• Title/Summary/Keyword: Cloud environment

검색결과 1,333건 처리시간 0.026초

DRM 클라우드 서비스를 위한 DRM Proxy 설계 및 구현 (Design and Implementation of DRM Proxy for DRM Cloud Service)

  • 이혜주;허창수;서창호;신상욱
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제2권12호
    • /
    • pp.553-560
    • /
    • 2013
  • 클라우드 컴퓨팅 기술과 스마트 장치 기술의 발전은 다양한 분야에서 그 영향력을 확대하고 있다. 콘텐츠 서비스에 있어서 콘텐츠를 안전하게 보호하기 위한 DRM(digital rights management) 기술은 매우 중요한 요소로 다양한 스마트 장치에서 시간 및 장소의 제약 없이 서비스를 제공하기 위해서는 DRM 기술 간의 상호 운용성(interoperability)을 해결해야 한다. 본 논문에서는 클라우드 환경에서 DRM 기능들을 서비스로 제공하는 DRM 클라우드를 연구하여 서로 다른 DRM 기술들을 서비스로 제공함으로써 상호 운용성을 해결하고자 한다. 즉, 서로 다른 DRM이 적용된 콘텐츠를 스마트 장치에서 사용하고자 할 때 DRM 클라우드로부터 해당 DRM 모듈과 기능들을 SaaS와 같은 서비스로 콘텐츠의 사용을 제어한다. 이를 위해 DRM 클라우드 사용자와 DRM 클라우드 간의 원활한 서비스 호출과 제공을 수행하는 중개자인 DRM Proxy의 기능과 구조를 정의하고 구현 결과를 기술한다.

Optimization of Data Placement using Principal Component Analysis based Pareto-optimal method for Multi-Cloud Storage Environment

  • Latha, V.L. Padma;Reddy, N. Sudhakar;Babu, A. Suresh
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.248-256
    • /
    • 2021
  • Now that we're in the big data era, data has taken on a new significance as the storage capacity has exploded from trillion bytes to petabytes at breakneck pace. As the use of cloud computing expands and becomes more commonly accepted, several businesses and institutions are opting to store their requests and data there. Cloud storage's concept of a nearly infinite storage resource pool makes data storage and access scalable and readily available. The majority of them, on the other hand, favour a single cloud because of the simplicity and inexpensive storage costs it offers in the near run. Cloud-based data storage, on the other hand, has concerns such as vendor lock-in, privacy leakage and unavailability. With geographically dispersed cloud storage providers, multicloud storage can alleviate these dangers. One of the key challenges in this storage system is to arrange user data in a cost-effective and high-availability manner. A multicloud storage architecture is given in this study. Next, a multi-objective optimization problem is defined to minimise total costs and maximise data availability at the same time, which can be solved using a technique based on the non-dominated sorting genetic algorithm II (NSGA-II) and obtain a set of non-dominated solutions known as the Pareto-optimal set.. When consumers can't pick from the Pareto-optimal set directly, a method based on Principal Component Analysis (PCA) is presented to find the best answer. To sum it all up, thorough tests based on a variety of real-world cloud storage scenarios have proven that the proposed method performs as expected.

Agent Based Information Security Framework for Hybrid Cloud Computing

  • Tariq, Muhammad Imran
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권1호
    • /
    • pp.406-434
    • /
    • 2019
  • In general, an information security approach estimates the risk, where the risk is to occur due to an unusual event, and the associated consequences for cloud organization. Information Security and Risk Management (ISRA) practices vary among cloud organizations and disciplines. There are several approaches to compare existing risk management methods for cloud organizations but their scope is limited considering stereo type criteria, rather than developing an agent based task that considers all aspects of the associated risk. It is the lack of considering all existing renowned risk management frameworks, their proper comparison, and agent techniques that motivates this research. This paper proposes Agent Based Information Security Framework for Hybrid Cloud Computing as an all-inclusive method including cloud related methods to review and compare existing different renowned methods for cloud computing risk issues and by adding new tasks from surveyed methods. The concepts of software agent and intelligent agent have been introduced that fetch/collect accurate information used in framework and to develop a decision system that facilitates the organization to take decision against threat agent on the basis of information provided by the security agents. The scope of this research primarily considers risk assessment methods that focus on assets, potential threats, vulnerabilities and their associated measures to calculate consequences. After in-depth comparison of renowned ISRA methods with ABISF, we have found that ISO/IEC 27005:2011 is the most appropriate approach among existing ISRA methods. The proposed framework was implemented using fuzzy inference system based upon fuzzy set theory, and MATLAB(R) fuzzy logic rules were used to test the framework. The fuzzy results confirm that proposed framework could be used for information security in cloud computing environment.

Softwarization of Cloud-based Real-Time Broadcast Channel System

  • Kwon, Myung-Kyu
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권9호
    • /
    • pp.25-32
    • /
    • 2017
  • In this paper, we propose the softwareization of broadcasting system. Recently, the topic of industry is the fourth industrial revolution. The fourth industrial revolution is evolving from physical to virtualization. The Industrial Revolution is based on IT technology. Artificial Intelligence (AI), Big Data, and the Internet of Things, which are famous for Alpha Go, are based on software. Among IT, software is the main driver of industrial terrain change. The systemization of software on the basis of cloud environment is proceeding rapidly. System development through softwarization can reduce time to market lead time, hardware cost reduction and manual operation compared to existing hardware system. By developing and implementing broadcasting system such as IPTV based on cloud, lead time for opening service compared to existing hardware system can be shortened by more than 90% and investment cost can be saved by about 40%. In addition, the area of the system can be reduced by 50%. In addition, efficiency can be improved between infrastructures, shortening of trouble handling and ease of maintenance. Finally, we can improve customer experience through rapid service opening.

