• Title/Summary/Keyword: Cloud Infrastructure

Search Result 325, Processing Time 0.026 seconds

Strategies Building Knowledge_Base to Respond Effectively to Advanced Cyber Threats (고도화된 사이버 위협에 효과적으로 대응하기 위한 Knowledge_Base 구축전략)

  • Lee, Tae-Young;Park, Dong-Gue
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.357-368
    • /
    • 2013
  • Our society has evolved into a fully connected society in a mixed reality environment enabling various knowledge sharing / management / control / creation due to the expansion of broadband ICT infrastructure, smart devices, cloud services and social media services. Therefore cyber threats have increased with the convenience. The society of the future can cause more complex and subtle problems, if you do not have an effective response to cyber threats, due to fusion of logical space and physical space, organic connection of the smart object and the universalization of fully connected society. In this paper, we propose the strategy to build knowledge-base as the basis to actively respond to new cyber threats caused by future various environmental changes and the universalization of fully connected society.

A Study on Internet Technology Perspective Applicable in Industrial Environments (산업환경에서 적용 가능한 사물인터넷 기술 전망에 한 연구)

  • Hong, Sunghyuck
    • Journal of Industrial Convergence
    • /
    • v.17 no.2
    • /
    • pp.21-27
    • /
    • 2019
  • The Internet of things is the infrastructure that can communicate with each other by exchanging information by installing antennas that can communicate with all things in the world. The reason why the Internet of Things is the core of the Fourth Industrial Revolution is that data is collected through the Internet to be. Technology of things Internet and Trend of Things Internet IoT (Internet of Things) is a concept that enables internet connection and communication between devices equipped with various sensors. It is the core IT trend of lot, technology such as big data, mobile, cloud And to provide information for the development of the industrial environment through research on the importance of the Internet of things, the core of the Fourth Industrial Revolution and the processing and analysis techniques of Big Data. By providing various security measures and future technologies, This study was conducted to contribute to management.

Reference Model for the Service of Smart City Platform through Case Study (사례 연구를 통한 스마트 시티 플랫폼의 서비스를 위한 참조 모델)

  • Kim, Young Soo;Mun, Hyung-Jin
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.241-247
    • /
    • 2021
  • As a way to solve the side effects of urban development, a smart city with information and communication technology converges in the city is being built. For this, a smart city platform should support the development and integration of smart city services. Therefore, the underlying technology and the functional and non-functional requirements that the smart platform must support were analyzed. As a result of this, we classified the Internet of Things, cloud computing, big data and cyber-physical systems into four categories as the underlying technologies supported by the smart city platform, and derived the functional and non-functional requirements that can be implemented and the reference model of the smart city platform. The reference model of the smart city platform is used for decision-making on investment in infrastructure technology and the development scope of services according to functional or non-functional requirements to solve specific city problems for city managers. It provides platform developers with guidelines to identify and determine the functional and non-functional requirements and implementation technologies of software platforms for building smart cities.

A Video Encryption Based Approach for Privacy Protection of Video Surveillance Service (개인정보보호를 위한 영상 암호화 아키텍처 연구)

  • Kim, Jeongseok;Lee, Jaeho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.12
    • /
    • pp.307-314
    • /
    • 2020
  • The video surveillance service is being widely deployed around our lives and the service stores sensitive data such as video streams in the cloud over the Internet or the centralized data store in an on-premise environment. The main concerning of these services is that the user should trust the service provider how secure the video or data is stored and handled without any concrete evidence. In this paper, we proposed the approach to protecting video by PKI (public key infrastructure) with a blockchain network. The video is encrypted by a symmetric key, then the key is shared through a blockchain network with taking advantage of the PKI mechanism. Therefore, the user can ensure the sensitive data is always kept secure and traceable in its lifecycle.

A Workflow Execution System for Analyzing Large-scale Astronomy Data on Virtualized Computing Environments

  • Yu, Jung-Lok;Jin, Du-Seok;Yeo, Il-Yeon;Yoon, Hee-Jun
    • International Journal of Contents
    • /
    • v.16 no.4
    • /
    • pp.16-25
    • /
    • 2020
  • The size of observation data in astronomy has been increasing exponentially with the advents of wide-field optical telescopes. This means the needs of changes to the way used for large-scale astronomy data analysis. The complexity of analysis tools and the lack of extensibility of computing environments, however, lead to the difficulty and inefficiency of dealing with the huge observation data. To address this problem, this paper proposes a workflow execution system for analyzing large-scale astronomy data efficiently. The proposed system is composed of two parts: 1) a workflow execution manager and its RESTful endpoints that can automate and control data analysis tasks based on workflow templates and 2) an elastic resource manager as an underlying mechanism that can dynamically add/remove virtualized computing resources (i.e., virtual machines) according to the analysis requests. To realize our workflow execution system, we implement it on a testbed using OpenStack IaaS (Infrastructure as a Service) toolkit and HTCondor workload manager. We also exhaustively perform a broad range of experiments with different resource allocation patterns, system loads, etc. to show the effectiveness of the proposed system. The results show that the resource allocation mechanism works properly according to the number of queued and running tasks, resulting in improving resource utilization, and the workflow execution manager can handle more than 1,000 concurrent requests within a second with reasonable average response times. We finally describe a case study of data reduction system as an example application of our workflow execution system.

