• 제목/요약/키워드: cloud theory

검색결과 102건 처리시간 0.026초

A Method for Service Evaluation Based on Fuzzy Theory for Cloud Computing

  • Guo, Liangmin;Luo, Yonglong;He, Xiaokang;Hu, Guiyin;Dong, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권4호
    • /
    • pp.1820-1840
    • /
    • 2017
  • Aiming at the phenomenon of false information issued by service providers in cloud computing environment, a method for service evaluation based on fuzzy theory is put forward in this paper. According to the quality of services provided by cloud service providers and their behavior during interactions, a trust relationship between cloud service providers and cloud service consumers is established, which can be quantified by using fuzzy theory. The quality of services is evaluated by drawing on the trust relationship. In our method, the recommendation credibility of a cloud service consumer is determined through behavior similarity with evaluators and a praise factor. The introduction of the praise factor better suits the phenomenon of a high-quality service getting more repeat customers. The negative impact of dishonest customers is reduced, and the accuracy of trust and cloud service quality evaluation is improved by introducing a confidence factor that can be dynamically adjusted. The experimental results show that our method can effectively and accurately evaluate the trust value and service quality of providers, while weakening the influence of dishonest consumers, and quickly detect dishonest service providers. This is beneficial for consumers trying to find high quality service providers for similar services.

What are the Individual's Real Cares to Switch Personal Cloud Services?

  • Luo, Weiyi;Lee, Young-Chan
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제23권2호
    • /
    • pp.109-137
    • /
    • 2014
  • As the fast development of information technology (IT), abundant attractive alternatives have showed up and challenged to the traditional information technology (IT). Cloud services, the hottest representative among these alternatives, has attracted the attention from all walks of life. Considering the diversity of cloud services, this study attempts to find out the important factors affected on individual's switching intention from incumbent IT to cloud services mainly based on two-factor theory (switching enablers and switching inhibitors) and explore the direct influences of these factors on individual's switching intention. According to our findings, individual's switching intention to cloud services is not only positively influenced by switching enablers but also negatively influenced by switching inhibitors. All the switching enablers in this study (perceived omnipresence, perceived collaboration support and perceived compatibility of cloud services) have positively significant influences on individual's switching intention as well as the switching inhibitors (usage habit of incumbent IT and perceived risk of cloud services) have negatively significant influences on individual's switching intention. It's noteworthy that satisfaction of incumbent IT has insignificant influence on individual's switching intention in this study. Moreover, as we expected, both social influence and personal innovativeness have significant influences on the generation of individual's switching intention.

클라우드 서비스를 활용한 디지털무역 사용자의 혁신저항에 관한 연구 (A Study on Innovation Resistance of Digital Trade Based On Cloud Services)

  • 이인성;김석태
    • 아태비즈니스연구
    • /
    • 제12권4호
    • /
    • pp.313-329
    • /
    • 2021
  • Purpose - Digital trade, which started in the early 2000s, is showing a sharp increase due to the recent pandemic. However, despite this proliferation, users' acceptance of innovation is very slow. Cloud services are at the center of digital trade activation. This study aims to contribute to the spread of digital trade through empirical analysis of the resistance factors that hinder the use of cloud service-based digital trade using the innovation resistance theory and the status quo bias theory. Design/Methodology/Approach - In order to achieve the research purpose, this study was conducted with 171 entrepreneurs using cloud service-based digital trade. Structural equation model(SEM) was used through empirical analysis. Findings - As a result of the study, it was found that the complexity of technology, perceived risk, compatibility, and trust in service providers had a significant effect on innovation resistance, and policy trust did not affect innovation resistance. Also, security concerns and institutional trust were analyzed to have a significant effect on the trust of service providers. Research Implications - This study is meaningful to help the rapid diffusion of innovative technologies through empirical analysis of factors that lower the intention to accept cloud service-based digital trade.

Generic Costing Scheme Using General Equilibrium Theory for Fair Cloud Service Charging

  • Hussin, Masnida;Jalal, Siti Fajar;Latip, Rohaya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권1호
    • /
    • pp.58-73
    • /
    • 2021
  • Cloud Service Providers (CSPs) enable their users to access Cloud computing and storage services from anywhere in quick and flexible manners through the Internet. With the basis of 'pay-as-you-go' model, it makes the interactions between CSPs and the users play a vital role in shaping the Cloud computing market. A pool of virtualized and dynamically scalable Cloud services that delivered on demand to the users is associated with guaranteed performance and cost-provisioning. It needed a costing scheme for determining suitable charges in order to secure lease pricing of the Cloud services. However, it is hard to meet the satisfied prices for both CSPs and users due to their conflicting needs. Furthermore, there is lack of Service Level Agreements (SLAs) that allowing the users to take part into price negotiating process. The users may lose their interest to use Cloud services while reducing CSPs profit. Therefore, this paper proposes a generic costing scheme for Cloud services using General Equilibrium Theory (GET). GET helps to formulate the price function for various services' factors to match with various demands from the users. It is initially determined by identifying the market circumstances that a general equilibrium will be hold and reached. Specifically, there are two procedures of agreement made in response to (i) established equilibrium supply and demand, and (ii) service price formed and constructed in a price range. The SLAs in our costing scheme is integrated to satisfy both CSPs and users' needs while minimizing their conflicts. The price ranging strategy is deliberated to provide prices' options to the users with respect their budget limit. Meanwhile, the CSPs can adaptively charge based on users' preferences without losing their profit. The costing scheme is testable and analyzed in multi-tenant computing environments. The results from our simulation experiments demonstrate that the proposed costing scheme provides better users' satisfaction while fostering fairness pricing in the Cloud market.