Map Reduce-based P2P DBaaS Hub system

  • Jung, Yean-Woo;Lee, Jong-Yong;Jung, Kye-Dong
    • International journal of advanced smart convergence
    • /
    • 제5권1호
    • /
    • pp.16-22
    • /
    • 2016
  • The database integration is being emphasized to one way of the companies collaboration. To database integration, companies are use like one database what their own, it can be provided more efficient service to customer. However, there exist some difficulty to database integration. that is the database security and database heterogeneity problems. In this paper, we proposed the MapReduce based p2p DBaaS hub system to solve database heterogeneity problem. The proposed system provides an environment for companies in the P2P cloud to integrate a database of each other. The proposed system uses DBaaS Hub for a collection of data in the P2P cloud, and use MapReduce for integrating the collected data.

A Reliable Secure Storage Cloud and Data Migration Based on Erasure Code

  • Mugisha, Emmy;Zhang, Gongxuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권1호
    • /
    • pp.436-453
    • /
    • 2018
  • Storage cloud scheme, pushing data to the storage cloud poses much attention regarding data confidentiality. With encryption concept, data accessibility is limited because of encrypted data. To secure storage system with high access power is complicated due to dispersed storage environment. In this paper, we propose a hardware-based security scheme such that a secure dispersed storage system using erasure code is articulated. We designed a hardware-based security scheme with data encoding operations and migration capabilities. Using TPM (Trusted Platform Module), the data integrity and security is evaluated and achieved.

A Heuristic Time Sharing Policy for Backup Resources in Cloud System

  • Li, Xinyi;Qi, Yong;Chen, Pengfei;Zhang, Xiaohui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권7호
    • /
    • pp.3026-3049
    • /
    • 2016
  • Cloud computing promises high performance and cost-efficiency. However, most cloud infrastructures operate at a low utilization, which greatly adheres cost effectiveness. Previous works focus on seeking efficient virtual machine (VM) consolidation strategies to increase the utilization of virtual resources in production environment, but overlook the under-utilization of backup virtual resources. We propose a heuristic time sharing policy of backup VMs derived from the restless multi-armed bandit problem. The proposed policy achieves increasing backup virtual resources utilization and providing high availability. Both the results in simulation and prototype system experiments show that the traditional 1:1 backup provision can be extended to 1:M (M≫1) between the backup VMs and the service VMs, and the utilization of backup VMs can be enhanced significantly.

중소건설사를 위한 클라우드 컴퓨팅 기반 EHS 통합관리시스템 프레임워크 개발 (The Framework Development of Cloud Computing-based Integrated EHS Management System for Small and Medium Construction Companies)

  • 서광규
    • 대한안전경영과학회지
    • /
    • 제12권4호
    • /
    • pp.139-143
    • /
    • 2010
  • The small and medium construction companies are facing potential EHS(Environment, Health & Safety) of major accidents to cause casualties or a financial loss and increasing social responsibility. So, they have to voluntarily accomplish the EHS management system rather than passively with regard to EHS regulation. In this study, the framework of integrated EHS management system is developed based on cloud computing, and construction companies are to materialize self-regulation EHS process of construction workplace and to standardize the total EHS business process using the developed system. The proposed system also provides risk analysis, education/control and continuous improvement for EHS tasks and users can easily access the system on the web at a low price through cloud computing service. Eventually, the integrated system contributes to the managerial improvement by minimizing economic and physical loss caused by construction accidents.

방송 인프라의 클라우드 및 가상화 동향 (Trends of Cloud and Virtualization in Broadcast Infra)

  • 김순철;오혜주;임현정;현은희;최동준
    • 전자통신동향분석
    • /
    • 제34권3호
    • /
    • pp.23-33
    • /
    • 2019
  • Broadcast is evolving into media service aimed at user customization, personalization, and participation with high-quality broadcasting contents (4K/8K/AR/VR). A broadcast infrastructure is needed to engage with the competition for providing large-scaled media traffic process, platform performance for adaptive transcoding to diverse receivers, and intelligent service. Cloud service and virtualization in broadcast are becoming more valuable as the broadcasting environment changes and new high-level broadcasting services emerge. This document describes the examples of cloud and virtualization in the broadcast industry, and prospects the network virtualization of broadcast transmission infrastructure, especially terrestrial and cable networks.

에지 클라우드 환경에서 사물인터넷 트래픽 침입 탐지 (Intrusion Detection for IoT Traffic in Edge Cloud)

  • Shin, Kwang-Seong;Youm, Sungkwan
    • 한국정보통신학회논문지
    • /
    • 제24권1호
    • /
    • pp.138-140
    • /
    • 2020
  • As the IoT is applied to home and industrial networks, data generated by the IoT is being processed at the cloud edge. Intrusion detection function is very important because it can be operated by invading IoT devices through the cloud edge. Data delivered to the edge network in the cloud environment is traffic at the application layer. In order to determine the intrusion of the packet transmitted to the IoT, the intrusion should be detected at the application layer. This paper proposes the intrusion detection function at the application layer excluding normal traffic from IoT intrusion detection function. As the proposed method, we obtained the intrusion detection result by decision tree method and explained the detection result for each feature.