An Analysis of Impact on the Quality of Life for Chronic Patients based Big Data (빅데이터 기반 만성질환자의 삶의 질에 미치는 영향분석)

  • Kim, Min-kyoung;Cho, Young-bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1351-1356
    • /
    • 2019
  • The purpose of this study is to investigate the effect of personal factors and community factors on the quality of life based on the presence of chronic patients based on the Big Data Platform. As a method of study, second data of 2017 community health survey and Statistics Korea by City·Gun·Gu public office were used and a multi-level analysis was conducted after separating EQ-5D index, individual factor and community factor. As a result, men, age, education level, monthly household income, having economic activity, the number of sports infrastructure were positively associated with the quality of life, and subjective health not good, extremely perceived stress were negatively associated with the quality of life. Research will continue to provide a platform independent of hardware that can utilize the cloud and open source for medical big data analysis in the future.

Design and Utilization of Connected Data Architecture-based AI Service of Mass Distributed Abyss Storage (대용량 분산 Abyss 스토리지의 CDA (Connected Data Architecture) 기반 AI 서비스의 설계 및 활용)

  • Cha, ByungRae;Park, Sun;Seo, JaeHyun;Kim, JongWon;Shin, Byeong-Chun
    • Smart Media Journal
    • /
    • v.10 no.1
    • /
    • pp.99-107
    • /
    • 2021
  • In addition to the 4th Industrial Revolution and Industry 4.0, the recent megatrends in the ICT field are Big-data, IoT, Cloud Computing, and Artificial Intelligence. Therefore, rapid digital transformation according to the convergence of various industrial areas and ICT fields is an ongoing trend that is due to the development of technology of AI services suitable for the era of the 4th industrial revolution and the development of subdivided technologies such as (Business Intelligence), IA (Intelligent Analytics, BI + AI), AIoT (Artificial Intelligence of Things), AIOPS (Artificial Intelligence for IT Operations), and RPA 2.0 (Robotic Process Automation + AI). This study aims to integrate and advance various machine learning services of infrastructure-side GPU, CDA (Connected Data Architecture) framework, and AI based on mass distributed Abyss storage in accordance with these technical situations. Also, we want to utilize AI business revenue model in various industries.

Zero Trust-Based Security System Building Process (제로 트러스트 기반 보안체계 구축 프로세스)

  • Ko, Min-Hyuck;Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1898-1903
    • /
    • 2021
  • Recently, the need to be wary of internal access such as internal access as well as external attackers' access to work has increased due to network expansion, cloud infrastructure expansion, and changes in working patterns due to COVID-19 situations. For this reason, a new network security model called Zero Trust is drawing attention. Zero Trust has a key principle that a trusted network does not exist, and in order to be allowed access, it must be authenticated first, and data resources can only be accessed by authenticated users and authenticated devices. In this paper, we will explain these zero trust and zero trust architectures and examine new security application strategies applicable to various companies using zero trust and the process of building a new security system based on the zero trust architecture model.

Development of an intelligent edge computing device equipped with on-device AI vision model (온디바이스 AI 비전 모델이 탑재된 지능형 엣지 컴퓨팅 기기 개발)

  • Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.17-22
    • /
    • 2022
  • In this paper, we design a lightweight embedded device that can support intelligent edge computing, and show that the device quickly detects an object in an image input from a camera device in real time. The proposed system can be applied to environments without pre-installed infrastructure, such as an intelligent video control system for industrial sites or military areas, or video security systems mounted on autonomous vehicles such as drones. The On-Device AI(Artificial intelligence) technology is increasingly required for the widespread application of intelligent vision recognition systems. Computing offloading from an image data acquisition device to a nearby edge device enables fast service with less network and system resources than AI services performed in the cloud. In addition, it is expected to be safely applied to various industries as it can reduce the attack surface vulnerable to various hacking attacks and minimize the disclosure of sensitive data.

A Study on the Strategic Trade Policy of Korea, China and Japan in the Era of Digital Trade (디지털무역 시대의 한국·중국·일본의 전략적 무역정책에 관한 연구)

  • Jia-Jia Liu;Nak-Hyun Han
    • Korea Trade Review
    • /
    • v.47 no.6
    • /
    • pp.335-353
    • /
    • 2022
  • There are two aspects of digital trade: the digitalisation of goods/services being traded and the digitalisation of the transactional act. Digital data (i.e. machine-readable industrial data and transactional data) is the major driving force for both aspects of digital trade. Digital data is a non-rivalrous input, whether for production or marketing activities, and is thus able to be used by many firms or government agencies without limiting the use of others. Digital platforms provide online infrastructure for the interactions between groups, for instance, consumers and producers. The externality effect refers to the situation in which prosperity in one group on a given platform will improve the returns of other groups on the same platform. In the era of the data-driven economy, strategic trade policy can involve data-related policies. The major objective of these policies is to improve the competitiveness of domestic firms. For instance, firms may be subsidised if they use cloud services provided by specific platforms. This strand of strategic trade policies might be useful for increasing the competitiveness of small-and medium-sized enterprises (SMEs) via the digitalisation of production/marketing processes. Alternatively, strategic trade policy may also exploit the externality effect via platform economy-related policies. Further, some countries may form data coalitions to facilitate cross-border data flow. This paper uses cases in Asian countries to illustrate which role these strategic trade policies can play in the digital economy.