• 제목/요약/키워드: utility computing

검색결과 104건 처리시간 0.03초

How do multilevel privacy controls affect utility-privacy trade-offs when used in mobile applications?

  • Kim, Seung-Hyun;Ko, In-Young
    • ETRI Journal
    • /
    • 제40권6호
    • /
    • pp.813-823
    • /
    • 2018
  • In existing mobile computing environments, users need to choose between their privacy and the services that they can receive from an application. However, existing mobile platforms do not allow users to perform such trade-offs in a fine-grained manner. In this study, we investigate whether users can effectively make utility-privacy trade-offs when they are provided with a multilevel privacy control method that allows them to recognize the different quality of service that they will receive from an application by limiting the disclosure of their private information in multiple levels. We designed a research model to observe users' utility-privacy trade-offs in accordance with the privacy control methods and other factors such as the trustworthiness of an application, quality level of private information, and users' privacy preferences. We conducted a user survey with 516 participants and found that, compared with the existing binary privacy controls, both the service utility and the privacy protection levels were significantly increased when the users used the multilevel privacy control method.

A cache placement algorithm based on comprehensive utility in big data multi-access edge computing

  • Liu, Yanpei;Huang, Wei;Han, Li;Wang, Liping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권11호
    • /
    • pp.3892-3912
    • /
    • 2021
  • The recent rapid growth of mobile network traffic places multi-access edge computing in an important position to reduce network load and improve network capacity and service quality. Contrasting with traditional mobile cloud computing, multi-access edge computing includes a base station cooperative cache layer and user cooperative cache layer. Selecting the most appropriate cache content according to actual needs and determining the most appropriate location to optimize the cache performance have emerged as serious issues in multi-access edge computing that must be solved urgently. For this reason, a cache placement algorithm based on comprehensive utility in big data multi-access edge computing (CPBCU) is proposed in this work. Firstly, the cache value generated by cache placement is calculated using the cache capacity, data popularity, and node replacement rate. Secondly, the cache placement problem is then modeled according to the cache value, data object acquisition, and replacement cost. The cache placement model is then transformed into a combinatorial optimization problem and the cache objects are placed on the appropriate data nodes using tabu search algorithm. Finally, to verify the feasibility and effectiveness of the algorithm, a multi-access edge computing experimental environment is built. Experimental results show that CPBCU provides a significant improvement in cache service rate, data response time, and replacement number compared with other cache placement algorithms.

공공부문의 사용량기반 IT서비스를 위한 인프라서비스 모델에 관한 연구 (Infra Service Model for Usage-based IT service in Public Sector)

  • 나종회;이상학;문성준;한인종
    • 디지털융복합연구
    • /
    • 제7권4호
    • /
    • pp.43-56
    • /
    • 2009
  • The concept causing all the fuss is "the utility computing or the usage-based IT service", which now represents the future for IT asset in all aspects of the way they work in business, the commercial and public sector. The core of "utility computing or usage-based IT service" is changing the IT assert from "ownership" to "borrowing", which enables managers to get greater utilization of data-centre resources at lower operating costs. This trend is spreaded in public sector centering the Governmental Internet data Center of Korea(NCIA). So, it has need to make an usage-based IT service model that is suitable for public sector. In this paper, we propose the usage-based IT service model that is composed of IT service framework, service pricing model and IT service architecture.

  • PDF

유틸리티 컴퓨팅(Utility Computing) 개념에 입각한 정보시스템 아웃소싱 사례에 대한 연구 (A Case Study on the Information System Outsourcing based on the Utility Computing Concept)

