• Title/Summary/Keyword: 소프트웨어 가상화

Search Result 240, Processing Time 0.021 seconds

Design and Implementation of Virtual and Invisible Private Disk (VIPDISK) having Secure Storage Device (보안 저장장치를 구비한 가상의 인비저블한 보안 디스크 (VIPDISK) 설계 및 구현)

  • Quan, Shan Guo;Kwon, Yong-Gu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.781-792
    • /
    • 2015
  • This paper proposes a virtual and invisible private disk (VIPDISK) technology equipped with the secure storage devices. As a software based security technology, it can create hidden partitions on any data storage device which can not be identified by the windows OS, so the program running on it, does not have any evidence of the existence of the hidden storage space. Under inactive state, it maintains an unexposed secure partition which can only be activated with a matching combination of a unique digital key and a user password to open the decryption tool. In addition, VIPDISK can store data to secure storage device with real-time encryption, it is worry-free even in the case of lost or theft. Simulation results show that VIPDISK provides a much higher level of security compared to other existing schemes.

Variability-based Service Specification Method for Brokering Cloud Services (클라우드 서비스 중개를 위한 가변성 기반의 서비스 명세 기법)

  • An, Youngmin;Park, Joonseok;Yeom, Keunhyuk
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.12
    • /
    • pp.664-669
    • /
    • 2014
  • As the prevalence of cloud computing increases, various cloud service types have emerged, such as IaaS, PaaS, and SaaS. The growth and diversification of these cloud services has also resulted in the development of technology for cloud service brokers (CSBs), which serve as intermediate cloud services that can assist cloud tenants (users) in deploying services that fit their requirements. In order to broker cloud services, CSBs require the specification of structural models in order to facilitate the analysis and search for cloud services. In this study, we propose a variability-based service analysis model (SAM) that can be used to describe various cloud services. This model is based on the concept of variability in the software product line and represents the commonality and variability of cloud services by binding variants to each variation point that exists in the specification, quality, and pricing of the services. We also propose a virtual cloud bank architecture as a CSB that serves as an intermediate to provides tenants with appropriate cloud services based on the SAM.

Visualized Execution Analyzer for the Java Class File (자바 클래스 파일에 대한 시각화 실행 분석기)

  • Ko, Kwang-Man
    • The KIPS Transactions:PartA
    • /
    • v.11A no.5
    • /
    • pp.319-324
    • /
    • 2004
  • The Java language is rapidly being adopted in the Internet. The distributed applications and their application range are being expanded beyond just a programing language and developed Into software applications. A variety of researches are going on with regard to the Java Virtual Machine runtime environment and methods of analyzing the Java class files and utilizing the information for applications. A class file is a converted file that is executable by the Java virtual machine. Analysis on the class file structure and the runtime processes will be convenient in arranging the decompilers and debugging the source programs. This paper is about the runtime process analyzer that presents the runtime processes, including class files, more visually. The content of a class file will be easily accessed and expressed as in a graphic user interface. The information in the class file displayed is divided into Constant_Pool, Class_file, Interface, Field, Method and Attribute with information on method area, operand stack and local variables expressed visually.

Hierarchical IoT Edge Resource Allocation and Management Techniques based on Synthetic Neural Networks in Distributed AIoT Environments (분산 AIoT 환경에서 합성곱신경망 기반 계층적 IoT Edge 자원 할당 및 관리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.2 no.3
    • /
    • pp.8-14
    • /
    • 2023
  • The majority of IoT devices already employ AIoT, however there are still numerous issues that need to be resolved before AI applications can be deployed. In order to more effectively distribute IoT edge resources, this paper propose a machine learning-based approach to managing IoT edge resources. The suggested method constantly improves the allocation of IoT resources by identifying IoT edge resource trends using machine learning. IoT resources that have been optimized make use of machine learning convolution to reliably sustain IoT edge resources that are always changing. By storing each machine learning-based IoT edge resource as a hash value alongside the resource of the previous pattern, the suggested approach effectively verifies the resource as an attack pattern in a distributed AIoT context. Experimental results evaluate energy efficiency in three different test scenarios to verify the integrity of IoT Edge resources to see if they work well in complex environments with heterogeneous computational hardware.

IoT Edge Architecture Model to Prevent Blockchain-Based Security Threats (블록체인 기반의 보안 위협을 예방할 수 있는 IoT 엣지 아키텍처 모델)

  • Yoon-Su Jeong
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.77-84
    • /
    • 2024
  • Over the past few years, IoT edges have begun to emerge based on new low-latency communication protocols such as 5G. However, IoT edges, despite their enormous advantages, pose new complementary threats, requiring new security solutions to address them. In this paper, we propose a cloud environment-based IoT edge architecture model that complements IoT systems. The proposed model acts on machine learning to prevent security threats in advance with network traffic data extracted from IoT edge devices. In addition, the proposed model ensures load and security in the access network (edge) by allocating some of the security data at the local node. The proposed model further reduces the load on the access network (edge) and secures the vulnerable part by allocating some functions of data processing and management to the local node among IoT edge environments. The proposed model virtualizes various IoT functions as a name service, and deploys hardware functions and sufficient computational resources to local nodes as needed.

