• Title/Summary/Keyword: Cloud Computing Services

Search Result 644, Processing Time 0.04 seconds

Enhanced Cloud Service Discovery for Naïve users with Ontology based Representation

  • Viji Rajendran, V;Swamynathan, S
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.38-57
    • /
    • 2016
  • Service discovery is one of the major challenges in cloud computing environment with a large number of service providers and heterogeneous services. Non-uniform naming conventions, varied types and features of services make cloud service discovery a grueling problem. With the proliferation of cloud services, it has been laborious to find services, especially from Internet-based service repositories. To address this issue, services are crawled and clustered according to their similarity. The clustered services are maintained as a catalogue in which the data published on the cloud provider's website are stored in a standard format. As there is no standard specification and a description language for cloud services, new efficient and intelligent mechanisms to discover cloud services are strongly required and desired. This paper also proposes a key-value representation to describe cloud services in a formal way and to facilitate matching between offered services and demand. Since naïve users prefer to have a query in natural language, semantic approaches are used to close the gap between the ambiguous user requirements and the service specifications. Experimental evaluation measured in terms of precision and recall of retrieved services shows that the proposed approach outperforms existing methods.

Unveiling the Influence of Corporate Organizational Inertia on Cloud Computing Transition Intentions: An Empirical Inquiry (기업내 조직 관성이 클라우드 컴퓨팅 전환 의도에 미치는 영향에 관한 실증적 연구)

  • Jae Won Kang;Sangyoon Yi
    • Journal of Information Technology Services
    • /
    • v.23 no.3
    • /
    • pp.17-37
    • /
    • 2024
  • This study explores the tendency of corporations and organizations to continue with their current processes despite having incentives for better Information Technology (IT) innovation or transition. In this context, the study argues that organizations may struggle with 'outsourcing inertia,' a well-known concept referring to an organization's deficient adaptability to environmental changes, particularly defined here as the organization's slow adaptation to changes in outsourcing levels. To verify this, the study analyzes how key variables identified from existing IT Outsourcing (ITO) decision-making research and recent studies on cloud computing transitions actually affect a firm's transition intentions. In the process, this study investigates the moderating effect of a firm's outsourcing inertia, utilizing the Technology-Organization-Environment (TOE) framework and the Push-Pull-Mooring (PPM) model based on migration theory to propose a research model. The study aims to contribute to finding strategic approaches necessary for facilitating IT innovation and transition by understanding the impact of outsourcing inertia on the decision-making process related to IT outsourcing. It is important to note that the majority of domestic conglomerates own IT subsidiaries, which significantly influence the process of transitioning to cloud computing. Nevertheless, research on the impact of IT subsidiaries on cloud computing transition is relatively scarce. Based on this background, this study proposes that IT subsidiaries within domestic conglomerates can act as a significant mooring factor of organizational inertia in the decision-making process for adopting cloud computing. Through this, the study seeks to provide strategic insights for overcoming organizational inertia faced by IT subsidiaries during the cloud computing transition process.

Securing Sensitive Data in Cloud Storage (클라우드 스토리지에서의 중요데이터 보호)

  • Lee, Shir-Ly;Lee, Hoon-Jae
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.

Design and evaluation of a GQS-based time-critical event dissemination for distributed clouds

  • Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.5
    • /
    • pp.989-998
    • /
    • 2011
  • Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing providers have setup several data centers at different geographical locations over the Internet in order to optimally serve needs of their customers around the world. One of the fundamental challenges in geographically distributed clouds is to provide efficient algorithms for supporting inter-cloud data management and dissemination. In this paper, we propose a group quorum system (GQS)-based dissemination for improving the interoperability of inter-cloud in time-critical event dissemination service, such as computing policy updating, message sharing, event notification and so forth. The proposed GQS-based method organizes these distributed clouds into a group quorum ring overlay to support a constant event dissemination latency. Our numerical results show that the GQS-based method improves the efficiency as compared with Chord-based and Plume methods.

Cloud Computing Industry Trends for Artificial Intelligence (인공지능을 위한 클라우드 컴퓨팅 산업 동향)

  • Choi, J.R.;Song, Y.M.;Kim, C.H.;Kim, S.J.
    • Electronics and Telecommunications Trends
    • /
    • v.32 no.5
    • /
    • pp.107-116
    • /
    • 2017
  • Artificial intelligence has recently been regarded as a key engine of future industry, and cloud computing and big data technologies have begun to receive significant attention. Major global vendors such as IBM, Microsoft, Google, and Amazon have been launching cloud-computing services for artificial intelligence. On the other hand, the situation domestically is now at an early stage. This report describes the industry trends both domestically and internationally regarding cloud computing for artificial intelligence. We also describe to significance of cloud computing ecosystem and data competitiveness for artificial intelligence.

