• 제목/요약/키워드: Cloud Network

검색결과 837건 처리시간 0.03초

An Overview of Data Security Algorithms in Cloud Computing

  • D. I. George Amalarethinam;S. Edel Josephine Rajakumari
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.65-72
    • /
    • 2023
  • Cloud Computing is one of the current research areas in computer science. Recently, Cloud is the buzz word used everywhere in IT industries; It introduced the notion of 'pay as you use' and revolutionized developments in IT. The rapid growth of modernized cloud computing leads to 24×7 accessing of e-resources from anywhere at any time. It offers storage as a service where users' data can be stored on a cloud which is managed by a third party who is called Cloud Service Provider (CSP). Since users' data are managed by a third party, it must be encrypted ensuring confidentiality and privacy of the data. There are different types of cryptographic algorithms used for cloud security; in this article, the algorithms and their security measures are discussed.

Optimization of Energy Consumption in the Mobile Cloud Systems

  • Su, Pan;Shengping, Wang;Weiwei, Zhou;Shengmei, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권9호
    • /
    • pp.4044-4062
    • /
    • 2016
  • We investigate the optimization of energy consumption in Mobile Cloud environment in this paper. In order to optimize the energy consumed by the CPUs in mobile devices, we put forward using the asymptotic time complexity (ATC) method to distinguish the computational complexities of the applications when they are executed in mobile devices. We propose a multi-scale scheme to quantize the channel gain and provide an improved dynamic transmission scheduling algorithm when offloading the applications to the cloud center, which has been proved to be helpful for reducing the mobile devices energy consumption. We give the energy estimation methods in both mobile execution model and cloud execution model. The numerical results suggest that energy consumed by the mobile devices can be remarkably saved with our proposed multi-scale scheme. Moreover, the results can be used as a guideline for the mobile devices to choose whether executing the application locally or offloading it to the cloud center.

SmartX-mini Playground 상의 IoT-Cloud 서비스에 대한 SDN 기반 모니터링 데이터 수집 경로 설정 (SDN-Based Collection-path Steering for IoT-Cloud Service Monitoring Data over SmartX-mini Playground)

  • 윤희범;김승룡;김종원
    • 한국통신학회논문지
    • /
    • 제41권11호
    • /
    • pp.1598-1607
    • /
    • 2016
  • 부상하는 IoT-Cloud 서비스들을 효율적으로 지원하기 위해서는 IoT-Cloud 간의 안정적이고 지속적인 데이터 전송이 필수적이다. 본 논문에서는 초융합형 SmartX Box에 기반한 SmartX-mini Playground 상에서 IoT-Cloud 서비스를 위한 다양한 모니터링 데이터를 보다 안정되게 수집/전송함에 있어서 오픈소스 메시징 시스템인 Kafka를 활용하고 ONOS(Open Network Operation System) SDN 제어기에 기반한 SDN 응용을 적용함으로써 실제적인 IoT-SDN-Cloud 환경에서의 안정적인 IoT-Cloud 서비스에 대응하는 모니터링 데이터 전송을 위한 유연한 수집 경로 설정이 가능함을 확인한다.

SECURITY THREATS AND ATTACKS IN CLOUD

  • Mohammed, Asma;Al khathami, Jamilah;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.184-191
    • /
    • 2021
  • The amount of information and data in the digital era is increasing tremendously. Continuous online connectivity is generating a massive amount of data that needs to store in computers and be made available as and when required. Cloud computing technology plays a pivotal role in this league. Cloud computing is a term that refers to computer systems, resources and online services that aim to protect and manage data in an effective, more efficient and easy way. Cloud computing is an important standard for maintaining the integrity and security of sensitive data and information for organizations and individuals. Cloud security is one of the most important challenges that the security of the entire cloud system depends on. Thus, the present study reviews the security challenges that exist in cloud computing, including attacks that negatively affect cloud resources. The study also addresses the most serious threats that affect cloud security. We also reviewed several studies, specifically those from 2017-20, that cited effective mechanisms to protect authentication, availability and connection security in the cloud. The present analysis aims to provide solutions to the problems and causes of cloud computing security system violations, which can be used now and developed in the future.

