• 제목/요약/키워드: Computing System

검색결과 5,858건 처리시간 0.033초

Service Deployment Strategy for Customer Experience and Cost Optimization under Hybrid Network Computing Environment

  • Ning Wang;Huiqing Wang;Xiaoting Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권11호
    • /
    • pp.3030-3049
    • /
    • 2023
  • With the development and wide application of hybrid network computing modes like cloud computing, edge computing and fog computing, the customer service requests and the collaborative optimization of various computing resources face huge challenges. Considering the characteristics of network environment resources, the optimized deployment of service resources is a feasible solution. So, in this paper, the optimal goals for deploying service resources are customer experience and service cost. The focus is on the system impact of deploying services on load, fault tolerance, service cost, and quality of service (QoS). Therefore, the alternate node filtering algorithm (ANF) and the adjustment factor of cost matrix are proposed in this paper to enhance the system service performance without changing the minimum total service cost, and corresponding theoretical proof has been provided. In addition, for improving the fault tolerance of system, the alternate node preference factor and algorithm (ANP) are presented, which can effectively reduce the probability of data copy loss, based on which an improved cost-efficient replica deployment strategy named ICERD is given. Finally, by simulating the random occurrence of cloud node failures in the experiments and comparing the ICERD strategy with representative strategies, it has been validated that the ICERD strategy proposed in this paper not only effectively reduces customer access latency, meets customers' QoS requests, and improves system service quality, but also maintains the load balancing of the entire system, reduces service cost, enhances system fault tolerance, which further confirm the effectiveness and reliability of the ICERD strategy.

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권4호
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

A Multi-Class Task Scheduling Strategy for Heterogeneous Distributed Computing Systems

  • El-Zoghdy, S.F.;Ghoneim, Ahmed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권1호
    • /
    • pp.117-135
    • /
    • 2016
  • Performance enhancement is one of the most important issues in high performance distributed computing systems. In such computing systems, online users submit their jobs anytime and anywhere to a set of dynamic resources. Jobs arrival and processes execution times are stochastic. The performance of a distributed computing system can be improved by using an effective load balancing strategy to redistribute the user tasks among computing resources for efficient utilization. This paper presents a multi-class load balancing strategy that balances different classes of user tasks on multiple heterogeneous computing nodes to minimize the per-class mean response time. For a wide range of system parameters, the performance of the proposed multi-class load balancing strategy is compared with that of the random distribution load balancing, and uniform distribution load balancing strategies using simulation. The results show that, the proposed strategy outperforms the other two studied strategies in terms of average task response time, and average computing nodes utilization.

편재형 컴퓨팅 기술을 적용한 차세대형 지식경영시스템의 비전과 연구 이슈 (Vision and Research Challenges of the Next Generation Knowledge Management Systems : A Pervasive Computing Technology Perspective)

  • 유기동;권오병
    • 지식경영연구
    • /
    • 제10권1호
    • /
    • pp.1-15
    • /
    • 2009
  • As pervasive computing technology, which aims to get linked to useful knowledge, information or services anytime, anywhere, using any devices and/or artifacts, is proliferating, desirable impacts on knowledge management systems are now available. The pervasive computing technology will potentially enable the knowledge management systems to realize individualization and socialization and ultimately increase the knowledge processing productivity. However, researchers who apply the pervasive computing methodologies to novel way of knowledge management have been very few. These result in unsatisfactory consideration of establishing pervasive knowledge management systems. Hence, the purpose of this paper is to cast the vision of pervasive knowledge management and search for a couple of possible research issues and possibilities. This paper suggests a framework of ubiDSS, an amended knowledge management system for the next generation deploying pervasive and autonomous knowledge acquisition capabilities of ubiquitous computing technologies. Also the CKAM, context-based knowledge acquisition module, is illustrated as a prototype of future knowledge management systems.

