• Title/Summary/Keyword: Cloud Broker

Search Result 38, Processing Time 0.129 seconds

A Broker for Cloud Resource Management and Its Experimental Performance Analysis

  • Ren, Ye;Kim, Seonghwan;Kang, Dongki;Youn, Chan-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.239-240
    • /
    • 2012
  • When users access to use the computing resources in the cloud, they expect specific quality of service (QoS) which should be guaranteed by the service provider. Meanwhile, the service provider should adopt proper schemes to enhance the resource utilization. In this thesis, we propose the MapChem-Broker which aims to satisfy users' QoS requirements as well as enhance the resource utilization by controlling the provision of VM resources in the cloud. On the experimental cloud testbed, we compare the proposed scheme with an existing one for VM resource provisioning. Results show that the proposed scheme outperforms the existing one.

An analysis of VM allocation schemes for application executing via a cloud service broker (클라우드 서비스 브로커를 통한 응용 실행에서의 가상 머신 할당 기법 분석)

  • Kim, Heejae;Youn, Chan-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.112-114
    • /
    • 2014
  • 클라우드(cloud)를 이용한 응용 실행에서 클라우드 서비스 브로커 (cloud service broker, CSB)는 효과적인 자원 사용 및 서비스 수준 협약(service level agreement, SLA) 보장 등의 장점을 가진다. 따라서 본 논문에서는 CSB 를 통한 응용 실행에서의 가상 머신 (virtual machine, VM) 할당 기법들을 소개하며 BestFit (BF), WorstFit (WF), Modified BestFit (MBF), Modified WorstFit (MWF), Reserved Instance-aware Modified BestFit (M-MBF) 의 평균 VM 사용률을 비교한다.

Cloud Service Evaluation Techniques Using User Feedback based on Sentiment Analysis (감정 분석 기반의 사용자 피드백을 이용한 클라우드 서비스 평가 기법)

  • Yun, Donggyu;Kim, Ungsoo;Park, Joonseok;Yeom, Keunhyuk
    • Journal of Software Engineering Society
    • /
    • v.27 no.1
    • /
    • pp.8-14
    • /
    • 2018
  • As cloud computing has emerged as a hot trend in the IT industry, various types of cloud services have emerged. In addition, cloud service broker (CSB) technology has emerged to alleviate the complexity of the process of selecting the desired service that user wants among the various cloud services. One of the key features of the CSB is to recommend the best cloud services to users. In general, CSB can use a method to evaluate a service by receiving feedback about a service from users in order to recommend a cloud service. However, since each user has different criteria for giving a rating, there is a problem that reliability of service evaluation can be low when the rating is only used. In this paper, a method is proposed to supplement evaluation of rating based service by applying machine learning based sentiment analysis to cloud service user's review. In addition, the CSB prototype is implemented based on proposed method. Further, the results of comparing the performance of various learning algorithms is proposed that can be used for sentiment analysis through experiments using actual cloud service review as learning data. The proposed service evaluation method complements the disadvantages of the existing rating-based service evaluation and can reflect the service quality in terms of user experience.

  • PDF

Quality Metrics of Cloud Service Based on Cross-cutting and SLA Specification Mechanism (Cross-cutting 기반의 클라우드 서비스 품질 메트릭 및 SLA 명세 기법)

  • An, Youngmin;Park, Joonseok;Yeom, Keunhyuk
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1361-1371
    • /
    • 2015
  • Depending on the increase amongst various cloud services, the technology of the Cloud Service Broker (CSB) to find the most appropriate services to meet the needs of cloud service consumers has emerged. In order to advance for cloud services to be used through the CSB, it is important to ensure the quality level that meets the demands of consumers through a negotiation process based on the Service Level Agreement (SLA). However, quality metrics of cloud services are different from each other based on the measurement scale, which represents the quality level, and the calculation for each type of cloud services. Therefore, it is necessary to analyze the variability of the quality of cloud services and establish a SLA model for ensuring and improving the level of quality. In this paper, we analyze the quality metrics for the specific type of cloud services by applying the cross-cutting concept and propose a Virtual SLA (VSLA) meta-model.

Zero-Knowledge Realization of Software-Defined Gateway in Fog Computing

  • Lin, Te-Yuan;Fuh, Chiou-Shann
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5654-5668
    • /
    • 2018
  • Driven by security and real-time demands of Internet of Things (IoT), the timing of fog computing and edge computing have gradually come into place. Gateways bear more nearby computing, storage, analysis and as an intelligent broker of the whole computing lifecycle in between local devices and the remote cloud. In fog computing, the edge broker requires X-aware capabilities that combines software programmability, stream processing, hardware optimization and various connectivity to deal with such as security, data abstraction, network latency, service classification and workload allocation strategy. The prosperous of Field Programmable Gate Array (FPGA) pushes the possibility of gateway capabilities further landed. In this paper, we propose a software-defined gateway (SDG) scheme for fog computing paradigm termed as Fog Computing Zero-Knowledge Gateway that strengthens data protection and resilience merits designed for industrial internet of things or highly privacy concerned hybrid cloud scenarios. It is a proxy for fog nodes and able to integrate with existing commodity gateways. The contribution is that it converts Privacy-Enhancing Technologies rules into provable statements without knowing original sensitive data and guarantees privacy rules applied to the sensitive data before being propagated while preventing potential leakage threats. Some logical functions can be offloaded to any programmable micro-controller embedded to achieve higher computing efficiency.

