• Title/Summary/Keyword: Cloud computing services

Search Result 630, Processing Time 0.024 seconds

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.55-61
    • /
    • 2017
  • Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.

A Study on the Factors Affecting the Adoption of Cloud Computing Service:Focused on the Technology Acceptance Model(TAM) and Resistance (개인사용자 중심의 클라우드서비스의 수용에 영향을 미치는 요인에 관한 연구:기술수용모형(TAM)과 저항을 중심으로)

  • Park, Yoonseo;Kim, Yongsik
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.1-23
    • /
    • 2013
  • This study examines whether key characteristics of cloud computing services would affect the intention of use for personalized cloud computing services. The research model was generated based on Technology Acceptance Model (TAM) with resistance variable, and verified statistically by undertaking a survey about the perception of personal users. As the results of this analysis, we could find the structural relationship among the factors affecting adoption of the cloud computing service. We found that the expectation of ubiquity as a representative function of the cloud computing service meaningfully affected the perceived ease of use and resistance, and that the relativeness with existing services also meaningfully affected the perceived ease of use, but not the resistance. In addition, the moderating effects of use experience in the path leading from the perceived ease of use and resistance to the intention of use were identified. This study will provide diverse implications for the companies providing personalized cloud computing services.

Design and Implementation of Multi-Cloud Service Common Platform (멀티 클라우드 서비스 공통 플랫폼 설계 및 구현)

  • Kim, Sooyoung;Kim, Byoungseob;Son, Seokho;Seo, Jihoon;Kim, Yunkon;Kang, Dongjae
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.1
    • /
    • pp.75-94
    • /
    • 2021
  • The 4th industrial revolution needs a fusion of artificial intelligence, robotics, the Internet of Things (IoT), edge computing, and other technologies. For the fusion of technologies, cloud computing technology can provide flexible and high-performance computing resources so that cloud computing can be the foundation technology of new emerging services. The emerging services become a global-scale, and require much higher performance, availability, and reliability. Public cloud providers already provide global-scale services. However, their services, costs, performance, and policies are different. Enterprises/ developers to come out with a new inter-operable service are experiencing vendor lock-in problems. Therefore, multi-cloud technology that federatively resolves the limitations of single cloud providers is required. We propose a software platform, denoted as Cloud-Barista. Cloud-Barista is a multi-cloud service common platform for federating multiple clouds. It makes multiple cloud services as a single service. We explain the functional architecture of the proposed platform that consists of several frameworks, and then discuss the main design and implementation issues of each framework. To verify the feasibility of our proposal, we show a demonstration which is to create 18 virtual machines on several cloud providers, combine them as a single resource, and manage it.

System Access Control Technique for Secure Cloud Computing

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.67-76
    • /
    • 2019
  • Along with the diversification of digital content services using wired/wireless networks, the market for the construction of base systems is growing rapidly. Cloud computing services are recognized for a reasonable cost of service and superior system operations. Cloud computing is convenient as far as system construction and maintenance are concerned; however, owing to the security risks associated with the system construction of actual cloud computing service, the ICT(Information and Communications Technologies) market is lacking regardless of its many advantages. In this paper, we conducted an experiment on a cloud computing security enhancement model to strengthen the security aspect of cloud computing and provide convenient services to the users. The objective of this study is to provide secure services for system operation and management while providing convenient services to the users. For secure and convenient cloud computing, a single sign-on (SSO) technique and a system access control technique are proposed. For user authentication using SSO, a security level is established for each user to facilitate the access to the system, thereby designing the system in such a manner that the rights to access resources of the accessed system are not abused. Furthermore, using a user authentication ticket, various systems can be accessed without a reauthorization process. Applying the security technique to protect the entire process of requesting, issuing, and using a ticket against external security threats, the proposed technique facilitates secure cloud computing service.

