• Title/Summary/Keyword: Cloud Architecture

Search Result 368, Processing Time 0.024 seconds

Fine Grained Security in Cloud with Cryptographic Access Control

  • Aparna Manikonda;Nalini N
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.123-127
    • /
    • 2024
  • Cloud computing services has gained increasing popularity in recent years for supporting various on demand and scalable services for IT consumers where there is a need of less investment towards infrastructure. While storage architecture of cloud enjoys a more robust and fault-tolerant cloud computing network, such architecture also poses a number of security challenges especially when applied in applications related to social networks, Financial transactions, etc. First, as data are stored and maintained by individual virtual machines so Cloud resources are prone to hijacked. Such attacks allow attackers to create, modify and delete machine images, and change administrative passwords and settings successfully. hence, it is significantly harder to ensure data security. Second, Due to dynamic and shared nature of the Cloud, data may be compromised in many ways. Last but not least, Service hijacking may lead to redirect client to an illegitimate website. User accounts and service instances could in turn make a new base for attackers. To address the above challenges, we propose in this paper a distributed data access control scheme that is able to fulfil fine-grained access control over cloud data and is resilient against strong attacks such as compromise and user colluding. The proposed framework exploits a novel cryptographic primitive called attribute-based encryption (ABE), tailors, and adapts it for cloud computing with respect to security requirements

Calculation of Solar radiation based on Cloud Data for Major cities of Korea (국내 주요도시의 운량데이터를 이용한 일사산출)

  • Yoo, Ho-Chun;Lee, Kwan-Ho;Park, So-Hee
    • 한국태양에너지학회:학술대회논문집
    • /
    • 2008.04a
    • /
    • pp.142-147
    • /
    • 2008
  • Limited fossil fuels and unstable energy supply are considered as one of the critical problems in architecture requiring large amounts of energy. In order to this challenge, environment-friendly architecture design is required. Especially, Application of solar energy as a clean energy source and one kind of renewable energy. Many sites however are mainly concentrated in the developed countries, and are scarcer within the developing world. Simple radiation estimation models using meteorologically observed input parameters are often used in the applications requiring rough estimations of solar radiation. In this paper, measurements of global solar radiation and cloud data hours in climatological locations in South Korea are used to develop an estimation in solar radiation. The results of measured data are compared with the results obtained from equations, internationally accepted correlations.

  • PDF

Dynamic Cloud Resource Reservation Model Based on Trust

  • Qiang, Jiao-Hong;Ning, Ding-Wan;Feng, Tian-Jun;Ping, Li-Wei
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.377-395
    • /
    • 2018
  • Aiming at the problem of service reliability in resource reservation in cloud computing environments, a model of dynamic cloud resource reservation based on trust is proposed. A domain-specific cloud management architecture is designed in which resources are divided into different management domains according to the types of service for easier management. A dynamic resource reservation mechanism (DRRM) is used to test users' reservation requests and reserve resources for users. According to user preference, several resources are chosen to be candidate resources by fuzzy cluster analysis. The fuzzy evaluation method and a two-way trust evaluation mechanism are adopted to improve the availability and credibility of the model. An analysis and simulation experiments show that this model can increase the flexibility of resource reservation and improve user satisfaction.

Volume Rendering Architecture of Mobile Medical Image using Cloud Computing (클라우드 컴퓨팅을 활용한 모바일 의료영상 볼륨렌더링 아키텍처)

  • Lee, Woongkyu;Nam, Doohee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.101-106
    • /
    • 2014
  • The era came that by having fastest internet and smart phone makes cloud computing really a big merit. This paper proposes architecture for medical image volume rendering in mobile environment using cloud computing. This architecture to replace expensive workstation server and storage it use one of the service of cloud computing IaaS(Infrastructure as a Service). And this paper propose to use webGL to get rid of restriction of mobile hardware. By this research, it is expected that medical image volume rendering service in mobile environment is more effective and can be a foundation work.

Secure Scheme Between Nodes in Cloud Robotics Platform (Cloud Robotics Platform 환경에서 Node간 안전한 통신 기법)

  • Kim, Hyungjoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.12
    • /
    • pp.595-602
    • /
    • 2021
  • The robot is developing into a software-oriented shape that recognizes the surrounding situation and is given a task. Cloud Robotics Platform is a method to support Service Oriented Architecture shape for robots, and it is a cloud-based method to provide necessary tasks and motion controllers depending on the situation. As it evolves into a humanoid robot, the robot will be used to help humans in generalized daily life according to the three robot principles. Therefore, in addition to robots for specific individuals, robots as public goods that can help all humans depending on the situation will be universal. Therefore, the importance of information security in the Cloud Robotics Computing environment is analyzed to be composed of people, robots, service applications on the cloud that give intelligence to robots, and a cloud bridge that connects robots and clouds. It will become an indispensable element for In this paper, we propose a Security Scheme that can provide security for communication between people, robots, cloud bridges, and cloud systems in the Cloud Robotics Computing environment for intelligent robots, enabling robot services that are safe from hacking and protect personal information.

