• Title/Summary/Keyword: Cloud Infrastructure

Search Result 319, Processing Time 0.023 seconds

Development of a Cloud-Based Infrastructure Engineering Design Platform Prototype (클라우드 기반의 인프라 엔지니어링 설계 플랫폼 프로토타입 개발)

  • Cho, Myung-Hwan;Pyo, Kil Seop;Youn, Seung Wook;Jung, Nahm-Chung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.42 no.4
    • /
    • pp.559-569
    • /
    • 2022
  • Infrastructure engineering is a field that supports construction (assembly) as a representative industry that creates high added value and jobs by combining science and technology with knowledge, though its importance is underestimated. According to a report from the Ministry of Land, Infrastructure and Transport (Korea), the value-added rate (65.3%) of the engineering industry and the employment inducement coefficient (14 employees per billion won) are three times higher than in manufacturing. In particular,the forward value chain (such as project management and basic design) accounts for less than 10~15% of the total project cost but determines the overall price and quality of the infrastructure facilities. In this study, a work break-down system, design support module and database development method for road design projects for design platform development is presented. Based on the presented development method, a cloud-based infrastructure design platform's prototype is developed. The developed infrastructure engineering platform is expected to provide a web-based design work environment without time/space restrictions and greatly contribute to winning overseas business orders and securing competitiveness.

A Prototype BIM Server based viewer for Cloud Computing BIM Services (클라우드 컴퓨팅 기반 BIM 서비스를 위한 BIM 서버 기반의 뷰어 개발)

  • Yoon, Su-Won;Kim, Byung-Kon;Choi, Jong-Moon;Kwon, Soon-Wook
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.4
    • /
    • pp.1719-1730
    • /
    • 2013
  • Recently BIM technology has been expanded for using in construction project. However its spread has been delayed than the initial expectations, due to the high-cost of BIM infrastructure development, the lack of regulations, the lack of process and so forth. Therefore, this research proposes the cloud computing based BIM service for saving the cost of BIM infrastructure development and providing various BIM Services to meet the domestic process. In order to achieve this, we perform a survey on the cloud computing based BIM service and develope the prototype system as the core technology of proposed service. The developed the prototype system consists of the IFC based BIM server for IaaS (Infrastructure as a Service) and the viewer for SaaS (Software as a Service). This research also conducts the performance test for their applicability and verifies that the results of this research can be used as core components in the cloud computing based BIM service.

A Design of Measuring impact of Distance between a mobile device and Cloudlet (모바일 장치와 클라우드 사이 거리의 영향 측정에 대한 연구)

  • Eric, Niyonsaba;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.232-235
    • /
    • 2015
  • In recent years, mobile devices are equipped with functionalities comparable to those computers. However, mobile devices have limited resources due to constraints, such as low processing power, limited memory, unpredictable connectivity, and limited battery life. To enhance the capacity of mobile devices, an interesting idea is to use cloud computing and virtualization techniques to shift the workload from mobile devices to a computational infrastructure. Those techniques consist of migrating resource-intensive computations from a mobile device to the resource-rich cloud, or server (called nearby infrastructure). In order to achieve their goals, researchers designed mobile cloud applications models (examples: CloneCloud, Cloudlet, and Weblet). In this paper, we want to highlight on cloudlet architecture (nearby infrastructure with mobile device), its methodology and discuss about the impact of distance between cloudlet and mobile device in our work design.

  • PDF

Service Management for Cloud Marketplace : A Case of Internet2 NET+ (클라우드 마켓플레이스를 위한 서비스 관리체계 연구 : Internet2 NET+ 사례)

  • Kwon, Suhn Beom;Ahn, Sung Mahn
    • Journal of Information Technology Services
    • /
    • v.14 no.4
    • /
    • pp.221-236
    • /
    • 2015
  • Application software is delivered to customers as a form of service at cloud environment. A cloud service provider is a marketplace between supply side (application providers) and demand side (customers). Cloud service providers have to validate applications to be included in their service portfolio. Not only performance, security, networking, compliances should be checked but also business contract, authentication should be provided. Organization customers are more sensitive to these validation criteria and process. We study the Internet2 NET+, which is a successful cloud marketplace of applications for research and education organizations. This case study shows us three things : (i) a cloud marketplace's application management process : selection, validation, transition to service, customization of applications (ii) what a cloud marketplace has for its infrastructure like authentication, security, access control etc. (iii) what a cloud marketplace has as its governance structure. This case study will provide informative analysis of Internet2 NET, a profit-making vertical and buyer's marketplace (education industry). And we will get some strategic implications for planning and implementing cloud marketplaces.

