• Title/Summary/Keyword: Cloud Computing Services

Search Result 644, Processing Time 0.028 seconds

Performance Evaluation of Microservers to drive for Cloud Computing Applications (클라우드 컴퓨팅 응용 구동을 위한 마이크로서버 성능평가)

  • Myeong-Hoon Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.85-91
    • /
    • 2023
  • In order to utilize KOSMOS, the performance evaluation results are presented in this paper with CloudSuite, an application service-based benchmark program in the cloud computing area. CloudSuite offers several distinct applications as cloud services in two parts: offline applications and online applications on containers. In comparison with other microservers which have similar hardware specifications of KOSMOS, it was observed that KOSMOS was superior in all CloudSuite benchmark applications. KOSMOS also showed higher performance than Intel Xeon CPU-based servers in an offline application. KOSMOS reduced completion time during executing Graph Analytics by 30.3% and 72.3% compared to two Intel Xeon CPU-based servers in an experimental configuration of multiple nodes in KOSMOS.

A Study on Demand Function of Customized Cloud BIM Service - Focused on Medical Facility Design - (맞춤형 클라우드 BIM 서비스 요구기능 도출에 관한 연구 - 의료시설 설계를 중심으로 -)

  • Jung, Sung-Ho;Lee, Byung-Soo;Choi, Yoon-Ki
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.7
    • /
    • pp.53-61
    • /
    • 2019
  • Cloud BIM, which incorporates cloud computing technology and BIM technology, is increasingly used in construction. In particular, the recent trend of cloud services in IT field is to provide customized cloud services according to the characteristics of users. These changes are also linked to the cloud BIM, which is emerging in the construction industry. However, cloud BIM researches and commercial technologies that are currently underway do not reflect these trends, and they provide services through generalized management functions in construction projects. In order to solve these problems, a new type of customized cloud BIM service is needed that can provide cloud services by reflecting the characteristics of the project, customization based on the user's work, and providing the knowledge service. Therefore, this study aims to derive the system requirement function that should be preceded for implementing the customized cloud BIM service, and the target project is selected as the medical facility.

Method to Evaluate and Enhance Reusability of Cloud Services (클라우드 서비스의 재사용성 평가 및 향상 기법)

  • Oh, Sang-Hun;La, Hyun-Jung;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.19D no.1
    • /
    • pp.49-62
    • /
    • 2012
  • In cloud computing, service providers develop and deploy services with common and reusable features among various applications, service consumers locate and reuse them in building their applications. Hence, reusability is a key intrinsic characteristic of cloud services. Services with high reusability would yield high return-on-investment. Cloud services have characteristics which do not appear in conventional programming paradigms, existing quality models for software reusability would not applicable to services. In this paper, we propose a reusability evaluation suite for cloud services, which includes quality attributes and metrics. A case study is presented to show its applicability.

Cyber-Resilience-based Virtual Honeypot Service: Framework Sketch and Feasibility Verification (사이버 탄력성 기반 가상 허니팟 서비스 프레임워크 구상 및 가능성 검증)

  • Cha, Byung Rae;Park, Sun;Kim, Jong Won
    • Smart Media Journal
    • /
    • v.5 no.2
    • /
    • pp.65-76
    • /
    • 2016
  • Cloud Computing has recently begun to emerge as a new attack target. The malice DDoS attacks are ongoing to delay and disturb the various services of the Cloud Computing. In this paper, we propose the Hornet-Cloud using security Honeypot technique and resources of Cloud Computing, define and design the concept of security functions about active low-interaction framework by cyber resilience simply. In addition, for virtual honeypot service, we simulated and vitrified the possibility of functions of the low-interaction vHoneypot using cyber resilience.

Secure Data Sharing in The Cloud Through Enhanced RSA

  • Islam abdalla mohamed;Loay F. Hussein;Anis Ben Aissa;Tarak kallel
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.89-95
    • /
    • 2023
  • Cloud computing today provides huge computational resources, storage capacity, and many kinds of data services. Data sharing in the cloud is the practice of exchanging files between various users via cloud technology. The main difficulty with file sharing in the public cloud is maintaining privacy and integrity through data encryption. To address this issue, this paper proposes an Enhanced RSA encryption schema (ERSA) for data sharing in the public cloud that protects privacy and strengthens data integrity. The data owners store their files in the cloud after encrypting the data using the ERSA which combines the RSA algorithm, XOR operation, and SHA-512. This approach can preserve the confidentiality and integrity of a file in any cloud system while data owners are authorized with their unique identities for data access. Furthermore, analysis and experimental results are presented to verify the efficiency and security of the proposed schema.

Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing

  • Li, Haoxing;Li, Fenghua;Song, Chenggen;Yan, Yalong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2719-2735
    • /
    • 2015
  • In the cloud environment, users pay more attentions to their data security since all of them are stored in the cloud server. Researchers have proposed many mutual authentication schemes for the access control of the cloud server by using the smart card to protect the sensitive data. However, few of them can resist from the smart card lost problem and provide both of the forward security and the backward security. In this paper, we propose a novel authentication scheme for cloud computing which can address these problems and also provide the anonymity for the user. The trick we use is using the password, the smart card and the public key technique to protect the processes of the user's authentication and key exchange. Under the Elliptic Curve Diffie-Hellman (ECDH) assumption, it is provably secure in the random oracle model. Compared with the existing smart card based authentication schemes in the cloud computing, the proposed scheme can provide better security degree.

