• Title/Summary/Keyword: Cloud Computing Services

Search Result 644, Processing Time 0.027 seconds

A Study on the Secure Cloud Federation Model of Korean Public and Administrative Institutions based on U.S. TIC 3.0 (미국 정부 TIC 3.0을 적용한 국내 공공·행정기관의 안전한 클라우드 연합 모델 연구)

  • Soo-hyun Lee;Ha-neul Lim;Byung-chul Bae;Eunseong Kang;Hyung-Jong Kim
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.13-21
    • /
    • 2023
  • Recently, due to the collapse of boundaries between fields caused by COVID-19, the government's goal of connecting all data and making it accessible to people, businesses, and governments has garnered attention. To achieve this goal, cloud technology is consistently mentioned, and since the use of cloud technology inevitably raises security concerns, various studies are being conducted on the topic. This paper analyzes the use of cloud technology in public and administrative institutions in Korea and presents a model that applies the U.S. government's TIC 3.0 concept to mitigate potential security issues. The objective is to provide a secure cloud service utilization model for public and administrative institutions, with reference to TIC 3.0.

A study on Cloud Security based on Network Virtualization (네트워크 가상화 기반 클라우드 보안 구성에 관한 연구)

  • Sang-Beom Hong;Sung-Cheol Kim;Mi-Hwa Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • In the cloud computing environment, servers and applications can be set up within minutes, and recovery in case of fail ures has also become easier. Particularly, using virtual servers in the cloud is not only convenient but also cost-effective compared to the traditional approach of setting up physical servers just for temporary services. However, most of the und erlying networks and security systems that serve as the foundation for such servers and applications are primarily hardwa re-based, posing challenges when it comes to implementing cloud virtualization. Even within the cloud, there is a growing need for virtualization-based security and protection measures for elements like networks and security infrastructure. This paper discusses research on enhancing the security of cloud networks using network virtualization technology. I configured a secure network by leveraging virtualization technology, creating virtual servers and networks to provide various security benefits. Link virtualization and router virtualization were implemented to enhance security, utilizing the capabilities of virt ualization technology. The application of virtual firewall functionality to the configured network allowed for the isolation of the network. It is expected that based on these results, there will be a contribution towards overcoming security vulnerabil ities in the virtualized environment and proposing a management strategy for establishing a secure network.

Design and Implementation of Library Information System Using Collective Intelligence and Cloud Computing (집단지성과 클라우드 컴퓨팅을 활용한 도서관 정보시스템 설계 및 구현)

  • Min, Byoung-Won
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.11
    • /
    • pp.49-61
    • /
    • 2011
  • In recent, library is considered as an integrated knowledge convergence center that can respond to various requests about information service of users. Therefor it is necessary to establish a novel information system based on information communications technologies of the era. In other words, it is currently required to develop mobile information service available in portable devices such as smart phones or tablet PCs, and to establish information system reflecting cloud computing, SaaS, Annotation, and Library 2.0 etc. In this paper we design and implement a library information system using collective intelligence and cloud computing. This information system can be adapted for the varieties of mobile service paradigm and abruptly increasing amount of electronic materials. Advantages of this concept model are resource sharing, multi-tenant supporting, configuration, and meta-data supporting etc. In addition it can offer software on-demand type user services. In order to test the performance of our system, we perform an effectiveness analysis and TTA authentication test. The average response time corresponding to variance of data reveals 0.692 seconds which is very good performance in timing effectiveness point of view. And we detect maturity level-3 or 4 authentication in TTA tests such as SaaS maturity, performance, and application programs.

Implementation of Fog Computing Architecture for IoT Service on Hybrid Broadcast Environment (하이브리드 방송 환경에서의 IoT 서비스 지원을 위한 Fog Computing Architecture 구현)

  • Kum, Seung Woo;Lim, Tae-Beom;Park, Jong-Il
    • Journal of Broadcast Engineering
    • /
    • v.22 no.1
    • /
    • pp.107-117
    • /
    • 2017
  • Recently, IoT applications are being deployed in Smart TVs, and these IoT applications are using smart TVs as application platforms rather than broadcast platforms. With the advent of Hybrid broadcast technologies, now it becomes available to develop IoT applications which are coupled to the broadcast information. However, the existing IoT services are not suitable for Hybrid broadcast application since they are built on cloud and require various protocol implementations. In this paper, a Fog Computing-based architecture for hybrid broadcast application is proposed. Instead of accessing IoT services from hybrid broadcast app directly, the proposed architecture places Fog Applet Server between them and distribute loads of hybrid broadcast app to the Fog Applet. The proposed architecture is implemented as a service to control IoT device with hybrid application.

Extraction of Optimal Moving Patterns of Edge Devices Using Frequencies and Weights (빈발도와 가중치를 적용한 엣지 디바이스의 최적 이동패턴 추출)

  • Lee, YonSik;Jang, MinSeok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.786-792
    • /
    • 2022
  • In the cloud computing environment, there has been a lot of research into the Fog/Edge Computing (FEC) paradigm for securing user proximity of application services and computation offloading to alleviate service delay difficulties. The method of predicting dynamic location change patterns of edge devices (moving objects) requesting application services is critical in this FEC environment for efficient computing resource distribution and deployment. This paper proposes an optimal moving pattern extraction algorithm in which variable weights (distance, time, congestion) are applied to selected paths in addition to a support factor threshold for frequency patterns (moving objects) of edge devices. The proposed algorithm is compared to the OPE_freq [8] algorithm, which just applies frequency, as well as the A* and Dijkstra algorithms, and it can be shown that the execution time and number of nodes accessed are reduced, and a more accurate path is extracted through experiments.

