• Title/Summary/Keyword: 개인 클라우드 컴퓨팅

Search Result 222, Processing Time 0.029 seconds

Distributed Edge Computing for DNA-Based Intelligent Services and Applications: A Review (딥러닝을 사용하는 IoT빅데이터 인프라에 필요한 DNA 기술을 위한 분산 엣지 컴퓨팅기술 리뷰)

  • Alemayehu, Temesgen Seyoum;Cho, We-Duke
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.12
    • /
    • pp.291-306
    • /
    • 2020
  • Nowadays, Data-Network-AI (DNA)-based intelligent services and applications have become a reality to provide a new dimension of services that improve the quality of life and productivity of businesses. Artificial intelligence (AI) can enhance the value of IoT data (data collected by IoT devices). The internet of things (IoT) promotes the learning and intelligence capability of AI. To extract insights from massive volume IoT data in real-time using deep learning, processing capability needs to happen in the IoT end devices where data is generated. However, deep learning requires a significant number of computational resources that may not be available at the IoT end devices. Such problems have been addressed by transporting bulks of data from the IoT end devices to the cloud datacenters for processing. But transferring IoT big data to the cloud incurs prohibitively high transmission delay and privacy issues which are a major concern. Edge computing, where distributed computing nodes are placed close to the IoT end devices, is a viable solution to meet the high computation and low-latency requirements and to preserve the privacy of users. This paper provides a comprehensive review of the current state of leveraging deep learning within edge computing to unleash the potential of IoT big data generated from IoT end devices. We believe that the revision will have a contribution to the development of DNA-based intelligent services and applications. It describes the different distributed training and inference architectures of deep learning models across multiple nodes of the edge computing platform. It also provides the different privacy-preserving approaches of deep learning on the edge computing environment and the various application domains where deep learning on the network edge can be useful. Finally, it discusses open issues and challenges leveraging deep learning within edge computing.

초연결사회로의 변화와 개인정보 보호

  • Seon, Won-Jin;Kim, Du-Hyeon
    • Information and Communications Magazine
    • /
    • v.31 no.4
    • /
    • pp.53-58
    • /
    • 2014
  • 초연결사회의 구현을 위해서는 다양한 객체를 연결하는 사물인터넷, 연결 사이를 흐르는 데이터 속의 가치를 찾아내는 빅데이터, 그리고 빅데이터의 관련 기술인 클라우드 컴퓨팅 등 핵심기술이 유기적으로 활용되고 있는데, 이 과정에서 발생하는 개인정보 침해의 위험성을 파악하고, 이에 대한 대응 방안을 모색하고자 한다.

A Structure of Message Broker for Load-balancing on Distributed Cloud Environment (분산 클라우드 환경에서 부하 분산을 위한 메시지 브로커 구조)

  • Byun, Jun-Young;Kim, Yunkon;Huh, Eui-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.21-23
    • /
    • 2017
  • 클라우드 컴퓨팅 환경은 하드웨어 및 네트워크 기술의 발전과 서비스 사용자 개인의 네트워크 사용량이 급격히 증가함에 따라 실시간성, 응답시간 보장, 로드 밸런싱을 위해 점차 분산화 되어가는 추세이다. 이러한 변화에 발맞추어 메시지 브로커 시스템도 분산 클라우드에 맞게 변화될 필요가 있다. 본 논문에서는 분산 클라우드 환경에서 최상위 계층의 클라우드에게 집중되는 트래픽 부하를 하위 계층의 클라우드에 분산시킴과 동시에 지연시간을 줄이고 끊김없는 메시징 서비스를 제공할 수 있는 분산 메시지 브로커 구조를 제안한다.

Configuration Method of AWS Security Architecture for Cloud Service (클라우드 서비스 보안을 위한 AWS 보안 아키텍처 구성방안)

  • Park, Se-Joon;Lee, Yong-Joon;Park, Yeon-Chool
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.7
    • /
    • pp.7-13
    • /
    • 2021
  • Recently, due to the many features and advantages of cloud computing, cloud service is being introduced to countless industries around the world at an unbelievably rapid pace. With the rapid increase in the introduction of multi-cloud based services, security vulnerabilities are increasing, and the risk of data leakage from cloud computing services are also expected to increase. Therefore, this study will propose an AWS Well-Architected based security architecture configuration method such as AWS standard security architecture, AWS shared security architecture model that can be applied for personal information security including cost effective of cloud services for better security in AWS cloud service. The AWS security architecture proposed in this study are expected to help many businesses and institutions that are hoping to establish a safe and reliable AWS cloud system.

A Study on 5 Platform Technology Trends for 4th Industrial Revolution (4차 산업혁명 관련 5대 플랫폼 기술의 연구 수준 분석)

  • Chun, Ki Woo;Kim, Haedo;Park, Kwisun;Lee, Keonsoo
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2017.11a
    • /
    • pp.1305-1319
    • /
    • 2017
  • 정보통신(ICT)혁명에 이어 사람이 기존에 수행하던 일을 사람의 도움 없이 자동화시킬 수 있는 기술들이 4차 산업혁명의 핵심 기술로 등장하고 있다. 4차 산업혁명이 현재 산업의 지형도와 경제 사회 패러다임의 변화를 촉진하고 있는 것은 주지의 사실이며, 이에 따라 4차 산업혁명에 주요 추동력(driving force)을 제공하고 있는 핵심 플랫폼 기술 5개(인공지능, 빅데이터, 사물인터넷, 클라우드 컴퓨팅, 3D 프린팅)를 선별하여 글로벌 연구동향과 한국의 연구 수준을 파악하였다. 5개 기술에 대해 Elsevier사의 SCOPUS DB를 기반으로 최근 5년 간의 학술연구논문의 출판 현황을 분석하는 한편, 한국연구재단에서 지원된 과제 현황을 조사하였다. 이를 바탕으로 5개 기술별로 국제적 연구 수준과 주요 리딩 연구기관을 파악하였으며, 4차 산업혁명에 대응하는 연구개발의 정책적 시사점을 도출하고자 하였다. 5개 기술에 대해 미국과 중국이 선도하고 있으며, 영국, 독일, 프랑스, 이탈리아 등의 유럽 국가와 일본, 인도, 한국 등이 추격 그룹을 형성하고 있었다. 한국은 HW 대비 SW분야의 연구 경쟁력이 상대적으로 취약하였으며, 전반적으로 연구 수준의 질적 향상이 필요함을 확인하였다.

