• Title/Summary/Keyword: Availability Guarantee

Search Result 71, Processing Time 0.026 seconds

Embedded Software Reliability Modeling with COTS Hardware Components (COTS 하드웨어 컴포넌트 기반 임베디드 소프트웨어 신뢰성 모델링)

  • Gu, Tae-Wan;Baik, Jong-Moon
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.8
    • /
    • pp.607-615
    • /
    • 2009
  • There has recently been a trend that IT industry is united with traditional industries such as military, aviation, automobile, and medical industry. Therefore, embedded software which controls hardware of the system should guarantee the high reliability, availability, and maintainability. To guarantee these properties, there are many attempts to develop the embedded software based on COTS (Commercial Off The Shelf) hardware components. However, it can cause additional faults due to software/hardware interactions beside general software faults in this methodology. We called the faults, Linkage Fault. These faults have high severity that makes overall system shutdown although their occurrence frequency is extremely low. In this paper, we propose a new software reliability model which considers those linkage faults in embedded software development with COTS hardware components. We use the Bayesian Analysis and Markov Chain Monte-Cairo method to validate the model. In addition, we analyze real linkage fault data to support the results of the theoretical model.

Implementation of SLA Management System for QoS Guarantee in Cloud Computing Environment (클라우드 환경에서 QoS 보장을 위한 SLA 관리시스템 구현)

  • Yoon, Ka-Ram;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.2
    • /
    • pp.302-308
    • /
    • 2013
  • Internet is becoming more common with increasing cloud services have been spreading rapidly. A SLA is agreements between service providers and customers of service providers is how to ensure quality of service. SLA in cloud computing environments from the perspective of the IT service providers to customer satisfaction increase for service quality, it will need to differentiate between competing carriers QoS guarantees with SLA is a very important factor. However, the study of SLA in the cloud is staying in its infancy. In this paper, SLA indices for cloud services defining and use them SLA Management System for QoS guarantee has been implemented. The proposed system using monitoring-based migration policy an open source-based cloud computing platform which Cluster Nodes load distribution of virtual machines assigned to their availability, response time, throughput analysis of what affects and is compared with existing cloud.

Development of B-Value Based GBAS Ground Facility Error Standard Deviation Model and Verification (B-Value를 이용한 GBAS 지상국 오차 표준편차 모델 개발 및 성능 평가)

  • Jun, Hyang-Sig;Ahn, Jong-Sun;Lee, Young-Jae;Choi, Young-Kiu;Sung, Sang-Kyung;Yeom, Chan-Hong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.37 no.12
    • /
    • pp.1232-1237
    • /
    • 2009
  • The ICAO and FAA are developing and verifying of GBAS for civil aircraft landing and take-off. The guarantee of aircraft integrity issue is the important part of GBAS. To guarantee integrity, the GBAS ground facility broadcasts various informations to aircraft. The informations are related to the estimated accuracy of each pseudorange correction and the estimated error terms, for example B-value and standard deviation of the ground facility error. These parameters are used to calculate position error (estimated value of the user). If estimated position errors don't satisfy requirements, aircraft use alternate navigation means. In this paper, GBAS reference stations's real data, which operated by KARI (Korea Aerospace Research Institute) in Jeju international airport, are used to development of new ground facility error standard deviation model. We verify improvement of GBAS availability, with respected to vertical protection level, using B-value based a new ground facility error standard deviation model and a sigma inflation factor.

A Study on Vulnerability for Isolation Guarantee in Container-based Virtualization (컨테이너 기반 가상화에서 격리성 보장을 위한 취약성 고찰)

  • Dayun Yum;Dongcheon Shin
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.23-32
    • /
    • 2023
  • Container-based virtualization has attracted many attentions as an alternative to virtual machine technology because it can be used more lightly by sharing the host operating system instead of individual guest operating systems. However, this advantage may owe some vulnerabilities. In particular, excessive resource use of some containers can affect other containers, which is known as the noisy neighbor problem, so that the important property of isolation may not be guaranteed. The noisy neighbor problem can threat the availability of containers, so we need to consider the noisy neighbor problem as a security problem. In this paper, we investigate vulnerabilities on guarantee of isolation incurred by the noisy neighbor problem in container-based virtualization. For this we first analyze the structure of container-based virtualization environments. Then we present vulnerabilities in 3 functional layers and general directions for solutions with limitations.

Access Control Mechanism for Industrial Control System Based Smart Contract (스마트 컨트랙트 기반의 산업제어시스템 접근 제어 메커니즘)

  • Cho, Minjeong;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.579-588
    • /
    • 2019
  • Industrial control systems consist of various physical devices such as sensors, actuators. Security Infringement such as waterworks facilities Remote Access Infringement and power control systems Infection have been occured by vulnerability of Access Control. Access control to physical devices must be fulfilled with a reliable system. However, Having a single access control system inside company can not guarantee reliability. In addition, when single access control is struggled with error or infringement, access control system is totally unavailable. so system requires a additional access control method or system. In this paper, we proposed access control mechanism for reliable and stable operation using blockchain and smart contract. Proposed Mechanism using trust score to consider resources to be consumed depending on each industrial environment in consideration of the industrial control system where availability is more important than integrity and confidentiality. Unlike other blockchain-based access control system, proposed system is designed for the currently operating industrial control system.

