• Title/Summary/Keyword: Cloud Traffic

Search Result 147, Processing Time 0.029 seconds

Analysis of K-Defense Cloud Computing Service Availability Considering of Cloud Computing Traffic Growth (클라우드 컴퓨팅 트래픽 증가를 고려한 국방 클라우드 컴퓨팅 서비스 가용성 분석)

  • Lee, Sung-Tae;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.93-100
    • /
    • 2013
  • In 2012, According to 'Cisco Global Cloud Index 2011-2016', the Cisco company forecasted that global data center traffic will nearly quadruple and cloud traffic will nearly sextuple by 2016. Such a rapid growing of traffic is caused by traffic inside the data center and cloud computing workloads. In 2010, the Ministry of National Defense decided to build a Mega Center including the cloud computing technology by 2014, as part of the '2012 Information Service Plan', which is now underway. One of the factors to consider is cloud computing traffic to build a Mega Center. Since the K-defense cloud computing system is built, K-defense cloud computing traffic will increase steadily. This paper, analyzed the availability of K-defense cloud computing service with the K-defense cloud computing traffic increasing using K-Defense cloud computing test system and CloudAnalyst simulation tool. Created 3 scenarios and Simulated with these scenarios, the results are derived that the availability of K-defense cloud computing test system is fulfilled, even cloud workloads are increased as muh as forecasted cloud traffic growth from now until 2016.

Design of Malicious Traffic Dynamic Analysis System in Cloud Environment (클라우드 환경에서의 악성트래픽 동적 분석 시스템 설계)

  • Lee, Eun-Ji;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.579-589
    • /
    • 2017
  • The cloud environment is hypervisor-based, and many virtual machines are interconnected, which makes propagation of malicious code easier than other environments. Accordingly, this paper proposes a malicious traffic dynamic analysis system for secure cloud environment. The proposed system continuously monitors and analyzes malicious activity in an isolated virtual network environment by distinguishing malicious traffic that occurs in a cloud environment. In addition, the analyzed results are reflected in the distinguishment and analysis of malicious traffic that occurs in the future. The goal of this research is secure and efficient malicious traffic dynamic analysis by constructing the malicious traffic analysis environment in the cloud environment for detecting and responding to the new and variant malicious traffic generated in the cloud environment.

Cloud computing for handling data from traffic sensing technologies and on-board diagnostics

  • Nkenyereye, Lionel;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.488-491
    • /
    • 2014
  • Based on a complete understanding research in Information and Communication Technologies (ICT), the Intelligent Transport Systems rapidly build up innovative applications to ensure real time attainment as well remote management of driven information, provide a huge range of services and involve many actors in automotive ecosystem. In this paper, we present an intelligent cloud computing for handling data received from traffic sensing technologies. Transportations technologies applied in ITS have played a great role in collecting data from devices deployed in vehicles and highway infrastructures utilizing broadband wireless technologies to the Cloud. In order to facilitate the interested in automotive industry to use data collected and afford services to the car's owner, a scalable acquisition, access to computing resources and offered services are the primary goal of the proposed cloud computing.

  • PDF

Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks

  • Hussain, Rasheed;Oh, Heekuck
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.103-118
    • /
    • 2014
  • Over the last couple of years, traditional VANET (Vehicular Ad Hoc NETwork) evolved into VANET-based clouds. From the VANET standpoint, applications became richer by virtue of the boom in automotive telematics and infotainment technologies. Nevertheless, the research community and industries are concerned about the under-utilization of rich computation, communication, and storage resources in middle and high-end vehicles. This phenomenon became the driving force for the birth of VANET-based clouds. In this paper, we envision a novel application layer of VANET-based clouds based on the cooperation of the moving cars on the road, called CaaS (Cooperation as a Service). CaaS is divided into TIaaS (Traffic Information as a Service), WaaS (Warning as a Service), and IfaaS (Infotainment as a Service). Note, however, that this work focuses only on TIaaS and WaaS. TIaaS provides vehicular nodes, more precisely subscribers, with the fine-grained traffic information constructed by CDM (Cloud Decision Module) as a result of the cooperation of the vehicles on the roads in the form of mobility vectors. On the other hand, WaaS provides subscribers with potential warning messages in case of hazard situations on the road. Communication between the cloud infrastructure and the vehicles is done through GTs (Gateway Terminals), whereas GTs are physically realized through RSUs (Road-Side Units) and vehicles with 4G Internet access. These GTs forward the coarse-grained cooperation from vehicles to cloud and fine-grained traffic information and warnings from cloud to vehicles (subscribers) in a secure, privacy-aware fashion. In our proposed scheme, privacy is conditionally preserved wherein the location and the identity of the cooperators are preserved by leveraging the modified location-based encryption and, in case of any dispute, the node is subject to revocation. To the best of our knowledge, our proposed scheme is the first effort to offshore the extended traffic view construction function and warning messages dissemination function to the cloud.

Secure and Privacy Preserving Protocol for Traffic Violation Reporting in Vehicular Cloud Environment

  • Nkenyereye, Lewis;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.7
    • /
    • pp.1159-1165
    • /
    • 2016
  • Traffic violations such as moving while the traffic lights are red have come from a simple omission to a premeditated act. The traffic control center cannot timely monitor all the cameras installed on the roads to trace and pursue those traffic violators. Modern vehicles are equipped and controlled by several sensors in order to support monitoring and reporting those kind of behaviors which some time end up in severe causalities. However, such applications within the vehicle environment need to provide security guaranties. In this paper, we address the limitation of previous work and present a secure and privacy preserving protocol for traffic violation reporting system in vehicular cloud environment which enables the vehicles to report the traffic violators, thus the roadside clouds collect those information which can be used as evidence to pursue the traffic violators. Particularly, we provide the unlinkability security property within the proposed protocol which also offers lightweight computational overhead compared to previous protocol. We consider the concept of conditional privacy preserving authentication without pairing operations to provide security and privacy for the reporting vehicles.