A Hybrid Cloud-P2P Architecture for Scalable Massively Multiplayer Online Games (확장가능한 대규모 멀티플레이어 온라인 게임을 위한 클라우드와 P2P 하이브리드 구조)

  • Kim, Jin-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.73-81
    • /
    • 2020
  • Today's massively multiplayer online games(MMOGs) can contain millions of synchronous players scattered across the world and participating with each other within a single shared game. The increase in the number of players in MMOGs has led to some issues with the demand of server which generates a significant increase in costs for the game industry and impacts to the quality of service offered to players. In dealing with a considerable scale of MMOGs, we propose a cloud computing and peer-to-peer(P2P) hybrid architecture in this paper. Given the two nearly independent functionalities of P2P and cloud architectures, we consider the possibility of fusing these two concepts and researching the application of the resultant amalgamation in MMOGs. With an efficient and effective provisioning of resources and mapping of load, the proposed hybrid architecture relieves a lot of computational power and network traffic, the load on the servers in the cloud while exploiting the capacity of the peers. The simulation results show that MMOGs based on the proposed hybrid architecture have better performance and lower traffic received compared with MMOGs based on traditional client-server system.

Vulnerability and Security Management System from the Perspective of the Cloud Service Users (클라우드 서비스 사용자 관점에서의 취약점과 보안관리체계)

  • Choi, Young-Jin;Ra, Jong-Hei;Ky, Hong Pil;Lee, Sang-Hak
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.401-411
    • /
    • 2012
  • There has been increased interest for cloud computing services that can promote cost savings while increasing investment in information resources. Cloud computing, however, has a disadvantage physically located in the external information resources to take advantage of the economic benefits, the advantages and increase the vulnerability of information protection and control of information assets. In this study, due to the unique properties of the new services, including vulnerability, the vulnerability of cloud computing derive the vulnerability of cloud computing and control items were derived through the mapping between vulnerability and control items, that are not being managed to identify vulnerabilities Cloud computing risk factors are presented.

A Novel Methodology for Auditing the Threats in Cloud Computing - A Perspective based on Cloud Storage

  • Nasreen Sultana Quadri;Kusum Yadav;Yogesh Kumar Sharma
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.124-128
    • /
    • 2024
  • Cloud computing is a technology for delivering information in which resources are retrieved from the internet through a web-based tools and applications, rather than a direct connection with the server. It is a new emerging computing based technology in which any individual or organization can remotely store or access the information. The structure of cloud computing allows to store and access various information as long as an electronic device has access to the web. Even though various merits are provided by the cloud from the cloud provides to cloud users, it suffers from various flaws in security. Due to these flaws, data integrity and confidentiality has become a challenging task for both the storage and retrieval process. This paper proposes a novel approach for data protection by an improved auditing based methodology in cloud computing especially in the process of cloud storage. The proposed methodology is proved to be more efficient in auditing the threats while storing data in the cloud computing architecture.

Two-Stage Multichannel Architecture for Oyster Product Management System

  • Yang, Yeong-Yil
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.96-103
    • /
    • 2019
  • In this paper, we propose two-stage multichannel architecture for oyster product management system, called cloud stage and agent stage. There are two communication channels at each stage. In cloud stage, the embedded system in the smart scale communicates with the server through two channels, Ethernet or 3G/LTE mobile communication. In agent stage, PCs and smart phones called agents communicate with the server also through Internet and 3G/LTE mobile communication. Compared with previous system in which the amount of the oyster produced in oyster workplaces could be monitored only at the console of only one oyster main server, developed system makes it possible to monitor the amount of produced oyster at several PCs (or smart phones). In addition to the amount of oysters produced at all oyster workplaces the environment of oyster workplaces such as temperature and humidity can be monitored on agents to judge the freshness. Two-stage architecture with multiple channels makes it possible to monitor the amount of oyster product and environment of the oyster workplace at any place in real time.

Applying the Graphic Processing Unit Based Cloud Computing in Cellular Network (그래픽 처리장치 기반 클라우드 컴퓨팅의 셀룰러 네트워크 응용)

  • Kim, June;Choi, Seung Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.75-85
    • /
    • 2012
  • In general, cellular network is deployed as distributed network architecture, so network equipment is spread out all over the coverage area. This case causes high cost. Recently, centralized network architecture has been deployable at cellular network since base station was able to be virtualized due to advance in computing power. The centralized network architecture in cellular network adjusts its cell radius dynamically and minimizes power consumption of the network. This paper introduces a new centralized deployment way of cellular network using SDR and cloud computing technology. Then, advantage and feasibility of the new network will be reviewed by implementing this novel network.