Bioinformatics services for analyzing massive genomic datasets

  • Ko, Gunhwan;Kim, Pan-Gyu;Cho, Youngbum;Jeong, Seongmun;Kim, Jae-Yoon;Kim, Kyoung Hyoun;Lee, Ho-Yeon;Han, Jiyeon;Yu, Namhee;Ham, Seokjin;Jang, Insoon;Kang, Byunghee;Shin, Sunguk;Kim, Lian;Lee, Seung-Won;Nam, Dougu;Kim, Jihyun F.;Kim, Namshin;Kim, Seon-Young;Lee, Sanghyuk;Roh, Tae-Young;Lee, Byungwook
    • Genomics & Informatics
    • /
    • v.18 no.1
    • /
    • pp.8.1-8.10
    • /
    • 2020
  • The explosive growth of next-generation sequencing data has resulted in ultra-large-scale datasets and ensuing computational problems. In Korea, the amount of genomic data has been increasing rapidly in the recent years. Leveraging these big data requires researchers to use large-scale computational resources and analysis pipelines. A promising solution for addressing this computational challenge is cloud computing, where CPUs, memory, storage, and programs are accessible in the form of virtual machines. Here, we present a cloud computing-based system, Bio-Express, that provides user-friendly, cost-effective analysis of massive genomic datasets. Bio-Express is loaded with predefined multi-omics data analysis pipelines, which are divided into genome, transcriptome, epigenome, and metagenome pipelines. Users can employ predefined pipelines or create a new pipeline for analyzing their own omics data. We also developed several web-based services for facilitating downstream analysis of genome data. Bio-Express web service is freely available at https://www. bioexpress.re.kr/.

Metamorphic Networks

  • Pujolle, Guy
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.3
    • /
    • pp.198-203
    • /
    • 2013
  • In this paper, we focus on a novel Internet architecture, based on the urbanization of virtual machines. In this approach, virtual networks are built linking specific virtual elements (router, switch, firewall, box, access point, etc.). A virtual network represents a network with an independent protocol stack that shares resources from the underlying network infrastructure. Virtualization divides a real computational environment into virtual computational environments that are isolated from each other, and interact with the upper computational layer, as would be expected from a real, non-virtualized environment. Metamorphic networks enhance several concepts related to future networks, and mainly the urbanization of virtual machines. We present this new paradigm, and the methodology, based on the worldwide metamorphic network platform "M-Net". The metamorphic approach could solve many complex problems, especially related to Cloud computing services.

A study on method to provide security services to Cloud Network with Software Defined Networking and Network Function Virtualization (소프트웨어 정의 네트워킹과 네트워크 기능 가상화를 이용한 클라우드 네트워크에서의 보안 서비스 제공 방법론에 대한 연구)

  • Kim, Jinwoo;Shin, Seungwon
    • Annual Conference of KIPS
    • /
    • 2016.04a
    • /
    • pp.133-135
    • /
    • 2016
  • 현재 클라우드 네트워크는 복잡성 및 거대한 규모로 인해 기존 네트워크와는 차별화된 양상을 보이고 있다. 하드웨어 기반 보안 장비로만 보안 서비스를 제공하기에는 한정적 자원을 고려하였을 때 한계가 있으며, 온 디맨드 서비스와 멀티 테넌시로 인한 동적인 네트워크 환경은 관리자가 외부의 보안 위협뿐만 아니라 내부의 위협도 고려해야하도록 만든다. 본 논문에서는 SDN과 NFV를 이용하여 언급한 문제점들을 해결하고, 효과적인 보안 서비스를 제공할 수 있는 방법론을 제시하도록 한다.

Deadline Constrained Adaptive Multilevel Scheduling System in Cloud Environment

  • Komarasamy, Dinesh;Muthuswamy, Vijayalakshmi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1302-1320
    • /
    • 2015
  • In cloud, everything can be provided as a service wherein a large number of users submit their jobs and wait for their services. hus, scheduling plays major role for providing the resources efficiently to the submitted jobs. The brainwave of the proposed ork is to improve user satisfaction, to balance the load efficiently and to bolster the resource utilization. Hence, this paper roposes an Adaptive Multilevel Scheduling System (AMSS) which will process the jobs in a multileveled fashion. The first level ontains Preprocessing Jobs with Multi-Criteria (PJMC) which will preprocess the jobs to elevate the user satisfaction and to itigate the jobs violation. In the second level, a Deadline Based Dynamic Priority Scheduler (DBDPS) is proposed which will ynamically prioritize the jobs for evading starvation. At the third level, Contest Mapping Jobs with Virtual Machine (CMJVM) is roposed that will map the job to suitable Virtual Machine (VM). In the last level, VM Scheduler is introduced in the two-tier VM rchitecture that will efficiently schedule the jobs and increase the resource utilization. These contributions will mitigate job iolations, avoid starvation, increase throughput and maximize resource utilization. Experimental results show that the performance f AMSS is better than other algorithms.

Efficient Method to Support Mobile Virtualization-based Cloud Resource Management (모바일 가상화기반 클라우드 자원관리를 지원하는 효율적 방법)

  • Kang, Yongho;Jang, Changbok;Lee, Wanjik;Heo, Seokyeol;Kim, Jooman
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.277-283
    • /
    • 2014
  • Recently, various cloud service has been being provided on mobile devices as well as desktop pc and server computer. Also, Smartphone users are very rapidly increasing, and they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). So, research to utilize resources on mobile device has been conducted. In this paper, We have suggested efficient method of cloud resource management by using information of available physical resources(CPU, memory, storage, etc.) between mobile devices, and information of physical resource in mobile device. Suggested technology is possible to guarantee real-time process and efficiently manage resources.