  • 홍현기
    • 경영정보학연구
    • /
    • 제7권2호
    • /
    • pp.213-228
    • /
    • 2005
  • 본 연구는 최근 기업들이 도입하고 있는 정보시스템의 아웃소싱 전략과 그 사례를 조사하였다. 전통적인 아웃소싱 방법은 기업에게 실질적인 이익을 충분히 가져다주고 있지 못하다. 이에 현실적으로 좀 더 기업에게 이익이 되는 적극적인 아웃소싱 방법론으로서 "유틸리티 컴퓨팅"의 개념에 기초한 적극적인 아웃소싱 방법론이 제시되고 있다. 이에 이러한 아웃소싱 전략을 채택한 한 기업의 사례를 통해서 그 내용을 알아보도록 하자. 이를 위해 정보시스템 아웃소싱을 정의해보고, 신 개념인 IBM사의 유틸리티 컴퓨팅 개념의 Value Net Service(VNS) 를 알아보며, 이를 채택한 한글라스 그룹의 사례를 살펴보도록 한다. 한글라스 그룹에서의 사례를 통해 과연 유틸리티 컴퓨팅에 입각한 정보 인프라의 아웃소싱이 어떠한 결과를 낳았고, 그 성과 및 문제점은 어떤 것들이 있는지도 살펴보도록 한다. 본 논문이 한글라스와 같은 전략을 채택할 기업들에게 좋은 사례가 될 수 있을 것으로 기대한다.

A Hybrid K-anonymity Data Relocation Technique for Privacy Preserved Data Mining in Cloud Computing

  • S.Aldeen, Yousra Abdul Alsahib;Salleh, Mazleena
    • 인터넷정보학회논문지
    • /
    • 제17권5호
    • /
    • pp.51-58
    • /
    • 2016
  • The unprecedented power of cloud computing (CC) that enables free sharing of confidential data records for further analysis and mining has prompted various security threats. Thus, supreme cyberspace security and mitigation against adversaries attack during data mining became inevitable. So, privacy preserving data mining is emerged as a precise and efficient solution, where various algorithms are developed to anonymize the data to be mined. Despite the wide use of generalized K-anonymizing approach its protection and truthfulness potency remains limited to tiny output space with unacceptable utility loss. By combining L-diversity and (${\alpha}$,k)-anonymity, we proposed a hybrid K-anonymity data relocation algorithm to surmount such limitation. The data relocation being a tradeoff between trustfulness and utility acted as a control input parameter. The performance of each K-anonymity's iteration is measured for data relocation. Data rows are changed into small groups of indistinguishable tuples to create anonymizations of finer granularity with assured privacy standard. Experimental results demonstrated considerable utility enhancement for relatively small number of group relocations.

Hierarchical Resource Management Framework and Multi-hop Task Scheduling Decision for Resource-Constrained VEC Networks

  • Hu, Xi;Zhao, Yicheng;Huang, Yang;Zhu, Chen;Yao, Jun;Fang, Nana
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권11호
    • /
    • pp.3638-3657
    • /
    • 2022
  • In urban vehicular edge computing (VEC) environments, one edge server always serves many task requests in its coverage which results in the resource-constrained problem. To resolve the problem and improve system utilization, we first design a general hierarchical resource management framework based on typical VEC network structures. Following the framework, a specific interacting protocol is also designed for our decision algorithm. Secondly, a greedy bidding-based multi-hop task scheduling decision algorithm is proposed to realize effective task scheduling in resource-constrained VEC environments. In this algorithm, the goal of maximizing system utility is modeled as an optimization problem with the constraints of task deadlines and available computing resources. Then, an auction mechanism named greedy bidding is used to match task requests to edge servers in the case of multiple hops to maximize the system utility. Simulation results show that our proposal can maximize the number of tasks served in resource constrained VEC networks and improve the system utility.

Edge Computing Task Offloading of Internet of Vehicles Based on Improved MADDPG Algorithm

  • Ziyang Jin;Yijun Wang;Jingying Lv
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권2호
    • /
    • pp.327-347
    • /
    • 2024
  • Edge computing is frequently employed in the Internet of Vehicles, although the computation and communication capabilities of roadside units with edge servers are limited. As a result, to perform distributed machine learning on resource-limited MEC systems, resources have to be allocated sensibly. This paper presents an Improved MADDPG algorithm to overcome the current IoV concerns of high delay and limited offloading utility. Firstly, we employ the MADDPG algorithm for task offloading. Secondly, the edge server aggregates the updated model and modifies the aggregation model parameters to achieve optimal policy learning. Finally, the new approach is contrasted with current reinforcement learning techniques. The simulation results show that compared with MADDPG and MAA2C algorithms, our algorithm improves offloading utility by 2% and 9%, and reduces delay by 29.6%.

