• Title/Summary/Keyword: Cloud computing systems

검색결과 587건 처리시간 0.026초

MediaCloud: A New Paradigm of Multimedia Computing

  • Hui, Wen;Lin, Chuang;Yang, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권4호
    • /
    • pp.1153-1170
    • /
    • 2012
  • Multimedia computing has attracted considerable attention with the rapid growth in the development and application of multimedia technology. Current studies have attempted to support the increasing resource consumption and computational overhead caused by multimedia computing. In this paper, we propose $MediaCloud$, a new multimedia computing paradigm that integrates the concept of cloud computing in handling multimedia applications and services effectively and efficiently. $MediaCloud$ faces the following key challenges: heterogeneity, scalability, and multimedia Quality of Service (QoS) provisioning. To address the challenges above, first, a layered architecture of $MediaCloud$, which can provide scalable multimedia services, is presented. Then, $MediaCloud$ technologies by which users can access multimedia services from different terminals anytime and anywhere with QoS provisioning are introduced. Finally, $MediaCloud$ implementation and applications are presented, and media retrieval and delivery are adopted as case studies to demonstrate the feasibility of the proposed $MediaCloud$ design.

데이터센터 클라우드관리시스템 구축 사례 연구 : G-Cloud 적용사례 중심으로 (A Case Study on the Establishment of Cloud Management System in Data Centers: Focusing onG-Cloud Application Case)

  • 장희돈;김승천
    • 융합정보논문지
    • /
    • 제9권9호
    • /
    • pp.33-37
    • /
    • 2019
  • 본 '클라우드컴퓨팅 발전 및 이용자 보호에 관한 법률'이 시행됨에 따라 이에 맞추어 국내 공공 및 민간기업에서 클라우드 컴퓨팅이라는 새로운 패러다임에 대한 관심이 고조되고 있다. 국내 클라우드 시장 선점을 위해서는 국내 통신사, SI 및 SW업체 등이 시장에 진출하고 있으나 글로벌 기업에 비해 경쟁력이 낮다. 따라서 국내기업은 국내시장에 특화된 SaaS 제품 개발을 하고 글로벌 기업에 앞선 IaaS 시장 선점을 위해 노력해야 할 것이다. 본 논문에서는 클라우드 컴퓨팅 개념과 G-클라우드의 클라우드관리시스템(G-CMS) 구축사례를 통해 향후 관련 산업의 발전방향 전망에 대해 알아본다. G-CMS는 이기종 Unix 가상화 시스템을 종합적으로 관리하는 최초의 시스템으로 볼 수 있습니다. 또한 G-CMS는 데이터 센터에서 이기종 가상화 시스템을 관리함으로써 비용을 절감할 수 있습니다.

확장된 UTAUT 모형에 기반한 개인차원에서의 클라우드 컴퓨팅 수용 (Cloud Computing Acceptance at Individual Level Based on Extended UTAUT)

  • 정철호;남수현
    • 디지털융복합연구
    • /
    • 제12권1호
    • /
    • pp.287-294
    • /
    • 2014
  • 클라우드 컴퓨팅은 새로운 컴퓨팅 기술이고 조직에서는 정보자원을 전략적으로 관리할 수 있게 하는 수단을 제공한다. 사용자 관점에서 클라우드 컴퓨팅은 원격의 어플리케이션에 접근하고, 데이터를 저장하며, 개인간 협업을 지원하는 등의 이슈를 수반한다. 조직에서 클라우드 컴퓨팅 효과적으로 적용되기 위해서는 우선 사용자의 채택이 전제조건이다. 본 논문에서 우리는 개인차원의 클라우드 컴퓨팅 수용을 설명하기 위하여 기존의 UTAUT 모형을 수정하고 확장한 모형을 제안하고, 설문 데이터를 이용하여 이 모형의 타당성을 검정한다.

Virtual Machine Placement Methods using Metaheuristic Algorithms in a Cloud Environment - A Comprehensive Review

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.147-158
    • /
    • 2022
  • Cloud Computing offers flexible, on demand, ubiquitous resources for cloud users. Cloud users are provided computing resources in a virtualized environment. In order to meet the growing demands for computing resources, data centres contain a large number of physical machines accommodating multiple virtual machines. However, cloud data centres cannot utilize their computing resources to their total capacity. Several policies have been proposed for improving energy proficiency and computing resource utilization in cloud data centres. Virtual machine placement is an effective method involving efficient mapping of virtual machines to physical machines. However, the availability of many physical machines accommodating multiple virtual machines in a data centre has made the virtual machine placement problem a non deterministic polynomial time hard (NP hard) problem. Metaheuristic algorithms have been widely used to solve the NP hard problems of multiple and conflicting objectives, such as the virtual machine placement problem. In this context, we presented essential concepts regarding virtual machine placement and objective functions for optimizing different parameters. This paper provides a taxonomy of metaheuristic algorithms for the virtual machine placement method. It is followed by a review of prominent research of virtual machine placement methods using meta heuristic algorithms and comparing them. Finally, this paper provides a conclusion and future research directions in virtual machine placement of cloud computing.

