics, metrics and issues involved in it. This study will help the cloud actors to understand and evaluate the agreements and to make firm decision on negotiation. The need for standardized, bilateral, semantic SLA has also been proposed.

Low Cost Cloud-Assisted Peer to Peer Live Streaming

  • Alghazawy, Bahaa Aldeen;Fujita, Satoshi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1732-1750
    • /
    • 2016
  • Recently, Peer-to-Peer (P2P) live streaming assisted by the cloud computing has attracted considerable attention to improve the reliability of the P2P such as the resilience to peer churn and the shortage of upload capacity. The cost of cloud-assistance is comprised of the number of requests issued to the cloud and the amount of data fetched from the cloud. In this paper, we propose three techniques to reduce the cost of such a cloud-assistance.More concretely, in the proposed method, 1) each peer which lost its parent in the overlay can find a new parent by referring to the information registered in the cloud, 2) several peers which proactively fetch chunks from the cloud are dynamically invested, and 3) the number of requests issued to the cloud is reduced by allowing peers to fetch a collection of chunks using a single request. The performance of the proposed method is evaluated by simulation. The simulation results indicate that it reduces the cost of conventional scheme by 46% while guaranteeing the quality of live streaming service.

A Key Management System for Cloud Services Based on Proxy Server Using Self-Creating Algorithm (셀프 생성 알고리즘을 사용한 프락시 서버를 기반으로 한 클라우드 서비스를 위한 키 관리 시스템)

  • Sung, Soonhwa;Youn, Cheong
    • Journal of KIISE
    • /
    • v.43 no.9
    • /
    • pp.1052-1059
    • /
    • 2016
  • A key role in cloud computing systems that is becoming an issue is implementing a database on untrusted cloud servers requiring the complexity of key management. This study proposes a key management system using Self Proxy Servers to minimize key executions and improve the performance of cloud services by generating Self-Creating Algorithms where the data owner is not directly concerned with related keys when a user sends an encrypted database a query. The Self Proxy Server supports active and autonomous key managements as a distributed server if any trouble should arise from a cloud key server and for an efficient cloud key management. Therefore, the key management system provides secure cloud services by supporting confidentiality of a cloud server database.

Performance Enhancement and Evaluation of Distributed File System for Cloud (클라우드 분산 파일 시스템 성능 개선 및 평가)

  • Lee, Jong Hyuk
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.11
    • /
    • pp.275-280
    • /
    • 2018
  • The choice of a suitable distributed file system is required for loading large data and high-speed processing through subsequent applications in a cloud environment. In this paper, we propose a write performance improvement method based on GlusterFS and evaluate the performance of MapRFS, CephFS and GlusterFS among existing distributed file systems in cloud environment. The write performance improvement method proposed in this paper enhances the response time by changing the synchronization level used by the synchronous replication method from disk to memory. Experimental results show that the distributed file system to which the proposed method is applied is superior to other distributed file systems in the case of sequential write, random write and random read.

A Case Analysis on the Effects of Cloud Adoption on Service Continuity - Focusing on Failures (클라우드 도입이 서비스 연속성에 미치는 영향에 관한 사례 분석 - 장애 중심으로)

  • Ji-Yong Huh;Joon-Hee Yoon;Eun-Kyong Han
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.121-126
    • /
    • 2023
  • As service utilization for IT technologies such as artificial intelligence, big data, and IOT has recently increased, cloud computing has been introduced to efficiently manage vast amounts of data and IT infrastructure resources that process them to provide stable and reliable information services while streamlining infrastructure costs. Efforts for this are ongoing. This thesis compares and analyzes the operation results before and after cloud adoption in terms of system failures for 426 systems at 360 branches nationwide in cloud systems of companies operating a total of 1,750 cloud systems. As a result of the analysis, the number of failures and failure types , service downtime, etc., the introduction of the cloud yielded significant results in securing service continuity. Through this result, it is expected to provide meaningful implications to companies expecting to secure service continuity by adopting the cloud.

