• Title/Summary/Keyword: Cloud Security

Search Result 851, Processing Time 0.045 seconds

Analysis of The Effectiveness of Server Based Computing Model Schools (SBC 기반 컴퓨터실 시범운영과 효과성 분석)

  • Kim, Han-Sung;Kim, Jin-Il;Jang, Sun-Il;Lee, Won-Gyu
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.3
    • /
    • pp.55-63
    • /
    • 2010
  • In order to solve the problems of maintenance and security for information-infrastructure, public organizations and some of leading companies adopted Server Based Computing(SBC) infrastructure. The effectiveness and possibility of SBC has become focused with the Cloud-Computing infrastructure, which is a extended concept of SBC, as it is being magnified as a main part among the internet business models for the next generation. The purpose of this study was to analyze its probability in elementary and secondary school and find out its effectiveness. In order to do this, three model schools have been selected from GyeongBuk, ChungNam, ChungBuk province and they were managed by SBC infrastructure. And We conducted analysis of satisfaction for teachers and students, interview with teachers and classroom observation as a effectiveness verification. As the results of the analysis, First, we can find out which part we should consider more when we are to adopt SBC infrastructure. Second, the level of satisfaction for teachers is 3.45 and students is 3.2. Therefore, this study was concluded to contribute to find directions what should be considered when setting the SBC infrastructure in elementary and secondary schools.

  • PDF

A Case study on the Utilization of Emulation Based Network Testbeds (에뮬레이션 기반 테스트베드 활용 사례 연구)

  • Lee, Minsun;Yoo, Kwan-Jong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.61-67
    • /
    • 2018
  • Emulab software was developed by the team of University of Utah and it has been replicated at dozens of other sites in the world. Although KREONET Emulab, which established by the Korea Institute of Science and Technology Information, has only a modest number of compute nodes it has been provided an ideal playground to conduct various research for network protocols, cyber security and convergence research. A testbed is a critical enabler of experimental research and researchers only carry out the experiments that are supported by the testbed. This paper outlines the Utah Emulab's status and use types among the last 10 years of operation results and compares them with the ones with the KREONET Emulab. In addition, Testbed-as-a-Service(TaaS) is discussed to upgrade the testbed for the convergence research community services.

SDN-Based Middlebox Management Framework in Integrated Wired and Wireless Networks (유무선 통합망에서의 SDN 기반 미들박스 관리 프레임워크)

  • Lee, Giwon;Jang, Insun;Kim, Wontae;Joo, Sukjin;Kim, Myungsoo;Pack, Sangheon;Kang, Chul-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.6
    • /
    • pp.379-386
    • /
    • 2014
  • Recently, middleboxes play a key role in many network settings such as firewalls, VPN gateways, proxies, intrusion detection and prevention systems, and WAN optimizers. However, achieving the performance and security benefits that middleboxes offer is highly complex, and therefore it is essential to manage middleboxes efficiently and dynamically. In this respect, Software-Defined Networking (SDN) offers a promising solution for middlebox policy enforcement by using logically centralized management, decoupling the data and control planes, and providing the ability to programmatically configure forwarding rules. Also, cloud computing and distributed Network Function Virtualization (NFV) can enable to manage middleboxes more easily. We introduce SDN-based middlebox management framework in integrated wired and wireless networks and discuss the further issues.

Performance Evaluation and Analysis for Block I/O Access Pattern between KVM-based Virtual Machine and Real Machine in the Virtualized Environment (KVM 기반 가상화 환경에서의 가상 머신과 리얼 머신의 입출력 패턴 분석 및 성능 측정)

  • Kim, Hyeunjee;Kim, Youngwoo;Kim, Youngmin;Choi, Hoonha;No, Jaechun;Park, Sungsoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.1
    • /
    • pp.86-96
    • /
    • 2016
  • Recently, virtualization is becoming the critical issue in the cloud computing due to its advantages of resource utilization and consolidation. In order to efficiently use virtualization services, several issues should be taken into account, including data reliability, security, and performance. In particular, a high write bandwidth on the virtual machine must be guaranteed to provide fast responsiveness to users. In this study, we implemented a way of visualizing comparison results between the block write pattern of KVM-based virtual machine and that of the real machine. Our final objective is to propose an optimized virtualization environment that enables to accelerate the disk write bandwidth.

Technology Trends, Research and Design of AIM Framework for Authentication Information Management (인증 정보 관리를 위한 기술 동향과 AIM 프레임워크 연구 및 설계)

  • Kim, Hyun-Joong;Cha, Byung-Rae;Pan, Sung-Bum
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.373-383
    • /
    • 2016
  • With mobile-epoch and emerging of Fin-tech, Bio-recognition technology utilizing bio-information in secure method has spread. Specially, In order to change convenient payment services and transportation cards, the combination of biometrics and mobile services are being expanded. The basic concept of authentication such as access control, IA&A, OpenID, OAuth 1.0a, SSO, and Biometrics techniques are investigated, and the protocol stack for security API platform, FIDO, SCIM, OAuth 2.0, JSON Identity Suite, Keystone of OpenStack, Cloud-based SSO, and AIM Agent are described detailed in aspect of application of AIM. The authentication technology in domestic and foreign will accelerate technology development and research of standardization centered in the federated FIDO Universal Authentication Framework(UAF) and Universal 2 Factor Framework(U2F). To accommodate the changing needs of the social computing paradigm recently in this paper, the trends of various authentication technology, and design and function of AIM framework was defined.