Study of Danger-Theory-Based Intrusion Detection Technology in Virtual Machines of Cloud Computing Environment

  • Zhang, Ruirui;Xiao, Xin
    • Journal of Information Processing Systems
    • /
    • 제14권1호
    • /
    • pp.239-251
    • /
    • 2018
  • In existing cloud services, information security and privacy concerns have been worried, and have become one of the major factors that hinder the popularization and promotion of cloud computing. As the cloud computing infrastructure, the security of virtual machine systems is very important. This paper presents an immune-inspired intrusion detection model in virtual machines of cloud computing environment, denoted I-VMIDS, to ensure the safety of user-level applications in client virtual machines. The model extracts system call sequences of programs, abstracts them into antigens, fuses environmental information of client virtual machines into danger signals, and implements intrusion detection by immune mechanisms. The model is capable of detecting attacks on processes which are statically tampered, and is able to detect attacks on processes which are dynamically running. Therefore, the model supports high real time. During the detection process, the model introduces information monitoring mechanism to supervise intrusion detection program, which ensures the authenticity of the test data. Experimental results show that the model does not bring much spending to the virtual machine system, and achieves good detection performance. It is feasible to apply I-VMIDS to the cloud computing platform.

A New Robust Signal Recognition Approach Based on Holder Cloud Features under Varying SNR Environment

  • Li, Jingchao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권12호
    • /
    • pp.4934-4949
    • /
    • 2015
  • The unstable characteristic values of communication signals along with the varying SNR (Signal Noise Ratio) environment make it difficult to identify the modulations of signals. Most of relevant literature revolves around signal recognition under stable SNR, and not applicable for signal recognition at varying SNR. To solve the problem, this research developed a novel communication signal recognition algorithm based on Holder coefficient and cloud theory. In this algorithm, the two-dimensional (2D) Holder coefficient characteristics of communication signals were firstly calculated, and then according to the distribution characteristics of Holder coefficient under varying SNR environment, the digital characteristics of cloud model such as expectation, entropy, and hyper entropy are calculated to constitute the three-dimensional (3D) digital cloud characteristics of Holder coefficient value, which aims to improve the recognition rate of the communication signals. Compared with traditional algorithms, the developed algorithm can describe the signals' features more accurately under varying SNR environment. The results from the numerical simulation show that the developed 3D feature extraction algorithm based on Holder coefficient cloud features performs better anti-noise ability, and the classifier based on interval gray relation theory can achieve a recognition rate up to 84.0%, even when the SNR varies from -17dB to -12dB.

A Cloud-Edge Collaborative Computing Task Scheduling and Resource Allocation Algorithm for Energy Internet Environment

  • Song, Xin;Wang, Yue;Xie, Zhigang;Xia, Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권6호
    • /
    • pp.2282-2303
    • /
    • 2021
  • To solve the problems of heavy computing load and system transmission pressure in energy internet (EI), we establish a three-tier cloud-edge integrated EI network based on a cloud-edge collaborative computing to achieve the tradeoff between energy consumption and the system delay. A joint optimization problem for resource allocation and task offloading in the threetier cloud-edge integrated EI network is formulated to minimize the total system cost under the constraints of the task scheduling binary variables of each sensor node, the maximum uplink transmit power of each sensor node, the limited computation capability of the sensor node and the maximum computation resource of each edge server, which is a Mixed Integer Non-linear Programming (MINLP) problem. To solve the problem, we propose a joint task offloading and resource allocation algorithm (JTOARA), which is decomposed into three subproblems including the uplink transmission power allocation sub-problem, the computation resource allocation sub-problem, and the offloading scheme selection subproblem. Then, the power allocation of each sensor node is achieved by bisection search algorithm, which has a fast convergence. While the computation resource allocation is derived by line optimization method and convex optimization theory. Finally, to achieve the optimal task offloading, we propose a cloud-edge collaborative computation offloading schemes based on game theory and prove the existence of Nash Equilibrium. The simulation results demonstrate that our proposed algorithm can improve output performance as comparing with the conventional algorithms, and its performance is close to the that of the enumerative algorithm.

