• Title/Summary/Keyword: Cloud Computing Services

Search Result 644, Processing Time 0.03 seconds

Handoff Method Supporting LBS Information in Mobile Clouding Computing (이동 클라우딩 환경에서 LBS 지원 핸드오프 기법)

  • Kim, Ki-Young;Kim, Sun-Jib
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.2
    • /
    • pp.89-97
    • /
    • 2015
  • In this paper, we propose a handoff method supporting LBS (Location Based Services) Information in mobile clouding environment. In mobile clouding computing, handoff delay and re-authentication is occurred. A mobile node needs re-authentication procedure from cloud server whenever it arrives new AP. But Using of location information of node enables to reduce delay time due to re-authentication. To reduce re-authentication delay time, proposed method stores location information of APs on WiFi based location server to complement. GPS-based technology which can't receive satellite signal in indoor and then node collects location information of AP at handoff time. And also enables to process LBS without increasing handoff delay by splitting the process of handoff from process of requesting location information. For analysis of proposed method, We analyze handoff delay and location information process time and have compared previous handoff method in cloud environment. We confirmed that proposed method shows lower delay time without increasing LBS process time than previous method because node receives location information from location information server when handoff is occurred.

Classification Model for Cloud-based Public Service (클라우드 기반의 공공 서비스 유형 분류 모델)

  • Ra, Jong-Hei;Lee, Ji-Yeon;Shin, Sun-Young;Kim, Jeong-Yeop;Choi, Young-Jin
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.4
    • /
    • pp.509-516
    • /
    • 2013
  • Cloud services are recognized the essential IT infrastructure in the optimal smart society which is changing rapidly as a low-cost and high-efficiency. This service of starting from prominent overseas companies such as Google, Amazon, had influenced on the introduction of the service for the various policies of foreign governments, including the United States and the United Kingdom. Such countries adopting to the cloud computing and make transform to the cloud service of existing public service for the effective management of information resources. In this study, we have proposed the main determining factors of cloud adoption, the model of cloud governance for the adoption of public cloud service.

A Study on Cloud Database Management System Protection Profile for the Secure Cloud Environment (안전한 클라우드 환경을 위한 클라우드 데이터 관리 시스템에 적용 가능한 보호프로파일에 관한 연구)

  • Wi, Yukyeong;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.411-429
    • /
    • 2014
  • As cloud computing has enabled, a variety of cloud services has come into wide use. Thus, cloud computing products can be easily identified in the IT market. Common Criteria is international standards for security evaluation performed of IT products. In addition, Consumers can be used as a objective guideline for the evaluation results. And, it is a provides for protection profile(security target of security products). For general, IT products are providing the protection profile. However, for cloud-related products of protection profile is not being provided. Thus, about cloud security products, there is no way for evaluation. Therefore, in this paper, we propose protection profile on cloud database management system for the secure cloud environment in common criteria.

Design and Development of Framework for Health Data Relay based on OAuth2 in Cloud Environment (클라우드 환경의 OAuth2 기반 건강 데이터 중계프레임워크 설계 및 구현)

  • Im, Seokjin;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.153-159
    • /
    • 2015
  • With information technology and health care, efficient health data management provides various health services. Health data from hospitals patients and healthy persons use stacked up enables to trace health condition and to manage health effectively and to reduce healthcare cost. In this paper, we design and implement a framework for relaying health data from various hospitals to cloud storage for manage health condition. For efficient authentication of the framework with cloud storage, OAuth2 protocal is adopted. The proposed health data relay framework can be used for developing various health services with the stacked data in the cloud storage.

Particle Swarm Optimization in Gated Recurrent Unit Neural Network for Efficient Workload and Resource Management (효율적인 워크로드 및 리소스 관리를 위한 게이트 순환 신경망 입자군집 최적화)

  • Ullah, Farman;Jadhav, Shivani;Yoon, Su-Kyung;Nah, Jeong Eun
    • Journal of the Semiconductor & Display Technology
    • /
    • v.21 no.3
    • /
    • pp.45-49
    • /
    • 2022
  • The fourth industrial revolution, internet of things, and the expansion of online web services have increased an exponential growth and deployment in the number of cloud data centers (CDC). The cloud is emerging as new paradigm for delivering the Internet-based computing services. Due to the dynamic and non-linear workload and availability of the resources is a critical problem for efficient workload and resource management. In this paper, we propose the particle swarm optimization (PSO) based gated recurrent unit (GRU) neural network for efficient prediction the future value of the CPU and memory usage in the cloud data centers. We investigate the hyper-parameters of the GRU for better model to effectively predict the cloud resources. We use the Google Cluster traces to evaluate the aforementioned PSO-GRU prediction. The experimental shows the effectiveness of the proposed algorithm.