Service Image Placement Mechanism Based on the Logical Fog Network (논리적 포그 네트워크 기반의 서비스 이미지 배치 기법)

  • Choi, Jonghwa;Ahn, Sanghyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.11
    • /
    • pp.250-255
    • /
    • 2020
  • For the resolution of the latency problem of the cloud center-based cloud computing, fog computing was proposed that allows end devices to offload computations to nearby fog nodes. In the fog computing, virtualized service images are placed on fog nodes and, if service images are placed close to end devices, the duplicate service image placement problem may occur. Therefore, in this paper, we propose a service image placement mechanism based on the logical fog network that reduces duplicate service images by considering the pattern of collected service requests. For the performance evaluation of the proposed mechanism, through simulations, we compare ours with the on-demand mechanism placing a service image upon the receipt of a service request. We consider the performance factors like the number of service images, the number of non-accommodated service requests, and the network cost.

Enhanced Cloud Service Discovery for Naïve users with Ontology based Representation

  • Viji Rajendran, V;Swamynathan, S
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.38-57
    • /
    • 2016
  • Service discovery is one of the major challenges in cloud computing environment with a large number of service providers and heterogeneous services. Non-uniform naming conventions, varied types and features of services make cloud service discovery a grueling problem. With the proliferation of cloud services, it has been laborious to find services, especially from Internet-based service repositories. To address this issue, services are crawled and clustered according to their similarity. The clustered services are maintained as a catalogue in which the data published on the cloud provider's website are stored in a standard format. As there is no standard specification and a description language for cloud services, new efficient and intelligent mechanisms to discover cloud services are strongly required and desired. This paper also proposes a key-value representation to describe cloud services in a formal way and to facilitate matching between offered services and demand. Since naïve users prefer to have a query in natural language, semantic approaches are used to close the gap between the ambiguous user requirements and the service specifications. Experimental evaluation measured in terms of precision and recall of retrieved services shows that the proposed approach outperforms existing methods.

A Study on Current Status of Central Government's Cloud-System Adoption (공공기관의 클라우드 도입 배경 및 현황)

  • Yu, Young-Moon
    • Proceedings of Korean Society of Archives and Records Management
    • /
    • 2019.05a
    • /
    • pp.51-54
    • /
    • 2019
  • The transition of the central government system to the cloud-based infrastructure is being conducted as the National Information Resources Service (NIRS, Ministry of the Interior and Safety) attempts government resource integration. In the early days, it was attempted as Infrastructure as a Service (IaaS) for cloud service for HW, but now it is being converted to Software as a Service (SaaS) for ordinary service. General tasks of the system are document creation for government service as well as public records management. To this end, government cloud systems were deployed to central government agencies from 2015 to 2018 and planned to be gradually deployed in 2018. Nowadays, records management is conducted with cloud RMS, the cloud RMS system is distributed to the central government from 2016 to 2018, and the dissemination to local government is scheduled to be carried out considering the adoption of On-Nara system.

An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage

  • Xia, Yingjie;Xia, Fubiao;Liu, Xuejiao;Sun, Xin;Liu, Yuncai;Ge, Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3607-3623
    • /
    • 2014
  • The increasing demand in promoting cloud computing in either business or other areas requires more security of a cloud storage system. Traditional cloud storage systems fail to protect data integrity information (DII), when the interactive messages between the client and the data storage server are sniffed. To protect DII and support public verifiability, we propose a data integrity verification scheme by deploying a designated confirmer signature DCS as a building block. The DCS scheme strikes the balance between public verifiable signatures and zero-knowledge proofs which can address disputes between the cloud storage server and any user, whoever acting as a malicious player during the two-round verification. In addition, our verification scheme remains blockless and stateless, which is important in conducting a secure and efficient cryptosystem. We perform security analysis and performance evaluation on our scheme, and compared with the existing schemes, the results show that our scheme is more secure and efficient.