클라우드 VR 기반 다중 사용자 메타버스 콘텐츠를 위한 엣지 컴퓨팅 서버 배치 기법 (Edge Computing Server Deployment Technique for Cloud VR-based Multi-User Metaverse Content)

  • 김원석
    • 한국멀티미디어학회논문지
    • /
    • 제24권8호
    • /
    • pp.1090-1100
    • /
    • 2021
  • Recently, as indoor activities increase due to the spread of infectious diseases, the metaverse is attracting attention. Metaverse refers to content in which the virtual world and the real world are closely related, and its representative platform technology is VR(Virtual Reality). However, since VR hardware is difficult to access in terms of cost, the concept of streaming-based cloud VR has emerged. This study proposes a server configuration and deployment method in an edge network when metaverse content involving multiple users operates based on cloud VR. The proposed algorithm deploys the edge server in consideration of the network and computing resources and client location for cloud VR, which requires a high level of computing resources while at the same time is very sensitive to latency. Based on simulation, it is confirmed that the proposed algorithm can effectively reduce the total network traffic load regardless of the number of applications or the number of users through comparison with the existing deployment method.

5G MEC 기반 로봇 엔진 원격 구동을 위한 클라우드 로보틱스 시스템 구성 및 실증 (Validation of Cloud Robotics System in 5G MEC for Remote Execution of Robot Engines)

  • 구세완;강성규;정원홍;문형일;양현석;김영재
    • 로봇학회논문지
    • /
    • 제17권2호
    • /
    • pp.118-123
    • /
    • 2022
  • We implemented a real-time cloud robotics application by offloading robot navigation engine over to 5G Mobile Edge Computing (MEC) sever. We also ran a fleet management system (FMS) in the server and controlled the movements of multiple robots at the same time. The mobile robots under the test were connected to the server through 5G SA network. Public 5G network, which is already commercialized, has been temporarily modified to support this validation by the network operator. Robot engines are containerized based on micro-service architecture and have been deployed using Kubernetes - a container orchestration tool. We successfully demonstrated that mobile robots are able to avoid obstacles in real-time when the engines are remotely running in 5G MEC server. Test results are compared with 5G Public Cloud and 4G (LTE) Public Cloud as well.

소셜 네트워크 서비스 어플리케이션의 클라우드 모델링 및 분석을 통한 국방 클라우드 컴퓨탱 시스템 설계 (K-Defense Cloud Computing System Design through Cloud Modeling and Analysis of Social Network Service Application)

  • 이성태;유황빈
    • 융합보안논문지
    • /
    • 제13권1호
    • /
    • pp.37-43
    • /
    • 2013
  • 국방부는 지난 2010년, '2012 정보화사업계획'의 일환으로 2014년까지 클라우드 컴퓨팅 기술이 포함된 국방통합정보관리소(메가센터)를 구축하기로 결정하였고, 현재 추진 중에 있다 클라우드 컴퓨팅 환경은 데이터 센터에 많은 IT 자원이 집약된 형태로 효율적인 인프라구조를 위한 기술과 정책을 적용하여 시스템을 설계해야 한다. 즉, 사용자의 요구를 만족 시키기 위해 클라우드 서비스를 효율적으로 제공하여야 하며, 시스템 구축 시 불필요하게 낭비되는 자원이 없게 설계되어야 한다. 그러나 최적 시스템을 구축하기 위해서는 시스템 설계 최초단계에 서비스 성능과 자원 사용의 가용성을 예측할 수 있어야 한다. 본 논문에서는 국방 클라우드 컴퓨팅 시스템의 서비스 가용성 예측을 위해 CloudAnalyst 시뮬레이터를 이용하여 현재 전 세계에서 가장 많은 사용자를 보유한 소설 네트워크 서비스 중 하나인 Facebook을 클라우드 모델링 및 분석하였다. 시뮬레이션 결과를 통해 최적의 국방 클라우드 컴퓨팅 설계 모델을 제안한다.

