• Title/Summary/Keyword: CLOUD

Search Result 5,420, Processing Time 0.037 seconds

Experience in Practical Implementation of Abstraction Interface for Integrated Cloud Resource Management on Multi-Clouds

  • Kim, Huioon;Kim, Hyounggyu;Chun, Kyungwon;Chung, Youngjoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.18-38
    • /
    • 2017
  • Infrastructure-as-a-Service (IaaS) clouds provide infrastructure as a pool of virtual resources, and the public IaaS clouds, e.g. Amazon Web Service (AWS) and private IaaS cloud toolkits, e.g. OpenStack, CloudStack, etc. provide their own application programming interfaces (APIs) for managing the cloud resources they offer. The heterogeneity of the APIs, however, makes it difficult to access and use the multiple cloud services concurrently and collectively. In this paper, we explore previous efforts to solve this problem and present our own implementation of an integrated cloud API, which can make it possible to access and use multiple clouds collectively in a uniform way. The implemented API provides a RESTful access and hides underlying cloud infrastructures from users or applications. We show the implementation details of the integrated API and performance evaluation of it comparing the proprietary APIs based on our cloud testbed. From the evaluation results, we could conclude that the overhead imposed by our interface is negligibly small and can be successfully used for multi-cloud access.

Issues and Suggestions for "Act on the Development of Cloud Computing" and Protection of its Users ("클라우드컴퓨팅 발전 및 이용자 보호에 관한 법률"의 쟁점 및 개선방안)

  • Lee, Jung Koo;Min, Daihwan;Kwon, Hun Yeong
    • Journal of Information Technology Applications and Management
    • /
    • v.24 no.1
    • /
    • pp.81-91
    • /
    • 2017
  • In Korea, "Act on the Development of Cloud Computing and Protection of its Users" has been enforced since September 28, 2015. Many countries implemented 'Cloud First' policies and global companies such as Amazon, Microsoft, IBM started cloud services in Korea. Under these circumstance, the Act was established for developing the cloud computing industry. The Act includes clauses for encouraging the use of private cloud computing by public organizations, supporting small- and medium-size cloud service providers, and utilizing secure cloud computing services by users. However, some terms appear to be similar but have different meanings from "Act on Promotion of Information and Communications Network Utilization and Information Protection, etc." and "Personal Information Protection Act". This generated some confusion and conflicts in relation to providing user information to a 3rd party and notifying the intrusion in the Cloud Computing Act. This paper discusses these issues and suggestions for revision of the Cloud Computing Act.

What are the Individual's Real Cares to Switch Personal Cloud Services?

  • Luo, Weiyi;Lee, Young-Chan
    • The Journal of Information Systems
    • /
    • v.23 no.2
    • /
    • pp.109-137
    • /
    • 2014
  • As the fast development of information technology (IT), abundant attractive alternatives have showed up and challenged to the traditional information technology (IT). Cloud services, the hottest representative among these alternatives, has attracted the attention from all walks of life. Considering the diversity of cloud services, this study attempts to find out the important factors affected on individual's switching intention from incumbent IT to cloud services mainly based on two-factor theory (switching enablers and switching inhibitors) and explore the direct influences of these factors on individual's switching intention. According to our findings, individual's switching intention to cloud services is not only positively influenced by switching enablers but also negatively influenced by switching inhibitors. All the switching enablers in this study (perceived omnipresence, perceived collaboration support and perceived compatibility of cloud services) have positively significant influences on individual's switching intention as well as the switching inhibitors (usage habit of incumbent IT and perceived risk of cloud services) have negatively significant influences on individual's switching intention. It's noteworthy that satisfaction of incumbent IT has insignificant influence on individual's switching intention in this study. Moreover, as we expected, both social influence and personal innovativeness have significant influences on the generation of individual's switching intention.

