• 제목/요약/키워드: Cloud Amount

검색결과 390건 처리시간 0.023초

클라우드 컴퓨팅에서 u-Fitness 기반 운동 관리를 위한 소유자의 프라이버시를 보장하는 프로토콜 (A Owner's Privacy Preserving Protocol for u-Fitness-based Exercise Management in Cloud Computing)

  • 김태연;조기환;최은복
    • 스마트미디어저널
    • /
    • 제6권3호
    • /
    • pp.21-28
    • /
    • 2017
  • u-fitness 기반 운동관리와 관련된 민감한 신체 정보의 양이 폭발적으로 증가하고 있기 때문에 클라우드 서비스의 활용에 대한 관심이 날로 증가하고 있다. 그러나 클라우드 서버는 자신의 서버에 저장된 정보에 불법적으로 접근할 수 있으며, 누가 그 정보의 소유자인지를 알아낼 수 있고, 스토리지에 저장된 정보 간의 연관성을 불법적으로 추론할 수 있다. 또한 클라우드 서버는 저장된 정보에 대해 수정, 삭제 같은 소유자의 정당한 연산 요청에 대해 불이행할 수 있으며, 자체의 오작동으로 인해 정보를 분실하거나 손상시킬 수 있다. 따라서 우리는 클라우드 서버를 전적으로 신뢰할 수 없기 때문에 클라우드 서버를 사용하기 위해서는 위와 같은 문제들을 해결해야 한다. 우리는 클라우드 컴퓨팅 환경에서 u-Fitness 기반 운동관리를 위한 소유자의 프라이버시를 보장하는 프로토콜을 제안한다. 그리고 제안한 구조가 실제 환경에서 적용 가능함을 보안 분석과 성능 분석을 통해 보인다.

영동지역 기상조건이 구름 및 강설 모의에 미치는 영향: 이상 실험 기반의 사례 연구 (Effects of Meteorological Conditions on Cloud and Snowfall Simulations in the Yeongdong Region: A Case Study Based on Ideal Experiments)

  • 김유준;안보영;김백조;김승범
    • 대기
    • /
    • 제31권4호
    • /
    • pp.445-459
    • /
    • 2021
  • This study uses a cloud-resolving storm simulator (CReSS) to understand the individual effect of determinant meteorological factors on snowfall characteristics in the Yeongdong region based on the rawinsonde soundings for two snowfall cases that occurred on 23 February (Episode 1) and 13 December (Episode 2) 2016; one has a single-layered cloud and the other has two-layered cloud structure. The observed cloud and precipitation (snow crystal) features were well represented by a CReSS model. The first ideal experiment with a decrease in low-level temperature for Episode 1 indicates that total precipitation amount was decreased by 19% (26~27% in graupel and 53~67% in snow) compared with the control experiment. In the ideal experiment that the upper-level wind direction was changed from westerly to easterly, although total precipitation was decreased for Episode 1, precipitation was intensified over the southwestern side (specifically in terrain experiment) of the sounding point (128.855°E, 37.805°N). In contrast, the precipitation for Episode 2 was increased by 2.3 times greater than the control experiment under terrain condition. The experimental results imply that the low-level temperature and upper-level dynamics could change the location and characteristics of precipitation in the Yeongdong region. However, the difference in precipitation between the single-layered experiment and control (two-layered) experiment for Episode 2 was negligible to attribute it to the effect of upper-level cloud. The current results could be used for the development of guidance of snowfall forecast in this region.

Cloud of Things (CoTs): Security Threats and Attacks

  • Almtrafi, Sara Mutlaq;Alkhudadi, Bdour Abduallatif;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.229-237
    • /
    • 2021
  • Cloud of things (CoTs) is a newer idea which combines cloud computing (CC) with the Internet of Things (IoT). IoT capable of comprehensively producing data, and cloud computing can be presented pathways that allow for the progression towards specific destinations. Integrating these technologies leads to the formation of a separate element referred to as the Cloud of Things (CoTs). It helps implement ideas that make businesses more efficient. This technology is useful for monitoring a device or a machine and managing or connecting them. Since there are a substantial amount of machines that can run the IoT, there is now more data available from the IoT that would have to be stored on a local basis for a provisional period, and this is impossible. CoTs is used to help manage and analyze data to additionally create usable information by permitting and applying the development of advanced technology. However, combining these elements has a few drawbacks in terms of how secure the process is. This investigation aims to recent study literature from the past 3 years that talk about how secure the technology is in terms of protecting by authentication, reliability, availability, confidentiality, and access control. Additionally, this investigation includes a discussion regarding some kinds of potential attacks when using Cloud of Things. It will also cover what the various authors recommend and conclude with as well as how the situation can be approached to prevent an attack.

기상청 천리안 위성 자료를 활용한 태양광 기상자원 특성 및 오차 분석 (Characteristics and Error Analysis of Solar Resources Derived from COMS Satellite)

  • 이수향;김연희
    • 대기
    • /
    • 제30권1호
    • /
    • pp.59-73
    • /
    • 2020
  • The characteristics of solar resources in South Korea were analyzed by comparing the solar irradiance derived from COMS (Communication, Ocean and Meteorological Satellite) with in-situ ground observation data (Pyranometer). Satellite-derived solar irradiance and in-situ observation showed general coincidence with correlation coefficient higher than 0.9, but the satellite observations tended to overestimate the radiation amount compared to the ground observations. Analysis of hourly and monthly irradiance showed that relatively large discrepancies between the satellite and ground observations exist after sunrise and during July~August period which were mainly attributed to uncertainties in the satellite retrieval such as large atmospheric optical thickness and cloud amount. But differences between the two observations did not show distinct diurnal or seasonal cycles. Analysis of regional characteristics of solar irradiance showed that differences between satellite and in-situ observations are relatively large in metrocity such as Seoul and coastal regions due to air pollution and sea salt aerosols which act to increase the uncertainty in the satellite retrieval. It was concluded that the satellite irradiance data can be used for assessment and prediction of solar energy resources overcoming the limitation of ground observations, although it still has various sources of uncertainty.

