• Title/Summary/Keyword: 클라우드 컴퓨팅 정책

Search Result 147, Processing Time 0.023 seconds

The Establishment for Technology Development Plan for National Spatial Information Infrastructure Cloud Service (국가 공간정보 인프라의 클라우드 서비스 기술개발 방안 수립)

  • Youn, Junhee;Kim, Changyoon;Moon, Hyonseok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.469-477
    • /
    • 2017
  • Cloud computing is an IT resource providing technology to various users by using virtualization technology. Newly updated spatial information may not be used by other organizations since management authorities are dispersed for Korean public spatial information. Further, the national budget is wasted since each organization independently implements renewable GIS analysis function. These problems can be solved by applying cloud service. However, research related to the application of cloud service to Korea spatial information system has been proposed in the technology development direction, and no detailed development plan has been proposed. In this paper, we deal with the establishment of a technology development plan for national spatial information infrastructure cloud service. First, we deduct the implication to derive the technology development goals by analyzing the political and technical environment. Second, technology and critical technology elements are derived to achieve the goals of the specialist's analysis based on the evaluation elements. As a result, thirteen critical technology elements are derived. Finally, thirty-one research activities, which comprise the critical technology elements, are defined. Critical technology elements and research activities derived in this research will be used for the generation of a technology development road-map.

An Empirical Study on Factors Affecting an Individual User's Behavioral Intention to Use SaaS (개인 사용자의 SaaS 사용의도에 영향을 미치는 요인에 관한 실증적 연구)

  • Hong, Il-Yoo;Lee, Seung-Min;Cho, Hwi-Hyung
    • Informatization Policy
    • /
    • v.25 no.3
    • /
    • pp.75-94
    • /
    • 2018
  • Today, Software as a Service(SaaS) is being recognized as a key means to enable the innovation of software distribution. Despite the increase in the interest in SaaS, individuals as well as businesses are not yet making an extensive use of it. This research is aimed at identifying and analyzing the antecedents of intentions to use SaaS. We proposed a research model to predict an individual's intention to use SaaS based on the Technology Acceptance Model(TAM). To this end, we conducted a questionnaire survey in which actual software users participated. An empirical analysis has been performed to test the reliability and validity and the hypotheses using SPSS and AMOS software packages. The results of the analysis revealed that functionality, interoperability and economic benefits have positive effects on the intention to use SaaS, while system quality has no significant effect on the behavioral intention. We discussed practical as well as academic implications, and provided research directions.

A Study on IT Network Policy Directions : Focusing on Network Neutrality versus Network Efficiency (IT Network 정책방향에 대한 연구 : 망(網) 중립성과 효율성을 중심으로)

  • Chung, Suk-Kyun
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.49-57
    • /
    • 2012
  • The Internet succeeded because of the end-to-end principle which allowed anyone to add functionality to the network. However, as the internet is increasingly becoming the platform for smart IT applications such as VoIP, IPTV, Cloud Computing and Smart Phone, networks are now under increasing strain of traffic congestion and the absence of quality of service insurances. To date, the debate over internet rules has focused on network neutrality rather than network efficiency. This article emphasizes the well-functioning role of market mechanism for the efficient use and further development of the network. To maximize the value of the network, this article proposes a differential treatment to packets based on customer types, and a two-part tariff pricing rule to secure funding to expand and upgrade networks.

A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion (Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1041-1051
    • /
    • 2012
  • Attack on Cloud Computing, an intensive service solution using network infrastructure recently released, generates service breakdown or intrusive incidents incapacitating developmental platforms, web-based software, or resource services. Therefore, it is needed to conduct research on security for the operational information of three kinds of services (3S': laaS, PaaS, SaaS) supported by the Cloud Computing system and also generated data from the illegal attack on service blocking. This paper aims to build a system providing optimal services as a 4-stage defensive method through the test on the attack and defense of Cloud Computing services. It is a defense policy that conducts 4-stage, orderly and phased access control as follows: controlling the initial access to the network, controlling virtualization services, classifying services for support, and selecting multiple routes. By dispersing the attacks and also monitoring and analyzing to control the access by stage, this study performs defense policy realization and analysis and tests defenses by the types of attack. The research findings will be provided as practical foundational data to realize Cloud Computing service-based defense policy.

Study on APT Penetration Analysis and Plan of Reaction for Secure XaaS (안전한 XaaS 구현을 위한 APT 공격 분석과 대응방안에 관한 연구)

  • Lee, Sun Ho;Kim, DaeYoub
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.841-850
    • /
    • 2015
  • XaaS (Everything as a Service) provides re-usable, fine-grained software components like software, platform, infra across a network. Then users usually pay a fee to get access to the software components. It is a subset of cloud computing. Since XaaS is provided by centralized service providers, it can be a target of various security attacks. Specially, if XaaS becomes the target of APT (Advanced Persistent Threat) attack, many users utilizing XaaS as well as XaaS system can be exposed to serious danger. So various solutions against APT attack are proposed. However, they do not consider all aspects of security control, synthetically. In this paper, we propose overall security checkup considering technical aspect and policy aspect to securely operate XaaS.

