• Title/Summary/Keyword: Cloud environment

Search Result 1,323, Processing Time 0.022 seconds

User Customized Web Interface Design Optimized for SaaS-based Digital Library System -focusing on the LinkSaaS Website- (SaaS 기반 전자도서관 시스템에 최적화된 사용자 맞춤형 웹 인터페이스 디자인 -LinkSaaS 웹사이트를 중심으로-)

  • Oh, Hyoung-Yong;Min, Byoung-Won;Oh, Yong-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.5
    • /
    • pp.148-156
    • /
    • 2011
  • Recently, an introduction of the cloud computing causes rapid changes in every aspect of the internet environments including hardware, operating systems, applications, and their services. As the cloud computing environment based on SaaS are being developed to a form in which web platform technology and web cloud services are converged. The digital library system also has been being developed to a service model optimized to SaaS based cloud computing environment, which are different from ASP technology. From the web interface point of view, user customization of the SaaS based cloud computing environment is the most important fact. Therefore, this research work suggests a customized web interface considering usability and accessibility so that enterprises and individual users can be able to do an effortless internet browsing under the cloud computing environment. For this purpose, usability tests were carried out as the user customized web interface design were developed and applied to the LinkSaaS website. This paper work lastly presents an UI environment on which customized interface design for individual users can be formulated.

Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment (신뢰실행환경기반 엣지컴퓨팅 환경에서의 암호문에 대한 효율적 프라이버시 보존 데이터 중복제거)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.9
    • /
    • pp.305-316
    • /
    • 2022
  • With the flood of digital data owing to the Internet of Things and big data, cloud service providers that process and store vast amount of data from multiple users can apply duplicate data elimination technique for efficient data management. The user experience can be improved as the notion of edge computing paradigm is introduced as an extension of the cloud computing to improve problems such as network congestion to a central cloud server and reduced computational efficiency. However, the addition of a new edge device that is not entirely reliable in the edge computing may cause increase in the computational complexity for additional cryptographic operations to preserve data privacy in duplicate identification and elimination process. In this paper, we propose an efficiency-improved duplicate data elimination protocol while preserving data privacy with an optimized user-edge-cloud communication framework by utilizing a trusted execution environment. Direct sharing of secret information between the user and the central cloud server can minimize the computational complexity in edge devices and enables the use of efficient encryption algorithms at the side of cloud service providers. Users also improve the user experience by offloading data to edge devices, enabling duplicate elimination and independent activity. Through experiments, efficiency of the proposed scheme has been analyzed such as up to 78x improvements in computation during data outsourcing process compared to the previous study which does not exploit trusted execution environment in edge computing architecture.

IBC-Based Entity Authentication Protocols for Federated Cloud Systems

  • Cao, Chenlei;Zhang, Ru;Zhang, Mengyi;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1291-1312
    • /
    • 2013
  • Cloud computing changes the service models of information systems and accelerates the pace of technological innovation of consumer electronics. However, it also brings new security issues. As one of the important foundations of various cloud security solutions, entity authentication is attracting increasing interest of many researchers. This article proposes a layered security architecture to provide a trust transmission mechanism among cloud systems maintained by different organizations. Based on the security architecture, four protocols are proposed to implement mutual authentication, data sharing and secure data transmission in federated cloud systems. The protocols not only can ensure the confidentiality of the data transferred, but also resist man-in-the-middle attacks and masquerading attacks. Additionally, the security properties of the four protocols have been proved by S-pi calculus formal verification. Finally, the performance of the protocols is investigated in a lab environment and the feasibility of the security architecture has been verified under a hybrid cloud system.

Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing

  • Li, Haoxing;Li, Fenghua;Song, Chenggen;Yan, Yalong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2719-2735
    • /
    • 2015
  • In the cloud environment, users pay more attentions to their data security since all of them are stored in the cloud server. Researchers have proposed many mutual authentication schemes for the access control of the cloud server by using the smart card to protect the sensitive data. However, few of them can resist from the smart card lost problem and provide both of the forward security and the backward security. In this paper, we propose a novel authentication scheme for cloud computing which can address these problems and also provide the anonymity for the user. The trick we use is using the password, the smart card and the public key technique to protect the processes of the user's authentication and key exchange. Under the Elliptic Curve Diffie-Hellman (ECDH) assumption, it is provably secure in the random oracle model. Compared with the existing smart card based authentication schemes in the cloud computing, the proposed scheme can provide better security degree.

Competitive Advantage Elements in the Global Cloud Game Market (글로벌 클라우드 게임 시장에서의 경쟁우위 요소)

  • Rhee, Chang Seop;Rhee, Hyunjung;Kim, Sehwan
    • Journal of Korea Game Society
    • /
    • v.20 no.5
    • /
    • pp.3-12
    • /
    • 2020
  • The introduction of 5G greatly reduced service traffic speed and capacity problems. In this communication environment, the market demand for cloud games is increasing, and cloud games are considered as a replacement for mobile games in the future. This study explains the changes in the game industry, and the characteristics and market status of cloud games. Next, this study suggests competitive advantage elements for cloud games market. We expect that this study could help make decisions related to policy support for the cloud game market and industry.