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.

A Survey on Cloud Storage System Security via Encryption Mechanisms

  • Alsuwat, Wejdan;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.181-186
    • /
    • 2022
  • Cloud computing is the latest approach that is developed for reducing the storage of space to store the data and helps the quick sharing of the data. An increase in the cloud computing users is observed that is also making the users be prone to hacker's attacks. To increase the efficiency of cloud storage encryption mechanisms are used. The encryption techniques that are discussed in this survey paper are searchable encryption, attribute-based, Identity-based encryption, homomorphic encryption, and cloud DES algorithms. There are several limitations and disadvantages of each of the given techniques and they are discussed in this survey paper. Techniques are found to be effective and they can increase the security of cloud storage systems.

Active ITS Infrastructure Management Strategy for Enhanced ITS Service (기존 ITS 서비스의 성능 강화를 위한 능동형 ITS 인프라 관리 전략)

  • Choi, Dongwon
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.9
    • /
    • pp.45-53
    • /
    • 2014
  • In this study, we analyzed the next generation ITS (C-ITS) technology trends, focusing on the national and international C-ITS projects. Based on the promotion practices of developed countries, we pointed out the lack of linkages with the existing ITS infrastructure. As a way to overcome this problem, we proposed the three-direction to enable the existing ITS infrastructure corresponding to the C-ITS. First one is developing a technique to improve the performance of the existing ITS infrastructure and automate the performance management (Performance-enhanced ITS). Second, developing active sensors or fusion sensor which along with V2X communication technology implement of an active safety driving support system (Safety-enhanced ITS). Third, we need to develop a technology that generate the new advanced traffic data by integrating the collected data from existing ITS infrastructure and nomadic device (Cloud-ITS). By improving the function of the existing ITS infrastructure for adaptation to the new V2X communication environment, we enhanced the efficiency of maintenance performance and would maximize the benefit of the introduction of C-ITS.

Volume Rendering Architecture of Mobile Medical Image using Cloud Computing (클라우드 컴퓨팅을 활용한 모바일 의료영상 볼륨렌더링 아키텍처)

  • Lee, Woongkyu;Nam, Doohee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.101-106
    • /
    • 2014
  • The era came that by having fastest internet and smart phone makes cloud computing really a big merit. This paper proposes architecture for medical image volume rendering in mobile environment using cloud computing. This architecture to replace expensive workstation server and storage it use one of the service of cloud computing IaaS(Infrastructure as a Service). And this paper propose to use webGL to get rid of restriction of mobile hardware. By this research, it is expected that medical image volume rendering service in mobile environment is more effective and can be a foundation work.

Design and Implementation of Cloud Computing Monitoring System Based on Android (안드로이드 기반의 클라우드 컴퓨팅 모니터링 시스템 설계 및 구현)

  • Kim, Bong-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.7
    • /
    • pp.1627-1632
    • /
    • 2013
  • Cloud computing technology for the company's IT infrastructure, reduce the maintenance burden and the company's IT technology to achieve cost savings through innovation in the high field of economic expectations. In particular, cloud computing monitoring system based on the Android is maturing necessary operational solutions in the IT infrastructure environments. Therefore, in this paper, cloud computing environment in terms of user management and real-time server check the situation in case of abnormalities Android phones are sent through the reality of sulfur and this situation of the server administrator to remotely diagnose and treatment system and to development a viable technology is applied.

Cryptography in the Cloud: Advances and Challenges

  • Boyd, Colin
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.17-23
    • /
    • 2013
  • Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.