Intrusion Detection for IoT Traffic in Edge Cloud (에지 클라우드 환경에서 사물인터넷 트래픽 침입 탐지)

  • Shin, Kwang-Seong;Youm, Sungkwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.138-140
    • /
    • 2020
  • As the IoT is applied to home and industrial networks, data generated by the IoT is being processed at the cloud edge. Intrusion detection function is very important because it can be operated by invading IoT devices through the cloud edge. Data delivered to the edge network in the cloud environment is traffic at the application layer. In order to determine the intrusion of the packet transmitted to the IoT, the intrusion should be detected at the application layer. This paper proposes the intrusion detection function at the application layer excluding normal traffic from IoT intrusion detection function. As the proposed method, we obtained the intrusion detection result by decision tree method and explained the detection result for each feature.

On the Seasonal Prediction of Traffic Accidents in Relation to the Weather Elements in Pusan Area (기상요소에 따른 부산지역 계절별 교통사고 변화와 예측에 관한 연구)

  • 이동인;이문철;유철환;이상구;이철기
    • Journal of Environmental Science International
    • /
    • v.9 no.6
    • /
    • pp.469-474
    • /
    • 2000
  • The traffic accidents in large cities such as Pusan metropolitan city have been increased every year due to increasing of vehicles numbers as well as the gravitation of the population. In addition to the carelessness of drivers, many meteorological factors have a great influence on the traffic accidents. Especially, the number of traffic accidents is governed by precipitation, visibility, cloud amounts temperature, etc. In this study, we have analyzed various data of meteorological factors from 1992 to 1997 and determined the standardized values for contributing to each traffic accident. Using the relationship between meteorological factors(visibility, precipitation, relative humidity and cloud amounts) and the total automobile mishaps, and experimental prediction formula for their traffic accident rates was seasonally obtained at Pusan city in 1997. Therefore, these prediction formulas at each meteorological factor may by used to predict the seasonal traffic accident numbers and contributed to estimate the variation of its value according to the weather condition it Pusan city.

  • PDF

A Study of Mobile Edge Computing System Architecture for Connected Car Media Services on Highway

  • Lee, Sangyub;Lee, Jaekyu;Cho, Hyeonjoong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5669-5684
    • /
    • 2018
  • The new mobile edge network architecture has been required for an increasing amount of traffic, quality requirements, advanced driver assistance system for autonomous driving and new cloud computing demands on highway. This article proposes a hierarchical cloud computing architecture to enhance performance by using adaptive data load distribution for buses that play the role of edge computing server. A vehicular dynamic cloud is based on wireless architecture including Wireless Local Area Network and Long Term Evolution Advanced communication is used for data transmission between moving buses and cars. The main advantages of the proposed architecture include both a reduction of data loading for top layer cloud server and effective data distribution on traffic jam highway where moving vehicles require video on demand (VOD) services from server. Through the description of real environment based on NS-2 network simulation, we conducted experiments to validate the proposed new architecture. Moreover, we show the feasibility and effectiveness for the connected car media service on highway.

A Study on the Development of Operator Training Methods for a Cloud-Based Vessel Traffic Service Platform (클라우드 기반 차세대 VTS 통합플랫폼 도입에 따른 교육과정 개발에 관한 연구)

  • Min Jung;Jeong-Ho Kim;Eun-Kyu Jang;Sek-Han Bae
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.7
    • /
    • pp.939-949
    • /
    • 2023
  • In South Korea, a cloud-based vessel traffic service (Cloud VTS) system integrating the fourth industrial revolution technologies such as cloud and AI is currently under development in contrast to the existing VTS systems. A pilot center for at Busan VTS is being established based on differentiated technology and operational programs. The roles of operators and maintenance personnel who operate the innovative Cloud VTS system must be redefined. Additionally, a demand exists for the development of new educational programs to ensure the smooth operation of the Cloud VTS. Therefore, this study introduces the development details of a Cloud VTS system and explores educational strategies aimed at operators and maintenance personnel to ensure its safe operation.

The Road Traffic Sign Recognition and Automatic Positioning for Road Facility Management (도로시설물 관리를 위한 교통안전표지 인식 및 자동위치 취득 방법 연구)

  • Lee, Jun Seok;Yun, Duk Geun
    • International Journal of Highway Engineering
    • /
    • v.15 no.1
    • /
    • pp.155-161
    • /
    • 2013
  • PURPOSES: This study is to develop a road traffic sign recognition and automatic positioning for road facility management. METHODS: In this study, we installed the GPS, IMU, DMI, camera, laser sensor on the van and surveyed the car position, fore-sight image, point cloud of traffic signs. To insert automatic position of traffic sign, the automatic traffic sign recognition S/W developed and it can log the traffic sign type and approximate position, this study suggests a methodology to transform the laser point-cloud to the map coordinate system with the 3D axis rotation algorithm. RESULTS: Result show that on a clear day, traffic sign recognition ratio is 92.98%, and on cloudy day recognition ratio is 80.58%. To insert exact traffic sign position. This study examined the point difference with the road surveying results. The result RMSE is 0.227m and average is 1.51m which is the GPS positioning error. Including these error we can insert the traffic sign position within 1.51m CONCLUSIONS: As a result of this study, we can automatically survey the traffic sign type, position data of the traffic sign position error and analysis the road safety, speed limit consistency, which can be used in traffic sign DB.