Reinforcement Learning Approach for Resource Allocation in Cloud Computing (클라우드 컴퓨팅 환경에서 강화학습기반 자원할당 기법)

  • Choi, Yeongho;Lim, Yujin;Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.653-658
    • /
    • 2015
  • Cloud service is one of major challenges in IT industries. In cloud environment, service providers predict dynamic user demands and provision resources to guarantee the QoS to cloud users. The conventional prediction models guarantee the QoS to cloud user, but don't guarantee profit of service providers. In this paper, we propose a new resource allocation mechanism using Q-learning algorithm to provide the QoS to cloud user and guarantee profit of service providers. To evaluate the performance of our mechanism, we compare the total expense and the VM provisioning delay with the conventional techniques with real data.

A Framework for Design and Evaluation of Robot Industry Business Model based on Cloud Services in an Aging Society (고령화 사회에서 클라우드 서비스 기반 로봇산업 비즈니스 모델의 설계 및 평가를 위한 프레임워크)

  • Jeon, Hangoo;Seo, Kwang-Kyu
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.441-446
    • /
    • 2013
  • It is expected to change for convergence robotic services according to emergence new communication technologies and cloud computing, etc. Robot industry is evaluated the biggest filed that is possibility to convergence of new IT technology. This paper presents a design framework for robot industry business model on cloud services through the cloud computing and environment of robot industry, features and provide valuable of cloud-based robot service, analysis of customer needs and value chain in the market in an aging society. In addition, we describe the evolution path of the proposed business model in terms of technology development and market. This study is expected to help that cloud and robot services companies when establishing new service model development and marketing strategy.

A Task Scheduling Strategy in Cloud Computing with Service Differentiation

  • Xue, Yuanzheng;Jin, Shunfu;Wang, Xiushuang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5269-5286
    • /
    • 2018
  • Task scheduling is one of the key issues in improving system performance and optimizing resource management in cloud computing environment. In order to provide appropriate services for heterogeneous users, we propose a novel task scheduling strategy with service differentiation, in which the delay sensitive tasks are assigned to the rapid cloud with high-speed processing, whereas the fault sensitive tasks are assigned to the reliable cloud with service restoration. Considering that a user can receive service from either local SaaS (Software as a Service) servers or public IaaS (Infrastructure as a Service) cloud, we establish a hybrid queueing network based system model. With the assumption of Poisson arriving process, we analyze the system model in steady state. Moreover, we derive the performance measures in terms of average response time of the delay sensitive tasks and utilization of VMs (Virtual Machines) in reliable cloud. We provide experimental results to validate the proposed strategy and the system model. Furthermore, we investigate the Nash equilibrium behavior and the social optimization behavior of the delay sensitive tasks. Finally, we carry out an improved intelligent searching algorithm to obtain the optimal arrival rate of total tasks and present a pricing policy for the delay sensitive tasks.

An Investigation of Cloud Computing and E-Learning for Educational Advancement

  • Ali, Ashraf;Alourani, Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.216-222
    • /
    • 2021
  • Advances in technology have given educators a tool to empower them to assist with developing the best possible human resources. Teachers at universities prefer to use more modern technological advances to help them educate their students. This opens up a necessity to research the capabilities of cloud-based learning services so that educational solutions can be found among the available options. Based on that, this essay looks at models and levels of deployment for the e-learning cloud architecture in the education system. A project involving educators explores whether gement Systems (LMS) can function well in a collaborative remote learning environment. The study was performed on how Blackboard was being used by a public institution and included research on cloud computing. This test examined how Blackboard Learn performs as a teaching tool and featured 60 participants. It is evident from the completed research that computers are beneficial to student education, especially in improving how schools administer lessons. Convenient tools for processing educational content are included as well as effective organizational strategies for educational processes and better ways to monitor and manage knowledge. In addition, this project's conclusions help highlight the advantages of rolling out cloud-based e-learning in higher educational institutions, which are responsible for creating the integrated educational product. The study showed that a shift to cloud computing can bring progress to educational material and substantial improvement to student academic outcomes, which is related to the increased use of better learning tools and methods.

Two-Stage Multichannel Architecture for Oyster Product Management System

  • Yang, Yeong-Yil
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.96-103
    • /
    • 2019
  • In this paper, we propose two-stage multichannel architecture for oyster product management system, called cloud stage and agent stage. There are two communication channels at each stage. In cloud stage, the embedded system in the smart scale communicates with the server through two channels, Ethernet or 3G/LTE mobile communication. In agent stage, PCs and smart phones called agents communicate with the server also through Internet and 3G/LTE mobile communication. Compared with previous system in which the amount of the oyster produced in oyster workplaces could be monitored only at the console of only one oyster main server, developed system makes it possible to monitor the amount of produced oyster at several PCs (or smart phones). In addition to the amount of oysters produced at all oyster workplaces the environment of oyster workplaces such as temperature and humidity can be monitored on agents to judge the freshness. Two-stage architecture with multiple channels makes it possible to monitor the amount of oyster product and environment of the oyster workplace at any place in real time.