• Title/Summary/Keyword: Cloud computing systems

Search Result 594, Processing Time 0.03 seconds

Improvement of Smart Library Information Service System for SaaS-based Cloud Computing Service

  • Min, Byung-Won
    • International Journal of Contents
    • /
    • v.12 no.4
    • /
    • pp.23-30
    • /
    • 2016
  • For a library to be able provide information services and fulfill its function as a knowledge convergence center capable of responding to various information demands, the development of next-generation information systems based on the latest information and communication technology is needed. The development of mobile information services using portable devices such smart phones and tablet PCs and information systems which incorporate the concepts of cloud computing, SaaS (Software as a Service), annotation and Library2.0 is also required. This paper describes a library information system that utilizes collective intelligence and cloud computing. The information system developed for this study adopts the SaaS-based cloud computing service concept to cope with the shift in the mobile service paradigm in libraries and the explosion of electronic data. The strengths of such a conceptual model include the sharing of resources, support of multi-tenants, and the configuration and support of metadata. The user services are provided in the form of software on-demand. To test the performance of the developed system, the efficiency analysis and TTA certification test were conducted. The results of performance tests, It is encouraging that, at least up to 100MB, the job time is approximately linear and with only a moderate overhead of less than one second. The system also passed the level-3 or higher criteria in the certification test, which includes the SaaS maturity, performance and application program functions.

A Secure Identity Management System for Secure Mobile Cloud Computing (안전한 모바일 클라우드 컴퓨팅을 위한 ID 관리 시스템)

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.516-519
    • /
    • 2014
  • Cloud computing is an up-and-coming paradigm shift transforming computing models from a technology to a utility. However, security concerns related to privacy, confidentiality and trust are among the issues that threaten the wide deployment of cloud computing. With the advancement of ubiquitous mobile-based clients, the ubiquity of the model suggests a higher integration in our day to day life and this leads to a rise in security issues. To strengthen the access control of cloud resources, most organizations are acquiring Identity Management Systems (IDM). This paper presents one of the most popular IDM systems, specifically OAuth, working in the scope of Mobile Cloud Computing which has many weaknesses in its protocol flow. OAuth is a Delegated Authorization protocol, and not an Authentication protocol and this is where the problem lies. This could lead to very poor security decisions around authentication when the basic OAuth flow is adhered to. OAuth provides an access token to a client, so that it can access a protected resource, based on the permission of the resource owner. Many researchers have opted to implement OpenlD alongside OAuth so as to solve this problem. But OpenlD similarly has several security flows. This paper presents scenarios of how insecure implementations of OAuth can be abused maliciously. We incorporate an authentication protocol to verify the identities before authorization is carried out.

The Impact of the Introduction of Cloud Computing-Based Collaborative Tools on Work and Life: Based on the S-O-R Framework (클라우드 컴퓨팅 기반 협업툴의 도입이 일과 삶에 미치는 영향: S-O-R 프레임워크를 중심으로)

  • Jung, Su In;Yang, Sung Byung;Kang, Eun Kyung
    • The Journal of Information Systems
    • /
    • v.32 no.2
    • /
    • pp.153-176
    • /
    • 2023
  • Purpose As non-face-to-face work environments become common due to COVID-19, interest in online collaboration tools that can communicate smoothly without time and space limitations is continuously increasing. Most of the prior studies are about the introduction, use intention, and satisfaction of cloud computing-based collaboration tools, and studies on the effects of collaboration tools on work-life balance and quality of life are somewhat lacking. Therefore, in this study, the characteristics of cloud computing-based collaboration tools were derived, and the effect on job satisfaction during work and job stress outside of working hours was confirmed. Design/methodology/approach This study applied the S-O-R framework and conducted an online survey of office workers who used cloud computing-based collaboration tools for more than three months. Hypotheses were tested using structural equations. Findings As a result of the analysis, among the characteristics of collaboration tools, stability, usefulness, and interoperability had higher job satisfaction as more stimuli were applied. In addition, the higher the job satisfaction during work, the higher the job performance, work-life balance, and quality of life.

An Operation of Cloud System for the Centralization Services of Business Documents (업무문서 중앙화 서비스 제공을 위한 클라우드 시스템 운영방안)

  • Yoon, Yong;Kim, Younsung
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.309-324
    • /
    • 2014
  • This case study focuses on the preparing a guide for the plan to the companies that want to build a business document system for the centralized services under the cloud computing. Total 3 Operating companies with regard to cloud computing issues are introduced for this purpose. Analyzing the usage and development direction of the selected companies were performed to set up plans. Through this in-depth needs of the user's point of view for the management of business documents, The necessary improvements in the process of collaboration and document sharing were derived. Business documents centralized service plans were proposed based on cloud computing models. Practical experiences of the companies were helpful to present the details of the operational strategy and operational plans. Especially with minimal staff input and verification process, Sample method for the automatic generating of the new document file name is introduced. A test bed before operating the enterprise-wide system were presented with information that is to be considered when building systems.

A Two-Step Job Scheduling Algorithm Based on Priority for Cloud Computing

  • Kim, Jeongwon
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.4
    • /
    • pp.235-240
    • /
    • 2013
  • Cloud systems are popular computing environment because they can provide easy access to computing resources for users as well as efficient use of resources for companies. The resources of cloud computing are heterogeneous and jobs have various characteristics. One such issue is effective job scheduling. Scheduling in the cloud system may be defined as a multiple criteria decision model. To address this issue, this paper proposes a priority-based two-step job scheduling algorithm. On the first level, jobs are classified based on preference. Resources are dedicated to a job if a deadline failure would cause severe results or critical business losses. In case of only minor discomfort or slight functional impairment, the job is scheduled using a best effort approach. On the second level, jobs are allocated to adequate resources through their priorities that are calculated by the analytic hierarchic process model. We then analyze the proposed algorithm and make a scheduling example to confirm its efficiency.