A Real-time Video Playback Scheme in a Distributed Storage System Supporting File Sharing (파일 공유를 지원하는 분산 저장 시스템에서 실시간 비디오 재생 기법)

  • Eunsam Kim
    • Smart Media Journal
    • /
    • v.12 no.11
    • /
    • pp.145-153
    • /
    • 2023
  • In a P2P-based distributed storage system where peers frequently join and leave, it is essential to guarantee not only data availability but also playback quality comparable to that provided by local storage devices when playing back video files with real-time constraints. In addition, cloud storage services based on distributed storage systems provide each user with the functionality to share their files with other users, so when multiple users request playback of the same video file at the same time, all playback should be supported seamlessly in real time. Therefore, in this paper, we propose a scheme that process multiple simultaneous playback requests for each video file in real time as well as data availability in a P2P-based distributed storage system that supports file sharing. This scheme can support real-time simultaneous playback and efficiently use storage space by adjusting the amount of redundant data encoded through erasure coding according to the number of concurrent playback requests for each video file.

Information Dispersal Algorithm and Proof of Ownership for Data Deduplication in Dispersed Storage Systems (분산 스토리지 시스템에서 데이터 중복제거를 위한 정보분산 알고리즘 및 소유권 증명 기법)

  • Shin, Youngjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.155-164
    • /
    • 2015
  • Information dispersal algorithm guarantees high availability and confidentiality for data and is one of the useful solutions for faulty and untrusted dispersed storage systems such as cloud storages. As the amount of data stored in storage systems increases, data deduplication which allows to save IT resources is now being considered as the most promising technology. Hence, it is necessary to study on an information dispersal algorithm that supports data deduplication. In this paper, we propose an information dispersal algorithm and proof of ownership for client-side data deduplication in the dispersed storage systems. The proposed solutions allow to save the network bandwidth as well as the storage space while giving robust security guarantee against untrusted storage servers and malicious clients.

An Empirical Study on the Location and Management Plan of Public Facilities in the Rural Center Place by Declining Population (인구감소에 따른 농촌지역 거점형 중심지 공공시설 입지 및 운영방안 개선에 관한 실증적 연구)

  • Park, Sung-Jin;Kang, In-Ho
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.20 no.3
    • /
    • pp.27-35
    • /
    • 2018
  • This study investigated the public use of Myeon Location in Jeollanam - do where the population is at risk of declining. And discussed the rational provision and coordination of public facilities as a guarantee of fundamental rights. As a result of the study, the rational supply and adjustment directions of public facilities are as follows. First, there are problems such as high availability of management, finance, shopping, and health facilities, lack of culture, leisure, community facilities, and weakening of center function. Therefore, in the continuing declining population situation, face management, safety and health facilities should be upgraded to multifunctional facilities, and utilization efficiency and integration should be promoted. In addition, town center rehabilitation should be centered on multifunctional facilities. In addition, elementary schools will have to utilize and preserve them to take advantage of local cultural values as nostalgia storing place that provide incentives for young people and elementary school children in the future. Second, in order to cope with population decline, public facilities need to strengthen public services through complexity and multifunctionality, wide-area operation with neighboring areas, and user-centered operation management.

Group Key Management Scheme for Survelliance and Reconnaissance Sensor Networks based on Probabilistic Key Sharing (확률론적 키 공유를 통한 감시정찰 센서네트워크에서의 그룹 키 관리 기법)

  • Bae, Si-Hyun;Lee, Soo-Jin
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.29-41
    • /
    • 2010
  • Survelliance and Reconnaissance Sensor Network(SRSN) which can collect various tactical information within battlefield in real time plays an important role in NCW environment, of sensor to shooter architecture. However, due to the resource-limited characteristics of sensor nodes and the intrinsic attributes of sensor network such as wireless communication, the SRSN may be vulnerable to various attacks compared to traditional networks. Therefore, in this paper, we propose a new group key management scheme to guarantee confidentiality, integrity, availability, and authentication during the operation of the SRSN. Proposed scheme generates and distributes the group key based on the topological characteristic of the SRSN and the probabilistic key sharing. The communication cost for distributing the group key is O(logn).

Rate Adaptation for HTTP Video Streaming to Improve the QoE in Multi-client Environments

  • Yun, Dooyeol;Chung, Kwangsue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4519-4533
    • /
    • 2015
  • Hypertext Transfer Protocol (HTTP) adaptive streaming has become a new trend in video delivery. An HTTP adaptive streaming client needs to effectively estimate resource availability and demand. However, due to the bitrate of the video encoded in variable bitrate (VBR) mode, a bitrate mismatch problem occurs. With the rising demand for mobile devices, the likelihood of cases where two or more HTTP adaptive streaming clients share the same network bottleneck and competing for available bandwidth will increase. These mismatch and competition issues lead to network congestion, which adversely affects the Quality of Experience (QoE). To solve these problem, we propose a video rate adaptation scheme for the HTTP video streaming to guarantee and optimize the QoE. The proposed scheme estimates the available bandwidth according to the bitrate of each segment and also schedules the segment request time to expedite the response to the bandwidth variation. We used a multi-client simulation to prove that our scheme can effectively cope with drastic changes in the connection throughput and video bitrate.