• 제목/요약/키워드: Cloud computing systems

검색결과 591건 처리시간 0.03초

Public Key Encryption with Equality Test for Heterogeneous Systems in Cloud Computing

  • Elhabob, Rashad;Zhao, Yanan;Sella, Iva;Xiong, Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권9호
    • /
    • pp.4742-4770
    • /
    • 2019
  • Cloud computing provides a broad range of services like operating systems, hardware, software and resources. Availability of these services encourages data owners to outsource their intensive computations and massive data to the cloud. However, considering the untrusted nature of cloud server, it is essential to encrypt the data before outsourcing it to the cloud. Unfortunately, this leads to a challenge when it comes to providing search functionality for encrypted data located in the cloud. To address this challenge, this paper presents a public key encryption with equality test for heterogeneous systems (PKE-ET-HS). The PKE-ET-HS scheme simulates certificateless public encryption with equality test (CLE-ET) with the identity-based encryption with equality test (IBE-ET). This scheme provides the authorized cloud server the right to actuate the equivalence of two messages having their encryptions performed under heterogeneous systems. Basing on the random oracle model, we construct the security of our proposed scheme under the bilinear Diffie-Hellman (BDH) assumption. Eventually, we evaluate the size of storage, computation complexities, and properties with other related works and illustrations indicate good performance from our scheme.

클라우드 컴퓨팅 기반의 도서관 서비스 도입방안에 관한 연구 (A Study on the Introduction of Library Services Based on Cloud Computing)

  • 김용
    • 한국비블리아학회지
    • /
    • 제23권3호
    • /
    • pp.57-84
    • /
    • 2012
  • 정형, 비정형의 정보자원의 폭발적인 증가에 따른 빅 데이터 시대의 도래와 함께, 도서관에 있어서 정보자원의 효과적인 저장, 관리 및 보존을 위한 새로운 방법을 요구하고 있다. 또한 디지털 환경에서 도서관 간의 협업의 필요성은 지속적으로 높아져 가고 있다. 이와 같이 도서관을 둘러싼 변화와 도전에 대한 효과적인 해결방안으로써 클라우드 컴퓨팅(cloud computing)에 대한 관심이 높아져 가고 있다. 본 연구에서는 도서관에서의 클라우드 컴퓨팅 도입을 위한 방안을 제시하는 것을 목적으로 하고 있다. 이를 위하여 기존 도서관 시스템에 대한 현황 및 문제점에 대한 분석을 위하여 문헌조사를 수행하였다. 또한, 클라우드 컴퓨팅 도입을 위한 고려사항, 기대효과, 단계별 전략 및 시나리오를 제안하였다. 그리고 현재 도서관 분야에서 클라우드 컴퓨팅을 도입한 사례에 대한 조사 및 분석을 기반으로 클라우드 컴퓨팅 모델에 따른 도서관 적용 분야 및 접근 전략을 제안하였다. 본 연구에서 제안하고 있는 단계별 접근방법을 통하여 클라우드 컴퓨팅 도입에 따른 시간과 노력을 절감할 수 있으며 도입효과를 극대화 할 수 있을 것이다.

Deep Learning Based Security Model for Cloud based Task Scheduling

  • Devi, Karuppiah;Paulraj, D.;Muthusenthil, Balasubramanian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권9호
    • /
    • pp.3663-3679
    • /
    • 2020
  • Scheduling plays a dynamic role in cloud computing in generating as well as in efficient distribution of the resources of each task. The principle goal of scheduling is to limit resource starvation and to guarantee fairness among the parties using the resources. The demand for resources fluctuates dynamically hence the prearranging of resources is a challenging task. Many task-scheduling approaches have been used in the cloud-computing environment. Security in cloud computing environment is one of the core issue in distributed computing. We have designed a deep learning-based security model for scheduling tasks in cloud computing and it has been implemented using CloudSim 3.0 simulator written in Java and verification of the results from different perspectives, such as response time with and without security factors, makespan, cost, CPU utilization, I/O utilization, Memory utilization, and execution time is compared with Round Robin (RR) and Waited Round Robin (WRR) algorithms.