An Analysis of Economic Effects of The Cloud Computing Industry (산업연관분석을 이용한 클라우드 컴퓨팅 산업의 경제적 파급효과 분석)

  • Kim, Dong Wook;Ban, Seung Hyun;Leem, Choon Seong
    • Journal of Information Technology Services
    • /
    • v.17 no.3
    • /
    • pp.37-51
    • /
    • 2018
  • Recently, cloud computing market is growing geometrically in both private and public area, and many global companies in various domains have developed and provided cloud computing services. In such situation, Korean government made multiple plans for domestic cloud computing industry. However, most research institutes have focused on market size and status information, which makes actual effectiveness of cloud computing service hard to recognize. In this study, we define cloud computing Industry by rearranging Input-Output table published by the Bank of Korea to use Input-Output Analysis. The Input-Output Analysis was devised in 1963 by Leontief and it is used in many fields of study until now. It produces various coefficients that are able to identify production-inducing effect, value-added effect, labor-inducing effect, front and rear chain effect. The analysis results show that production-inducing effect, front and rear chain effect of cloud computing industry is low compared to other industries. However, cloud computing Industry possesses relatively high value-added effect and labor-inducing effect. It is because industry magnitude of cloud computing is smaller than other industries such as manufacturing, chemical industries. The economic effects of the cloud computing industry are not remarkable, but this result is significant to emerging markets and industries and presents the fresh way of analyzing cloud computing research field.

A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion (Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1041-1051
    • /
    • 2012
  • Attack on Cloud Computing, an intensive service solution using network infrastructure recently released, generates service breakdown or intrusive incidents incapacitating developmental platforms, web-based software, or resource services. Therefore, it is needed to conduct research on security for the operational information of three kinds of services (3S': laaS, PaaS, SaaS) supported by the Cloud Computing system and also generated data from the illegal attack on service blocking. This paper aims to build a system providing optimal services as a 4-stage defensive method through the test on the attack and defense of Cloud Computing services. It is a defense policy that conducts 4-stage, orderly and phased access control as follows: controlling the initial access to the network, controlling virtualization services, classifying services for support, and selecting multiple routes. By dispersing the attacks and also monitoring and analyzing to control the access by stage, this study performs defense policy realization and analysis and tests defenses by the types of attack. The research findings will be provided as practical foundational data to realize Cloud Computing service-based defense policy.

Analysis of Cloud Service Providers

  • Lee, Yo-Seob
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.315-320
    • /
    • 2021
  • Currently, cloud computing is being used as a technology that greatly changes the IT field. For many businesses, many cloud services are available in the form of custom, reliable, and cost-effective web applications. Most cloud service providers provide functions such as IoT, machine learning, AI services, blockchain, AR & VR, mobile services, and containers in addition to basic cloud services that support the scalability of processors, memory, and storage. In this paper, we will look at the most used cloud service providers and compare the services provided by the cloud service providers.

A Study on the Authentication of Digital Content in Cloud Computing Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.99-106
    • /
    • 2022
  • In this paper, we proposes digital content management technology in a cloud computing environment. proposes digital content management technology in a cloud computing environment. Computing services using networks are basic infrastructure services that cannot be missed in the era of the 4th Industrial Revolution. Financial services, digital content services, and industrial and home network services using smartphones are changing from services in the local area to a cloud service environment where the entire service is possible. Therefore, this study proposed a system to safely support digital content services suitable for cloud computing environments. The proposed system provides convenience and safety for users to access the system, protects the copyright of digital content authors, and provides a secure digital content distribution and management system. The purpose of this study is to stabilize and revitalize the digital content market by providing a digital content distribution structure suitable for the cloud computing environment.

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

Analysis of Influence Factors on the Intention to Use Personal Cloud Computing (개인용 클라우드 컴퓨팅 사용에 미치는 영향요인 분석)

  • Ryu, Jae Hong;Moon, Hye Young;Choi, Jinho
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.319-335
    • /
    • 2013
  • Cloud computing allows users to access software or specific programs that support the cloud platform through an information communicating device that can connect to the internet anywhere or anytime. Also, the cloud architecture not only reduces the expenses of IT infrastructure construction and maintenance, but also speeds up processing and mobility, which leads to a significant ease of use. In spite of the advantages of cloud computing, previous studies have been centered on case studies of the execution, advantages, and problems of cloud computing. In contrast, empirical research on individual cloud computing up till now is very insufficient. Thus, the research aims to create a model of an individual user's perspective and verify validation. This study reveals types of influence that characteristics can have on an individual user's intention to use, by searching the characteristics that the individual user recognizes on cloud computing services. The results are as follows:first, the characteristics of cloud computing indicates a significant influence on usage intention. Second, all characteristics in cloud computing, accessibility, reliability, perceived ease of use, and fusibility, are confirmed in providing significant influences in shaping social influence forms. Third, social influence has a significant influence on usage intention.