  • PDF

Integrated Lighting Enabler System Using M2M Platforms for Enhancing Energy Efficiency

  • Abdurohman, Maman;Putrada, Aji Gautama;Prabowo, Sidik;Wijiutomo, Catur Wirawan;Elmangoush, Asma
    • Journal of Information Processing Systems
    • /
    • 제14권4호
    • /
    • pp.1033-1048
    • /
    • 2018
  • This paper proposes an integrated lighting enabler system (ILES) based on standard machine-to-machine (M2M) platforms. This system provides common services of end-to-and M2M communication for smart lighting system. It is divided into two sub-systems, namely end-device system and server system. On the server side, the M2M platform OpenMTC is used to receive data from the sensors and send response for activating actuators. At the end-device system, a programmable smart lighting device is connected to the actuators and sensors for communicating their data to the server. Some experiments have been done to prove the system concept. The experiment results show that the proposed integrated lighting enabler system is effective to reduce the power consumption by 25.22% (in average). The proving of significance effect in reducing power consumption is measured by the Wilcoxon method.

A Study on the Authentication of Digital Content in Cloud Computing Environment

  • Jang, Eun-Gyeom
    • 한국컴퓨터정보학회논문지
    • /
    • 제27권11호
    • /
    • pp.99-106
    • /
    • 2022
  • 본 논문은 클라우딩 컴퓨팅 환경에서 디지털 콘텐츠 관리 기술을 제안한다. 네트워크를 활용한 컴퓨팅 서비스는 4차 산업혁명 시대에 빠질 수 없는 기본 인프라 서비스이다. 스마트폰을 활용한 금융 서비스, 디지털 콘텐츠 서비스, 산업 및 홈 네트워크 서비스는 국부적인 영역의 서비스에서 전체 서비스가 가능한 클라우드 서비스 환경으로 변화하고 있다. 이에 본 연구에서는 클라우드 컴퓨팅 환경에 적합한 디지털 콘텐츠 서비스가 안전하게 지원되도록 시스템을 제안하였다. 제안 시스템은 사용자의 시스템 접근의 편의성과 안전성을 제공하고, 디지털 콘텐츠 저작자의 저작권을 보호하며, 안전한 디지털 콘텐츠 유통 및 관리 시스템을 제공한다. 본 연구의 목적은 클라우드 컴퓨팅 환경에 적합한 디지털 콘텐츠 유통구조를 제공하여 디지털 콘텐츠 시장을 안정화시키고 활성화하는데 있다.

SD-MTD: Software-Defined Moving-Target Defense for Cloud-System Obfuscation

  • Kang, Ki-Wan;Seo, Jung Taek;Baek, Sung Hoon;Kim, Chul Woo;Park, Ki-Woong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권3호
    • /
    • pp.1063-1075
    • /
    • 2022
  • In recent years, container techniques have been broadly applied to cloud computing systems to maximize their efficiency, flexibility, and economic feasibility. Concurrently, studies have also been conducted to ensure the security of cloud computing. Among these studies, moving-target defense techniques using the high agility and flexibility of cloud-computing systems are gaining attention. Moving-target defense (MTD) is a technique that prevents various security threats in advance by proactively changing the main attributes of the protected target to confuse the attacker. However, an analysis of existing MTD techniques revealed that, although they are capable of deceiving attackers, MTD techniques have practical limitations when applied to an actual cloud-computing system. These limitations include resource wastage, management complexity caused by additional function implementation and system introduction, and a potential increase in attack complexity. Accordingly, this paper proposes a software-defined MTD system that can flexibly apply and manage existing and future MTD techniques. The proposed software-defined MTD system is designed to correctly define a valid mutation range and cycle for each moving-target technique and monitor system-resource status in a software-defined manner. Consequently, the proposed method can flexibly reflect the requirements of each MTD technique without any additional hardware by using a software-defined approach. Moreover, the increased attack complexity can be resolved by applying multiple MTD techniques.

시스템 부하를 고려한 효율적인 가상 머신 배치 (Efficient Virtual Machine Placement Considering System Load)

  • 정성민
    • 디지털산업정보학회논문지
    • /
    • 제16권2호
    • /
    • pp.35-43
    • /
    • 2020
  • Cloud computing integrates computing resources such as servers, storage, and networks with virtualization technology to provide suitable services according to user needs. Due to the structural characteristics of sharing physical resources based on virtualization technology, threats to availability can occur, so it is essential to respond to availability threats in cloud computing. Existing over-provisioning method is not suitable because it can generate idle resources and cause under-provisioning to degrade or disconnect service. System resources must be allocated in real-time according to the system load to guarantee the cloud system's availability. Through appropriate management measures, it is necessary to reduce the system load and increase the performance of the system. This paper analyzes the work response time according to the allocation or migration of virtual machines and discusses an efficient resource management method considering the system load.

