• Title/Summary/Keyword: Cloud resources

Search Result 561, Processing Time 0.024 seconds

GPU Resource Contention Management Technique for Simultaneous GPU Tasks in the Container Environments with Share the GPU (GPU를 공유하는 컨테이너 환경에서 GPU 작업의 동시 실행을 위한 GPU 자원 경쟁 관리기법)

  • Kang, Jihun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.10
    • /
    • pp.333-344
    • /
    • 2022
  • In a container-based cloud environment, multiple containers can share a graphical processing unit (GPU), and GPU sharing can minimize idle time of GPU resources and improve resource utilization. However, in a cloud environment, GPUs, unlike CPU or memory, cannot logically multiplex computing resources to provide users with some of the resources in an isolated form. In addition, containers occupy GPU resources only when performing GPU operations, and resource usage is also unknown because the timing or size of each container's GPU operations is not known in advance. Containers unrestricted use of GPU resources at any given point in time makes managing resource contention very difficult owing to where multiple containers run GPU tasks simultaneously, and GPU tasks are handled in black box form inside the GPU. In this paper, we propose a container management technique to prevent performance degradation caused by resource competition when multiple containers execute GPU tasks simultaneously. Also, this paper demonstrates the efficiency of container management techniques that analyze and propose the problem of degradation due to resource competition when multiple containers execute GPU tasks simultaneously through experiments.

NDynamic Framework for Secure VM Migration over Cloud Computing

  • Rathod, Suresh B.;Reddy, V. Krishna
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.476-490
    • /
    • 2017
  • In the centralized cloud controlled environment, the decision-making and monitoring play crucial role where in the host controller (HC) manages the resources across hosts in data center (DC). HC does virtual machine (VM) and physical hosts management. The VM management includes VM creation, monitoring, and migration. If HC down, the services hosted by various hosts in DC can't be accessed outside the DC. Decentralized VM management avoids centralized failure by considering one of the hosts from DC as HC that helps in maintaining DC in running state. Each host in DC has many VM's with the threshold limit beyond which it can't provide service. To maintain threshold, the host's in DC does VM migration across various hosts. The data in migration is in the form of plaintext, the intruder can analyze packet movement and can control hosts traffic. The incorporation of security mechanism on hosts in DC helps protecting data in migration. This paper discusses an approach for dynamic HC selection, VM selection and secure VM migration over cloud environment.

Comparison of Distributed and Parallel NGS Data Analysis Methods based on Cloud Computing

  • Kang, Hyungil;Kim, Sangsoo
    • International Journal of Contents
    • /
    • v.14 no.1
    • /
    • pp.34-38
    • /
    • 2018
  • With the rapid growth of genomic data, new requirements have emerged that are difficult to handle with big data storage and analysis techniques. Regardless of the size of an organization performing genomic data analysis, it is becoming increasingly difficult for an institution to build a computing environment for storing and analyzing genomic data. Recently, cloud computing has emerged as a computing environment that meets these new requirements. In this paper, we analyze and compare existing distributed and parallel NGS (Next Generation Sequencing) analysis based on cloud computing environment for future research.

Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing

  • Zhao, Zhiyuan;Wang, Jianhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3254-3272
    • /
    • 2017
  • With the development of wireless access technologies and the popularity of mobile intelligent terminals, cloud computing is expected to expand to mobile environments. Attribute-based encryption, widely applied in cloud computing, incurs massive computational cost during the encryption and decryption phases. The computational cost grows with the complexity of the access policy. This disadvantage becomes more serious for mobile devices because they have limited resources. To address this problem, we present an efficient verifiable outsourced scheme based on the bilinear group of prime order. The scheme is called the verifiable outsourced computation ciphertext-policy attribute-based encryption scheme (VOC-CP-ABE), and it provides a way to outsource intensive computing tasks during encryption and decryption phases to CSP without revealing the private information and leaves only marginal computation to the user. At the same time, the outsourced computation can be verified by two hash functions. Then, the formal security proofs of its (selective) CPA security and verifiability are provided. Finally, we discuss the performance of the proposed scheme with comparisons to several related works.

Efficient Task Allocation Technique Using Resources' State Transition Probability Table (Volunteer Computing에서의 자원 상태전이확률테이블을 이용한 효율적인 작업 할당 기법)

  • Lee, Jaehyeck;Song, Chunggun;Lee, Bongwoo;Yu, Heonchang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.70-71
    • /
    • 2017
  • Volunteer Computing은 대규모 프로젝트를 많은 분산된 데스크탑, 랩탑 PC, 그리고 스마트 폰과 같은 모바일 디바이스의 idle(유휴 상태)인 컴퓨팅 자원을 기여(Volunteer)받아 수행하는 환경이다. 그러나 기여된 컴퓨팅 자원이 idle과 used(사용 상태) 간의 상태전이가 빈번히 일어나거나, idle로 지속되는 시간이 짧은 자원의 경우, 프로젝트를 수행하는데 비효율적이다. 따라서 본 논문에서는 이러한 자원을 구분하고, 해당 자원의 다음 상태전이확률테이블을 계산하여 결과에 따라 해당 자원에 적합한 작업을 할당하는 방법을 제안한다.

Automation technology for analyzing 3D point cloud data of construction sites

  • Park, Suyeul;Kim, Younggun;Choi, Yungjun;Kim, Seok
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.1100-1105
    • /
    • 2022
  • Denoising, registering, and detecting changes of 3D digital map are generally conducted by skilled technicians, which leads to inefficiency and the intervention of individual judgment. The manual post-processing for analyzing 3D point cloud data of construction sites requires a long time and sufficient resources. This study develops automation technology for analyzing 3D point cloud data for construction sites. Scanned data are automatically denoised, and the denoised data are stored in a specific storage. The stored data set is automatically registrated when the data set to be registrated is prepared. In addition, regions with non-homogeneous densities will be converted into homogeneous data. The change detection function is developed to automatically analyze the degree of terrain change occurred between time series data.

