• Title/Summary/Keyword: 클라우드 컴퓨팅 정책

Search Result 147, Processing Time 0.027 seconds

Analysis of Accountability for Trust DRM Cloud Service and Design of Monitoring Tool (신뢰되는 DRM 클라우드 서비스를 위한 책임 추적성 분석 및 모니터링 툴 설계)

  • Lee, Hyejoo;Seo, Changho;Shin, Sang Uk
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.303-311
    • /
    • 2014
  • The accountability of cloud service which provides the cloud users with accountable services applies various technologies such as the compliance of service policy, monitoring and auditing, logging, and others. It ultimately intends to provide trustworthy cloud service by determining who is accountable for various problems happened during data processing and service offering. In this paper, we propose a cloud ecosystem formed from the chain of content and DRM Cloud service in order to offer secure and trust DRM cloud service when providing high value-added content service. Besides this, we analyse the requirements of cloud services for content owners and users and then propose some logging information to be recorded for trace of accountability and a structure of tool for monitoring.

A Study on the Security Enhancement for Personal Healthcare Information of CloudHIS (CloudHIS의 개인 의료정보를 위한 보안강화에 관한 연구)

  • Cho, Young-Sung;Chung, Ji-Moon;Na, Won-Shik
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.27-32
    • /
    • 2019
  • Along with the growth of u-Healthcare, we propose a security enhancement based on network separation for CloudHIS with for handling healthcare information to cope with cyber attack. To protect against all security threats and to establish clear data security policies, we apply desktop computing servers to cloud computing services for CloudHIS. Use two PCs with a hypervisor architecture to apply physical network isolation and select the network using KVM switched controller. The other is a logical network separation using one PC with two OSs, but the network is divided through virtualization. Physical network separation is the physical connection of a PC to each network to block the access path from both the Internet and the business network. The proposed system is an independent desktop used to access an intranet or the Internet through server virtualization technology on a user's physical desktop computer. We can implement an adaptive solution to prevent hacking by configuring the CloudHIS, a cloud system that handles medical hospital information, through network separation for handling security enhancement.

A Study on Networking Technology for Cloud Data Centers (클라우드 데이터센터를 위한 네트워킹 기술에 관한 연구)

  • Choi, Jung-Yul
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.235-243
    • /
    • 2016
  • Legacy data centers are transforming toward cloud data centers according to the advance of mobile and Internet of Things technology, processing of big data, and development of cloud computing technology. The goal of cloud data centers is to efficiently manage energy and facility, and to rapidly provide service demands to users by operating virtualized ICT(Information and Communication Technology) resources. Accordingly, it requires to configure and operate networks for efficiently providing virtualized ICT resources. This paper analyzes networking technologies suitable for cloud data centers and presents ways to efficiently operate the data center.

Analysis of Technical Factors for Multidisplinary Cloud Service Model and Development of Service Model based on Use Case (유즈 케이스 기반의 융.복합 클라우드 서비스 모델을 위한 요소 기술 분석 및 서비스 모델 개발)

  • Seo, Kwang-Kyu
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.545-550
    • /
    • 2012
  • The size of global IT convergence market is expected to increase more and more and cloud computing in industrial convergence environment provides the useful solutions to support convergence environment between other industries. It is necessary and important to predict and develop integrated service structures and types of combining cloud computing and other application technologies. Therefore this paper presents technical factors to provide cloud service. In additions, the requirement and technical factors for various convergence service models are introduced and analyzed using use case which is efficient modelling methodology to construct many system. Using the research results, we performed the case study to develop a convergence cloud service. Eventually, this study is expected to use the basic researches to develop the various the multidisplinary cloud service models based on use case to create the new values.

A Framework of Service Level Agreement for Activating Cloud Services (클라우드서비스 활성화를 위한 서비스수준협약(SLA) 프레임워크)

  • Seo, Kwang-Kyu
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.173-186
    • /
    • 2018
  • While cloud services are expanding, many users are having difficulty in adopting cloud services. This is because there is no information as to which cloud services can be trusted by users. loud service level agreement (Cloud SLA) is an agreement between cloud service providers and cloud service consumers using qualitative and quantitative indicators including quality and performance, etc. of cloud services. In this study, we propose a framework for cloud SLA that can be applied to the domestic cloud industry to improve service levels for cloud service providers and to protect users and also derive the detailed components of cloud SLA applicable to the domestic cloud industry using the proposed framework. Through this result, it is expected that the government will utilize the policy to enhance the reliability between cloud service providers and users under "the Act on the Development of Cloud Computing and Protection of Users", and eventually to activate cloud services by improving the quality and performance level of domestic cloud services and building a user trust.

