• Title/Summary/Keyword: distributed cloud

Search Result 327, Processing Time 0.023 seconds

Workflow Task Clustering Method Considering Available Resources in Cloud Environments (클라우드 환경에서 가용 자원 활용도를 고려한 워크플로우 작업 클러스터링 기법)

  • Myung, Rohyoung;Jung, Daeyong;Chung, KwangSik;Yu, Heonchang
    • Annual Conference of KIPS
    • /
    • 2015.04a
    • /
    • pp.160-163
    • /
    • 2015
  • 워크플로우 매니지먼트시스템은 오늘날의 어플리케이션들의 처리를 위한 효율적인 워크플로우 설계와 수행을 가능하게 한다. 그러나 전체물리학, 생물학, 지질학과 같이 과학탐구에 목적을 둔 어플리케이션들의 경우 대용량의 데이터를 연산해야 하기 때문에 단일 컴퓨팅 자원으로는 단 시간내에 작업을 완료하기 어렵다. 클라우드 환경에서 워크플로우를 효율적으로 수행하기 위해서는 여러 자원을 효율적으로 활용하기 위한 분산 병렬처리가 필수적이다. 일반적으로 시스템의 마스터노드에서는 클러스터의 원격노드들에게 어플리케이션 수행을 위해 설계된 워크플로우에 맞게 작업들을 분배하게 되는데 이때 마스터노드와 원격노드의 큐에서의 대기시간과 원격노드에서 할당된 작업들을 위한 스케줄링 시간은 성능을 좋지 않게 만드는 원인이 된다. 따라서 본 논문은 클라우드 환경에서 원격노드에서 작업수행이전까지의 지연시간을 줄이기 위한 최적화 방법으로 컴퓨팅 자원 활용도를 고려한 작업들의 병합 기법을 적용해서 워크플로우의 처리 속도를 향상시킨다.

Cloud Assisted P2P Live Video Streaming over DHT Overlay Network (DHT 오버레이 네트워크에서 클라우드 보조의 P2P 라이브 비디오 스트리밍)

  • Lim, Pheng-Un;Choi, Chang-Yeol;Choi, Hwang-Kyu
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.1
    • /
    • pp.89-99
    • /
    • 2017
  • Many works have attempted to solve the scalability, the availability, and the low-latency problems of peer-to-peer (P2P) live video streaming; yet, the problems still remain. While tree-based systems are vulnerable to churn, the mesh-based systems suffer from high delay and overhead. The DHT-aided chunk-driven overlay (DCO) [1] tried to tackle these problems by using the distributed hash table (DHT), which structures into a mesh-based overlay to efficiently share the video segment. However, DCO fully depends on the capacity of the users' device which is small and unstable, i.e., the users' device may leave and join the network anytime, and the video server's bandwidth can be insufficient when the number of users joining the network suddenly increases. Therefore, cloud assist is introduced to overcome those problems. Cloud assist can be used to enhance the availability, the low-latency, and the scalability of the system. In this paper, the DHT is used to maintain the location of the streaming segments in a distributed manner, and the cloud server is used to assist other peers when the bandwidth which required for sharing the video segment is insufficient. The simulation results show that by using the threshold and cloud assist, the availability and the low-latency of the video segments, and the scalability of the network are greatly improved.

A Study on Data Storage and Recovery in Hadoop Environment (하둡 환경에 적합한 데이터 저장 및 복원 기법에 관한 연구)

  • Kim, Su-Hyun;Lee, Im-Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.569-576
    • /
    • 2013
  • Cloud computing has been receiving increasing attention recently. Despite this attention, security is the main problem that still needs to be addressed for cloud computing. In general, a cloud computing environment protects data by using distributed servers for data storage. When the amount of data is too high, however, different pieces of a secret key (if used) may be divided among hundreds of distributed servers. Thus, the management of a distributed server may be very difficult simply in terms of its authentication, encryption, and decryption processes, which incur vast overheads. In this paper, we proposed a efficiently data storage and recovery scheme using XOR and RAID in Hadoop environment.

