• 제목/요약/키워드: Cloud resources

검색결과 555건 처리시간 0.025초

Semantic Interoperability Framework for IAAS Resources in Multi-Cloud Environment

  • Benhssayen, Karima;Ettalbi, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • 제21권2호
    • /
    • pp.1-8
    • /
    • 2021
  • Cloud computing has proven its efficiency, especially after the increasing number of cloud services offered by a wide range of cloud providers, from different domains. Despite, these cloud services are mostly heterogeneous. Consequently, and due to the rising interest of cloud consumers to adhere to a multi-cloud environment instead of being locked-in to one cloud provider, the need for semantically interconnecting different cloud services from different cloud providers is a crucial and important task to ensure. In addition, considerable research efforts proposed interoperability solutions leading to different representation models of cloud services. In this work, we present our solution to overcome this limitation, precisely in the IAAS service model. This solution is a framework permitting the semantic interoperability of different IAAS resources in a multi-cloud environment, in order to assist cloud consumers to retrieve the cloud resource that meets specific requirements.

An Analysis of Spot Cloud in Cloud Computing

  • Mansoor, Usman;Mehmood, Usman;Khan, Faraz Idris;Kim, Ki-Hyung
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 춘계학술발표대회
    • /
    • pp.242-245
    • /
    • 2011
  • Cloud Computing is a fast developing domain in computer system architecture which enables dynamically scalable and virtualized resources to its users. Spot Cloud is the next evolutionary step in this field which allows the cloud computing resources to be treated as a market commodity. Cloud computing vendors will now be able to put their un used computational resources for sale using the singular access platform provided by Spot Cloud. Meanwhile customers will be able to buy/sell these resources according to their requirements. This paper analyzes the idea of Spot Cloud and the anticipated impact it will have on Cloud Computing globally. The paper also presents the risks and inherent barriers associated with this idea and how they might hinder the development of Spot Cloud to its full potential.

군집분석을 이용한 하이브리드 클라우드 컴퓨팅 환경에서의 시맨틱 클라우드 자원 추천 서비스 기법 (Semantic Cloud Resource Recommendation Using Cluster Analysis in Hybrid Cloud Computing Environment)

  • 안윤선;김윤희
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제4권9호
    • /
    • pp.283-288
    • /
    • 2015
  • 하이브리드 클라우드 컴퓨팅 환경에서 많은 과학자들이 과학 응용을 수행하고 있으나, 클라우드 컴퓨팅 서비스를 제공하는 각 회사들의 자원 표기법이 상이하고 복잡하여 사용에 어려움이 따르고, 응용에 적합한 클라우드 자원을 선택하는 것이 어렵다. 클라우드 서비스 간에 상호 호환성을 제공해주는 하이브리드 클라우드 환경에서의 표준화된 자원 명세 표기법이 필요하다. 과학자들은 기존에 자신들이 수행했던 자원이나 가장 좋은 성능의 자원에서만 수행하려는 경향이 있어, 비용, 시간을 효율적으로 수행하면서 응용에 적합하고, 기존의 실험과 유사하게 진행할 수 있는 자원을 추천해주는 서비스가 필요하다. 하이브리드 클라우드 서비스의 표준화를 위해 인터클라우드 프로젝트가 진행되고 있으나, 과학 응용 실험에 적합한 자원의 선택을 위해 필요한 클라우드 자원의 특성들을 나타내는 데 한계가 있다. 본 논문에서는 하이브리드 클라우드 환경에서 시맨틱 클라우드 자원 서비스를 제안한다. 통계 기법으로 과학 응용의 특징에 따라 응용에 적합한 클라우드 자원을 그룹으로 분류하고 분류된 유사한 클라우드 자원 그룹을 가지고 시맨틱 클라우드 자원 추천 서비스 기법을 제공한다. 제안한 알고리즘을 통해 시맨틱 클라우드 추천 서비스 기법을 제공하면, 효율적인 자원의 가용성과 비용으로 응용을 수행할 수 있고, 응용에 적합한 클라우드 자원을 추천할 수 있다.

An Efficient VM-Level Scaling Scheme in an IaaS Cloud Computing System: A Queueing Theory Approach

  • Lee, Doo Ho
    • International Journal of Contents
    • /
    • 제13권2호
    • /
    • pp.29-34
    • /
    • 2017
  • Cloud computing is becoming an effective and efficient way of computing resources and computing service integration. Through centralized management of resources and services, cloud computing delivers hosted services over the internet, such that access to shared hardware, software, applications, information, and all resources is elastically provided to the consumer on-demand. The main enabling technology for cloud computing is virtualization. Virtualization software creates a temporarily simulated or extended version of computing and network resources. The objectives of virtualization are as follows: first, to fully utilize the shared resources by applying partitioning and time-sharing; second, to centralize resource management; third, to enhance cloud data center agility and provide the required scalability and elasticity for on-demand capabilities; fourth, to improve testing and running software diagnostics on different operating platforms; and fifth, to improve the portability of applications and workload migration capabilities. One of the key features of cloud computing is elasticity. It enables users to create and remove virtual computing resources dynamically according to the changing demand, but it is not easy to make a decision regarding the right amount of resources. Indeed, proper provisioning of the resources to applications is an important issue in IaaS cloud computing. Most web applications encounter large and fluctuating task requests. In predictable situations, the resources can be provisioned in advance through capacity planning techniques. But in case of unplanned and spike requests, it would be desirable to automatically scale the resources, called auto-scaling, which adjusts the resources allocated to applications based on its need at any given time. This would free the user from the burden of deciding how many resources are necessary each time. In this work, we propose an analytical and efficient VM-level scaling scheme by modeling each VM in a data center as an M/M/1 processor sharing queue. Our proposed VM-level scaling scheme is validated via a numerical experiment.

