• 제목/요약/키워드: Cloud Computing

검색결과 1,771건 처리시간 0.023초

클라우드 컴퓨팅 성장에 따른 반도체 기업들의 미래 전략 (The Future Strategy of Semiconductor Companies with the Growth of Cloud Computing)

  • 정의영;이기백;조항정
    • 디지털산업정보학회논문지
    • /
    • 제10권3호
    • /
    • pp.71-85
    • /
    • 2014
  • This study proposes the future strategy of semiconductor companies corresponding to the growth of cloud computing. Cloud computing is the delivery of IT resources such as hardware and software as a service rather than a product, and it is expected to significantly change the IT market. By employing the scenario planning method, this study develops a total of eight scenario cases, and presents the three possible scenarios including the best market, the worst market, and the neutral market scenario. This study suggests the future strategy of semiconductor companies based on the best market scenario (increasing firms' IT expenditure, increasing the complexity and performance of devices, the frequent replacement of devices). The suggested future strategy of semiconductor includes that the semiconductor companies need to strengthen their price competitiveness, secure the next generation technologies, and develop the better capability for market prediction with the growth of cloud computing. This study will help semiconductor companies set up the strategy direction of technology development, and understand the connections between cloud computing and the memory semiconductor industry. This study has practical implications for semiconductor industry to prepare for the future of cloud computing.

클라우드 컴퓨팅 서비스 도입에 따른 데이터보안에 관한 연구 (A Study on the Data Security for Cloud Computing Infrastructure Development)

  • 경지훈;정성재;배유미;박정수;성경
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2012년도 추계학술대회
    • /
    • pp.736-739
    • /
    • 2012
  • 클라우드 컴퓨팅(Cloud Computing)이 주목받고 활성화되면서 각 기업들 및 공공기관 등에서 급속도로 확산 및 도입되어지고 있다. 이러한 영향으로 인해 클라우드 컴퓨팅 기술을 이용한 정보시스템 자원의 활용과 통합은 크게 각광 받고 있으며 이에 따른 데이터 보안 또한 이슈화되고 있다. 본 논문에서는 클라우드 컴퓨팅 시스템 도입으로 인한 정보시스템의 자원 즉 데이터보안에 관한 측면을 조명하여 클라우드 컴퓨팅 인프라 구축을 위한 기반 지식을 제공하고자 한다.

  • PDF

성공적인 클라우드 컴퓨팅 구현과 성과를 높이기 위한 조직 구성원의 역할: 리더십과 지속적 지원의 조절효과 (The Role of Organizational Members in Implementing and Achieving Successful Cloud Computing: The Moderating Effects of Leadership and Continuous Supports)

  • 김상현;박현선
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제29권2호
    • /
    • pp.197-220
    • /
    • 2020
  • Purpose Cloud computing that provides a new paradigm for a firm's use of information technology is getting a lot of attentions by practitioners. However, the empirical investigation on members of organizations using cloud computing are insufficient. Therefore, this study aims to examine the capabilities and perceptions of organizational members that should be considered important for successful cloud computing implementation. Design/methodology/approach This study proposed factors related to the capabilities and perceptions of members of the organization, and examined the relationship between these factors and successful cloud computing implementation and performance. In addition, this study tested the moderating effect of leadership and continuous supports through empirical analysis. The proposed hypotheses were verified through structural equation modeling using SmartPLS3.0 with the collected data. Findings The results showed that four factors except 'member behavior control' had a positive effect on successful cloud computing implementation, which had a positive effect on performance. In addition, leadership and organizational continuous support have been shown to strengthen the relationship among factors.