인지된 위험과 신뢰가 Cloud Computing 사용의도에 미치는 영향 : 모바일 Cloud Computing을 중심으로 (The Effect of Perceived Risk and Trust on Users' Acceptance of Cloud Computing : Mobile Cloud Computing)

  • 김준우;김용구
    • 산업경영시스템학회지
    • /
    • 제35권3호
    • /
    • pp.70-76
    • /
    • 2012
  • This research tested how the perceived risk and the trust affect the usage intention of the cloud computing. To this end, this research setups a research model and tests it with the statistic tools. In order to build the model, TAM (Technology Acceptance Model) and UTAUT (Unified Theory of Acceptance and Use of Technology) were employed and, the factors such as the perceived risk, the trust and the intention of the cloud computing use were derived. This research finds that the perceived risk does not affect the intention of usage. Also the perceived risk has the negative effect for the trust. Thus this research has the following suggestions.

모바일 클라우드 컴퓨팅 서비스를 위한 위성영상 병렬 정보처리 성능 예비실험 (Preliminary Performance Testing of Geo-spatial Image Parallel Processing in the Mobile Cloud Computing Service)

  • 강상구;이기원;김용승
    • 대한원격탐사학회지
    • /
    • 제28권4호
    • /
    • pp.467-475
    • /
    • 2012
  • 클라우드 컴퓨팅 서비스는 경제성, 확장성, 보안성, 공유성, 접근성 등에서 특장점이 있기 때문에 단순한 사무용 시스템에서 전문적 과학정보처리까지 여러 분야에서 활용되고 있다. 그러나 공간정보 분야, 특히 원격탐사 분야에서는 연구나 기술 개발 단계가 아직 초기 수준이다. 이번 연구에서는 기존 연구에서 구축한 스마트폰 위성영상 정보처리 시스템을 아마존 웹 서비스와 연계된 모바일 클라우드 컴퓨팅 환경으로 이동하고 연산 성능 향상을 위해 병렬처리 프로그래밍 기법을 적용하였다. 앞으로 모바일 클라우드 컴퓨팅 서비스에 대한 산업적 수요와 관련 기술개발 사례가 증가할 것이므로 이 연구에서는 주로 영상처리 기능에 대한 성능 측정 실험을 우선적으로 수행하였다. 모바일 클라우드 컴퓨팅 환경의 운영이나 서비스 방식이 다양한 데, 이번 연구에서 적용된 실험 조건에서는 클라우드 서버가 단일 서버 방식에 비하여 성능이 우수한 것으로 나타났다. 이 연구는 모바일 클라우드를 위성영상정보처리와 연계하기 위한 예비 연구이다.

Dynamic Task Scheduling Via Policy Iteration Scheduling Approach for Cloud Computing

  • Hu, Bin;Xie, Ning;Zhao, Tingting;Zhang, Xiaotong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권3호
    • /
    • pp.1265-1278
    • /
    • 2017
  • Dynamic task scheduling is one of the most popular research topics in the cloud computing field. The cloud scheduler dynamically provides VM resources to variable cloud tasks with different scheduling strategies in cloud computing. In this study, we utilized a valid model to describe the dynamic changes of both computing facilities (such as hardware updating) and request task queuing. We built a novel approach called Policy Iteration Scheduling (PIS) to globally optimize the independent task scheduling scheme and minimize the total execution time of priority tasks. We performed experiments with randomly generated cloud task sets and varied the performance of VM resources using Poisson distributions. The results show that PIS outperforms other popular schedulers in a typical cloud computing environment.