SECURITY THREATS AND ATTACKS IN CLOUD

  • Mohammed, Asma;Al khathami, Jamilah;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.184-191
    • /
    • 2021
  • The amount of information and data in the digital era is increasing tremendously. Continuous online connectivity is generating a massive amount of data that needs to store in computers and be made available as and when required. Cloud computing technology plays a pivotal role in this league. Cloud computing is a term that refers to computer systems, resources and online services that aim to protect and manage data in an effective, more efficient and easy way. Cloud computing is an important standard for maintaining the integrity and security of sensitive data and information for organizations and individuals. Cloud security is one of the most important challenges that the security of the entire cloud system depends on. Thus, the present study reviews the security challenges that exist in cloud computing, including attacks that negatively affect cloud resources. The study also addresses the most serious threats that affect cloud security. We also reviewed several studies, specifically those from 2017-20, that cited effective mechanisms to protect authentication, availability and connection security in the cloud. The present analysis aims to provide solutions to the problems and causes of cloud computing security system violations, which can be used now and developed in the future.

Observational Evidence of Giant Cloud Condensation Nucleus Effects on the Precipitation Sensitivity in Marine Stratocumulus Clouds

  • Jung, Eunsil
    • Journal of the Korean earth science society
    • /
    • v.43 no.4
    • /
    • pp.498-510
    • /
    • 2022
  • Cloud-aerosol interactions are one of the paramount but least understood forcing factors in climate systems. Generally, an increase in the concentration of aerosols increases the concentration of cloud droplet numbers, implying that clouds tend to persist for longer than usual, suppressing precipitation in the warm boundary layer. The cloud lifetime effect has been the center of discussion in the scientific community, partly because of the lack of cloud life cycle observations and partly because of cloud problems. In this study, the precipitation susceptibility (So) matrix was employed to estimate the aerosols' effect on precipitation, while the non-aerosol effect is minimized. The So was calculated for the typical coupled, well-mixed maritime stratocumulus decks and giant cloud condensation nucleus (GCCN) seeded clouds. The GCCN-artificially introduced to the marine stratocumulus cloud decks-is shown to initiate precipitation and reduces So to approximately zero, demonstrating the cloud lifetime hypothesis. The results suggest that the response of precipitation to changes in GCCN must be considered for accurate prediction of aerosol-cloud-precipitation interaction by model studies

A study on Development of Certification Schemes for Cloud Security (국내 클라우드 보안 인증스킴 개발에 관한 연구)

  • Jung, Jin-Woo;Kim, Jungduk;Song, Myeong-Gyun;Jin, Chul-Gu
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.43-49
    • /
    • 2015
  • As the cloud computing law was passed in March, 2015, many private companies and public organizations give consideration to introduce cloud computing services. However, most of them are still concerned about the security issues in cloud computing services. To solve the problem, a certification system of cloud security is necessary as an enabler for adoption of the trusted cloud services. There have been a number of studies about certification systems for cloud security, but only few studies exist about certification scheme of cloud security. Therefore, in this study, foreign certification systems for cloud security are analyzed to draw requirements for developing a domestic certification scheme for cloud security. Based on the result of analysis, this study proposes the three certification schemes of cloud security, which have been reviewed by the focus group interview method to draw advantages and disadvantages of each scheme.

An Exploratory Study on the Derivation of Characteristics of Personal Cloud Computing (개인용 클라우드 컴퓨팅의 특성 도출에 관한 탐색적 연구)

  • Moon, Hye Young;Ryu, Jae Hong;Choi, Jinho
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.2
    • /
    • pp.57-68
    • /
    • 2013
  • Recently, cloud computing has been viewed as a technology of great influence. Despite the importance of personal cloud services, the majority of cloud computing studies has been focused on an enterprise level. Therefore, in this research, we list variables of personal cloud computing characteristics (accessibility, storage, trust, perceived ease of use, availability) from preceding research done on an enterprise level. So, through pilot testing, we analyze whether examined characteristic variables affect the intention to use personal cloud computing. Next, we investigate the relevancy between user characteristics, including gender, age, and occupation, and the usage rate of personal cloud computing. Lastly, we implement an analysis of variance in order to speculate whether there is any difference between the five characteristic variables in using personal cloud computing between cloud service enterprises. For empirical testing people with experience in personal cloud computing are surveyed. Frequency analysis, exploratory factor analysis, internal consistency analysis, T-test, ANOVA, and multiple regression analysis are implemented with 325 valid samples. The analysis results are as follows: First, among user characteristic variables, 'occupation' shows a significant relationship with cloud service usage, Second, between cloud service enterprises, all five characteristic variables of 'Naver N Drive' are thoroughly evaluated and 'Google Drive' receives a high evaluation in availability and accessibility. Third and finally, all of the selected characteristic variables affect the intention to use personal cloud computing. However, availability is identified to be the most important factor. This research will serve as a reference to enterprises for the practical implementation of personal cloud computing service.