Trends in Edge Computing Technology (엣지 컴퓨팅 기술 동향)

  • Hong, J.H.;Lee, K.C.;Lee, S.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.6
    • /
    • pp.78-87
    • /
    • 2020
  • With the evolution of the Internet of Things (IoT), a computing paradigm shift from cloud to edge computing is rapidly taking place to effectively manage the rapidly increasing volume of data generated by various IoT devices. Edge computing is computing that occurs at or near the physical location of a user or data source. Placing computing services closer to these locations allows users to benefit from faster and more reliable services, and enterprises can take advantage of the flexibility of hybrid cloud computing. This paper describes the concept and main benefits of edge computing and presents the trends and future prospects for edge computing technology.

A Method for Service Evaluation Based on Fuzzy Theory for Cloud Computing

  • Guo, Liangmin;Luo, Yonglong;He, Xiaokang;Hu, Guiyin;Dong, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.1820-1840
    • /
    • 2017
  • Aiming at the phenomenon of false information issued by service providers in cloud computing environment, a method for service evaluation based on fuzzy theory is put forward in this paper. According to the quality of services provided by cloud service providers and their behavior during interactions, a trust relationship between cloud service providers and cloud service consumers is established, which can be quantified by using fuzzy theory. The quality of services is evaluated by drawing on the trust relationship. In our method, the recommendation credibility of a cloud service consumer is determined through behavior similarity with evaluators and a praise factor. The introduction of the praise factor better suits the phenomenon of a high-quality service getting more repeat customers. The negative impact of dishonest customers is reduced, and the accuracy of trust and cloud service quality evaluation is improved by introducing a confidence factor that can be dynamically adjusted. The experimental results show that our method can effectively and accurately evaluate the trust value and service quality of providers, while weakening the influence of dishonest consumers, and quickly detect dishonest service providers. This is beneficial for consumers trying to find high quality service providers for similar services.

Exploring Working Group's Psychological Subjectivity on Public Smart Work Services in a Cloud-based Social Networking

  • Kim, Ki Youn;Song, In Kuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4748-4762
    • /
    • 2020
  • Recently, the COVID 19 pandemic has affected on our daily lives and society in many ways. Specifically, it has brought rapid changes in the working environment from office working to smart telecommuting. In addition, cloud computing technology and services not only provided ubiquitous access, but also led to a sharing of information, internal-external communication channels, telework, and innovative smart work for the business process. As a result, smart work services based on social cloud networking have spread to the public sector. However, existing academic research examining smart work merely remains to focus on the theoretical conceptualization or to deal with merely several examples of private views. Best practices of smart work services based on cloud computing technology in the public field rarely exists. Moreover, many studies have been differently measured the values of smart work for private and public sectors depending on organizational singularities. Therefore, the study aims to define new theoretical implications and to explore future business strategies and policy directions based on a technical working group's personal psychological subjectivity. The research applied Q methodology, and selected five public organizations in Korea, that they have adopted or currently plan to adopt some part of smart work services.

A Cloud-Based User-Friendly DRM System

  • Lee, Suk Ja;Wang, Jing;Rhee, Kyung-Hyune
    • Annual Conference of KIPS
    • /
    • 2013.05a
    • /
    • pp.636-639
    • /
    • 2013
  • With the development and rapid growth of cloud computing, lots of application services based on cloud computing have been developed. In addition, cloud-based DRM systems have been developed to support those services' copyright and privacy protection. In this paper, we propose a new cloud-based user-friendly DRM system, which allows users to execute the same contents bought at most n times at any devices with license enforcement, which checks the validation of licenses before every execution, having no smart card, which has to carry a smart card reader that seems troublesome to a user, and providing the copyright and privacy protection.

A Comparative Analysis of Domestic and Foreign Cloud Service Agreements (국내외 클라우드 서비스 이용약관 비교 분석 연구)

  • Song, Jiwon;Lee, Hwansoo
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.8
    • /
    • pp.499-509
    • /
    • 2016
  • The MSIP has implemented "Act on The Development of Cloud Computing and Protection of Its Users" from September 2015 and invigorated the cloud service industry. The act mainly includes the improvement cloud computing reliability and user protection for the development foundation and use activation. In order to expand the cloud market, it is important to increase the reliability of individual users. However, practical discussions and approach for cloud services adoption are still limited. In fact, there is no agreement standard for domestic cloud services. As a user agreement is not standardized, users feel difficulty compare to each agreement of cloud service provider and may be damaged because of unfair terms. Thus, it is necessary to examine the unfairness of cloud service agreement for user protection. This study analyzes domestic and foreign cloud service agreements including Practical Guide to Cloud Service Agreement of Cloud Standards Customer Council and suggests the direction of the standard agreement of cloud services.