An Empirical Study on the Effects of Personal and Systematic Characteristics on the Acceptance of Technologically Innovative Products - With Focus on Cloud Computing - (개인특성 및 시스템특성이 기술혁신제품의 수용에 미치는 영향 연구 - 클라우드 컴퓨팅을 대상으로 -)

  • Park, Cheol-Woo;Jeong, Hae-Joo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.7 no.2
    • /
    • pp.63-76
    • /
    • 2012
  • The possibility of successful commercialization of technologically innovative products depends on the degree to which consumers select and utilize the product. Therefore, the research that endeavors to find the usage behavior and the acceptance intention of users of technologically innovative products is a very important quest. This study empirically analyzes the factors that influence commercialization of a technologically innovative product: cloud computing. Existing studies examined acceptance intentions by expanding the TAM model and excluded attitude and usage behavior. This study determined attitude, usage behavior and personal characteristics of consumers to be important influencing factors. The results of the empirical analysis are as follows: First, the self-efficacy of personal characteristics had a significant effect on ease of use and acceptance intention and perceived costs had a significant influence on the factors of perceived usefulness and perceived ease of use. Second, research on the systematic characteristics of cloud computing confirmed that security was an important factor affecting acceptance intention while innovativeness was critical to ease of use. Third, of the usage characteristics among users of technologically innovative products, perceived usefulness had an effect on the acceptance and usage behavior of cloud computing, and perceived ease of use had an important influence on perceived usefulness. Currently, when cloud computing services have not yet become widespread to the public, this study proposed meaningful results for policy direction and commercialization strategies by revealing variables that influence acceptance and usage behavior.

  • PDF

A Study on Computation of the Reduction Rate in the Total Cost of Ownership of the Open Source Software in Comparison to the Commercial Software (상용소프트웨어대비 공개소프트웨어 총소유비용 절감비율 산정에 관한 연구)

  • Kim, Shin-Pyo;Kim, Tae-Yeol;Park, Keun-Ha
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.115-126
    • /
    • 2013
  • The purpose of this study was to confirm the extent of the reduction in the total cost of ownership of the open source software in comparison to the commercial software installed for information system, PC and cloud computing. Accordingly, the actual reduction rates in the total cost of ownership, when open source software is installed in the information system, PC and cloud computing, were computed and analyzed for 51 companies in the area of information system, 18 companies in the area of PC and 6 companies in the area of cloud computing, which included government institution, educational institution and private enterprises. The results of expert survey illustrated that the reduction rates are (1)63.3% on the average for the 4areas of information system, namely, DBMS, WAS, Web and OS, (2) 59.4% on the average for the 6 areas of PC, namely, OS, Documentation Program, Back-up and Restoration, Screen Capture, Vaccine and Others and (3) 61.2% on the average for the 6 areas of cloud computing, namely, Virtualization, OS, WEM/WAS, DBMS, DFS and Cloud Management.

A Study on Secure Data Access Control in Mobile Cloud Environment (모바일 클라우드 환경에서 안전한 데이터 접근 제어에 관한 연구)

  • Kim, Si-Jung;Yeo, Sang-Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.317-322
    • /
    • 2013
  • Mobile cloud environment is recently becoming popular due to Internet access through various environments. Driven by computer performance improvement and service development, the demand for mobile cloud is increasing and accordingly the damage is on the rise. Therefore, it needs to conduct a study on problems of security necessary in large database that occurs in mobile cloud services. Although various security solutions limiting database access, security strategies about new user environments should be analyzed. This study analyzes weakness of safe data access through database management in mobile cloud environment and examines security requirements for safe data management. In addition, this study looks into threatening factors of security in cloud services and then draws security requirements about safer access control. A study on system application and evaluation of security requirements about access control is required.

Collaboration Framework based on Social Semantic Web for Cloud Systems (클라우드 시스템에서 소셜 시멘틱 웹 기반 협력 프레임 워크)

  • Mateo, Romeo Mark A.;Yang, Hyun-Ho;Lee, Jae-Wan
    • Journal of Internet Computing and Services
    • /
    • v.13 no.1
    • /
    • pp.65-74
    • /
    • 2012
  • Cloud services are used for improving business. Moreover, customer relationship management(CRM) approaches use social networking as tools to enhance services to customers. However, most cloud systems do not support the semantic structures, and because of this, vital information from social network sites is still hard to process and use for business strategy. This paper proposes a collaboration framework based on social semantic web for cloud system. The proposed framework consists of components to support social semantic web to provide an efficient collaboration system for cloud consumers and service providers. The knowledge acquisition module extracts rules from data gathered by social agents and these rules are used for collaboration and business strategy. This paper showed the implementations of processing of social network site data in the proposed semantic model and pattern extraction which was used for the virtual grouping of cloud service providers for efficient collaboration.

A Study on Performance Degradation of Workflow Application with VM Interference in Cloud (클라우드에서 가상 머신 인스턴스 간섭에 의한 워크플로우 응용 성능 저하 분석 연구)

  • Choi, Kyu-Beom;Kang, Dong-Ki;Kim, Seong-Hwan;Youn, Chan-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.167-169
    • /
    • 2015
  • 기존 그리드 및 클러스터 환경과 달리 클라우드 컴퓨팅 환경에서는 하나의 물리 호스트 위에 다수의 가상 머신 인스턴스가 할당 및 운용됨에 따라 가상 머신 간섭 (Virtual Machine Interference)에 의한 응용 처리 성능 저하가 발생한다. 본 논문에서는 클라우드 오픈소스 플랫폼인 오픈스택 (OpenStack)을 기반으로 하여 가상 머신 인스턴스 위에서 Montage 워크플로우 응용을 처리할 때 가상 머신 간섭이 처리 성능에 미치는 정도를 분석하고 이를 해결하기 위한 자원 할당 정책을 논의한다.