• Title/Summary/Keyword: Cloud Computing Services

Search Result 644, Processing Time 0.026 seconds

A Study on the Role and Security Enhancement of the Expert Data Processing Agency: Focusing on a Comparison of Data Brokers in Vermont (데이터처리전문기관의 역할 및 보안 강화방안 연구: 버몬트주 데이터브로커 비교를 중심으로)

  • Soo Han Kim;Hun Yeong Kwon
    • Journal of Information Technology Services
    • /
    • v.22 no.3
    • /
    • pp.29-47
    • /
    • 2023
  • With the recent advancement of information and communication technologies such as artificial intelligence, big data, cloud computing, and 5G, data is being produced and digitized in unprecedented amounts. As a result, data has emerged as a critical resource for the future economy, and overseas countries have been revising laws for data protection and utilization. In Korea, the 'Data 3 Act' was revised in 2020 to introduce institutional measures that classify personal information, pseudonymized information, and anonymous information for research, statistics, and preservation of public records. Among them, it is expected to increase the added value of data by combining pseudonymized personal information, and to this end, "the Expert Data Combination Agency" and "the Expert Data Agency" (hereinafter referred to as the Expert Data Processing Agency) system were introduced. In comparison to these domestic systems, we would like to analyze similar overseas systems, and it was recently confirmed that the Vermont government in the United States enacted the first "Data Broker Act" in the United States as a measure to protect personal information held by data brokers. In this study, we aim to compare and analyze the roles and functions of the "Expert Data Processing Agency" and "Data Broker," and to identify differences in designated standards, security measures, etc., in order to present ways to contribute to the activation of the data economy and enhance information protection.

A study of Reference Model of Smart Library based on Linked Open Data (링크드오픈데이터 기반 스마트 라이브러리의 참조모델에 관한 연구)

  • Moon, Hee-kyung;Han, Sung-kook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1666-1672
    • /
    • 2016
  • In recent years, smart technology has been applied to various information system fields. Especially, traditional library service area is changing to Smart-Library from Digital-Library. In this environment are need to library service software platform for supporting variety content, library services, users and smart-devices. Due to this, existing library service has a limitation that inhibits semantic interoperability between different heterogeneous library systems. In this paper, we propose Linked-Open-Data based smart library as an archetype of future-library system that provide a variety content and system interaction and integration of services. It is an innovative system of the cutting-edge information intensive. Therefore, we designed system environments according to various integration requirements for smart library based on Linked-Open-Data. And, we describe the functional requirements of smart-library systems by considering the users' demands and the eco-systems of information technology. In addition, we show the reference framework, which can accommodate the functional requirements and provide smart knowledge service to user through a variety of smart-devices.

Interactive Visual Analytic Approach for Anomaly Detection in BGP Network Data (BGP 네트워크 데이터 내의 이상징후 감지를 위한 인터랙티브 시각화 분석 기법)

  • Choi, So-mi;Kim, Son-yong;Lee, Jae-yeon;Kauh, Jang-hyuk;Kwon, Koo-hyung;Choo, Jae-gul
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.135-143
    • /
    • 2022
  • As the world has implemented social distancing and telecommuting due to the spread of COVID-19, real-time streaming sessions based on routing protocols have increased dependence on the Internet due to the activation of video and voice-related content services and cloud computing. BGP is the most widely used routing protocol, and although many studies continue to improve security, there is a lack of visual analysis to determine the real-time nature of analysis and the mis-detection of algorithms. In this paper, we analyze BGP data, which are powdered as normal and abnormal, on a real-world basis, using an anomaly detection algorithm that combines statistical and post-processing statistical techniques with Rule-based techniques. In addition, we present an interactive spatio-temporal analysis plan as an intuitive visualization plan and analysis result of the algorithm with a map and Sankey Chart-based visualization technique.

