• Title/Summary/Keyword: Cloud-technology

Search Result 1,892, Processing Time 0.028 seconds

A Study on Performance Improvement of Distributed Computing Framework using GPU (GPU를 활용한 분산 컴퓨팅 프레임워크 성능 개선 연구)

  • Song, Ju-young;Kong, Yong-joon;Shim, Tak-kil;Shin, Eui-seob;Seong, Kee-kin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.499-502
    • /
    • 2012
  • 빅 데이터 분석의 시대가 도래하면서 대용량 데이터의 특성과 계산 집약적 연산의 특성을 동시에 가지는 문제 해결에 대한 요구가 늘어나고 있다. 대용량 데이터 처리의 경우 각종 분산 파일 시스템과 분산/병렬 컴퓨팅 기술들이 이미 많이 사용되고 있으며, 계산 집약적 연산 처리의 경우에도 GPGPU 활용 기술의 발달로 보편화되는 추세에 있다. 하지만 대용량 데이터와 계산 집약적 연산 이 두 가지 특성을 모두 가지는 문제를 처리하기 위해서는 많은 제약 사항들을 해결해야 하는데, 본 논문에서는 이에 대한 대안으로 분산 컴퓨팅 프레임워크인 Hadoop MapReduce와 Nvidia의 GPU 병렬 컴퓨팅 아키텍처인 CUDA 흘 연동하는 방안을 제시하고, 이를 밀집행렬(dense matrix) 연산에 적용했을 때 얻을 수 있는 성능 개선 효과에 대해 소개하고자 한다.

Building On/off Attacks Detector for Effective Trust Evaluation in Cloud Services Environment

  • SALAH T. ALSHAMMARI;AIIAD ALBESHRI;KHALID ALSUBHI
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.101-107
    • /
    • 2024
  • Cloud computing is a widely used technology that has changed the way people and organizations store and access information. This technology is quite versatile, which is why extensive amounts of data can be stored in the cloud. Furthermore, businesses can access various services over the cloud without having to install applications. However, the cloud computing services are provided over a public domain, which means that both trusted and non-trusted users can access the services. Though there are several advantages of cloud computing services, especially to business owners, various challenges are also posed in terms of the privacy and security of information and online services. A kind of threat that is widely faced in the cloud environment is the on/off attack. In this kind of attack, a few entities exhibit proper behavior for a given time period to develop a highly a positive reputation and gather trust, after which they exhibit deception. A viable solution is provided by the given trust model for preventing the attacks. This method works by providing effective security to the cloud services by identifying malicious and inappropriate behaviors through the application of trust algorithms that can identify on-off attacks.

Multi-factor Evolution for Large-scale Multi-objective Cloud Task Scheduling

  • Tianhao Zhao;Linjie Wu;Di Wu;Jianwei Li;Zhihua Cui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.4
    • /
    • pp.1100-1122
    • /
    • 2023
  • Scheduling user-submitted cloud tasks to the appropriate virtual machine (VM) in cloud computing is critical for cloud providers. However, as the demand for cloud resources from user tasks continues to grow, current evolutionary algorithms (EAs) cannot satisfy the optimal solution of large-scale cloud task scheduling problems. In this paper, we first construct a large- scale multi-objective cloud task problem considering the time and cost functions. Second, a multi-objective optimization algorithm based on multi-factor optimization (MFO) is proposed to solve the established problem. This algorithm solves by decomposing the large-scale optimization problem into multiple optimization subproblems. This reduces the computational burden of the algorithm. Later, the introduction of the MFO strategy provides the algorithm with a parallel evolutionary paradigm for multiple subpopulations of implicit knowledge transfer. Finally, simulation experiments and comparisons are performed on a large-scale task scheduling test set on the CloudSim platform. Experimental results show that our algorithm can obtain the best scheduling solution while maintaining good results of the objective function compared with other optimization algorithms.

Dynamic Task Scheduling Via Policy Iteration Scheduling Approach for Cloud Computing

  • Hu, Bin;Xie, Ning;Zhao, Tingting;Zhang, Xiaotong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1265-1278
    • /
    • 2017
  • Dynamic task scheduling is one of the most popular research topics in the cloud computing field. The cloud scheduler dynamically provides VM resources to variable cloud tasks with different scheduling strategies in cloud computing. In this study, we utilized a valid model to describe the dynamic changes of both computing facilities (such as hardware updating) and request task queuing. We built a novel approach called Policy Iteration Scheduling (PIS) to globally optimize the independent task scheduling scheme and minimize the total execution time of priority tasks. We performed experiments with randomly generated cloud task sets and varied the performance of VM resources using Poisson distributions. The results show that PIS outperforms other popular schedulers in a typical cloud computing environment.

Improvement of Cloud Service Quality and Performance Management System (클라우드 서비스 품질·성능 관리체계의 개선방안)

  • Kim, Nam Ju;Ham, Jae Chun;Seo, Kwang-Kyu
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.4
    • /
    • pp.83-88
    • /
    • 2021
  • Cloud services have become the core infrastructure of the digital economy as a basis for collecting, storing, and processing large amounts of data to trigger artificial intelligence-based services and industrial innovation. Recently, cloud services have been spotlighted as a means of responding to corporate crises and changes in the work environment in a national disaster caused by COVID-19. While the cloud is attracting attention, the speed of adoption and diffusion of cloud services is not being actively carried out due to the lack of trust among users and uncertainty about security, performance, and cost. This study compares and analyzes the "Cloud Service Quality and Performance Management System" and the "Cloud Service Certification System" and suggests complementary points and improvement measures for the cloud service quality and performance management system.