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Jang, Eun-Gyeom
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권8호
    • /
    • pp.55-61
    • /
    • 2017
  • Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.

클라우드 컴퓨팅 서비스의 가용성 최적화를 위한 모델링 및 시뮬레이션 (A study of Modeling and Simulation for the Availability Optimization of Cloud Computing Service)

  • 장은영;박춘식
    • 한국시뮬레이션학회논문지
    • /
    • 제20권1호
    • /
    • pp.1-8
    • /
    • 2011
  • 클라우드 컴퓨팅은 장소나 장비에 제한 없이 네트워크를 통해 IT자원을 서비스 형태로 제공받을 수 있는 새로운 패러다임이다. 클라우드 컴퓨팅 환경은 데이터센터에 많은 IT자원이 집약된 형태로 효율적인 인프라구조를 위한 기술과 정책을 적용하여 시스템을 설계해야 한다. 즉, 클라우드 서비스를 효율적으로 제공하여 사용자의 요구를 만족시켜야 하며, 사업자는 불필요하게 낭비되는 자원으로 인한 손해가 없어야 한다. 그러나 최적 시스템을 구축하기 위해서는 서비스를 배포하기 전에 서비스 제공 성능과 자원 사용의 효율성을 예측할 수 있어야 한다. 본 논문에서는 이러한 클라우드 컴퓨팅 시스템 설계과정의 문제를 해결하기 위해 네트워크 환경에서의 클라우드 서비스 모델을 모델링하고 클라우드 서비스의 가용성 최적화를 위해 가용성 평가 지표를 산출하였다. 또한 클라우드 환경이 적용된 CloudSim 시뮬레이터를 이용해 클라우드 컴퓨팅 서비스 요구와 데이터센터 성능에 대한 가용성을 최적화하는 방법을 모색하였다.

Deep Learning Based Security Model for Cloud based Task Scheduling

  • Devi, Karuppiah;Paulraj, D.;Muthusenthil, Balasubramanian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권9호
    • /
    • pp.3663-3679
    • /
    • 2020
  • Scheduling plays a dynamic role in cloud computing in generating as well as in efficient distribution of the resources of each task. The principle goal of scheduling is to limit resource starvation and to guarantee fairness among the parties using the resources. The demand for resources fluctuates dynamically hence the prearranging of resources is a challenging task. Many task-scheduling approaches have been used in the cloud-computing environment. Security in cloud computing environment is one of the core issue in distributed computing. We have designed a deep learning-based security model for scheduling tasks in cloud computing and it has been implemented using CloudSim 3.0 simulator written in Java and verification of the results from different perspectives, such as response time with and without security factors, makespan, cost, CPU utilization, I/O utilization, Memory utilization, and execution time is compared with Round Robin (RR) and Waited Round Robin (WRR) algorithms.

The Security Architecture for Secure Cloud Computing Environment

  • Choi, Sang-Yong;Jeong, Kimoon
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권12호
    • /
    • pp.81-87
    • /
    • 2018
  • Cloud computing is a computing environment in which users borrow as many IT resources as they need to, and use them over the network at any point in time. This is the concept of leasing and using as many IT resources as needed to lower IT resource usage costs and increase efficiency. Recently, cloud computing is emerging to provide stable service and volume of data along with major technological developments such as the Internet of Things, artificial intelligence and big data. However, for a more secure cloud environment, the importance of perimeter security such as shared resources and resulting secure data storage and access control is growing. This paper analyzes security threats in cloud computing environments and proposes a security architecture for effective response.

Dynamic Cloud Resource Reservation Model Based on Trust

  • Qiang, Jiao-Hong;Ning, Ding-Wan;Feng, Tian-Jun;Ping, Li-Wei
    • Journal of Information Processing Systems
    • /
    • 제14권2호
    • /
    • pp.377-395
    • /
    • 2018
  • Aiming at the problem of service reliability in resource reservation in cloud computing environments, a model of dynamic cloud resource reservation based on trust is proposed. A domain-specific cloud management architecture is designed in which resources are divided into different management domains according to the types of service for easier management. A dynamic resource reservation mechanism (DRRM) is used to test users' reservation requests and reserve resources for users. According to user preference, several resources are chosen to be candidate resources by fuzzy cluster analysis. The fuzzy evaluation method and a two-way trust evaluation mechanism are adopted to improve the availability and credibility of the model. An analysis and simulation experiments show that this model can increase the flexibility of resource reservation and improve user satisfaction.

A Two-Step Job Scheduling Algorithm Based on Priority for Cloud Computing

  • Kim, Jeongwon
    • Journal of information and communication convergence engineering
    • /
    • 제11권4호
    • /
    • pp.235-240
    • /
    • 2013
  • Cloud systems are popular computing environment because they can provide easy access to computing resources for users as well as efficient use of resources for companies. The resources of cloud computing are heterogeneous and jobs have various characteristics. One such issue is effective job scheduling. Scheduling in the cloud system may be defined as a multiple criteria decision model. To address this issue, this paper proposes a priority-based two-step job scheduling algorithm. On the first level, jobs are classified based on preference. Resources are dedicated to a job if a deadline failure would cause severe results or critical business losses. In case of only minor discomfort or slight functional impairment, the job is scheduled using a best effort approach. On the second level, jobs are allocated to adequate resources through their priorities that are calculated by the analytic hierarchic process model. We then analyze the proposed algorithm and make a scheduling example to confirm its efficiency.