A Study on the Authentication of Digital Content in Cloud Computing Environment

  • Jang, Eun-Gyeom
    • 한국컴퓨터정보학회논문지
    • /
    • 제27권11호
    • /
    • pp.99-106
    • /
    • 2022
  • 본 논문은 클라우딩 컴퓨팅 환경에서 디지털 콘텐츠 관리 기술을 제안한다. 네트워크를 활용한 컴퓨팅 서비스는 4차 산업혁명 시대에 빠질 수 없는 기본 인프라 서비스이다. 스마트폰을 활용한 금융 서비스, 디지털 콘텐츠 서비스, 산업 및 홈 네트워크 서비스는 국부적인 영역의 서비스에서 전체 서비스가 가능한 클라우드 서비스 환경으로 변화하고 있다. 이에 본 연구에서는 클라우드 컴퓨팅 환경에 적합한 디지털 콘텐츠 서비스가 안전하게 지원되도록 시스템을 제안하였다. 제안 시스템은 사용자의 시스템 접근의 편의성과 안전성을 제공하고, 디지털 콘텐츠 저작자의 저작권을 보호하며, 안전한 디지털 콘텐츠 유통 및 관리 시스템을 제공한다. 본 연구의 목적은 클라우드 컴퓨팅 환경에 적합한 디지털 콘텐츠 유통구조를 제공하여 디지털 콘텐츠 시장을 안정화시키고 활성화하는데 있다.

A Performance Comparison between XEN and KVM Hypervisors While Using Cryptographic Algorithms

  • Mohammed Al-Shalabi;Waleed K. Abdulraheem;Jafar Ababneh;Nader Abdel Karim
    • International Journal of Computer Science & Network Security
    • /
    • 제24권1호
    • /
    • pp.61-70
    • /
    • 2024
  • Cloud Computing is internet-based computing, where the users are provided with whatever service they need from the resources, software, and information. Recently, the security of cloud computing is considered as one of the major issues for both cloud service providers CSP and end-users. Privacy and highly confidential data make many users refuse to store their data within cloud computing, since data on cloud computing is not dully secured. The cryptographic algorithm is a technique which is used to maintain the security and privacy of the data on the cloud. In this research, we applied eight different cryptographic algorithms on Xen and KVM as hypervisors on cloud computing, to be able to measure and compare the performance of the two hypervisors. Response time and CPU utilization while encryption and decryption have been our aspects to measure the performance. In terms of response time and CPU utilization, results show that KVM is more efficient than Xen on average at 11.5% and 11% respectively. While TripleDES cryptographic algorithm shows a more efficient time response at Xen hypervisor than KVM.

Critical Factors Influencing Adoption of Cloud Computing for Government Organizations in Yemen

  • Salem, Mubarkoot Mohammed;Hwang, Gee-Hyun
    • 유통과학연구
    • /
    • 제14권11호
    • /
    • pp.37-47
    • /
    • 2016
  • Purpose - Many countries nowadays look at cloud computing as an opportunity because it holds great advantages for governments. Public sector in Yemen still uses traditional computing. This study tends to explore the factors that would affect cloud computing adoption in government organizations in Yemen. Research design, data and methodology - We used a combination of DOI theory and TOE framework with some changes to suit the context of government organizations. Eight hypotheses were proposed with a questionnaire developed and sent to people in Yemen. 118 responses were collected to assess the hypotheses. Results - Results indicate that Yemen lacks some prerequisites of cloud technology in terms of technological readiness and regulations. The factors: relative advantage, compatibility, security concern, perception of benefits and government support were accepted. Perception of benefits, in particular, is found to affect the decision of adoption. Security concern also showed a direct and indirect influence on cloud adoption in the government. Respondents consider security a key issues of the technology. The factors: complexity, technology readiness and regulatory support were rejected. Conclusions - Based on all analysis results, this study proposed some steps toward adopting cloud computing in Yemen.

BCOR 접근법을 이용한 클라우드 컴퓨팅 도입의 의사결정 요인에 관한 연구 (A Study on Decision Making Factors of Cloud Computing Adoption Using BCOR Approach)

  • 이영찬;당응웬하인
    • 한국IT서비스학회지
    • /
    • 제11권1호
    • /
    • pp.155-171
    • /
    • 2012
  • With the continuous and outstanding development of information technology(IT), human being is coming to the new computing era which is called cloud computing. This era brings lots of huge benefits also at the same time release the resources of IT infrastructure and data boom for man. In the future no longer, most of IT service providers, enterprises, organizations and systems will adopt this new computing model. There are three main deployment models in cloud computing including public cloud, private cloud and hybrid cloud; each one also has its own cons and pros. While implementing any kind of cloud services, customers have to choose one of three above deployment models. Thus, our paper aims to represent a practical framework to help the adopter select which one will be the best suitable deployment model for their requirements by evaluating each model comprehensively. The framework is built by applying the analytic hierarchy process(AHP), namely benefit-cost-opportunity-risk(BCOR) model as a powerful and effective tool to serve the problem. The gained results hope not only to provide useful information for the readers but also to contribute valuable knowledge to this new area. In addition, it might support the practitioners' effective decision making process in case they meet the same issue and have a positive influence on the increase of right decision for the organization.