Individual Presence-and-Preference-Based Local Intelligent Service System and Mobile Edge Computing (개인 프레즌스-선호 기반 지능형 로컬 서비스 시스템과 모바일 엣지 컴퓨팅 환경에서의 적용 방안)

  • Kim, Kilhwan;Jang, Jin-San;Keum, Changsup;Chung, Ki-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.523-535
    • /
    • 2017
  • Local intelligent services aim at controlling local services such as cooling or lightening services in a certain local area, using Internet-of-Things (IoT) sensor data in the area. As the IoT paradigm has evolved, local intelligent services have gained increasing attention. However, most of the local intelligent service mechanism proposed so far do not directly take the users' presence and service preference information into account for controlling local services. This study proposes an individual presence-and-preference-based local service system (IPP-LISS). We present a intelligent service control algorithm and implement a prototype system of IPP-LISS. Typically, the intelligence part of IPP-LISS including the prediction models, is generated on remote server in the cloud because of their compute-intense aspect. However, this can cause huge data traffic between IoT devices and servers in the cloud. The emerging mobile edge computing technology will be a promising solution of this challenge of IPP-LISS. In this paper, we implement IPP-LISS in the cloud, and then, based on the implementation result, we discuss applying the mobile edge computing technology to the IPP-LISS application.

Experience in Practical Implementation of Abstraction Interface for Integrated Cloud Resource Management on Multi-Clouds

  • Kim, Huioon;Kim, Hyounggyu;Chun, Kyungwon;Chung, Youngjoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.18-38
    • /
    • 2017
  • Infrastructure-as-a-Service (IaaS) clouds provide infrastructure as a pool of virtual resources, and the public IaaS clouds, e.g. Amazon Web Service (AWS) and private IaaS cloud toolkits, e.g. OpenStack, CloudStack, etc. provide their own application programming interfaces (APIs) for managing the cloud resources they offer. The heterogeneity of the APIs, however, makes it difficult to access and use the multiple cloud services concurrently and collectively. In this paper, we explore previous efforts to solve this problem and present our own implementation of an integrated cloud API, which can make it possible to access and use multiple clouds collectively in a uniform way. The implemented API provides a RESTful access and hides underlying cloud infrastructures from users or applications. We show the implementation details of the integrated API and performance evaluation of it comparing the proprietary APIs based on our cloud testbed. From the evaluation results, we could conclude that the overhead imposed by our interface is negligibly small and can be successfully used for multi-cloud access.

Trends in Privacy-Preserving Quantum Computing Research (프라이버시 보호 양자 컴퓨팅 연구 동향)

  • Y.K. Lee
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.5
    • /
    • pp.40-48
    • /
    • 2024
  • Quantum computers can likely perform computations that are unattainable by classical computers, and they represent the next generation of computing technologies. Due to high costs and complex maintenance, direct ownership of quantum computers by individuals users is challenging. Future utilization is predicted to involve quantum computing servers performing delegated computations for clients lacking quantum capabilities, similar to the current utilization of supercomputing. This delegation model allows several users to benefit from quantum computing without requiring ownership, thereby providing innovation potential in various fields. Ensuring data privacy and computational integrity in this model is critical for ensuring the reliability of quantum cloud computing services. However, these requirements are difficult to achieve because classical security techniques cannot be directly applied to quantum computing. We review research on security protocols for the delegation of quantum computing with focus on data privacy and integrity verification. Our analysis covers the background of quantum computing, privacy-preserving quantum computational models, and recent research trends. Finally, we discuss challenges and future directions for secure quantum delegated computations, highlighting their importance for the commercialization and widespread adoption of quantum computing.

Analysis of Security Weakness on Secure Deduplication Schemes in Cloud Storage (클라우드 스토리지에서 안전한 중복 제거 기법들에 대한 보안 취약점 분석)

  • Park, Ji Sun;Shin, Sang Uk
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.909-916
    • /
    • 2018
  • Cloud storage services have many advantages. As a result, the amount of data stored in the storage of the cloud service provider is increasing rapidly. This increase in demand forces cloud storage providers to apply deduplication technology for efficient use of storages. However, deduplication technology has inherent security and privacy concerns. Several schemes have been proposed to solve these problems, but there are still some vulnerabilities to well-known attacks on deduplication techniques. In this paper, we examine some of the existing schemes and analyze their security weaknesses.

An Efficient Two-Phase Heuristic Policy for Acceptance Control in IaaS Cloud Service (IaaS 클라우드 서비스 수락제어를 위한 효율적인 2단계 휴리스틱 정책)

  • Kim, Moon Kyung;Choi, Jin Young
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.2
    • /
    • pp.91-100
    • /
    • 2015
  • In this study, we propose an efficient two-phase heuristic policy, called an acceptance tolerance control policy, for Infrastructure as a Service (IaaS) cloud services that considers both the service provider and customer in terms of profit and satisfaction, respectively. Each time an IaaS cloud service is requested, this policy determines whether the service is accepted or rejected by calculating the potential for realizing the two performance objectives. Moreover, it uses acceptance tolerance to identify the possibility for error with the chosen decision while compensating for both future fluctuations in customer demand and error possibilities based on past decisions. We conducted a numerical experiment to verify the performance of the proposed policy using several actual IaaS cloud service specifications and comparing it with other heuristics.