A Classification-Based Virtual Machine Placement Algorithm in Mobile Cloud Computing

  • Tang, Yuli;Hu, Yao;Zhang, Lianming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권5호
    • /
    • pp.1998-2014
    • /
    • 2016
  • In recent years, cloud computing services based on smart phones and other mobile terminals have been a rapid development. Cloud computing has the advantages of mass storage capacity and high-speed computing power, and it can meet the needs of different types of users, and under the background, mobile cloud computing (MCC) is now booming. In this paper, we have put forward a new classification-based virtual machine placement (CBVMP) algorithm for MCC, and it aims at improving the efficiency of virtual machine (VM) allocation and the disequilibrium utilization of underlying physical resources in large cloud data center. By simulation experiments based on CloudSim cloud platform, the experimental results show that the new algorithm can improve the efficiency of the VM placement and the utilization rate of underlying physical resources.

Study of Danger-Theory-Based Intrusion Detection Technology in Virtual Machines of Cloud Computing Environment

  • Zhang, Ruirui;Xiao, Xin
    • Journal of Information Processing Systems
    • /
    • 제14권1호
    • /
    • pp.239-251
    • /
    • 2018
  • In existing cloud services, information security and privacy concerns have been worried, and have become one of the major factors that hinder the popularization and promotion of cloud computing. As the cloud computing infrastructure, the security of virtual machine systems is very important. This paper presents an immune-inspired intrusion detection model in virtual machines of cloud computing environment, denoted I-VMIDS, to ensure the safety of user-level applications in client virtual machines. The model extracts system call sequences of programs, abstracts them into antigens, fuses environmental information of client virtual machines into danger signals, and implements intrusion detection by immune mechanisms. The model is capable of detecting attacks on processes which are statically tampered, and is able to detect attacks on processes which are dynamically running. Therefore, the model supports high real time. During the detection process, the model introduces information monitoring mechanism to supervise intrusion detection program, which ensures the authenticity of the test data. Experimental results show that the model does not bring much spending to the virtual machine system, and achieves good detection performance. It is feasible to apply I-VMIDS to the cloud computing platform.

SD-MTD: Software-Defined Moving-Target Defense for Cloud-System Obfuscation

  • Kang, Ki-Wan;Seo, Jung Taek;Baek, Sung Hoon;Kim, Chul Woo;Park, Ki-Woong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권3호
    • /
    • pp.1063-1075
    • /
    • 2022
  • In recent years, container techniques have been broadly applied to cloud computing systems to maximize their efficiency, flexibility, and economic feasibility. Concurrently, studies have also been conducted to ensure the security of cloud computing. Among these studies, moving-target defense techniques using the high agility and flexibility of cloud-computing systems are gaining attention. Moving-target defense (MTD) is a technique that prevents various security threats in advance by proactively changing the main attributes of the protected target to confuse the attacker. However, an analysis of existing MTD techniques revealed that, although they are capable of deceiving attackers, MTD techniques have practical limitations when applied to an actual cloud-computing system. These limitations include resource wastage, management complexity caused by additional function implementation and system introduction, and a potential increase in attack complexity. Accordingly, this paper proposes a software-defined MTD system that can flexibly apply and manage existing and future MTD techniques. The proposed software-defined MTD system is designed to correctly define a valid mutation range and cycle for each moving-target technique and monitor system-resource status in a software-defined manner. Consequently, the proposed method can flexibly reflect the requirements of each MTD technique without any additional hardware by using a software-defined approach. Moreover, the increased attack complexity can be resolved by applying multiple MTD techniques.

Service Oriented Cloud Computing Trusted Evaluation Model

  • Jiao, Hongqiang;Wang, Xinxin;Ding, Wanning
    • Journal of Information Processing Systems
    • /
    • 제16권6호
    • /
    • pp.1281-1292
    • /
    • 2020
  • More and more cloud computing services are being applied in various fields; however, it is difficult for users and cloud computing service platforms to establish trust among each other. The trust value cannot be measured accurately or effectively. To solve this problem, we design a service-oriented cloud trust assessment model using a cloud model. We also design a subjective preference weight allocation (SPWA) algorithm. A flexible weight model is advanced by combining SPWA with the entropy method. Aiming at the fuzziness and subjectivity of trust, the cloud model is used to measure the trust value of various cloud computing services. The SPWA algorithm is used to integrate each evaluation result to obtain the trust evaluation value of the entire cloud service provider.