클라우드 컴퓨팅에 대한 국내외 동향 분석 (Analysis of Worldwide Review on Cloud Computing)

  • 임영문;황영섭
    • 대한안전경영과학회:학술대회논문집
    • /
    • 대한안전경영과학회 2009년도 추계학술대회
    • /
    • pp.411-415
    • /
    • 2009
  • There are some definitions of cloud computing but it can be defined as utilization of personal computers, servers and softwares in one cluster for approaches to the use of shared computing resources. Nowadays the applications of cloud computing are rapidly increasing because of its merits on economic aspect, connectivity convenience, storage space and so on. The main objective of this paper is to find an effective methodology as an initial stage for applications of cloud computing in a real life. Therefore this paper addresses worldwide reviews on cloud computing.

  • PDF

다양한 유틸리티 태그를 활용한 컨벤션 서비스 시스템 적용 사례: 2013 오송 화장품·뷰티 세계박람회를 중심으로 (An Application Case of Utility Tag-based Convention Service System: Cosmetics and Beauty Expo, Osong Korea 2013)

  • 최명희;전정호;강희구;이경전
    • 경영정보학연구
    • /
    • 제15권3호
    • /
    • pp.111-128
    • /
    • 2013
  • 컨벤션은 기업의 효율적인 마케팅 도구로서의 역할을 수행하는데, 이는 기업은 전시회에 참가함으로써, 해당 산업의 시장 변화를 용이하게 파악할 수 있고, 새로운 시장 개척 및 잠재 고객의 발굴, 전략적 네트워크 구축 및 강화와 같은 기회를 획득할 수 있기 때문이다. 이러한 컨벤션 분야에서 관람객의 효과적 관람을 지원하기 위해 유비쿼터스 컴퓨팅 기술이 도입되고 있는 가운데, 본 연구는 다양한 유틸리티 태그를 활용하여 컨벤션을 지원하는 서비스 시스템을 구현하고, 2013 오송 화장품 뷰티 세계박람회에 적용한 사례를 소개한다. 본 연구에서 소개하는 유틸리티 태그를 활용한 컨벤션 서비스 시스템은 관람객이 자신의 스마트폰으로 전시회의 다양한 공간 및 사물에 부착되어 있는 유틸리티 태그를 효율적으로 제공 및 관리할 수 있도록 하는 태그 관리 시스템, 참여 기업이 관람객에게 제공하고자 하는 기업 및 상품 정보를 시스템을 통해 직접 입력할 수 있는 정보 제공 시스템, 관람객의 효과적인 관람을 위한 다양한 유틸리티 태그 등으로 구성되어 있다. 본 연구는 먼저 컨벤션 분야에서 유비쿼터스 기술의 도입과 관련된 기존 연구를 검토하고, 다양한 유틸리티를 활용한 컨벤션 서비스 시스템의 적용 사례를 소개한다. 또한 시스템을 통해 수집된 관람객 터치 데이터 분석 및 연관 관계분석을 수행하며, 이를 통해 유틸리티 태그를 활용한 컨벤션 서비스 시스템의 향후 다양한 컨벤션 분야에 적용 가능성을 제시한다.

  • PDF

An Exhaustive Review on Security Issues in Cloud Computing

  • Fatima, Shahin;Ahmad, Shish
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.3219-3237
    • /
    • 2019
  • The Cloud Computing is growing rapidly in the current IT industry. Cloud computing has become a buzzword in relation to Grid & Utility computing. It provides on demand services to customers and customers will pay for what they get. Various "Cloud Service Provider" such as Microsoft Azure, Google Web Services etc. enables the users to access the cloud in cost effective manner. However, security, privacy and integrity of data is a major concern. In this paper various security challenges have been identified and the survey briefs the comprehensive overview of various security issues in cloud computing. The classification of security issues in cloud computing have been studied. In this paper we have discussed security challenges in cloud computing and also list recommended methods available for addressing them in the literature.