• Title/Summary/Keyword: Cloud-based

Search Result 2,652, Processing Time 0.025 seconds

The Method for Cloud Service Recommendation Based on Requirements of Tenant (테넌트 요구사항 기반의 클라우드 서비스 추천 방법)

  • An, Young Min;Kang, Tae Jun;Park, Joon Seok;Yeom, Keun Hyuk
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.4
    • /
    • pp.161-168
    • /
    • 2015
  • It is difficult to provide proper cloud services for cloud users, because the number of cloud services are increasing and the type of cloud services are diversifying. To overcome this problem, the concept of cloud service broker is presented to mediate cloud services between cloud providers and tenant. The most important role of cloud service broker is to finding cloud services that fulfill requirements of tenant. However, current existing cloud service broker conduct passive requirements analysis process with cloud service expert's assistance. In addition, the systematic functional and non-functional requirement analysis is insufficient. Therefore, we need the new methods for requirement analysis to find nearest service that matches with requirement of tenant. In this paper, we apply pairwise comparison from AHP method to analyze requirement automatically and systematically. It calculates score of service by comparing requirement with service specification, calculating importance rate, and so on.

Secure Scheme Between Nodes in Cloud Robotics Platform (Cloud Robotics Platform 환경에서 Node간 안전한 통신 기법)

  • Kim, Hyungjoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.12
    • /
    • pp.595-602
    • /
    • 2021
  • The robot is developing into a software-oriented shape that recognizes the surrounding situation and is given a task. Cloud Robotics Platform is a method to support Service Oriented Architecture shape for robots, and it is a cloud-based method to provide necessary tasks and motion controllers depending on the situation. As it evolves into a humanoid robot, the robot will be used to help humans in generalized daily life according to the three robot principles. Therefore, in addition to robots for specific individuals, robots as public goods that can help all humans depending on the situation will be universal. Therefore, the importance of information security in the Cloud Robotics Computing environment is analyzed to be composed of people, robots, service applications on the cloud that give intelligence to robots, and a cloud bridge that connects robots and clouds. It will become an indispensable element for In this paper, we propose a Security Scheme that can provide security for communication between people, robots, cloud bridges, and cloud systems in the Cloud Robotics Computing environment for intelligent robots, enabling robot services that are safe from hacking and protect personal information.

A Proposal of SH-Tree Based Data Synchronization Method for Secure Maritime Cloud (안전한 해사클라우드 환경을 위한 SH-Tree 기반의 데이터 동기화 기법 제안)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.929-940
    • /
    • 2016
  • The IMO e-navigation strategy has requested a communication infrastructure providing authorized seamless information transfer between stakeholders. The Maritime Cloud is the term used to describe the concept of an infrastructure that support authorized, seamless information transfer, adding those elements, that are necessary to support the e-navigation domain. It is necessary to consider the study on maritime cloud security, but the study is still an early stage. In this paper, we propose a secure synchronization method for the maritime cloud services. The proposed method can be synchronize between the vessel based on the SH-Tree, and it has the advantage that there is no exposure information in the synchronization process.

Open Source Cloud Computing: An Experience Case of Geo-based Image Handling in Amazon Web Services

  • Lee, Ki-Won
    • Korean Journal of Remote Sensing
    • /
    • v.28 no.3
    • /
    • pp.337-346
    • /
    • 2012
  • In the view from most application system developers and users, cloud computing becomes popular in recent years and is still evolving. But in fact it is not easy to reach at the level of actual operations. Despite, it is known that the cloud in the practical stage provides a new pattern for deploying a geo-spatial application. However, domestically geo-spatial application implementation and operation based on this concept or scheme is on the beginning stage. It is the motivation of this works. Although this study is an introductory level, a simple and practical processed result was presented. This study was carried out on Amazon web services platform, as infrastructure as a service in the geo-spatial areas. Under this environment, cloud instance, a web and mobile system being previously implemented in the multi-layered structure for geo-spatial open sources of database and application server, was generated. Judging from this example, it is highly possible that cloud services with the functions of geo-processing service and large volume data handling are the crucial point, leading a new business model for civilian remote sensing application and geo-spatial enterprise industry. The further works to extend geo-spatial applications in cloud computing paradigm are left.

Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage

  • Zhang, Yinghui;Zhang, Tiantian;Guo, Rui;Xu, Shengmin;Zheng, Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5653-5672
    • /
    • 2019
  • In cloud computing era, an increasing number of resource-constrained users outsource their data to cloud servers. Due to the untrustworthiness of cloud servers, it is important to ensure the integrity of outsourced data. However, most of existing solutions still have challenging issues needing to be addressed, such as the identity privacy protection of users, the traceability of users, the supporting of dynamic user operations, and the publicity of auditing. In order to tackle these issues simultaneously, in this paper, we propose a traceable dynamic public auditing scheme with identity privacy preserving for cloud storage. In the proposed scheme, a single user, including a group manager, is unable to know the signer's identity. Furthermore, our scheme realizes traceability based on a secret sharing mechanism and supports dynamic user operations. Based on the security and efficiency analysis, it is shown that our scheme is secure and efficient.

VARIABILITY OF THE TRENDS OBSERVED FROM SEAWIFS-DERIVED SUB-MICRON AEROSOL FRACTION OVER EAST ASIAN SEAS BASED ON DIFFERENT CLOUD MASKING ALGORITHMS

  • Li, Li-Ping;Fukushima, Hajime;Takeno, Keisuke
    • Proceedings of the KSRS Conference
    • /
    • v.1
    • /
    • pp.316-319
    • /
    • 2006
  • Monthly-mean aerosol parameters derived from the 1998-2004 SeaWiFS observations over East Asian waters are analyzed. SeaWiFS GAC Level 1 data covering the Northeast Asian area are collected and processed by the standard atmospheric correction algorithm released by the SeaWiFS Project to produce daily aerosol optical thickness (AOT) and ${{\AA}}ngstr{\ddot{o}}m$ exponent imageries. Monthly mean AOT and ${{\AA}}ngstr{\ddot{o}}m$ exponent values are extracted from the daily composite images for six study areas chosen from the surrounding waters of Japan. A slight increasing trend of ${{\AA}}ngstr{\ddot{o}}m$ exponent is found and interpreted as about 4-5% increase in submicron fraction of aerosol optical thickness at 550nm. Two cloud screening methods, including the standard cloud masking method of SeaWiFS and the one based on the local variance method, are applied to the SeaWiFS data processing, in an attempt to inspect the influence to the observed statistical uptrend which probably induced by different cloud mask algorithms. The variability comes from the different cloud masking algorithms are discussed.

  • PDF

THE DEVELOPMENT OF IR-BASED VISIBLE CHANNEL CALIBRATION USING DEEP CONVECTIVE CLOUDS

  • Ham, Seung-Hee;Sohn, Byung-Ju
    • Proceedings of the KSRS Conference
    • /
    • 2008.10a
    • /
    • pp.430-432
    • /
    • 2008
  • Visible channel calibration method using deep convective clouds (DCCs) is developed. The method has advantages that visible radiance is not sensitive to cloud optical thickness (COT) for deep convective clouds because visible radiance no longer increases when COT exceeds 100. Therefore, once DCCs are chosen appropriately, and then cloud optical properties can be assumed without operational ancillary data for the specification of cloud conditions in radiative transfer model. In this study, it is investigated whether IR measurements can be used for the selection of DCC targets. To construct appropriate threshold value for the selection of DCCs, the statistics of cloud optical properties are collected with MODIS measurements. When MODIS brightness temperature (TB) at 11 ${\mu}$ m is restricted to be less than 190 K, it is shown that more than 85% of selected pixels show COT ${\geq}$ 100. Moreover, effective radius ($r_e$) distribution shows a sharp peak around 20 ${\mu}m$. Based on those MODIS observations, cloud optical properties are assumed as COT = 200 and $r_e$ = 20 ${\mu}m$ for the simulation of MODIS visible (0.646 ${\mu}m$) band radiances over DCC targets.

