• Title/Summary/Keyword: distributed data storage

Search Result 297, Processing Time 0.025 seconds

A Predictive Virtual Machine Placement in Decentralized Cloud using Blockchain

  • Suresh B.Rathod
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.60-66
    • /
    • 2024
  • Host's data during transmission. Data tempering results in loss of host's sensitive information, which includes number of VM, storage availability, and other information. In the distributed cloud environment, each server (computing server (CS)) configured with Local Resource Monitors (LRMs) which runs independently and performs Virtual Machine (VM) migrations to nearby servers. Approaches like predictive VM migration [21] [22] by each server considering nearby server's CPU usage, roatative decision making capacity [21] among the servers in distributed cloud environment has been proposed. This approaches usage underlying server's computing power for predicting own server's future resource utilization and nearby server's resource usage computation. It results in running VM and its running application to remain in waiting state for computing power. In order to reduce this, a decentralized decision making hybrid model for VM migration need to be proposed where servers in decentralized cloud receives, future resource usage by analytical computing system and takes decision for migrating VM to its neighbor servers. Host's in the decentralized cloud shares, their detail with peer servers after fixed interval, this results in chance to tempering messages that would be exchanged in between HC and CH. At the same time, it reduces chance of over utilization of peer servers, caused due to compromised host. This paper discusses, an roatative decisive (RD) approach for VM migration among peer computing servers (CS) in decentralized cloud environment, preserving confidentiality and integrity of the host's data. Experimental result shows that, the proposed predictive VM migration approach reduces extra VM migration caused due over utilization of identified servers and reduces number of active servers in greater extent, and ensures confidentiality and integrity of peer host's data.

Large-scale Virtual Power Plant Management Method Considering Variable and Sensitive Loads (가변 및 민감성 부하를 고려한 대단위 가상 발전소 운영 방법)

  • Park, Yong Kuk;Lee, Min Goo;Jung, Kyung Kwon;Lee, Yong-Gu
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.5
    • /
    • pp.225-234
    • /
    • 2015
  • Nowadays a Virtual Power Plant (VPP) represents an aggregation of distributed energy resource such as Distributed Generation (DG), Combined Heat and Power generation (CHP), Energy Storage Systems (ESS) and load in order to operate as a single power plant by using Information and Communication Technologies, ICT. The VPP has been developed and verified based on a single virtual plant platform which is connected with a number of various distributed energy resources. As the VPP's distributed energy resources increase, so does the number of data from distributed energy. Moreover, it is obviously inefficient in the aspects of technique and cost that a virtual plant platform operates in a centralized manner over widespread region. In this paper the concept of the large-scale VPP which can reduce a error probability of system's load and increase the robustness of data exchange among distributed energy resources will be proposed. In addition, it can directly control and supervise energy resource by making small size's virtual platform which can make a optimal resource scheduling to consider of variable and sensitive load in the large-scale VPP. It makes certain the result is verified by simulation.

3D Modelling Shape Embodiment and Efficiency Analysis of Reservoir that using RTK-GPS and E/S (RTK-GPS와 E/S를 이용한 저수지의 3D 모델링 형상 구현과 효율성 분석)

  • Lee, Jae-One;Park, Un-Yong;Yang, Young-Bo;Kim, Yong-Suk
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.13 no.1 s.31
    • /
    • pp.11-17
    • /
    • 2005
  • A lot of small-scale reservoirs that is extravagant in whole country are controlled state or real condition that correct data about the practice contents is not equipped all up to now. In this study, YungNam districts that region Gyeong-Ju city reservoir is distributed much of when flow speedily choose 23 peace among 73 small scale reservoir and experimented. Acquired data every 5 seconds, and user E/S and user value TS for orthocenter to 1 second interval and executes present condition measurement using RTK-GPS. Could was wave and state that reservoir of 15 places (about 65%) gives protective care that do 3D modelling with acquired data, and now correct contents about reservoir state past through comparative analysis with data. Also, area of full water and wave that analyze effective storage and area of full water of 23 places reservoir could know that 20.63%, effective storage decreased as 3.34%. I wish to contribute about analysis about present reservoir state through this and method the adminstration direction.