Personalization Recommendation Service using OWL Modeling (OWL 모델링을 이용한 개인 추천 서비스)

  • Ahn, Hyo-Sik;Jeong, Hoon;Chang, Hyo-Kyung;Choi, Eui-In
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.309-315
    • /
    • 2012
  • The dissemination of smartphones is being spread and supplementary services using smartphones are increasing and various as the Mobile network and device are developing rapidly, so smartphones that enables to provide a wide range of services is expected to receive the most attention. It makes users listen to music anytime, anywhere in real-time, use useful applications, and access to Internet to search for information. The service environment is changing on PC into Mobile due to the change of the circumstance mentioned above. these services are done by using just location information rather than other context, and users have to search services and use them. It is essential to have Context-aware technology for personalization recommendation services and the appropriate representation and definition of Context information for context-aware. Ontology is possible to represent knowledge freely and knowledge can be extended by inferring. In addition, design of the ontology model is needed according to the purposes of utilization. This paper used context-aware technologies to implement a user personalization recommendation service. It also defined the context through OWL modeling for user personalization recommendation service and used inference rules and inference engine for context reasoning.

Delayed offloading scheme for IoT tasks considering opportunistic fog computing environment (기회적 포그 컴퓨팅 환경을 고려한 IoT 테스크의 지연된 오프로딩 제공 방안)

  • Kyung, Yeunwoong
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.89-92
    • /
    • 2020
  • According to the various IoT(Internet of Things) services, there have been lots of task offloading researches for IoT devices. Since there are service response delay and core network load issues in conventional cloud computing based offloadings, fog computing based offloading has been focused whose location is close to the IoT devices. However, even in the fog computing architecture, the load can be concentrated on the for computing node when the number of requests increase. To solve this problem, the opportunistic fog computing concept which offloads task to available computing resources such as cars and drones is introduced. In previous fog and opportunistic fog node researches, the offloading is performed immediately whenever the service request occurs. This means that the service requests can be offloaded to the opportunistic fog nodes only while they are available. However, if the service response delay requirement is satisfied, there is no need to offload the request immediately. In addition, the load can be distributed by making the best use of the opportunistic fog nodes. Therefore, this paper proposes a delayed offloading scheme to satisfy the response delay requirements and offload the request to the opportunistic fog nodes as efficiently as possible.

A Study on Workbench-based Dynamic Service De-sign and Construction of Computational Science Engineering Platform (계산과학공학 플랫폼의 워크벤치 기반 동적 서비스 설계 및 구축에 관한 연구)

  • Kwon, Yejin;Jeon, Inho;Ma, Jin;Lee, Sik;Cho, Kum Won;Seo, Jerry
    • Journal of Internet Computing and Services
    • /
    • v.19 no.3
    • /
    • pp.57-66
    • /
    • 2018
  • EDISON ( EDucation-research Integration through Simulation On the Net) is a web simulation service based on cloud compu-ting. EDISON provides that web service and provide analysis result to users through pre-built infrastructure and various calcu-lation nodes computational science engineering problems that are difficult or impossible to analysis as user's personal resources to users. As a result, a simulation execution environment is provided in a web portal environment so that EDISON can be ac-cessed regardless of a user's device or operating system to perform computational science engineering analysis simulation. The purpose of this research is to design and construct a workbench based real - time dynamic service to provide an integrat-ed user interface to the EDSION system, which is a computational science engineering simulation and analysis platform, which is currently provided to users. We also devised a workbench-based user simulation service environment configuration. That has a user interface that is similar to the computational science engineering simulation software environment used locally. It can configure a dynamic web environment such as various analyzers, preprocessors, and simulation software. In order to provide these web services, the service required by the user is configured in portlet units, and as a result, the simulation service using the workbench is constructed.

Research for Standards of N-Screen Service Platform for Smart Public Services (스마트 공공서비스를 위한 N-스크린 서비스 플랫폼 표준규격에 대한 연구)

  • Lee, Jeong-Heon;Lee, Hee-Joo;Jeong, Un-Gyo;Lee, Seung-Taek;Jang, Youn-Sang;Kang, Sang-Ug
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.277-291
    • /
    • 2012
  • Smartphone (smartpad) and cloud computing has grown rapidly. So, the users started getting interested in multi-screen services. However, various OS / platforms due to the increased content development time and cost. Increase the cost of content development for a multi-screen service, it has been an obstacle. To solve this problem in this study, HTML5-based multi-screen service platform standards specification was established. HTML5 is a specification of the next generation of Web standards. Standards specification established by this study were research in terms of the service provider. And, this standards specification can be used independently of the service infrastructure and device. In addition, this standards specification in order to develop a multi-screen services are efficient and easy to use. For verification adequacy of standards specification established in this study, Scenarios technical entries were mapped by standard specification entries.

