• Title/Summary/Keyword: Cloud Computing Storage Service

Search Result 103, Processing Time 0.023 seconds

Analysis of Cloud Service Providers

  • Lee, Yo-Seob
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.315-320
    • /
    • 2021
  • Currently, cloud computing is being used as a technology that greatly changes the IT field. For many businesses, many cloud services are available in the form of custom, reliable, and cost-effective web applications. Most cloud service providers provide functions such as IoT, machine learning, AI services, blockchain, AR & VR, mobile services, and containers in addition to basic cloud services that support the scalability of processors, memory, and storage. In this paper, we will look at the most used cloud service providers and compare the services provided by the cloud service providers.

Design of Cloud Service Platform for eGovernment

  • LEE, Choong Hyong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.201-209
    • /
    • 2021
  • The term, eGovernmen or e-Government, uses technology communications devices such as computers and the Internet to provide public services to citizens and others. The eGovernment or e-government provides citizens with new opportunities to access the government directly and conveniently, while the government provides citizens with directservices. Also, in these days, cloud computing is a feature that enables users to use computer system resources, especially data storage (cloud storage) and on-demand computing power, without having to manage themselves. The term is commonly used to describe data centers that are available to many users over the Internet. Today, the dominant Big Cloud is distributed across multiple central servers. You can designate it as an Edge server if it is relatively close to the user. However, despite the prevalence of e-government and cloud computing, each of these concepts has evolved. Research attempts to combine these two concepts were not being made properly. For this reason, in this work, we aim to produce independent and objective analysis results by separating progress steps for the analysis of e-government cloud service platforms. This work will be done through an analysis of the development process and architectural composition of the e-government development standard framework and the cloud platform PaaS-TA. In addition, this study is expected to derive implications from an analysis perspective on the direction and service composition of the e-government cloud service platform currently being pursued.

Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service

  • Chen, Liqing;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1523-1545
    • /
    • 2019
  • Cloud computing is now a widespread and economical option when data owners need to outsource or share their data. Designing secure and efficient data access control mechanism is one of the most challenging issues in cloud storage service. Anonymous broadcast encryption is a promising solution for its advantages in the respects of computation cost and communication overload. We bring forward an efficient anonymous identity-based broadcast encryption construction combined its application to the data access control mechanism in cloud storage service. The lengths for public parameters, user private key and ciphertext in the proposed scheme are all constant. Compared with the existing schemes, in terms of encrypting and decrypting computation cost, the construction of our scheme is more efficient. Furthermore, the proposed scheme is proved to achieve adaptive security against chosen-ciphertext attack adversaries in the standard model. Therefore, the proposed scheme is feasible for the system of data access control in cloud storage service.

An Exploratory Study on the Derivation of Characteristics of Personal Cloud Computing (개인용 클라우드 컴퓨팅의 특성 도출에 관한 탐색적 연구)

  • Moon, Hye Young;Ryu, Jae Hong;Choi, Jinho
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.2
    • /
    • pp.57-68
    • /
    • 2013
  • Recently, cloud computing has been viewed as a technology of great influence. Despite the importance of personal cloud services, the majority of cloud computing studies has been focused on an enterprise level. Therefore, in this research, we list variables of personal cloud computing characteristics (accessibility, storage, trust, perceived ease of use, availability) from preceding research done on an enterprise level. So, through pilot testing, we analyze whether examined characteristic variables affect the intention to use personal cloud computing. Next, we investigate the relevancy between user characteristics, including gender, age, and occupation, and the usage rate of personal cloud computing. Lastly, we implement an analysis of variance in order to speculate whether there is any difference between the five characteristic variables in using personal cloud computing between cloud service enterprises. For empirical testing people with experience in personal cloud computing are surveyed. Frequency analysis, exploratory factor analysis, internal consistency analysis, T-test, ANOVA, and multiple regression analysis are implemented with 325 valid samples. The analysis results are as follows: First, among user characteristic variables, 'occupation' shows a significant relationship with cloud service usage, Second, between cloud service enterprises, all five characteristic variables of 'Naver N Drive' are thoroughly evaluated and 'Google Drive' receives a high evaluation in availability and accessibility. Third and finally, all of the selected characteristic variables affect the intention to use personal cloud computing. However, availability is identified to be the most important factor. This research will serve as a reference to enterprises for the practical implementation of personal cloud computing service.

Service Architecture Models For Fog Computing: A Remedy for Latency Issues in Data Access from Clouds

  • Khalid, Adnan;Shahbaz, Muhammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2310-2345
    • /
    • 2017
  • With the emergence of the Internet of Things (IoT) the world is projecting towards a scenario where every object in the world (including humans) acts as a sender and receiver of data and if we were to see that concept mature we would soon be talking of billions more users of the cloud networks. The cloud technology is a very apt alternative to permanent storage when it comes to bulk storage and reporting. It has however shown weaknesses concerning real-time data accessibility and processing. The bandwidth availability of the cloud networks is limited and combined with the highly centralized storage structure and geographical vastness of the network in terms of distance from the end user the cloud just does not seem like a friendly environment for real-time IOT data. This paper aims at highlighting the importance of Flavio Bonomi's idea of Fog Computing which has been glamorized and marketed by Cisco but has not yet been given a proper service architecture that would explain how it would be used in terms of various service models i-e IaaS, PaaS and SaaS, of the Cloud. The main contribution of the paper would be models for IaaS, PaaS and SaaS for Fog environments. The paper would conclude by highlighting the importance of the presented models and giving a consolidated overview of how they would work. It would also calculate the respective latencies for fog and cloud to prove that our models would work. We have used CloudSim and iFogSim to show the effectiveness of the paradigm shift from traditional cloud architecture to our Fog architecture.