  • PDF

3D Modelling Shape Embodiment and Efficiency Analysis of Reservoir (저수지의 3D 모델링 형상 구현과 효율성 분석)

  • Song, Youn-Kyung;Hong, Soon-Hyun;Hong, Jung-Soo
    • Journal of the Korean Geophysical Society
    • /
    • v.9 no.2
    • /
    • pp.113-120
    • /
    • 2006
  • A lot of small-scale reservoirs that is extravagant in whole country are controlled state or real conditionthat correct data about the practice contents is not equipped all up to now. In this study, YungNam districts that region Gyeong-Ju city reservoir is distributed much of when flow speedily choose 23 peace among 73 small scale reservoir and experimented. Acquired data every 5 seconds, and user E/S and user value TS for orthocenter to 1 second interval and executes present ondition measurement using RTK-GPS. Could was wave and state that reservoir of 15 places (about 65%) gives protective care that do 3D modelling with acquired data, and now correct contents about reservoir state past through comparative analysis with data. Also, area of full water and wave that analyze effective storage and area of full water of 23 places reservoir could know that 20.63%, effective storage decreased as 3.34%. I wish to contribute about analysis about present reservoir state through this and method the adminstration direction.

  • PDF

Result of CO2 Geological Storage Site Survey for Small-scale Demonstration in Pohang Basin, Yeongil Bay, SE Korea (영일만 해상 포항분지 소규모 CO2 지중저장 실증을 위한 부지 탐사 결과)

  • Shinn, Young Jae;Kwon, Yi Kyun;Yoon, Jong-Ryeol;Kim, Byoung-Yeop;Cheong, Snons
    • The Journal of Engineering Geology
    • /
    • v.28 no.2
    • /
    • pp.161-174
    • /
    • 2018
  • $CO_2$ storage site for small-scale demonstration has been investigated in Yeongil Bay, Pohang, SE Korea, using seismic survey and exploration well data. We found a potential storage formation consisting mainly of conglomerate and sandstone. The storage formation unconformably overlies volcanic basement rocks that are located in a depth from 650 to 950 m (below sea level). The depth of the storage formation is suitable for injecting supercritical $CO_2$ in the Pohang Basin. The average thickness of the storage formation is about 123 m, which possibly provides sufficient capacity at the level of small-scale storage demonstration. The overlying fine-grained deposits consist mainly of marine hemipelagic muds and interlayered turbidite sands. The overlying formation is considered as a good seal rock that is over 600 m thick and widely distributed in the onshore and offshore portions of the basin. NNE-trending faults found in the study area likely formed at basement level, probably not continue to seafloor. Such faults are interpreted as syndepositional faults involved to the basin initiation. This study reveals that the offshore area of the Pohang Basin contains deep geological formations suitable for small-scale $CO_2$ storage demonstration.

Scalable RDFS Reasoning Using the Graph Structure of In-Memory based Parallel Computing (인메모리 기반 병렬 컴퓨팅 그래프 구조를 이용한 대용량 RDFS 추론)

  • Jeon, MyungJoong;So, ChiSeoung;Jagvaral, Batselem;Kim, KangPil;Kim, Jin;Hong, JinYoung;Park, YoungTack
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.998-1009
    • /
    • 2015
  • In recent years, there has been a growing interest in RDFS Inference to build a rich knowledge base. However, it is difficult to improve the inference performance with large data by using a single machine. Therefore, researchers are investigating the development of a RDFS inference engine for a distributed computing environment. However, the existing inference engines cannot process data in real-time, are difficult to implement, and are vulnerable to repetitive tasks. In order to overcome these problems, we propose a method to construct an in-memory distributed inference engine that uses a parallel graph structure. In general, the ontology based on a triple structure possesses a graph structure. Thus, it is intuitive to design a graph structure-based inference engine. Moreover, the RDFS inference rule can be implemented by utilizing the operator of the graph structure, and we can thus design the inference engine according to the graph structure, and not the structure of the data table. In this study, we evaluate the proposed inference engine by using the LUBM1000 and LUBM3000 data to test the speed of the inference. The results of our experiment indicate that the proposed in-memory distributed inference engine achieved a performance of about 10 times faster than an in-storage inference engine.

