• Title/Summary/Keyword: Cloud computing services

Search Result 635, Processing Time 0.033 seconds

Evaluation of Distributed Intrusion Detection System Based on MongoDB (MongoDB 기반의 분산 침입탐지시스템 성능 평가)

  • Han, HyoJoon;Kim, HyukHo;Kim, Yangwoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.12
    • /
    • pp.287-296
    • /
    • 2019
  • Due to the development and increased usage of Internet services such as IoT and cloud computing, a large number of packets are being generated on the Internet. In order to create a safe Internet environment, malicious data that may exist among these packets must be processed and detected quickly. In this paper, we apply MongoDB, which is specialized for unstructured data analysis and big data processing, to intrusion detection system for rapid processing of big data security events. In addition, building the intrusion detection system(IDS) using some of the private cloud resources which is the target of protection, elastic and dynamic reconfiguration of the IDS is made possible as the number of security events increase or decrease. In order to evaluate the performance of MongoDB - based IDS proposed in this paper, we constructed prototype systems of IDS based on MongoDB as well as existing relational database, and compared their performance. Moreover, the number of virtual machine has been increased to find out the performance change as the IDS is distributed. As a result, it is shown that the performance is improved as the number of virtual machine is increased to make IDS distributed in MongoDB environment but keeping the overall system performance unchanged. The security event input rate based on distributed MongoDB was faster as much as 60%, and distributed MongoDB-based intrusion detection rate was faster up to 100% comparing to the IDS based on relational database.

IoT Based Real-Time Indoor Air Quality Monitoring Platform for a Ventilation System (청정환기장치 최적제어를 위한 IoT 기반 실시간 공기질 모니터링 플랫폼 구현)

  • Uprety, Sudan Prasad;Kim, Yoosin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.6
    • /
    • pp.95-104
    • /
    • 2020
  • In this paper, we propose the real time indoor air quality monitoring and controlling platform on cloud using IoT sensor data such as PM10, PM2.5, CO2, VOCs, temperature, and humidity which has direct or indirect impact to indoor air quality. The system is connected to air ventilator to manage and optimize the indoor air quality. The proposed system has three main parts; First, IoT data collection service to measure, and collect indoor air quality in real time from IoT sensor network, Second, Big data processing pipeline to process and store the collected data on cloud platform and Finally, Big data analysis and visualization service to give real time insight of indoor air quality on mobile and web application. For the implication of the proposed system, IoT sensor kits are installed on three different public day care center where the indoor pollution can cause serious impact to the health and education of growing kids. Analyzed results are visualized on mobile and web application. The impact of ventilation system to indoor air quality is tested statistically and the result shows the proper optimization of indoor air quality.

Design Blockchain as a Service and Smart Contract with Secure Top-k Search that Improved Accuracy (정확도가 향상된 안전한 Top-k 검색 기반 서비스형 블록체인과 스마트 컨트랙트 설계)

  • Hobin Jang;Ji Young Chun;Ik Rae Jeong;Geontae Noh
    • Journal of Internet Computing and Services
    • /
    • v.24 no.5
    • /
    • pp.85-96
    • /
    • 2023
  • With advance of cloud computing technology, Blockchain as a Service of Cloud Service Provider has been utilized in various areas such as e-Commerce and financial companies to manage customer history and distribution history. However, if users' search history, purchase history, etc. are to be utilized in a BaaS in areas such as recommendation algorithms and search engine development, the users' search queries will be exposed to the company operating the BaaS, and privacy issues will be occured. Z. Guan et al. ensure the unlinkability between users' search query and search result using searchable encryption, and based on the inner product similarity, they select Top-k results that are highly relevant to the users' search query. However, there is a problem that the Top-k results selection may be not possible due to ties of inner product similarity, and BaaS over cloud is not considered. Therefore, this paper solve the problem of Z. Guan et al. using cosine similarity, so we improve accuracy of search result. And based on this, we design a BaaS with secure Top-k search that improved accuracy. Furthermore, we design a smart contracts that preserve privacy of users' search and obtain Top-k search results that are highly relevant to the users' search.