A study on the application of blockchain to the edge computing-based Internet of Things (에지 컴퓨팅 기반의 사물인터넷에 대한 블록체인 적용 방안 연구)

  • Choi, Jung-Yul
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.219-228
    • /
    • 2019
  • Thanks to the development of information technology and the vitalization of smart services, the Internet of Things (IoT) technology, in which various smart devices are connected to the network, has been continuously developed. In the legacy IoT architecture, data processing has been centralized based on cloud computing, but there are concerns about a single point of failure, end-to-end transmission delay, and security. To solve these problems, it is necessary to apply decentralized blockchain technology to the IoT. However, it is hard for the IoT devices with limited computing power to mine blocks, which consumes a great amount of computing resources. To overcome this difficulty, this paper proposes an IoT architecture based on the edge computing technology that can apply blockchain technology to IoT devices, which lack computing resources. This paper also presents an operaional procedure of blockchain in the edge computing-based IoT architecture.

A Study on the Improvement of Smart Work Satisfaction and Productivity (스마트워크를 통한 직원 만족도와 업무 생산성 증대에 관한 연구 : 홈오피스 환경에서)

  • Lee, Dae Hyung;Cho, Seung Yeon;Kim, Hee-Woong
    • Informatization Policy
    • /
    • v.21 no.2
    • /
    • pp.24-48
    • /
    • 2014
  • Smart working, along with the spread of smart device use, has recently garnered increased interest. The issue has become focused on low labor productivity over working time, work-life balance and social discussion. There has also been a shift in working styles due to the development of mobile, security, and cloud computing-related IT technology support and activation of the smart work environment. However, former research show concern that smart working may not meet the initially expected levels of productivity. This empirical study was carried out to introduce the impact of teleworking on increased productivity and satisfaction in companies and public institutions through user interviews, a socio-technical systems approach and surveys. To summarize the results of this study, 'Telework satisfaction' is directly influenced by 'Work-life balance', 'Telework-system fit, and 'Telework-job fit'. Direct impact factors of 'Telework productivity'are 'Telework-job fit', 'Telework satisfaction', and 'Telework environment quality'.

Strategies Building Knowledge_Base to Respond Effectively to Advanced Cyber Threats (고도화된 사이버 위협에 효과적으로 대응하기 위한 Knowledge_Base 구축전략)

  • Lee, Tae-Young;Park, Dong-Gue
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.357-368
    • /
    • 2013
  • Our society has evolved into a fully connected society in a mixed reality environment enabling various knowledge sharing / management / control / creation due to the expansion of broadband ICT infrastructure, smart devices, cloud services and social media services. Therefore cyber threats have increased with the convenience. The society of the future can cause more complex and subtle problems, if you do not have an effective response to cyber threats, due to fusion of logical space and physical space, organic connection of the smart object and the universalization of fully connected society. In this paper, we propose the strategy to build knowledge-base as the basis to actively respond to new cyber threats caused by future various environmental changes and the universalization of fully connected society.

Analysis of technical environment of domestic fintech companies (국내 핀테크 기업의 기술 환경 분석)

  • Choi, Yoo-jung;Choi, Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.10
    • /
    • pp.1384-1389
    • /
    • 2020
  • Although the fintech industry is developing rapidly around the world, the domestic development situation is rather slow compared to the speed. Therefore, the future development direction can be set by analyzing the current status of the fintech industry in order to suggest the direction of development in the domestic fintech industry. The main services provided by companies belonging to the domestic fintech industry are in the areas of remittance settlement, financial investment, asset management, crowdfunding, P2P finance, overseas remittance, fintech SI, insurtech, virtual currency, security, and authentication. It is divided into. This study identifies the main technologies used in the service and grasps the current domestic status. In addition, it analyzes the distribution of workers by each service. This study is expected to play an important role in the development of the financial industry through technical analysis of fintech companies.

Edge-Centric Metamorphic IoT Device Platform for Efficient On-Demand Hardware Replacement in Large-Scale IoT Applications (대규모 IoT 응용에 효과적인 주문형 하드웨어의 재구성을 위한 엣지 기반 변성적 IoT 디바이스 플랫폼)

  • Moon, Hyeongyun;Park, Daejin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.12
    • /
    • pp.1688-1696
    • /
    • 2020
  • The paradigm of Internet-of-things(IoT) systems is changing from a cloud-based system to an edge-based system to solve delays caused by network congestion, server overload and security issues due to data transmission. However, edge-based IoT systems have fatal weaknesses such as lack of performance and flexibility due to various limitations. To improve performance, application-specific hardware can be implemented in the edge device, but performance cannot be improved except for specific applications due to a fixed function. This paper introduces a edge-centric metamorphic IoT(mIoT) platform that can use a variety of hardware through on-demand partial reconfiguration despite the limited hardware resources of the edge device, so we can increase the performance and flexibility of the edge device. According to the experimental results, the edge-centric mIoT platform that executes the reconfiguration algorithm at the edge was able to reduce the number of server accesses by up to 82.2% compared to previous studies in which the reconfiguration algorithm was executed on the server.