Optimizing User Experience While Interacting with IR Systems in Big Data Environments

  • Minsoo Park
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.104-110
    • /
    • 2023
  • In the user-centered design paradigm, information systems are created entirely tailored to the users who will use them. When the functions of a complex system meet a simple user interface, users can use the system conveniently. While web personalization services are emerging as a major trend in portal services, portal companies are competing for a second service, such as introducing 'integrated communication platforms'. Until now, the role of the portal has been content and search, but this time, the goal is to create and provide the personalized services that users want through a single platform. Personalization service is a login-based cloud computing service. It has the characteristic of being able to enjoy the same experience at any time in any space with internet access. Personalized web services like this have the advantage of attracting highly loyal users, making them a new service trend that portal companies are paying attention to. Researchers spend a lot of time collecting research-related information by accessing multiple information sources. There is a need to automatically build interest information profiles for each researcher based on personal presentation materials (papers, research projects, patents). There is a need to provide an advanced customized information service that regularly provides the latest information matched with various information sources. Continuous modification and supplementation of each researcher's information profile of interest is the most important factor in increasing suitability when searching for information. As researchers' interest in unstructured information such as technology markets and research trends is gradually increasing from standardized academic information such as patents, it is necessary to expand information sources such as cutting-edge technology markets and research trends. Through this, it is possible to shorten the time required to search and obtain the latest information for research purposes. The interest information profile for each researcher that has already been established can be used in the future to determine the degree of relationship between researchers and to build a database. If this customized information service continues to be provided, it will be useful for research activities.

Enhanced PMIPv6 Route Optimization Handover using PFMIPv6 in Mobile Cloud Environment (모바일 클라우드 환경에서 PFMIPv6를 이용한 향상된 PMIPv6 경로 최적화 핸드오버 기법)

  • Na, Je-Gyun;Seo, Dae-Hee;Nah, Jae-Hoon;Mun, Young-Song
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.12
    • /
    • pp.17-23
    • /
    • 2010
  • In the mobile cloud computing, the mobile node should request and receive the services while being connected. In PMIPv6, all packets sent by mobile nodes or correspondent nodes are transferred through the local mobility anchor. This unnecessary detour still results in high delivery latency and significant processing cost. Several PMIPv6 route optimization schemes have been proposed to solve this issue. However, they also suffer from the high signaling costs and handover latency when determining the optimized path. We propose the route optimization handover scheme which adopts the prediction algorithm in PFMIPv6. In the proposed scheme, the new mobile access gateway establishes the bi-directional tunnel with the correspondent node's MAG using the context message when the mobile node's handover is imminent. This tunnel may eliminate the need of separate route optimization procedure. Hence, the proposed scheme can reduce the signaling cost than other conventional schemes do. Analytical performance evaluation is preformed to show the effectiveness of the proposed scheme. The result shows that our scheme is more effective than other schemes.

Evaluation of Distributed Intrusion Detection System Based on MongoDB (MongoDB 기반의 분산 침입탐지시스템 성능 평가)

  • Han, HyoJoon;Kim, HyukHo;Kim, Yangwoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.12
    • /
    • pp.287-296
    • /
    • 2019
  • Due to the development and increased usage of Internet services such as IoT and cloud computing, a large number of packets are being generated on the Internet. In order to create a safe Internet environment, malicious data that may exist among these packets must be processed and detected quickly. In this paper, we apply MongoDB, which is specialized for unstructured data analysis and big data processing, to intrusion detection system for rapid processing of big data security events. In addition, building the intrusion detection system(IDS) using some of the private cloud resources which is the target of protection, elastic and dynamic reconfiguration of the IDS is made possible as the number of security events increase or decrease. In order to evaluate the performance of MongoDB - based IDS proposed in this paper, we constructed prototype systems of IDS based on MongoDB as well as existing relational database, and compared their performance. Moreover, the number of virtual machine has been increased to find out the performance change as the IDS is distributed. As a result, it is shown that the performance is improved as the number of virtual machine is increased to make IDS distributed in MongoDB environment but keeping the overall system performance unchanged. The security event input rate based on distributed MongoDB was faster as much as 60%, and distributed MongoDB-based intrusion detection rate was faster up to 100% comparing to the IDS based on relational database.