  • PDF

A Study of Security Authentication for Cloud Computing Based on Smart Phone (스마트폰 기반의 클라우드 컴퓨팅 보안 인증 연구)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1027-1035
    • /
    • 2012
  • Recently, the smart phone including web and mobile service based on the reliability and extendability of cloud computing is receiving huge attention. However, most of current cloud services provide just an application service for synchronizing data between mobile entity and server. Business model developed by communication companies have problems with interoperability. This paper proposes a new service security authentication model to efficiently manage smart phone users using different business models between smartphones and to keep the reliability and extendability of cloud computing. Proposed model authenticates for smart phone users to stay with in the unified communication with smart phone user's identity and access control to effectively use the current cloud computing system.

An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services

  • Irshad, Azeem;Sher, Muhammad;Ahmad, Hafiz Farooq;Alzahrani, Bander A.;Chaudhry, Shehzad Ashraf;Kumar, Rahul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5529-5552
    • /
    • 2016
  • Mobile cloud computing (MCC) has revolutionized the way in which the services can be obtained from the cloud service providers. Manifold increase in the number of mobile devices and subscribers in MCC has further enhanced the need of an efficient and robust authentication solution. Earlier, the subscribers could get cloud-computing services from the cloud service providers only after having consulted the trusted third party. Recently, Tsai and Lo has proposed a multi-server authenticated key agreement solution for MCC based on bilinear pairing, to eliminate the trusted third party for mutual authentication. The scheme has been novel as far as the minimization of trusted party involvement in authenticating the user and service provider, is concerned. However, the Tsai and Lo scheme has been found vulnerable to server spoofing attack (misrepresentation attack), de-synchronization attack and denial-of-service attack, which renders the scheme unsuitable for practical deployment in different wireless mobile access networks. Therefore, we have proposed an improved model based on bilinear pairing, countering the identified threats posed to Tsai and Lo scheme. Besides, the proposed work also demonstrates performance evaluation and formal security analysis.

A Review of the Observation-based Framework for the Study of Aerosol-Cloud-Precipitation Interactions (CAPI) (에어로솔-구름-강수 상호작용 (CAPI) 연구를 위한 관측 방법론 고찰)

  • Kim, Byung-Gon
    • Atmosphere
    • /
    • v.22 no.4
    • /
    • pp.437-447
    • /
    • 2012
  • There is still large uncertainty in estimating aerosol indirect effect despite ever-escalating efforts and virtually exponential increase in published studies concerning aerosol-cloud-precipitation interactions (CAPI). Probably most uncertainty comes from a wide range of observational scales and different platforms inappropriately used, and inherent complex chains of CAPI. Therefore, well-designed field campaigns and data analysis are required to address how to attribute aerosol signals along with clouds and precipitation to the microphysical effects of aerosols. Basically, aerosol influences cloud properties at the microphysical scales, "process scale", but observations are generally made of bulk properties over a various range of temporal and spatial resolutions, "analysis scale" (McComiskey & Feingold, 2012). In the most studies, measures made within the wide range of scales are erroneously treated as equivalent, probably resulting in a large uncertainty in associated with CAPI. Therefore, issues associated with the disparities of the observational resolution particular to CAPI are briefly discussed. In addition, the dependence of CAPI on the cloud environment such as stability and adiabaticity, and observation characteristics with varying situations of CAPI are also addressed together with observation framework optimally designed for the Korean situation. Properly designed and observation-based CAPI studies will likely continue to accumulate new evidences of CAPI, to further help understand its fundamental mechanism, and finally to develop improved parameterization for cloud-resolving models and large scale models.