• Title/Summary/Keyword: 스토리지 가상화

Search Result 69, Processing Time 0.046 seconds

A User Privacy Protection Scheme based on Password through User Information Virtuality in Cloud Computing (클라우드 컴퓨팅에서 패스워드기반의 사용자 정보 가상화를 통한 사용자 프라이버시 보장 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Convergence Society for SMB
    • /
    • v.1 no.1
    • /
    • pp.29-37
    • /
    • 2011
  • As the area of informatization has been expanding followed by the development of information communication technology, cloud computing which can use infra sources like server, storage, and network in IT area as an efficient service whenever and wherever skyrockets. But users who use cloud computing technology may have some problems like exposure personal data, surveillance on person, and process on commercial purpose on their personal data. This paper proposes a security technique which protect user's privacy by creating imaginary user information not to be used by other people. The proposed technique virtualizes user's information as an anonymity value not to let other people know user's identity by combining PIN code with it and guarantees user's anonymity. Also it can manage and certificate personal information that is important in cloud computing, so that it can solve security problem of cloud computing which centers all informations. Therefore this paper can assist upgrading of the level of information of poor SMBs through safe use of cloud computing.

  • PDF

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.

Comparison of Resource Allocation Scheduling in IaaS Cloud (IaaS에서의 자원 할당 스케줄링 기법 비교 및 분석)

  • Kim, Ji-Yeong;Lee, Han-Na;Eom, Young Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.118-120
    • /
    • 2013
  • 클라우드 컴퓨팅에서 IaaS(Infrastructure-as-a-service)는 서버, 스토리지, 네트워크 등을 가상화 환경으로 만들어 활용할 수 있도록 하는 서비스이다. 이러한 서비스를 통해 기업들은 초기 인프라 비용을 절약하는 등의 장점을 얻을 수 있기 때문에 많은 관심을 가지고 사용하고 있다. 이러한 사용자들의 증가로 물리적인 자원을 바로 증가시키는 대신 가상머신을 통한 자원의 할당을 좀 더 효율적으로 하는 것에 중점을 두게 되었다. 본 논문에서는 기본적으로 사용되는 자원 할당 기법들과 발전되어 제안된 기법 등 5가지 스케줄링 기법을 비교 및 분석한다. 여러 상황에서 각각의 기법은 장점과 단점을 가진다. 분석 결과를 바탕으로, IaaS를 제공하는 기업에서는 사용자들의 편의와 자신들의 상황에 맞는 자원 할당 스케줄링 기법을 선택할 수 있다.

A Study on Structure of Open Mobile Cloud (개방형 모바일 클라우드 구조 연구)

  • Kim, Woo-Joong;Youn, Chan-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.234-235
    • /
    • 2012
  • 본 논문에서는 모바일 단말에 최적화원 VM(Virtual Machine)인 경량화된 PVI(Private Virtual Instance)를 프로비저닝하여 가상단발상의 Rich 앱에 고성능 컴퓨팅, 스토리지, 네트워크를 제공하고 모바일 클라우드 서비스를 위한 개방형 개발 환경 및 서비스 환경을 제공하는 새로운 모바일 클라우드 모델을 제안한다.

A Study on the Reproduction Method of Oriental-painting on 3D Space in Virtual Reality - Based on the case of "Haedol landscape painting" (가상현실 속 3D 공간에서의 동양화 기법 재현방법 연구 - "해돌 산수화"의 사례를 중심으로)

  • Park, Min-Ji;Sung, Jung-Hwan
    • Journal of Korea Game Society
    • /
    • v.19 no.3
    • /
    • pp.33-42
    • /
    • 2019
  • This paper is the result of research on how to represent 'Landscape' of Oriental painting in 3D space within virtual reality. Based on the similarities between the characteristics of Oriental painting and virtual reality put together three features of painting and put them into the digital content. For the expression of painting style, we produced texture, represented spaces and shadows as a content development environment, and the view point with helper storytelling.