Analysis of Cybercrime Investigation Problems in the Cloud Environment

  • Khachatryan, Grigor
    • International Journal of Computer Science & Network Security
    • /
    • 제22권7호
    • /
    • pp.315-319
    • /
    • 2022
  • Cloud computing has emerged to be the most effective headway for investigating crime especially cybercrime in this modern world. Even as we move towards an information technology-controlled world, it is important to note that when innovations are made, some negative implications also come with it, and an example of this is these criminal activities that involve technology, network devices, and networking that have emerged as a result of web improvements. These criminal activities are the ones that have been termed cybercrime. It is because of these increased criminal activities that organizations have come up with different strategies that they use to counter these crimes, and one of them is carrying out investigations using the cloud environment. A cloud environment has been defined as the use of web-based applications that are used for software installation and data stored in computers. This paper examines problems that are a result of cybercrime investigation in the cloud environment. Through analysis of the two components in play; cybercrime and cloud environment, we will be able to understand what are the problems that are encountered when carrying out investigations in cloud forensics. Through the use of secondary research, this paper found out that most problems are associated with technical and legal channels that are involved in carrying out these investigations. Investigator's mistakes when extracting pieces of evidence form the most crucial problems that take a lead when it comes to cybercrime investigation in the cloud environment. This paper not only flags out the challenges that are associated with cybercrime investigation in cloud environments but also offer recommendations and suggested solutions that can be used to counter the problems in question here. Through a proposed model to perform forensics investigations, this paper discusses new methodologies solutions, and developments for performing cybercrime investigations in the cloud environment.

Implementation of Cloud-Based Virtual Laboratory using SOI and CIMP on Virtual Machines

  • Ferdiansyah, Doddy;Hwang, Mintae
    • Journal of information and communication convergence engineering
    • /
    • 제20권1호
    • /
    • pp.16-21
    • /
    • 2022
  • In this research, we create a network infrastructure based on a service-oriented infrastructure (SOI) for the virtualization technology and integrate it with a cloud technology that applies the cloud integration management platform (CIMP) concept. In CIMP, the server and storage will be separated. The server will be adopted for virtualization while the storage will be used by students and teachers to store data. As long they save their data in the storage module, every time, everywhere, and on every device, they can access their data. This research will implement the design of the network infrastructure and be applied to the remote practical learning system in the laboratory. Students and teachers will ultimately adopt this network infrastructure for remote practice using their respective devices without physically meeting in the laboratory. In the future, if the implementation phase is successful, then in addition to laboratory environments, it can be implemented in all learning activities at our campus.

새로운 IT 서비스 모델, 클라우드 비즈니스 모델 : M-Pesa 사례 분석 (Emerging IT Services Model : Cloud Business Model, Focused on M-Pesa Case)

  • 함유근;윤영수;강한수;김진성
    • 한국IT서비스학회지
    • /
    • 제11권3호
    • /
    • pp.287-304
    • /
    • 2012
  • Cloud computing, which means a new way of deploying information technology(IT) in organizations as a service and charging per use, has a deep impact on organizations' IT accessibility, agility and efficiency of its usage. More than that, the emergence of cloud computing surpasses a mere technological innovation, making business model innovation possible. We call this innovation realized by could computing a cloud business model. This study develops a comprehensive framework of business model, first, and then defines and analyzes the cloud business model through this framework. This study also examines the case of M-Pesa mobile payment as a cloud business model in which a new value creation and profit realization schemes have been realized and industry value network has changed. Finally, this study discusses the business implications from this new business model.