A Novel Architecture for Mobile Crowd and Cloud computing for Health care

  • kumar, Rethina;Ganapathy, Gopinath;Kang, Jeong-Jin
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.226-232
    • /
    • 2018
  • The rapid pace of growth in internet usage and rich mobile applications and with the advantage of incredible usage of internet enabled mobile devices the Green Mobile Crowd Computing will be the suitable area to research combining with cloud services architecture. Our proposed Framework will deploy the eHealth among various health care sectors and pave a way to create a Green Mobile Application to provide a better and secured way to access the Products/ Information/ Knowledge, eHealth services, experts / doctors globally. This green mobile crowd computing and cloud architecture for healthcare information systems are expected to lower costs, improve efficiency and reduce error by also providing better consumer care and service with great transparency to the patient universally in the field of medical health information technology. Here we introduced novel architecture to use of cloud services with crowd sourcing.

A Study of Mobile Edge Computing System Architecture for Connected Car Media Services on Highway

  • Lee, Sangyub;Lee, Jaekyu;Cho, Hyeonjoong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5669-5684
    • /
    • 2018
  • The new mobile edge network architecture has been required for an increasing amount of traffic, quality requirements, advanced driver assistance system for autonomous driving and new cloud computing demands on highway. This article proposes a hierarchical cloud computing architecture to enhance performance by using adaptive data load distribution for buses that play the role of edge computing server. A vehicular dynamic cloud is based on wireless architecture including Wireless Local Area Network and Long Term Evolution Advanced communication is used for data transmission between moving buses and cars. The main advantages of the proposed architecture include both a reduction of data loading for top layer cloud server and effective data distribution on traffic jam highway where moving vehicles require video on demand (VOD) services from server. Through the description of real environment based on NS-2 network simulation, we conducted experiments to validate the proposed new architecture. Moreover, we show the feasibility and effectiveness for the connected car media service on highway.

Five Forces Model of Computational Power: A Comprehensive Measure Method

  • Wu, Meixi;Guo, Liang;Yang, Xiaotong;Xie, Lina;Wang, Shaopeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2239-2256
    • /
    • 2022
  • In this paper, a model is proposed to comprehensively evaluate the computational power. The five forces model of computational power solves the problem that the measurement units of different indexes are not unified in the process of computational power evaluation. It combines the bidirectional projection method with TOPSIS method. This model is more scientific and effective in evaluating the comprehensive situation of computational power. Lastly, an example shows the validity and practicability of the model.

Performance Comparison of Tilera Many-core and x86-64 Multi-core Systems (Tilera 다중코어와 x86-64 멀티코어 시스템의 성능 비교)

  • Choi, HeeSeok;Lyoo, TaeMuk;Park, JiSu;Jung, Daeyong;Lim, JongBeom;Lee, Jungha;Suh, Teaweon;Yu, Heonchang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.102-105
    • /
    • 2013
  • 최근 멀티코어 시스템은 컴퓨터의 성능을 향상시키기 위해 더 많은 수의 코어를 연결시키는 다중코어 시스템으로 발전하고 있다. 그러나 멀티코어 시스템은 사용하는 코어의 아키텍처 구조와 개수에 따라 성능 차이가 발생한다. 이에, 본 논문에서는 코어의 아키텍처 구조와 코어의 개수가 성능에 미치는 영향을 분석하기 위해 Tilera의 다중코어 시스템인 Tile-Gx36, TilePro64와 Intel의 x86-64 멀티코어 시스템인 Core i5의 성능을 비교하였다. 코어의 사용률이 늘어남에 따른 성능차이를 알아보기 위해 벤치마크 프로그램인 SPEC CPU 2006을 이용하여 각 시스템 내 단일코어의 성능을 측정하고, OpenMP 벤치마크 프로그램을 이용하여 시스템의 모든 코어를 사용했을 때의 입력 데이터 크기에 따른 성능을 측정하였다. 실험 결과, 단일코어에서의 성능은 정수형 데이터를 사용하여 측정하였을 경우 Core i5가 Tile-Gx36보다 약 87%, 실수형 데이터를 사용하여 측정하였을 경우 약 94% 더 빠른 것으로 나타났다. 그러나 코어 전체를 이용한 성능 결과에서는 정수형 배열 크기가 이상일 경우 Tile-Gx36 시스템의 처리 속도가 Core i5 시스템 보다 평균적으로 약 7.6배 향상됨을 확인할 수 있었다. 따라서 Tilera의 다중코어 시스템은 클럭 속도와 아키텍처 구조의 영향으로 단일코어의 성능은 떨어지나, 병렬 처리를 이용한 고속연산에서는 성능이 향상된다고 할 수 있다.

How to Manage Cloud Risks Based on the BMIS Model

  • Song, Youjin;Pang, Yasheng
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.132-144
    • /
    • 2014
  • Information always comes with security and risk problems. There is the saying that, "The tall tree catches much wind," and the risks from cloud services will absolutely be more varied and more severe. Nowadays, handling these risks is no longer just a technology problem. So far, a good deal of literature that focuses on risk or security management and frameworks in information systems has already been submitted. This paper analyzes the causal risk factors in cloud environments through critical success factors, from a business perspective. We then integrated these critical success factors into a business model for information security by mapping out 10 principles related to cloud risks. Thus, we were able to figure out which aspects should be given more consideration in the actual transactions of cloud services, and were able to make a business-level and general-risk control model for cloud computing.