An Effective Multivariate Control Framework for Monitoring Cloud Systems Performance

  • Hababeh, Ismail;Thabain, Anton;Alouneh, Sahel
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권1호
    • /
    • pp.86-109
    • /
    • 2019
  • Cloud computing systems' performance is still a central focus of research for determining optimal resource utilization. Running several existing benchmarks simultaneously serves to acquire performance information from specific cloud system resources. However, the complexity of monitoring the existing performance of computing systems is a challenge requiring an efficient and interactive user directing performance-monitoring system. In this paper, we propose an effective multivariate control framework for monitoring cloud systems performance. The proposed framework utilizes the hardware cloud systems performance metrics, collects and displays the performance measurements in terms of meaningful graphics, stores the graphical information in a database, and provides the data on-demand without requiring a third party software. We present performance metrics in terms of CPU usage, RAM availability, number of cloud active machines, and number of running processes on the selected machines that can be monitored at a high control level by either using a cloud service customer or a cloud service provider. The experimental results show that the proposed framework is reliable, scalable, precise, and thus outperforming its counterparts in the field of monitoring cloud performance.

SSO based Security Management in Cloud Computing Environment

  • Jing, Si Da;Jung, Young-Min;Chung, Mok-Dong
    • 정보처리학회지
    • /
    • 제17권2호
    • /
    • pp.18-29
    • /
    • 2010
  • In this paper, we surveyed SSO based security management including the knowledge domain of the area of cloud and its relevant components. Cloud computing refers to the delivery of software and other technology services over the Internet by a service provider. SSO refers to the ability to log on to a single security system once, rather than logging on separately to multiple security systems. Existing SSO solutions in cloud computing environment suggest several methods. SSO-based security Issues illustrate these key items in cloud computing environment such as risks and security vulnerabilities of SSO. SSO supports for multiple and different domains in cloud computing environment.

  • PDF

A Secure Cloud Computing System by Using Encryption and Access Control Model

  • Mahmood, Ghassan Sabeeh;Huang, Dong Jun;Jaleel, Baidaa Abdulrahman
    • Journal of Information Processing Systems
    • /
    • 제15권3호
    • /
    • pp.538-549
    • /
    • 2019
  • Cloud computing is the concept of providing information technology services on the Internet, such as software, hardware, networking, and storage. These services can be accessed anywhere at any time on a pay-per-use basis. However, storing data on servers is a challenging aspect of cloud computing. This paper utilizes cryptography and access control to ensure the confidentiality, integrity, and proper control of access to sensitive data. We propose a model that can protect data in cloud computing. Our model is designed by using an enhanced RSA encryption algorithm and a combination of role-based access control model with extensible access control markup language (XACML) to facilitate security and allow data access. This paper proposes a model that uses cryptography concepts to store data in cloud computing and allows data access through the access control model with minimum time and cost for encryption and decryption.

A Security Protection Framework for Cloud Computing

  • Zhu, Wenzheng;Lee, Changhoon
    • Journal of Information Processing Systems
    • /
    • 제12권3호
    • /
    • pp.538-547
    • /
    • 2016
  • Cloud computing is a new style of computing in which dynamically scalable and reconfigurable resources are provided as a service over the internet. The MapReduce framework is currently the most dominant programming model in cloud computing. It is necessary to protect the integrity of MapReduce data processing services. Malicious workers, who can be divided into collusive workers and non-collusive workers, try to generate bad results in order to attack the cloud computing. So, figuring out how to efficiently detect the malicious workers has been very important, as existing solutions are not effective enough in defeating malicious behavior. In this paper, we propose a security protection framework to detect the malicious workers and ensure computation integrity in the map phase of MapReduce. Our simulation results show that our proposed security protection framework can efficiently detect both collusive and non-collusive workers and guarantee high computation accuracy.

Task Scheduling and Resource Management Strategy for Edge Cloud Computing Using Improved Genetic Algorithm

  • Xiuye Yin;Liyong Chen
    • Journal of Information Processing Systems
    • /
    • 제19권4호
    • /
    • pp.450-464
    • /
    • 2023
  • To address the problems of large system overhead and low timeliness when dealing with task scheduling in mobile edge cloud computing, a task scheduling and resource management strategy for edge cloud computing based on an improved genetic algorithm was proposed. First, a user task scheduling system model based on edge cloud computing was constructed using the Shannon theorem, including calculation, communication, and network models. In addition, a multi-objective optimization model, including delay and energy consumption, was constructed to minimize the sum of two weights. Finally, the selection, crossover, and mutation operations of the genetic algorithm were improved using the best reservation selection algorithm and normal distribution crossover operator. Furthermore, an improved legacy algorithm was selected to deal with the multi-objective problem and acquire the optimal solution, that is, the best computing task scheduling scheme. The experimental analysis of the proposed strategy based on the MATLAB simulation platform shows that its energy loss does not exceed 50 J, and the time delay is 23.2 ms, which are better than those of other comparison strategies.

하이브리드 클라우드 컴퓨팅 환경에 적합한 인증시스템 설계 (Design of An Authentication System Proper for Hybrid Cloud Computing System)

  • 이극;지재원;천현우;이규원
    • 융합보안논문지
    • /
    • 제11권6호
    • /
    • pp.31-36
    • /
    • 2011
  • 클라우드 컴퓨팅은 자원을 편리하고 효율적으로 사용하기 위해 만들어진 시스템이다. 본 논문에서는 PKI와 ID_PW 그리고 지리정보 조합을 이용한 2-factor 인증방법을 제안한다. 제안한 방법은 하이브리드 클라우드 환경에 적합하며 자원과 데이터를 보다 안전하게 관리할 수 있다.