국내 주요도시의 운량데이터를 이용한 일사산출 (Calculation of Solar radiation based on Cloud Data for Major cities of Korea)

  • 유호천;이관호;박소희
    • 한국태양에너지학회:학술대회논문집
    • /
    • 한국태양에너지학회 2008년도 춘계학술발표대회 논문집
    • /
    • pp.142-147
    • /
    • 2008
  • Limited fossil fuels and unstable energy supply are considered as one of the critical problems in architecture requiring large amounts of energy. In order to this challenge, environment-friendly architecture design is required. Especially, Application of solar energy as a clean energy source and one kind of renewable energy. Many sites however are mainly concentrated in the developed countries, and are scarcer within the developing world. Simple radiation estimation models using meteorologically observed input parameters are often used in the applications requiring rough estimations of solar radiation. In this paper, measurements of global solar radiation and cloud data hours in climatological locations in South Korea are used to develop an estimation in solar radiation. The results of measured data are compared with the results obtained from equations, internationally accepted correlations.

  • PDF

Provably-Secure Public Auditing with Deduplication

  • Kim, Dongmin;Jeong, Ik Rae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권4호
    • /
    • pp.2219-2236
    • /
    • 2017
  • With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu's scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.

Applying Workload Shaping Toward Green Cloud Computing

  • Kim, Woongsup
    • International journal of advanced smart convergence
    • /
    • 제1권2호
    • /
    • pp.12-15
    • /
    • 2012
  • Energy costs for operating and cooling computing resources in Cloud infrastructure have increased significantly up to the point where they would surpass the hardware purchasing costs. Thus, reducing the energy consumption can save a significant amount of management cost. One of major approach is removing hardware over-provisioning. In this paper, we propose a technique that facilitates power saving through reducing resource over provisioning based on virtualization technology. To this end, we use dynamic workload shaping to reschedule and redistribute job requests considering overall power consumption. In this paper, we present our approach to shape workloads dynamically and distribute them on virtual machines and physical machines through virtualization technology. We generated synthetic workload data and evaluated it in simulating and real implementation. Our simulated results demonstrate our approach outperforms to when not using no workload shaping methodology.

Profit-Maximizing Virtual Machine Provisioning Based on Workload Prediction in Computing Cloud

  • Li, Qing;Yang, Qinghai;He, Qingsu;Kwak, Kyung Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권12호
    • /
    • pp.4950-4966
    • /
    • 2015
  • Cloud providers now face the problem of estimating the amount of computing resources required to satisfy a future workload. In this paper, a virtual machine provisioning (VMP) mechanism is designed to adapt workload fluctuation. The arrival rate of forthcoming jobs is predicted for acquiring the proper service rate by adopting an exponential smoothing (ES) method. The proper service rate is estimated to guarantee the service level agreement (SLA) constraints by using a diffusion approximation statistical model. The VMP problem is formulated as a facility location problem. Furthermore, it is characterized as the maximization of submodular function subject to the matroid constraints. A greedy-based VMP algorithm is designed to obtain the optimal virtual machine provision pattern. Simulation results illustrate that the proposed mechanism could increase the average profit efficiently without incurring significant quality of service (QoS) violations.

한반도에서 해상도 변화에 따른 지표면 일사량의 시공간 분포 (Temporal and Spatial Distributions of the Surface Solar Radiation by Spatial Resolutions on Korea Peninsula)

  • 이규태;조일성;지준범;최영진
    • 신재생에너지
    • /
    • 제7권1호
    • /
    • pp.22-28
    • /
    • 2011
  • The surface solar radiations were calculated and analyzed with spatial resolutions (4 km and 1 km) using by GWNU (Gangneung-Wonju National University) solar radiation model. The GWNU solar radiation model is used various data such as aerosol optical thickness, ozone amount, total precipitable water and cloud factor are retrieved from Moderate Resolution Imaging Spectrometer (MODIS), Ozone Monitoring Instrument (OMI), MTSAT-1R satellite data and output of the Regional Data Assimilation Prediction System(RDAPS) model by Korea Meteorological Administration (KMA), respectively. The differences of spatial resolutions were analyzed with input data (especially, cloud factor from MTSAT-1R satellite). And the Maximum solar radiation by GWNU model were found in Andong, Daegu and Jinju regions and these results were corresponded with the MTSAT-1R cloud factor.

An adaptive fault tolerance strategy for cloud storage

  • Xiai, Yan;Dafang, Zhang;Jinmin, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권11호
    • /
    • pp.5290-5304
    • /
    • 2016
  • With the growth of the massive amount of data, the failure probability of the cloud storage node is becoming more and more big. A single fault tolerance strategy, such as replication and erasure codes, has some unavoidable disadvantages, which can not meet the needs of the today's fault tolerance. Therefore, according to the file access frequency and size, an adaptive hybrid redundant fault tolerance strategy is proposed, which can dynamically change between the replication scheme and erasure codes scheme throughout the lifecycle. The experimental results show that the proposed scheme can not only save the storage space(reduced by 32% compared with replication), but also ensure the fast recovery of the node failures(increased by 42% compared with erasure codes).