The Study on Development of Technology for Electronic Government of S. Korea with Cloud Computing analysed by the Application of Scenario Planning (한국 전자정부와 클라우드 컴퓨팅 기술개발연구 - 시나리오플래닝을 적용하여 -)

  • Lee, Sang-Yun;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.6
    • /
    • pp.1245-1258
    • /
    • 2012
  • This study is about development of technology for electronic government of S. Korea with cloud computing analysed by the application of scenario planning. As a society of knowledge and information has been developed rapidly, because of changing from web environment to ubiquitous environment, a lot of countries across the world as well as S. Korea for e-Government have a variety of changes with cloud computing service. So this research focused on the strategy consulting of e-Government of S. Korea with development of cloud computing technology analysed by the application of 'scenario planning' as a foresight method. As a result, the future policy for development of cloud computing technology for electronic government of S. Korea is to further spur the development of technology for hard ware and internet data center as SLA(Service Level Agreement) and service provisioning, more improvement of level of technology with soft ware solution as resource virtualization, open API(Application Programming Interface).

Selection of An Initial Training Set for Active Learning Using Cluster-Based Sampling (능동적 학습을 위한 군집기반 초기훈련집합 선정)

  • 강재호;류광렬;권혁철
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.7
    • /
    • pp.859-868
    • /
    • 2004
  • We propose a method of selecting initial training examples for active learning so that it can reach high accuracy faster with fewer further queries. Our method is based on the assumption that an active learner can reach higher performance when given an initial training set consisting of diverse and typical examples rather than similar and special ones. To obtain a good initial training set, we first cluster examples by using k-means clustering algorithm to find groups of similar examples. Then, a representative example, which is the closest example to the cluster's centroid, is selected from each cluster. After these representative examples are labeled by querying to the user for their categories, they can be used as initial training examples. We also suggest a method of using the centroids as initial training examples by labeling them with categories of corresponding representative examples. Experiments with various text data sets have shown that the active learner starting from the initial training set selected by our method reaches higher accuracy faster than that starting from randomly generated initial training set.

A Component-Based Application Framework for Context-Aware Smartphone Applications Based on Android (안드로이드에서 상황 인지 스마트폰 애플리케이션을 위한 컴포넌트 기반 애플리케이션 프레임워크)

  • Hwang, Seyoung;Lee, Hyunguk;Park, Sangwon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.9
    • /
    • pp.621-628
    • /
    • 2013
  • This paper presents a framework for context-aware smart phone applications based on Android. The mobile context-aware system is composed of a low level context collection module, a high level context generation module and a service provision module. Existing android system cannot provide an appropriate application framework to integrate these independent modules. In this paper, we provide an application framework which make each module a component, and provide appropriate services to each component. This framework hides the Android platform, so that the complexity for organical combination can be minimized and the application developers can make the mobile context-aware applications easily.

Implementing Geometry Packing in TMIV for Six Degrees of Freedom Immersive Video (6 자유도 몰입형 영상을 위한 TMIV Geometry Packing 구현)

  • Jeong, Jong-Beom;Lee, Soonbin;Choi, YiHyun;Ryu, Eun-Seok
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2022.06a
    • /
    • pp.253-256
    • /
    • 2022
  • 실사 영상 기반의 메타버스 환경을 구축하기 위한 다수의 카메라를 통한 영상 취득 및 부호화, 전송 기술이 활발히 연구되고 있고, 이를 위해 영상 압축 표준화 단체인 moving picture experts group (MPEG) 에서는 MPEG immersive video (MIV) 표준을 개발하였다. 하지만, 현재 널리 사용되는 가상 현실 영상을 스트리밍 가능한 장비의 연산 능력으로는 MIV 기반 몰입형 영상을 스트리밍 시 복호기 동기화 문제가 발생할 수 있다. 따라서 본 논문은 저사양 및 고사양 장비에서 적응적으로 복호기 개수를 조절 가능한 geometry packing 기법을 MIV 의 참조 소프트웨어인 test model for immersive video (TMIV)에서 구현한다. 제안하는 패킹 기법은 지오메트리 영상을 패킹하여 텍스쳐 영상과 같은 높이를 가지도록 한 후 각각 단일 서브픽쳐 (subpicture) 로 부호화한다. 이후 부호화된 서브픽쳐들에 적응적으로 비트스트림 병합이 적용되어 장비의 복호기 사양에 대응한다.

  • PDF

The Study on Dynamic Query Visualization of Digital Data - Focusing on Developing Element, Expression and Interface - (디지털 데이터의 동적 질의형 시각화에 관한 연구 -개발 요소, 표현, 인터페이스 중심으로-)

  • 최홍석;김성곤
    • Archives of design research
    • /
    • v.17 no.2
    • /
    • pp.437-450
    • /
    • 2004
  • Advancement of the media it will be able to express the development and information of computer system causes a problem, how to get the information from plenty of digital data. It needs to the research that provides efficient interface to the user and presents the information visualization standard to the author Consequently, From this paper it investigated analysis of the dynamic diagram and the computer software it led development process of information visualization and result of development outcome. Important developing forms of Information visualization are include Element, Expression, Interface. For developing information visualization model, First, Find the element from many kind of media, include graphic. Second, Find form of the expression from past the diagram which comes to be used plentifully. Last, To get appropriate result it applies the interface, necessary from the interface component which is various uses from computer program. like this, on this paper presents about important three visualization developing forms with detail examples.

  • PDF