A Study on Individual User's Preference for Cloud Storage Service (클라우드 스토리지 서비스에 대한 개인 사용자의 선호 요인 연구)

  • Lee, Sewon;Hong, Ahreum;Hwang, Junseok
    • Journal of Technology Innovation
    • /
    • v.23 no.1
    • /
    • pp.1-36
    • /
    • 2015
  • The purpose of this research is to find individual user's preference for cloud storage service such as Daum Cloud, Naver N-Drive, GoogleDrive, Dropbox, SkyDrive and iCloud. Through literature reviewed and pilot tests, 6 attributes of cloud storage service (storage capacity, perceived cost, collaboration, accessibility, social influence and perceived security) were selected and all 6 attributes had significant effects on the preference of cloud storage service by conjoint analysis. The results shows that the user's willingness to pay is estimated 10,553 won for the free storage, 4,646 won for the function for mobile accessibility, and 2,443 won for more reliable cloud computing service provider. This study has significance to apply conjoint analysis with economic, technological, and environmental factors to cloud storage service (SaaS) and shed light on policy promotion of next generation of cloud computing ecosystem by user perception with willingness to pay on the storage service.

A Study on Selection Factors of Personal Cloud Storage Service Using AHP (AHP를 활용한 개인 클라우드 스토리지 서비스 선택 요인에 관한 연구)

  • Jo, Hyeon;Cho, Hyegyeong;Kim, Younghee;Kim, Hayan;Jeon, Hyeon-Jeong;Lee, Jae Kwang
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.197-215
    • /
    • 2015
  • Recently, many internet users are using cloud computing. Users can manage, store and share their data and information by using personal cloud storage. In this paper, we aim to figure out influencing factors on personal cloud storage selection. The causal relationship between factors were identified through a importance analysis by using AHP(Analytic Hierarchy Process). AHP is a structured technique for organizing and analyzing complex decisions, based on mathematics and psychology. Research model consists of upper factorsincluding system factor, service factor and user factor. 12 lower factors and 6 alternatives were also analyzed. Asa result, system factor of 3 upper factors was found as the most important factor. Purpose-coincidence, security andaccessibility were top 3 factors among lower factors. N drive showed top importance value. We also conducted ANOVAby classifying 4 groups according to gender, age, currently used cloud and cloud to use. The results of this researchcan be useful guidelines for cloud computing industry.

The study on a threat countermeasure of mobile cloud services (모바일 클라우드 서비스의 보안위협 대응 방안 연구)

  • Jang, Eun-Young;Kim, Hyung-Jong;Park, Choon-Sik;Kim, Joo-Young;Lee, Jae-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.177-186
    • /
    • 2011
  • Mobile services which are applied PC performance and mobile characteristics are increased with spread of the smartphone. Recently, mobile cloud service is getting the spotlight as a solution of mobile service problems that mobile device is lack of memory, computing power and storage and mobile services are subordinate to a particular mobile device platform. However, mobile cloud service has more potential security threats by the threat inheritance of mobile service, wireless network and cloud computing service. Therefore, security threats of mobile cloud service has to be removed in order to deploy secure mobile cloud services and user and manager should be able to respond appropriately in the event of threat. In this paper, We define mobile cloud service threats by threat analysis of mobile device, wireless network and cloud computing and we propose mobile cloud service countermeasures in order to respond mobile cloud service threats and threat scenarios in order to respond and predict to potential mobile cloud service threats.

An Exhaustive Review on Security Issues in Cloud Computing

  • Fatima, Shahin;Ahmad, Shish
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3219-3237
    • /
    • 2019
  • The Cloud Computing is growing rapidly in the current IT industry. Cloud computing has become a buzzword in relation to Grid & Utility computing. It provides on demand services to customers and customers will pay for what they get. Various "Cloud Service Provider" such as Microsoft Azure, Google Web Services etc. enables the users to access the cloud in cost effective manner. However, security, privacy and integrity of data is a major concern. In this paper various security challenges have been identified and the survey briefs the comprehensive overview of various security issues in cloud computing. The classification of security issues in cloud computing have been studied. In this paper we have discussed security challenges in cloud computing and also list recommended methods available for addressing them in the literature.

Digital Forensic Methodology of IaaS Cloud Computing Service (IaaS 유형의 클라우드 컴퓨팅 서비스에 대한 디지털 포렌식 연구)

  • Jeong, Il-Hoon;Oh, Jung-Hoon;Park, Jung-Heum;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.55-65
    • /
    • 2011
  • Recently, use of cloud computing service is dramatically increasing due to wired and wireless communications network diffusion in a field of high performance Internet technique. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. In a view of digital forensic investigation, it is difficult to obtain data from cloud computing service environments. therefore, this paper suggests analysis method of AWS(Amazon Web Service) and Rackspace which take most part in cloud computing service where IaaS formats presented for data acquisition in order to get an evidence.