A Design of User Authentication Protocol using Biometric in Mobile-cloud Environments (모바일 클라우드 환경에서 생체인식을 이용한 사용자 인증 프로토콜 설계)

  • Kim, Hyung-Uk;Kim, Bumryong;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.1
    • /
    • pp.32-39
    • /
    • 2017
  • Recently, usage of mobile cloud services has been increasing. In particular, beyond the constraints of a single cloud computing service, studies on the multi-cloud have been actively pursued. A user must authenticate multiple cloud service providers to use additional cloud services in a multi-cloud. In previous studies, an authentication method using single sign-on (SSO) was not available in all cloud services. Cloud services will not be available when the SSO server is not available due to malicious attacks, because all authentication is done via the SSO server. Additionally, using a broker, there is a vulnerability that can expose authentication information for the service provider to a user who did not sign up. In this paper, we propose a secure user authentication protocol using biometric authentication that does not expose user information when using additional cloud services. The proposed protocol can use a single biometric authentication for multi-cloud services without storing authentication information in each cloud service. In terms of key stability (to ensure stability through the key agreement process and the key area), by disabling various attack methods, such as man-in-the-middle attacks and replay attacks, we provide secure mobile cloud services.

An Authentication Scheme for Providing to User Service Transparency in Multicloud Environment (멀티클라우드 환경에서 사용자에게 서비스의 투명성을 제공하는 인증 기법)

  • Lee, Jaekyung;Son, Junggab;Kim, Hunmin;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1131-1141
    • /
    • 2013
  • Most of the single server model of cloud computing services have problems that are hard to solve, such as a service availability, insider attack, and vendor lock-in, etc. To solve these problems, the research about multicloud has emerged. Multicloud model can supplement previous cloud model's weakness and provides new services to user. In this paper, we focus on a user authentication problem in multicloud model and propose a scheme to resolve it. We define a cloud broker-based multicloud model. And we propose an authentication protocol that is applicable at presented model. The proposed scheme can provide service transparency to user and prevent an impersonation attack by service provider.

클라우드 서비스 브로커 기술 및 사례 분석

  • Gang, Dong-Jae;Kim, Nam-U;Son, Deok-Ju;Jeong, Seong-In
    • Information and Communications Magazine
    • /
    • v.30 no.4
    • /
    • pp.7-15
    • /
    • 2013
  • 본고에서는 최근 클라우드 컴퓨팅 기술에서 이슈가 되고 클라우드 서비스 브로커(Cloud Service Broker) 기술 및 관련 기술동향을 살펴보고 실제 구현을 진행중인 사례를 분석 함으로서 클라우드 서비스 브로커 기술에 대한 전반적인 내용을 살펴보고자 한다.

Architecture of Virtual Cloud Bank for Mediating Cloud Services based on Cloud User Requirements (클라우드 사용자 요구사항 기반으로 클라우드 서비스 중개를 위한 가상 클라우드 뱅크 아키텍처)

  • Park, Joonseok;An, Youngmin;Yeom, Keunhyuk
    • Journal of KIISE
    • /
    • v.42 no.9
    • /
    • pp.1090-1099
    • /
    • 2015
  • The concept of Cloud Service Brokerage (CSB) has been introduced as a result of the expansion of the cloud-computing paradigm. Cloud services that provide similar functionality are registered with a CSB. A CSB intermediates cloud services between cloud users and providers. However, there are differences in the price and performance offered by each of the cloud providers. Thus, cloud users have difficulty in finding suitable services to use. Therefore, a CSB is required in order to provide an approach for cloud services to fulfill the requirements of cloud users. In this paper, we propose a virtual cloud bank architecture that includes both a Service Analysis Model (SAM) that can be used to specify and analyze various cloud services and a requirement analysis method that can be used to collect and analyze the cloud user requirements. The VCB architecture that is herein proposed can be used as a reference architecture to provide user-centric cloud services.

A Study on the Role and Security Enhancement of the Expert Data Processing Agency: Focusing on a Comparison of Data Brokers in Vermont (데이터처리전문기관의 역할 및 보안 강화방안 연구: 버몬트주 데이터브로커 비교를 중심으로)

  • Soo Han Kim;Hun Yeong Kwon
    • Journal of Information Technology Services
    • /
    • v.22 no.3
    • /
    • pp.29-47
    • /
    • 2023
  • With the recent advancement of information and communication technologies such as artificial intelligence, big data, cloud computing, and 5G, data is being produced and digitized in unprecedented amounts. As a result, data has emerged as a critical resource for the future economy, and overseas countries have been revising laws for data protection and utilization. In Korea, the 'Data 3 Act' was revised in 2020 to introduce institutional measures that classify personal information, pseudonymized information, and anonymous information for research, statistics, and preservation of public records. Among them, it is expected to increase the added value of data by combining pseudonymized personal information, and to this end, "the Expert Data Combination Agency" and "the Expert Data Agency" (hereinafter referred to as the Expert Data Processing Agency) system were introduced. In comparison to these domestic systems, we would like to analyze similar overseas systems, and it was recently confirmed that the Vermont government in the United States enacted the first "Data Broker Act" in the United States as a measure to protect personal information held by data brokers. In this study, we aim to compare and analyze the roles and functions of the "Expert Data Processing Agency" and "Data Broker," and to identify differences in designated standards, security measures, etc., in order to present ways to contribute to the activation of the data economy and enhance information protection.