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.

Analysis of Impact of Climate Change on River Flows in an Agricultural Watershed Using a Semi-distributed Watershed Model STREAM (준분포형 유역모델 STREAM을 이용한 기후변화가 농업유역의 하천유량에 미치는 영향 분석)

  • Jeong, Euisang;Cho, Hong-Lae
    • Journal of Korean Society on Water Environment
    • /
    • v.35 no.2
    • /
    • pp.131-144
    • /
    • 2019
  • Climate Change affects the hydrological cycle in agricultural watersheds through rising air temperature and changing rainfall patterns. Agricultural watersheds in Korea are characterized by extensive paddy fields and intensive water use, a resource that is under stress from the changing climate. This study analyzed the effects of climate change on river flows for Geum Cheon and Eun-San Choen watershed using STREAM, a semi-distributed watershed model. In order to evaluate the performance and improve the reliability of the model, calibration and validation of the model was done for one flow observation point and three reservoir water storage ratio points. Climate change scenarios were based on RCP data provided by the Korea Meteorological Administration (KMA) and bias corrections were done using the Quantile Mapping method to minimize the uncertainties in the results produced by the climate model to the local scale. Because of water mass-balance, evapotranspiration tended to increase steadily with an increase in air temperature, while the increase in RCP 8.5 scenario resulted in higher RCP 4.5 scenario. The increase in evapotranspiration led to a decrease in the river flow, particularly the decrease in the surface runoff. In the paddy agricultural watershed, irrigation water demand is expected to increase despite an increase in rainfall owing to the high evapotranspiration rates occasioned by climate change.

Design and Implementation of Big Data Platform for Image Processing in Agriculture (농업 이미지 처리를 위한 빅테이터 플랫폼 설계 및 구현)

  • Nguyen, Van-Quyet;Nguyen, Sinh Ngoc;Vu, Duc Tiep;Kim, Kyungbaek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.50-53
    • /
    • 2016
  • Image processing techniques play an increasingly important role in many aspects of our daily life. For example, it has been shown to improve agricultural productivity in a number of ways such as plant pest detecting or fruit grading. However, massive quantities of images generated in real-time through multi-devices such as remote sensors during monitoring plant growth lead to the challenges of big data. Meanwhile, most current image processing systems are designed for small-scale and local computation, and they do not scale well to handle big data problems with their large requirements for computational resources and storage. In this paper, we have proposed an IPABigData (Image Processing Algorithm BigData) platform which provides algorithms to support large-scale image processing in agriculture based on Hadoop framework. Hadoop provides a parallel computation model MapReduce and Hadoop distributed file system (HDFS) module. It can also handle parallel pipelines, which are frequently used in image processing. In our experiment, we show that our platform outperforms traditional system in a scenario of image segmentation.

Fine Grained Security in Cloud with Cryptographic Access Control

  • Aparna Manikonda;Nalini N
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.123-127
    • /
    • 2024
  • Cloud computing services has gained increasing popularity in recent years for supporting various on demand and scalable services for IT consumers where there is a need of less investment towards infrastructure. While storage architecture of cloud enjoys a more robust and fault-tolerant cloud computing network, such architecture also poses a number of security challenges especially when applied in applications related to social networks, Financial transactions, etc. First, as data are stored and maintained by individual virtual machines so Cloud resources are prone to hijacked. Such attacks allow attackers to create, modify and delete machine images, and change administrative passwords and settings successfully. hence, it is significantly harder to ensure data security. Second, Due to dynamic and shared nature of the Cloud, data may be compromised in many ways. Last but not least, Service hijacking may lead to redirect client to an illegitimate website. User accounts and service instances could in turn make a new base for attackers. To address the above challenges, we propose in this paper a distributed data access control scheme that is able to fulfil fine-grained access control over cloud data and is resilient against strong attacks such as compromise and user colluding. The proposed framework exploits a novel cryptographic primitive called attribute-based encryption (ABE), tailors, and adapts it for cloud computing with respect to security requirements