A Study of the Efficient Cloud Migration Technique and Process based on Open Source Software (오픈 소스 기반의 효율적인 클라우드 마이그레이션 절차에 관한 연구)

  • Park, In-Geun;Lee, Eun-Seok;Park, Jong-Kook;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.280-283
    • /
    • 2014
  • Cloud Computing virtualizes logical resources like cpu, memory and disks etcs from physical machines. This virtualization technology increases computing resource utilization and supports dynamic resource allocations. Because of these benefits, global cloud computing services like Amazon AWS, Google Cloud and Apple iCloud are prevalent. With this cloud Computing services, there has been a request about cloud migration between different cloud environments. If one service which operates in a cloud computing environment wants to migrate to another cloud environment, there should have been a compitability between two different cloud environment. but even global cloud computing services do not support this compitability. In this paper, we suggest a process and technology to cloud migrations based on open sources.

  • PDF

A Study on CVE Improvement Plans to improve Cloud Service Security (클라우드 서비스 보안성 향상을 위한 CVE 개선 방안 연구)

  • Kim Taekyung;Jung Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.2
    • /
    • pp.39-46
    • /
    • 2023
  • The rise in popularity of cloud services has brought about a heightened concern for security in the field of cloud computing. As a response, governments have implemented CSAP(Cloud Security Assurance Program) to ensure the security of these services. However, despite such measures, the emergence of various security vulnerabilities persists, resulting in incidents related to cloud security breaches. To address this, the utilization of Common Vulnerabilities and Exposures (CVE) has been proposed as a means to facilitate the sharing of vulnerability information across different domains. Nevertheless, the unique characteristics of cloud services present challenges in assigning CVE IDs to the diverse range of vulnerabilities within the cloud environment. In this study, we analyzed how CVE can be effectively employed to enhance cloud security. The assignment of a CVE ID is contingent upon the fulfillment of three rules in the Counting Decision and five rules in the Inclusion Decision. Notably, the third rule in the Inclusion Decision, INC3, clashes with the nature of cloud services, resulting in obstacles in assigning CVE IDs to various cloud vulnerabilities. To tackle this issue, we suggest the appointment of designated individuals who would be responsible for overseeing specific areas of cloud services, thereby enabling the issuance of CVE IDs. This proposed approach aims to overcome the challenges associated with the unique characteristics of cloud services and ensure the seamless sharing of vulnerability information. Information sharing regarding vulnerabilities is crucial in the field of security, and by incorporating cloud vulnerabilities into the CVE system, this method can contribute to enhancing the security of cloud services.

A Comparative Analysis of Domestic and Foreign Cloud Service Agreements (국내외 클라우드 서비스 이용약관 비교 분석 연구)

  • Song, Jiwon;Lee, Hwansoo
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.8
    • /
    • pp.499-509
    • /
    • 2016
  • The MSIP has implemented "Act on The Development of Cloud Computing and Protection of Its Users" from September 2015 and invigorated the cloud service industry. The act mainly includes the improvement cloud computing reliability and user protection for the development foundation and use activation. In order to expand the cloud market, it is important to increase the reliability of individual users. However, practical discussions and approach for cloud services adoption are still limited. In fact, there is no agreement standard for domestic cloud services. As a user agreement is not standardized, users feel difficulty compare to each agreement of cloud service provider and may be damaged because of unfair terms. Thus, it is necessary to examine the unfairness of cloud service agreement for user protection. This study analyzes domestic and foreign cloud service agreements including Practical Guide to Cloud Service Agreement of Cloud Standards Customer Council and suggests the direction of the standard agreement of cloud services.