An Investigation of Cloud Computing and E-Learning for Educational Advancement

  • Ali, Ashraf;Alourani, Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.216-222
    • /
    • 2021
  • Advances in technology have given educators a tool to empower them to assist with developing the best possible human resources. Teachers at universities prefer to use more modern technological advances to help them educate their students. This opens up a necessity to research the capabilities of cloud-based learning services so that educational solutions can be found among the available options. Based on that, this essay looks at models and levels of deployment for the e-learning cloud architecture in the education system. A project involving educators explores whether gement Systems (LMS) can function well in a collaborative remote learning environment. The study was performed on how Blackboard was being used by a public institution and included research on cloud computing. This test examined how Blackboard Learn performs as a teaching tool and featured 60 participants. It is evident from the completed research that computers are beneficial to student education, especially in improving how schools administer lessons. Convenient tools for processing educational content are included as well as effective organizational strategies for educational processes and better ways to monitor and manage knowledge. In addition, this project's conclusions help highlight the advantages of rolling out cloud-based e-learning in higher educational institutions, which are responsible for creating the integrated educational product. The study showed that a shift to cloud computing can bring progress to educational material and substantial improvement to student academic outcomes, which is related to the increased use of better learning tools and methods.

Computationally Efficient Instance Memory Monitoring Scheme for a Security-Enhanced Cloud Platform (클라우드 보안성 강화를 위한 연산 효율적인 인스턴스 메모리 모니터링 기술)

  • Choi, Sang-Hoon;Park, Ki-Woong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.775-783
    • /
    • 2017
  • As interest in cloud computing grows, the number of users using cloud computing services is increasing. However, cloud computing technology has been steadily challenged by security concerns. Therefore, various security breaches are springing up to enhance the system security for cloud services users. In particular, research on detection of malicious VM (Virtual Machine) is actively underway through the introspecting virtual machines on the cloud platform. However, memory analysis technology is not used as a monitoring tool in the environments where multiple virtual machines are run on a single server platform due to obstructive monitoring overhead. As a remedy to the challenging issue, we proposes a computationally efficient instance memory introspection scheme to minimize the overhead that occurs in memory dump and monitor it through a partial memory monitoring based on the well-defined kernel memory map library.

Implementations of Record_Level Synchronized Safe Personal Cloud (레코드 단위의 동기화를 지원하는 개별 클라우드 구현 기법)

  • Hong, Dong-Kweon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.3
    • /
    • pp.239-244
    • /
    • 2014
  • As the usefulness of mobile device is kept growing the privacy of the cloud computing is receiving more attentions. Even though many researches and solutions for privacy matters are suggested we are still worrying about the security problems. In addition most of cloud computing systems uses file-level synchronization which make it difficult to modify a part of a file. If we use data-centric app that stores data on embedded DBMS such as SQLite, a simple synchronization may incur some loss of information. In this paper we propose a solution to build a personal cloud that supports record-level synchronization. And we show a prototype system which uses RESTful web services and the same schema on mobie devices and the cloud storage. Synchronization is achieved by using a kind of optimistic concurrency control.

A Study on CVE Improvement Plans to improve Cloud Service Security (클라우드 서비스 보안성 향상을 위한 CVE 개선 방안 연구)

  • Kim Taekyung;Jung Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.2
    • /
    • pp.39-46
    • /
    • 2023
  • The rise in popularity of cloud services has brought about a heightened concern for security in the field of cloud computing. As a response, governments have implemented CSAP(Cloud Security Assurance Program) to ensure the security of these services. However, despite such measures, the emergence of various security vulnerabilities persists, resulting in incidents related to cloud security breaches. To address this, the utilization of Common Vulnerabilities and Exposures (CVE) has been proposed as a means to facilitate the sharing of vulnerability information across different domains. Nevertheless, the unique characteristics of cloud services present challenges in assigning CVE IDs to the diverse range of vulnerabilities within the cloud environment. In this study, we analyzed how CVE can be effectively employed to enhance cloud security. The assignment of a CVE ID is contingent upon the fulfillment of three rules in the Counting Decision and five rules in the Inclusion Decision. Notably, the third rule in the Inclusion Decision, INC3, clashes with the nature of cloud services, resulting in obstacles in assigning CVE IDs to various cloud vulnerabilities. To tackle this issue, we suggest the appointment of designated individuals who would be responsible for overseeing specific areas of cloud services, thereby enabling the issuance of CVE IDs. This proposed approach aims to overcome the challenges associated with the unique characteristics of cloud services and ensure the seamless sharing of vulnerability information. Information sharing regarding vulnerabilities is crucial in the field of security, and by incorporating cloud vulnerabilities into the CVE system, this method can contribute to enhancing the security of cloud services.