클라우드 컴퓨팅 환경에서LMS와 LCMS기반의 이러닝 적용 방안 (A Study on the Application of the LMS and LCMS Based E-Learning in the Cloud Computing Environment)

  • 정화영;김은원;홍봉화
    • 전자공학회논문지 IE
    • /
    • 제47권1호
    • /
    • pp.56-60
    • /
    • 2010
  • IT의 폭넓은 개발, Web 2.0 애플리케이션의 의 발전, 인터넷이 가능한 개인용 단말장치의 증가, 무선 네트워크의 유용성 등은 클라우드 컴퓨팅 모델을 만드는데 매우 중요한 역할을 수행하였다. 클라우드 컴퓨팅은 하나의 비즈니스 모델이며, 웹 애플리케이션의 새로운 트렌드다. 또한 형식은 그리드 컴퓨팅이나 유틸리티 컴퓨팅과 같은 형태를 사용한다. 클라우드 컴퓨팅 환경에서는 서버의 같은 하드웨어 자원을 사용할 수 있으며 정보를 공유하기 쉽다. 본 연구에서는 클라우드 컴퓨팅 환경에서 이러닝 분야를 적용하기 위한 방안을 제시한다. 이를 위하여 클라우드 컴퓨팅환경에서 LMS와 LCMS 기반의 이러닝을 제시하고자 한다. 이는 클라우드 컴퓨팅의 데이터센터에 LCMS를 포함한 LMS를 접속하도록 하였다.

Exploring Support Vector Machine Learning for Cloud Computing Workload Prediction

  • ALOUFI, OMAR
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.374-388
    • /
    • 2022
  • Cloud computing has been one of the most critical technology in the last few decades. It has been invented for several purposes as an example meeting the user requirements and is to satisfy the needs of the user in simple ways. Since cloud computing has been invented, it had followed the traditional approaches in elasticity, which is the key characteristic of cloud computing. Elasticity is that feature in cloud computing which is seeking to meet the needs of the user's with no interruption at run time. There are traditional approaches to do elasticity which have been conducted for several years and have been done with different modelling of mathematical. Even though mathematical modellings have done a forward step in meeting the user's needs, there is still a lack in the optimisation of elasticity. To optimise the elasticity in the cloud, it could be better to benefit of Machine Learning algorithms to predict upcoming workloads and assign them to the scheduling algorithm which would achieve an excellent provision of the cloud services and would improve the Quality of Service (QoS) and save power consumption. Therefore, this paper aims to investigate the use of machine learning techniques in order to predict the workload of Physical Hosts (PH) on the cloud and their energy consumption. The environment of the cloud will be the school of computing cloud testbed (SoC) which will host the experiments. The experiments will take on real applications with different behaviours, by changing workloads over time. The results of the experiments demonstrate that our machine learning techniques used in scheduling algorithm is able to predict the workload of physical hosts (CPU utilisation) and that would contribute to reducing power consumption by scheduling the upcoming virtual machines to the lowest CPU utilisation in the environment of physical hosts. Additionally, there are a number of tools, which are used and explored in this paper, such as the WEKA tool to train the real data to explore Machine learning algorithms and the Zabbix tool to monitor the power consumption before and after scheduling the virtual machines to physical hosts. Moreover, the methodology of the paper is the agile approach that helps us in achieving our solution and managing our paper effectively.

가상 허니팟 기술의 호넷 클라우드의 프로타입 설계 (Prototype Design of Hornet Cloud using Virtual Honeypot Technique)

  • 차병래;박선;김종원
    • 한국전자통신학회논문지
    • /
    • 제10권8호
    • /
    • pp.891-900
    • /
    • 2015
  • 최근 클라우드 컴퓨팅이 새로운 공격 대상으로 부상하기 시작했으며, 클라우드의 다양한 서비스를 지연 및 방해하기 위한 악의적인 DDoS 공격이 진행되고 있다. 본 논문에서는 허니팟 보안 기술과 클라우드 컴퓨팅의 자원을 이용한 호넷 클라우드를 제안하며, 간략하게 능동 상호동작의 개념과 보안 기능들을 설계한다.