Design and Implementation of Multi-Cloud Service Common Platform (멀티 클라우드 서비스 공통 플랫폼 설계 및 구현)

  • Kim, Sooyoung;Kim, Byoungseob;Son, Seokho;Seo, Jihoon;Kim, Yunkon;Kang, Dongjae
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.1
    • /
    • pp.75-94
    • /
    • 2021
  • The 4th industrial revolution needs a fusion of artificial intelligence, robotics, the Internet of Things (IoT), edge computing, and other technologies. For the fusion of technologies, cloud computing technology can provide flexible and high-performance computing resources so that cloud computing can be the foundation technology of new emerging services. The emerging services become a global-scale, and require much higher performance, availability, and reliability. Public cloud providers already provide global-scale services. However, their services, costs, performance, and policies are different. Enterprises/ developers to come out with a new inter-operable service are experiencing vendor lock-in problems. Therefore, multi-cloud technology that federatively resolves the limitations of single cloud providers is required. We propose a software platform, denoted as Cloud-Barista. Cloud-Barista is a multi-cloud service common platform for federating multiple clouds. It makes multiple cloud services as a single service. We explain the functional architecture of the proposed platform that consists of several frameworks, and then discuss the main design and implementation issues of each framework. To verify the feasibility of our proposal, we show a demonstration which is to create 18 virtual machines on several cloud providers, combine them as a single resource, and manage it.

A study of Carbon Dioxide Emissions due to the Cloud computing security (클라우드 컴퓨팅 보안에 따른 이산화탄소 배출에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.101-108
    • /
    • 2014
  • Recently, The cloud computing technology is emerging as an important issue in the world and the cloud computing has attracted much attention to the technology about carbon dioxide reduction. However, Unlike to the positive aspects of a cloud computing are included several security vulnerabilities. For this reason, the carbon dioxide reduction of a cloud computing technology has a differences. Therefore, this paper will be analyzed to the carbon dioxide emission factors of a cloud computing through the cloud case studies related $CO_2$ emissions and experiments measured of $CO_2$ emissions a security system. and In the future, this is expected to be utilized as a basis for the security design and performance improvement.

An Empirical Study on the Influence of Environmental Determinants on the Mobile Cloud Computing Technology Usage and the Moderating Effects of Job Relevance (모바일 클라우드 컴퓨팅 기술사용에 영향을 주는 환경적 요인과 직무 관련성의 조절효과에 대한 실증연구)

  • Kim, Sang-Hyun;Kim, Geun-A
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.4
    • /
    • pp.1-20
    • /
    • 2011
  • The recent development of mobile devices, including smartphones has maximized the user's convenience. This phenomenon has triggered the specification and activation of mobile cloud service and transformed the user's information usage and communication means. Despite such development of new technology, there is little understanding of mobile cloud. Therefor, in order to help the understanding of the usage of mobile cloud computing technology, this study developed the research model based on the UTAUT (the Unified Theory of Acceptance and Usage of Technology) model. The proposed research model included five external determinants, such as Interoperability, Information Organization, Adequacy, Information Security and Context Awareness, along with the moderating effects of Job Relevance, and empirically proved their influence on the user's job performance. This study proved the research model by analyzing the data collected from 287 copies of survey with the structural equation modeling approach. The result showed that all determinants, except Information Security have positive impact on the usage of mobile cloud computing technology. Thus, this study can compliment the limitations of previous research, suggest a new direction to analyze the user's perspective in the related research on mobile cloud and build a theoretical foundation for the further development of mobile cloud.

Privacy-assured Boolean Adjacent Vertex Search over Encrypted Graph Data in Cloud Computing

  • Zhu, Hong;Wu, Bin;Xie, Meiyi;Cui, Zongmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.5171-5189
    • /
    • 2016
  • With the popularity of cloud computing, many data owners outsource their graph data to the cloud for cost savings. The cloud server is not fully trusted and always wants to learn the owners' contents. To protect the information hiding, the graph data have to be encrypted before outsourcing to the cloud. The adjacent vertex search is a very common operation, many other operations can be built based on the adjacent vertex search. A boolean adjacent vertex search is an important basic operation, a query user can get the boolean search results. Due to the graph data being encrypted on the cloud server, a boolean adjacent vertex search is a quite difficult task. In this paper, we propose a solution to perform the boolean adjacent vertex search over encrypted graph data in cloud computing (BASG), which maintains the query tokens and search results privacy. We use the Gram-Schmidt algorithm and achieve the boolean expression search in our paper. We formally analyze the security of our scheme, and the query user can handily get the boolean search results by this scheme. The experiment results with a real graph data set demonstrate the efficiency of our scheme.

Analyzing Factors Affecting the Adoption of Cloud Computing: A Case of Turkey

  • Akar, Ezgi;Mardiyan, Sona
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.18-37
    • /
    • 2016
  • Cloud computing is an upcoming technology and emerging concept in the field of information technologies. Companies have begun to invest in cloud computing with the expectation that it will improve their business performances, operations, and processes. However, many companies are not so much aware of the cloud computing, so they can hesitate to adopt this new technology. The aims of the study are analyzing factors affecting the adoption of cloud computing and applying structural equation modeling technique to analyze the important dimensions of the adoption. Concordantly, previous studies are examined and expert interviews are arranged. Based on both our literature review and expert interviews, a model is proposed to measure the adoption of cloud computing. It is obvious that there are scarce researches about cloud computing adoption in the literature. Thus, the originality of the paper lies on that it proposes a research model for cloud computing adoption and it investigates various dimensions of cloud computing adoption in detail.