클라우드 컴퓨팅 환경에서 빅데이터 처리를 위한 ART 기반의 적응형 자원관리 방법 (Adaptive Resource Management Method base on ART in Cloud Computing Environment)

  • 조규철;김재권
    • 한국시뮬레이션학회논문지
    • /
    • 제23권4호
    • /
    • pp.111-119
    • /
    • 2014
  • 클라우드 환경은 빅데이터의 이슈와 데이터 분석을 가능하게 하는 기술로서, 이를 위한 자원 관리 기법이 필요하다. 현재까지의 자원관리 기법은 한정된 계산 방법을 이용하여 자원의 편중의 문제점이 있으며, 이를 해결하기 위해서 자원관리는 자원이력 정보를 활용한 학습기반의 스케줄링이 필요하다. 본 논문에서는 ART(Adaptive Resonance Theory)기반의 적응형 자원관리 기법을 제안한다. 제안하는 기법은 클라우드환경에서 모니터링 및 자원이력을 이용하여 작업의 적합한 할당이 가능하다. 제안하는 방법은 무감독 학습방법을 사용하며, 적응형 자원 관리를 통하여 서비스의 안정성과 데이터 처리성능을 향상시키는 것을 목적으로 한다. 제안하는 방법은 체계적인 자원관리가 가능하고 가용자원을 효율적으로 활용하여 요구 성능을 향상시킬 수 있다는 장점이 있다.

개인 클라우드 컴퓨팅 서비스로의 전환의도에 관한 연구: 사회교환이론을 중심으로 (Understanding Individual's Switching Intentions to Cloud Computing Service: Based on the Social Exchange Theory)

  • 신선진;박성욱
    • 기술혁신학회지
    • /
    • 제18권1호
    • /
    • pp.176-203
    • /
    • 2015
  • 클라우드 컴퓨팅은 지속적 성장세를 보이고 있고, 개인 클라우드 컴퓨팅 서비스의 중요성이 확대되고 있다. 이러한 중요성에 견주어, 본 연구의 목적은 어떤 이유로 기존 컴퓨팅 환경에서 클라우드 컴퓨팅 환경으로 전환을 하는 것인지, 또 어떤 요인들이 전환을 저해하는지에 대한 판단의 근거를 탐색하고자 한다. 본 연구에서는 사회교환이론을 연구의 이론적 프레임워크로 하여, 지각된 가치와 전환의도와의 관계를 실증적으로 분석하였다. 이를 위해 선행연구를 기초로 클라우드 컴퓨팅 서비스의 특성요인을 도출하였고, 이러한 요인들이 지각된 가치를 매개로 전환의도에 영향을 주는지를 파악하는 연구모형을 설정하였다. 총 7개의 연구가설을 제안하였으며, 총 204개의 데이터를 SmartPLS를 통해 가설을 검증하였다. 검증결과, 제안한 7개의 가설 중, 5개의 가설이 지지되었다. 동기요인 중에서는 효율성과 경제성이 지각된 가치를 매개로 전환의도에 영향을 미치는 것으로 나타났고, 저해요인 중에서는 전환 비용과 보안우려가 전환의도의 선행요인임을 규명하였다. 본 연구는 실무적 차원 혹은 조직관점에서 논의되어 온 클라우드 컴퓨팅 서비스를 개인 수준에서 접근하였다는데 의의가 있다. 또한 클라우드 컴퓨팅 서비스로의 전환의도를 동기요인과 저해요인의 이요인 관점에서 논의하였다는데 또 다른 의의를 갖고 있다.

Agent Based Information Security Framework for Hybrid Cloud Computing

  • Tariq, Muhammad Imran
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권1호
    • /
    • pp.406-434
    • /
    • 2019
  • In general, an information security approach estimates the risk, where the risk is to occur due to an unusual event, and the associated consequences for cloud organization. Information Security and Risk Management (ISRA) practices vary among cloud organizations and disciplines. There are several approaches to compare existing risk management methods for cloud organizations but their scope is limited considering stereo type criteria, rather than developing an agent based task that considers all aspects of the associated risk. It is the lack of considering all existing renowned risk management frameworks, their proper comparison, and agent techniques that motivates this research. This paper proposes Agent Based Information Security Framework for Hybrid Cloud Computing as an all-inclusive method including cloud related methods to review and compare existing different renowned methods for cloud computing risk issues and by adding new tasks from surveyed methods. The concepts of software agent and intelligent agent have been introduced that fetch/collect accurate information used in framework and to develop a decision system that facilitates the organization to take decision against threat agent on the basis of information provided by the security agents. The scope of this research primarily considers risk assessment methods that focus on assets, potential threats, vulnerabilities and their associated measures to calculate consequences. After in-depth comparison of renowned ISRA methods with ABISF, we have found that ISO/IEC 27005:2011 is the most appropriate approach among existing ISRA methods. The proposed framework was implemented using fuzzy inference system based upon fuzzy set theory, and MATLAB(R) fuzzy logic rules were used to test the framework. The fuzzy results confirm that proposed framework could be used for information security in cloud computing environment.