A Study on Smart Work 2.0 Implementation Methodology (스마트워크 2.0 구축 방법론에 대한 연구)

  • Lim, Kyu-Kwan
    • Journal of Digital Convergence
    • /
    • v.9 no.4
    • /
    • pp.235-244
    • /
    • 2011
  • According to spread of Smart Work introduction to public organizations & commercial enterprises, its being more focused on how to implement Smart Work effectively. So far current Smart Work, mainly Mobile Office has emphasized the speed & efficiency of management. But future Smart Work, Smart Work 2.0 must focus on the creativity & innovation of companies & people. In order to do that, the new technology like Social networking & Cloud computing should be applied. This study suggests Smart Work 2.0 implementation methodology including critical successful factors & solutions of Smart Work implementation through referencing existing implementation methodology and case study.

Development of Contents on the Marine Meteorology Service by Meteorology and Climate Big Data (기상기후 빅데이터를 활용한 해양기상서비스 콘텐츠 개발)

  • Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.2
    • /
    • pp.125-138
    • /
    • 2016
  • Currently, there is increasing demand for weather information, however, providing meteorology and climate information is limited. In order to improve them, supporting the meteorology and climate big data platform use and training the meteorology and climate big data specialist who meet the needs of government, public agencies and corporate, are required. Meteorology and climate big data requires high-value usable service in variety fields, and it should be provided personalized service of industry-specific type for the service extension and new content development. To provide personalized service, it is essential to build the collaboration ecosystem at the national level. Building the collaboration ecosystem environment, convergence of marine policy and climate policy, convergence of oceanography and meteorology and convergence of R&D basic research and applied research are required. Since then, demand analysis, production sharing information, unification are able to build the collaboration ecosystem.

Constant-Size Ciphertext-Policy Attribute-Based Data Access and Outsourceable Decryption Scheme (고정 크기 암호 정책 속성 기반의 데이터 접근과 복호 연산 아웃소싱 기법)

  • Hahn, Changhee;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.43 no.8
    • /
    • pp.933-945
    • /
    • 2016
  • Sharing data by multiple users on the public storage, e.g., the cloud, is considered to be efficient because the cloud provides on-demand computing service at anytime and anywhere. Secure data sharing is achieved by fine-grained access control. Existing symmetric and public key encryption schemes are not suitable for secure data sharing because they support 1-to-1 relationship between a ciphertext and a secret key. Attribute based encryption supports fine-grained access control, however it incurs linearly increasing ciphertexts as the number of attributes increases. Additionally, the decryption process has high computational cost so that it is not applicable in case of resource-constrained environments. In this study, we propose an efficient attribute-based secure data sharing scheme with outsourceable decryption. The proposed scheme guarantees constant-size ciphertexts irrespective of the number of attributes. In case of static attributes, the computation cost to the user is reduced by delegating approximately 95.3% of decryption operations to the more powerful storage systems, whereas 72.3% of decryption operations are outsourced in terms of dynamic attributes.

Research for Standards of N-Screen Service Platform for Smart Public Services (스마트 공공서비스를 위한 N-스크린 서비스 플랫폼 표준규격에 대한 연구)

  • Lee, Jeong-Heon;Lee, Hee-Joo;Jeong, Un-Gyo;Lee, Seung-Taek;Jang, Youn-Sang;Kang, Sang-Ug
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.277-291
    • /
    • 2012
  • Smartphone (smartpad) and cloud computing has grown rapidly. So, the users started getting interested in multi-screen services. However, various OS / platforms due to the increased content development time and cost. Increase the cost of content development for a multi-screen service, it has been an obstacle. To solve this problem in this study, HTML5-based multi-screen service platform standards specification was established. HTML5 is a specification of the next generation of Web standards. Standards specification established by this study were research in terms of the service provider. And, this standards specification can be used independently of the service infrastructure and device. In addition, this standards specification in order to develop a multi-screen services are efficient and easy to use. For verification adequacy of standards specification established in this study, Scenarios technical entries were mapped by standard specification entries.

Personalization Recommendation Service using OWL Modeling (OWL 모델링을 이용한 개인 추천 서비스)

  • Ahn, Hyo-Sik;Jeong, Hoon;Chang, Hyo-Kyung;Choi, Eui-In
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.309-315
    • /
    • 2012
  • The dissemination of smartphones is being spread and supplementary services using smartphones are increasing and various as the Mobile network and device are developing rapidly, so smartphones that enables to provide a wide range of services is expected to receive the most attention. It makes users listen to music anytime, anywhere in real-time, use useful applications, and access to Internet to search for information. The service environment is changing on PC into Mobile due to the change of the circumstance mentioned above. these services are done by using just location information rather than other context, and users have to search services and use them. It is essential to have Context-aware technology for personalization recommendation services and the appropriate representation and definition of Context information for context-aware. Ontology is possible to represent knowledge freely and knowledge can be extended by inferring. In addition, design of the ontology model is needed according to the purposes of utilization. This paper used context-aware technologies to implement a user personalization recommendation service. It also defined the context through OWL modeling for user personalization recommendation service and used inference rules and inference engine for context reasoning.