A Research about Hybrid Cloud Service Models (하이브리드 클라우드 서비스 모델에 대한 연구)

  • Lee, Jaekyung;Son, Junggab;Eun, Hasoo;Oh, Heekuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.552-555
    • /
    • 2013
  • 클라우드 컴퓨팅은 인터넷 기술을 기반으로 소프트웨어, 스토리지, OS 등의 가상화된 IT 자원 서비스로서 이용한 만큼 비용을 지불하는 방식으로 제공된다. 따라서 이를 이용하는 사용자 또는 조직이 IT 자원의 유지비용을 절감할 수 있는 이점이 있다. 하지만 기존의 단일 클라우드 서비스 모델은 가용성 문제, vendor lock-in 문제 등의 해결하기 어려운 문제점을 가지고 있다. 이에 따라 최근 클라우드 서비스 간 상호작용을 통해 기존 단일 클라우드의 문제를 해결하고자 하는 모델에 대한 연구가 진행되고 있다. 본 논문에서는 앞서 언급한 모델을 hybrid 클라우드 서비스 모델이라 칭한다. 현재까지 hybrid 클라우드 서비스 모델은 multi-cloud, inter-cloud, collaborative-cloud 등 크게 세 가지 형태로 제안되었다. 본 논문에서는 hybrid 클라우드 서비스 모델에 대한 전반적인 내용을 분석하고, 서로 다른 클라우드 서비스 간 상호작용 과정에서 새롭게 발생할 수 있는 보안 문제를 분석한다.

A Study of VR Interactive Storytelling for Empathy (공감을 위한 VR 인터랙티브 스토리텔링 연구)

  • Bae, Byung-Chull;Kim, Dong Gyun;Seo, Gapyuel
    • Journal of Digital Contents Society
    • /
    • v.18 no.8
    • /
    • pp.1481-1487
    • /
    • 2017
  • In this article we describe our preliminary work to create VR interactive storytelling particularly for building empathic relationships between the reader (or the player) and story characters. As a practical guideline for developing empathy-based VR interactive story, we propose four key factors: first, narrativity considering narrative theories and concepts including the notion of focalization by Gerald Genette; second, interactivity for balancing between narrative and player control in interactive storytelling domain; third, consideration of virtual reality in human computer interaction domain; fourth, empathy in narrative from the viewpoint of psychology and cognitive science. We also introduce an example interactive storytelling scenario based on Little Red Riding Hood story. Finally we conclude with our VR implementation using Unreal game engine and HTC Vive.

A Study on Measurement Parameters of Virtualized Resources on Cloud Computing Networks (클라우드 컴퓨팅 네트워크에서 가상화 장비 평가 항목 연구)

  • Lee, Wonhyuk;Park, Byungyeon;Kim, Seunghae;Kim, TaeYeon;Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.85-90
    • /
    • 2014
  • Cloud computing originated simply to request and execute the desired operation from the network of clouds. It means that an IT resource that provides a service using the Internet technology. It is getting the most attention in today's IT trends. In cloud computing networks, devices and data centers which are composed of the server, storage and application are connected over network. That is, data of computers in different physical locations are integrated using the virtualization technology to provide a service. Therefore cloud computing system is a key information resource, standardized methods and assessment system are required. In this paper, we aims to derive the parameters and information for research of technical standards stability evaluation method associated with various cloud computing equipment.

User behavior analysis in No Disk System Configuration (No Disk System 환경에서의 사용자 행위 분석)

  • Kim, Deunghwa;Namgung, Jaeung;Park, Jungheum;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.491-500
    • /
    • 2013
  • With the advent of big data and increased costs of SSD(HDD), domestic and foreign Internet cafes and organizations have adopted NDS(No Disk System) solution recently. NDS is a storage virtualization solution based on a kind of cloud computing. It manages Operating System and applications in the central server, which were originally managed by individual computers. This research will illustrate the way to analyze user's behaviors under NDS circumstance.

The Design of Active Storage Virtualization System for Information Protection (정보보호를 위한 능동적 스토리지 가상화 시스템 설계)

  • Cho, Kyoung-Ok;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.9
    • /
    • pp.2040-2048
    • /
    • 2010
  • In contemporary society, though convenience and efficiency of work using information system is growing high, adverse effect problems of malignant code, system hacking, information leak by insiders due to the development of the network are raising their head daily. Because of this, enormous work forces and expenses for the recovery and management of system is needed. The existing system can be divided into two aspects: security solution which surveils and treats virus and malignant codes, and network management solution which observes the system of computer, and practices maintenance and repair such as management, recovery, backup. This treatise applied Active Write Filter mechanism and the technology based on NFS and complemented the maintenance problems of user data of the existing system and designed the system which enables solving problems of intellectual property right such as information protection and illegal work.