A Prototype Implementation of Component Modules for Web-based SAR Data Processing System (웹 기반 SAR 자료처리 시스템 구성모듈 시험구현)

  • Kang, Sang-Goo;Lee, Ki-Won
    • Korean Journal of Remote Sensing
    • /
    • v.28 no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Nowadays, most remote sensing image processing systems are on client-based ones. But in the view of information technology, a web-based system is predominant, being closely related to cloud computing and services. The web-based system in remote sensing is somewhat limited in the area of data sharing or dissemination, but it is necessary to extend. This study is to implement a web-based system and its component modules for SAR data processing. First, the previous cases dealt with both web computing and SAR information are investigated. InSAR information processing and concerned modules for a web-based system among SAR research domains are the main points in this work. It is expected that this approach contributes to the first attempt to link web computing technology such as HTML5 and satellite image processing.

Malware Behavior Analysis based on Mobile Virtualization (모바일 가상화기반의 악성코드 행위분석)

  • Kim, Jang-Il;Lee, Hee-Seok;Jung, Yong-Gyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.1-7
    • /
    • 2015
  • As recent smartphone is used around the world, all of the subscribers of the mobile communication is up to 47.7% about 24 million people. Smartphone has a vulnerability to security, and security-related incidents are increased in damage with the smartphone. However, precautions have been made, rather than analysis of the infection of most of the damage occurs after the damaged except for the case of the expert by way of conventional post-countermeasure. In this paper, we implement a mobile-based malware analysis systems apply a virtualization technology. It is designed to analyze the behavior through it. Virtualization is a technique that provides a logical resources to the guest by abstracting the physical characteristics of computing resources. The virtualization technology can improve the efficiency of resources by integrating with cloud computing services to servers, networks, storage, and computing resources to provide a flexible. In addition, we propose a system that can be prepared in advance to buy a security from a user perspective.

Development of an intelligent edge computing device equipped with on-device AI vision model (온디바이스 AI 비전 모델이 탑재된 지능형 엣지 컴퓨팅 기기 개발)

  • Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.17-22
    • /
    • 2022
  • In this paper, we design a lightweight embedded device that can support intelligent edge computing, and show that the device quickly detects an object in an image input from a camera device in real time. The proposed system can be applied to environments without pre-installed infrastructure, such as an intelligent video control system for industrial sites or military areas, or video security systems mounted on autonomous vehicles such as drones. The On-Device AI(Artificial intelligence) technology is increasingly required for the widespread application of intelligent vision recognition systems. Computing offloading from an image data acquisition device to a nearby edge device enables fast service with less network and system resources than AI services performed in the cloud. In addition, it is expected to be safely applied to various industries as it can reduce the attack surface vulnerable to various hacking attacks and minimize the disclosure of sensitive data.

A Study on the remote acuisition of HejHome Air Cloud artifacts (스마트 홈 헤이 홈 Air의 클라우드 아티팩트 원격 수집 방안 연구)

  • Kim, Ju-eun;Seo, Seung-hee;Cha, Hae-seong;Kim, Yeok;Lee, Chang-hoon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.69-78
    • /
    • 2022
  • As the use of Internet of Things (IoT) devices has expanded, digital forensics coverage of the National Police Agency has expanded to smart home areas. Accordingly, most of the existing studies conducted to acquire smart home platform data were mainly conducted to analyze local data of mobile devices and analyze network perspectives. However, meaningful data for evidence analysis is mainly stored on cloud storage on smart home platforms. Therefore, in this paper, we study how to acquire stored in the cloud in a Hey Home Air environment by extracting accessToken of user accounts through a cookie database of browsers such as Microsoft Edge, Google Chrome, Mozilia Firefox, and Opera, which are recorded on a PC when users use the Hey Home app-based "Hey Home Square" service. In this paper, the it was configured with smart temperature and humidity sensors, smart door sensors, and smart motion sensors, and artifacts such as temperature and humidity data by date and place, device list used, and motion detection records were collected. Information such as temperature and humidity at the time of the incident can be seen from the results of the artifact analysis and can be used in the forensic investigation process. In addition, the cloud data acquisition method using OpenAPI proposed in this paper excludes the possibility of modulation during the data collection process and uses the API method, so it follows the principle of integrity and reproducibility, which are the principles of digital forensics.