A Study on Improving the Reliability of Cloud Computing (클라우드 컴퓨팅의 신뢰성 향상 방안에 관한 연구)

  • Yang, Jeong Mo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.107-113
    • /
    • 2012
  • Cloud computing has brought changes to the IT environment. Due to the spread of LTE, users of cloud services are growing more. This which provides IT resources to meet the needs of users of cloud services are noted as a core industry. But it is not activated because of the security of personal data and the safety of the service. In order to solve this, intrusion detection system is constructed as follows. This protects individual data safely which exists in the cloud and also protects information exhaustively from malicious attack. The cause of most attack risk which exists to cloud computing can find in distributed environment. In this study, we analyzed about necessary property of network-based intrusion detection system that process and analyze large amount of data which occur in cloud computing environment. Also, we studied functions which detect and correspond attack occurred in interior of virtualization.

Cryptography in the Cloud: Advances and Challenges

  • Boyd, Colin
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.17-23
    • /
    • 2013
  • Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.

Performance Improvement of Data Replication in Cloud Computing (Cloud Computing에서의 데이터 복제 성능 개선)

  • Lee, Joon-Kyu;Lee, Bong-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.53-56
    • /
    • 2008
  • Recently, the distributed system is being evolved into a new paradigm, named cloud computing, which provides users with efficient computing resources and services from data centers. Cloud computing would reduce the potential danger of Grid computing which utilizes resource sharing by constructing centralized data center. In this paper, a new data replication scheme is proposed for Hadoop distributed file system by changing 1:1 data transmission to 1:N. The proposed scheme considerably reduced the data transmission delay comparing to the current mechanism.

  • PDF

Study on the Job Execution Time of Mobile Cloud Computing (모바일 클라우드 컴퓨팅의 작업 실행 시간에 대한 연구)

  • Jung, Sung Min;Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.99-105
    • /
    • 2012
  • Given the numbers of smartphones, tablets and other mobile devices shipped every day, more and more users are relying on the cloud as the main driver for satisfying their computing needs, whether it is data storage, applications or infrastructure. Mobile cloud computing is simply cloud computing in which at least some of the devices involved are mobile. Each node is owned by a different user and is likely to be mobile. Using mobile hardware for cloud computing has advantages over using traditional hardware. These advantage include computational access to multimedia and sensor data without the need for large network transfer, more efficient access to data stored on other mobile devices and distributed ownership and maintenance of hardware. It is important to predict job execution time in mobile cloud computing because there are many mobile nodes with different capabilities. This paper analyzes the job execution time for mobile cloud computing in terms of network environment and heterogeneous mobile nodes using a mathematical model.

A Study on Authentication Technology of Cloud Service Broker (클라우드 서비스 브로커 인증 기술에 관한 연구)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.321-323
    • /
    • 2016
  • The current cloud system is not compatible as low interoperability between cloud systems because they build up cloud environments with their own way. For example, users who are using Google's cloud system, it will not be able to use the cloud system of MS (Microsoft). To solve these problems, CSB (Cloud Service Broker) technology appeared, but solves interoperability problems between cloud systems require circumstances to develop and still much research. In this study, in the CSB, which has appeared as a service intermediary technology of heterogeneous distributed cloud environment (Cloud Service Broker) technology, to study authentication system, which is a fundamental problem to be solved of the interoperability of the cloud user.

  • PDF

A Data Sharing Algorithm of Micro Data Center in Distributed Cloud Networks (분산클라우드 환경에서 마이크로 데이터센터간 자료공유 알고리즘)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.63-68
    • /
    • 2015
  • Current ICT(Information & Communication Technology) infrastructures (Internet and server/client communication) are struggling for a wide variety of devices, services, and business and technology evolution. Cloud computing originated simply to request and execute the desired operation from the network of clouds. It means that an IT resource that provides a service using the Internet technology. It is getting the most attention in today's IT trends. In the distributed cloud environments, management costs for the network and computing resources are solved fundamentally through the integrated management system. It can increase the cost savings to solve the traffic explosion problem of core network via a distributed Micro DC. However, traditional flooding methods may cause a lot of traffic due to transfer to all the neighbor DCs. Restricted Path Flooding algorithms have been proposed for this purpose. In large networks, there is still the disadvantage that may occur traffic. In this paper, we developed Lightweight Path Flooding algorithm to improve existing flooding algorithm using hop count restriction.

Mitigating Threats and Security Metrics in Cloud Computing

  • Kar, Jayaprakash;Mishra, Manoj Ranjan
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.226-233
    • /
    • 2016
  • Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.