  • PDF

Analysis of Time Series Changes in the Surrounding Environment of Rural Local Resources Using Aerial Photography and UAV - Focousing on Gyeolseong-myeon, Hongseong-gun - (항공사진과 UAV를 이용한 농촌지역자원 주변환경의 시계열 변화 분석 - 충청남도 홍성군 결성면을 중심으로 -)

  • An, Phil-Gyun;Eom, Seong-Jun;Kim, Yong-Gyun;Cho, Han-Sol;Kim, Sang-Bum
    • Journal of Korean Society of Rural Planning
    • /
    • v.27 no.4
    • /
    • pp.55-70
    • /
    • 2021
  • In this study, in the field of remote sensing, where the scope of application is rapidly expanding to fields such as land monitoring, disaster prediction, facility safety inspection, and maintenance of cultural properties, monitoring of rural space and surrounding environment using UAV is utilized. It was carried out to verify the possibility, and the following main results were derived. First, the aerial image taken with an unmanned aerial vehicle had a much higher image size and spatial resolution than the aerial image provided by the National Geographic Information Service. It was suitable for analysis due to its high accuracy. Second, the more the number of photographed photos and the more complex the terrain features, the more the point cloud included in the aerial image taken with the UAV was extracted. As the amount of point cloud increases, accurate 3D mapping is possible, For accurate 3D mapping, it is judged that a point cloud acquisition method for difficult-to-photograph parts in the air is required. Third, 3D mapping technology using point cloud is effective for monitoring rural space and rural resources because it enables observation and comparison of parts that cannot be read from general aerial images. Fourth, the digital elevation model(DEM) produced with aerial image taken with an UAV can visually express the altitude and shape of the topography of the study site, so it can be used as data to predict the effects of topographical changes due to changes in rural space. Therefore, it is possible to utilize various results using the data included in the aerial image taken by the UAV. In this study, the superiority of images acquired by UAV was verified by comparison with existing images, and the effect of 3D mapping on rural space monitoring was visually analyzed. If various types of spatial data such as GIS analysis and topographic map production are collected and utilized using data that can be acquired by unmanned aerial vehicles, it is expected to be used as basic data for rural planning to maintain and preserve the rural environment.

Dynamic Clustering based Optimization Technique and Quality Assessment Model of Mobile Cloud Computing (동적 클러스터링 기반 모바일 클라우드 컴퓨팅의 최적화 기법 및 품질 평가 모델)

  • Kim, Dae Young;La, Hyun Jung;Kim, Soo Dong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.6
    • /
    • pp.383-394
    • /
    • 2013
  • As a way of augmenting constrained resources of mobile devices such as CPU and memory, many works on mobile cloud computing (MCC), where mobile devices utilize remote resources of cloud services or PCs, have been proposed. Typically, in MCC, many nodes with different operating systems and platform and diverse mobile applications or services are located, and a central manager autonomously performs several management tasks to maintain a consistent level of MCC overall quality. However, as there are a larger number of nodes, mobile applications, and services subscribed by the mobile applications and their interactions are extremely increased, a traditional management method of MCC reveals a fundamental problem of degrading its overall performance due to overloaded management tasks to the central manager, i.e. a bottle neck phenomenon. Therefore, in this paper, we propose a clustering-based optimization method to solve performance-related problems on large-scaled MCC and to stabilize its overall quality. With our proposed method, we can ensure to minimize the management overloads and stabilize the quality of MCC in an active and autonomous way.

A Virtualization Management Convergence Access Control Model for Cloud Computing Environments (클라우드 컴퓨팅 환경에서 가상화 관리 융합접근제어 모델)

  • Choi, Eun-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.69-75
    • /
    • 2018
  • The purpose of access control is to prevent computing resources from illegal behavior such as leakage, modification, and destruction by unauthorized users. As the cloud computing environment is expanded to resource sharing services using virtualization technology, a new security model and access control technique are required to provide dynamic and secure cloud-based computing services. The virtualization management convergence access control model provides a flexible user authorization function by applying the dynamic privilege assignment function to the role based access control mechanism. In addition, by applying access control mechanism based on security level and rules, we solve the conflict problem in virtual machine system and guarantee the safeness of physical resources. This model will help to build a secure and efficient cloud-based virtualization management system and will be expanded to a mechanism that reflects the multi-level characteristics.

Pratical Offloading Methods and Cost Models for Mobile Cloud Computing (모바일 클라우드 컴퓨팅을 위한 실용적인 오프로딩 기법 및 비용 모델)

  • Park, Min Gyun;Zhe, Piao Zhen;La, Hyun Jung;Kim, Soo Dong
    • Journal of Internet Computing and Services
    • /
    • v.14 no.2
    • /
    • pp.73-85
    • /
    • 2013
  • As a way of augmenting constrained resources of mobile devices such as CPU and memory, many works on mobile cloud computing (MCC), where mobile devices utilize remote resources of cloud services or PCs, /have been proposed. A typical approach to resolving resource problems of mobile nodes in MCC is to offload functional components to other resource-rich nodes. However, most of the current woks do not consider a characteristic of dynamically changed MCC environment and propose offloading mechanisms in a conceptual level. In this paper, in order to ensure performance of highly complex mobile applications, we propose four different types of offloading mechanisms which can be applied to diverse situations of MCC. And, the proposed offloading mechanisms are practically designed so that they can be implemented with current technologies. Moreover, we define cost models to derive the most sutilable situation of applying each offloading mechanism and prove the performance enhancement through offloadings in a quantitative manner.