Design and Implementation of HPC Job Management Framework for Computational Scientific Simulation (계산과학 시뮬레이션을 위한 HPC 작업 관리 프레임워크의 설계 및 구현)

  • Yu, Jung-Lok;Kim, Han-Gi;Byun, Hee-Jung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.554-557
    • /
    • 2016
  • Recently, supercomputer has been increasingly adopted as a computing environment for scientific simulation as well as education, healthcare and national defence. Especially, supercomputing system with heterogeneous computing resources is gaining resurgence of interest as a next-generation problem solving environment, allowing theoretical and/or experimental research in various fields to be free of time and spatial limits. However, traditional supercomputing services have only been handled through a simple form of command-line based console, which leads to the critical limit of accessibility and usability of heterogeneous computing resources. To address this problem, in this paper, we provide the design and implementation of web-based HPC (High Performance Computing) job management framework for computational scientific simulation. The proposed framework has highly extensible design principles, providing the abstraction interfaces of job scheduler (as well as bundle scheduler plug-ins for LoadLeveler, Sun Grid Engine, OpenPBS scheduler) in order to easily incorporate the broad spectrum of heterogeneous computing resources such as cluster, computing cloud and grid. We also present the detailed specification of HTTP standard based RESTful endpoints, which manage simulation job's life-cycles such as job creation, submission, control and status monitoring, etc., enabling various 3rd-party applications to be newly created on top of the proposed framework.

  • PDF

Design and Implementation of the Graphical Relational Searching for Folksonomy Tags in the Participational Architecture of Web 2.0 (웹2.0의 참여형 아키텍쳐 환경에서 그래픽 기반 포크소노미 태그 연관 검색의 설계 및 구현)

  • Kim, Woon-Yong;Park, Seok-Gyu
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.1-10
    • /
    • 2007
  • Recently, the web 2.0 services which appear by exponential extension of the Internet can be expressed with the changes in the quality of structural evolution and in the quantity of increasing users. The structural base is in user participational architecture, the web 2.0 services such as Blog, UCC, SNS(Social Networking Service), Mash-up, Long tail, etc. play a important role in organization of web, and grouping and searching of user participational data in web 2.0 is broadly used by folksonomy. Folksonomy is a new form that categorizes by tags, not classic taxonomy skill. it is made by user participation. Searching based on tag is now done by a simple text or a tag cloud method. But searching to consider and express the relations among each tags is imperfect yet. Thus, this paper provides the relational searching based on tags using the relational graph of tags. It should improve the trust of the searching and provide the convenience of the searching.

  • PDF

Policy Design to Vitalize Spectrum Sharing Ecosystem : A System Dynamics Approach (인과지도에 기반한 주파수공유 생태계 활성화 정책 설계)

  • Song, Hee Seok;Kim, Jae Kyung;Kim, Taehan
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.109-122
    • /
    • 2014
  • Demand of spectrum resource is tremendously increasing recently and this trend will continues in the future due to the wide spread of IT services based on cloud computing and Internet of Things technology and as well as smart devices. Recently, spectrum sharing technology has drawn attention to the spectrum policy makers as a promising way to overcome the shortage problem of scarce spectrum resource. To succeed in commercialization of spectrum sharing technology, it is necessary to prospect the future business ecosystem of spectrum sharing and develop appropriate policies and laws at the same time along with the advance of spectrum sharing technology. The purpose of this paper is to analyze casual relationships between enablers in future business ecosystem of spectrum sharing and propose policies to vitalize spectrum sharing ecosystem based on a system dynamics causal map proposed in the previous research. With the causal map and system dynamics method, it is possible to analyze feedback loops exist in the business ecosystem of spectrum sharing and build policies which optimize positive dynamics in business ecosystem of spectrum sharing. As a result, policy leverages were found in four areas; spectrum supply, spectrum demand, spectrum quality and technology, and spectrum transaction cost. For those policy leverages, 13 policies were identified and intervention timing for each policy was discussed. Finally, the promotion policies of government and market participants to vitalize spectrum sharing ecosystem were discussed.