  • PDF

A Secure Data Processing Using ID-Based Key Cryptography in Mobile Cloud Computing (모바일 클라우드 컴퓨팅 환경에서 ID-기반 키 암호화를 이용한 안전한 데이터 처리 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.3-8
    • /
    • 2015
  • Most mobile cloud computing system use public key cryptography to provide data security and mutual authentication. A variant of traditional public key technologies called Identity-Based Cryptography(IBC) has recently received considerable attention. The certificate-free approach of IBC may well match the dynamic qualities of cloud environment. But, there is a need for a lightweight secure framework that provides security with minimum processing overhead on mobile devices. In this paper, we propose to use hierarchical ID-Based Encryption in mobile cloud computing. It is suitable for a mobile network since it can reduce the workload of root Public Key Generators by delegating the privilege of user authentication and private key generation. The Identity-Based Encryption and Identity-Based Signature are also proposed and an ID-Based Authentication scheme is presented to secure data processing. The proposed scheme is designed by one-way hash functions and XOR operations, thus has low computation costs for mobile users.

Cloud Computing Virtualization: It's Security Issues and Vulnerability (클라우드 컴퓨팅 가상화 기술: 보안이슈 및 취약점)

  • Kang, Dea-Hoon;Kim, Sang-Gu;Kim, HyunHo;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.234-237
    • /
    • 2014
  • The increasing of Cloud Computing technology among several companies has been a key strategy for IT services to provide desirable IT solutions to consumers of cloud services. More attention is concentrated to these core technologies that enable cloud services and more particularly to the virtualization aspect. The accessibility to a larger number of users is possible because of the usage of the data-intensive, data management and data integrity. Unfortunately, those useful services are vulnerable to kind of attacks by hackers, thus the security of personal information is in critical situation. To solve this to leakage vulnerability, and with the proliferation of cloud services, the cloud service providers adopt a security system with firewall, antivirus software and a large number of virtualized servers and Host. In this paper, a variety of virtualization technologies, threats and vulnerabilities are described with a complement of different security solutions as countermeasures.

  • PDF

Design of Custom Services Platform for Tourists based on Cloud (클라우드 기반의 관광객 맞춤형 서비스 플랫폼 설계)

  • Lee, Yun-Ju;Jung, Jong-Jin;Lim, Tae-Beom
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2013.06a
    • /
    • pp.387-388
    • /
    • 2013
  • 최근 상황인지 기반을 통해 사용자에 대한 모든 정보를 정확하게 파악하여, 현재 가장 필요한 데이터들만 추출하여 실시간으로 빠르게 지능적으로 제공하는 새로운 스마트 클라우드 컴퓨팅 모델의 연구가 필수적으로 요구되고 있다. 이에 본 논문은 관광객이 전시관이나 관광지에서 공연, 예술, 문화재 등을 감상할 때 클라우드 서버에 실시간으로 접속하여 개인 정보와 환경, TPO에 맞게 전시물의 설명이나 체험 서비스를 받을 수 있는 관광객 맞춤형 문화서비스 플랫폼을 연구 및 설계하였다.

  • PDF

Tracking Data through Tracking Data Server in Edge Computing (엣지 컴퓨팅 환경에서 추적 데이터 서버를 통한 데이터 추적)

  • Lim, Han-wool;Byoun, Won-jun;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.443-452
    • /
    • 2021
  • One of the key technologies in edge computing is that it always provides services close to the user by moving data between edge servers according to the user's movements. As such, the movement of data between edge servers is frequent. As IoT technology advances and usage areas expand, the data generated also increases, requiring technology to accurately track and process each data to properly manage the data present in the edge computing environment. Currently, cloud systems do not have data disposal technology based on tracking technology for data movement and distribution in their environment, so users cannot see where it is now, whether it is properly removed or not left in the cloud system if users request it to be deleted. In this paper, we propose a tracking data server to create and manage the movement and distribution of data for each edge server and data stored in the central cloud in an edge computing environment.

A Spread Random Interleaver based Efficient DES Algorithm for Personal Cloud Computing Environments (개인 클라우드 컴퓨팅 환경을 위한 스프레드 랜덤 인터리버 기반의 효율적인 DES 알고리즘)

  • Chung, Yeon Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.41-48
    • /
    • 2013
  • An efficient encryption algorithm based on the Data Encryption Standard (DES) for personal cloud computing environments is presented. The proposed algorithm improves data privacy, security and also encryption speed, compared with the triple DES. The improvement of the proposed algorithm stems from enhanced privacy inherent from the use of spread random interleaver in the place of the known substitution table for initial and final permutations in the DES algorithm. The simulation results demonstrate that the interleaver based DES (I-DES) is found to run faster than the triple DES algorithm and also offer improved security. The proposed algorithm also offers encryption for variable-length data using the Cipher Block Chaining (CBC).