클라우드 컴퓨팅 환경을 위한 침입탐지시스템 특징 분석 (Study on Intrusion Detection System under Cloud Computing Environment)

  • 양환석;이병천;유승재
    • 융합보안논문지
    • /
    • 제12권3호
    • /
    • pp.59-65
    • /
    • 2012
  • IT와 네트워크 기술의 발전으로 새롭게 소개된 클라우드 컴퓨팅은 개인의 인터넷 환경뿐만 아니라 기업들의 서비스 환경에도 많은 변화를 가져다주었다. 특히 저렴한 비용으로 IT 자원을 빌려 쓸 수 있고, 인프라를 구축할 필요가 없으며, 가상화를 이용한 다양한 컴퓨팅 환경을 제공받을 수 있는 것은 클라우드 컴퓨팅 환경이 인기를 얻을 수밖에 없는 이유이기도 하다. 이러한 클라우드 컴퓨팅에서는 다양한 접속 방법과 서비스 제공 범위가 넓어지고 있는 것과 비례하여 공격 위협의 범위 또한 넓어지고 있다. 따라서 악의적인 의도를 갖는 다양한 공격으로부터 자원을 보호해 줄 수 있는 침입탐지시스템이 반드시 필요하다. 본 논문에서는 자원의 공유와 가상화가 갖는 특성으로 인해 침입이 발생하였을 때 다른 컴퓨팅 환경에 비해 그 피해가 매우 큰 클라우드 컴퓨팅 환경에서 침입탐지시스템이 가져야할 특징에 대하여 분석하였다.

그리드 컴퓨팅을 위한 온톨로지 기반의 시맨틱 정보 시스템 (Ontology Based Semantic Information System for Grid Computing)

  • 한병전;김형래;정창성
    • 인터넷정보학회논문지
    • /
    • 제10권4호
    • /
    • pp.87-103
    • /
    • 2009
  • 그리드 컴퓨팅 환경은 기존의 분산 컴퓨팅 기술의 확장된 개념으로, 다양한 분야에서 저비용의 고성능 컴퓨팅 퍼포먼스를 얻기 위하여 그리드를 이용하고 있다. 그러나 공통적으로 이용할 수 있는 정보 시스템의 부재로, 현재의 그리드는 대규모의 단일한 환경으로서의 그리드가 아닌, 기존의 클러스터 컴퓨터와 같은 의미로 사용되고 있다. 따라서 자신이 구성한 분산 컴퓨팅 환경을 그리드 환경의 한 부분으로 포함시키기 위해서는 컴퓨팅 환경에 대한 정보를 그리드의 이용자가 공유할 수 있어야 하며, 정보 서비스를 공개하여 공유할 수 있도록 해야 한다. 따라서 본 논문에서는 정보의 공유와 확장이 용이하며, 플랫폼에 독립적인 서비스를 제공할 수 있는 정보 시스템을 구축하기 위한 웹 서비스, 온톨로지 기반의 Semantic Information System Framework(WebSIS)을 제안한다. WebSIS를 통하여 온톨로지를 이용하는 정보 시스템의 제작을 용이하게 하며, 온톨로지의 공유와 재사용, 확장의 특징을 활용할 수 있는 구조를 제안한다. 또, 그리드 컴퓨팅 환경이 기존의 분산 컴퓨팅 환경에 비해 복잡해짐에 따라 작업을 수행하기 위한 적절한 자원의 할당에도 좀 더 많은 고려사항이 존재하게 되었고, 이를 효과적으로 처리하기 위해서는 좀 더 고수준의 정보처리를 필요로 하게 되었다. 이에 우리는 WebSIS와 함께 WebSIS를 이용하여 그리드 환경을 이용하는 작업의 자동화를 위한, 온톨로지 기반의 고수준의 정보처리가 가능한 Resource Information Service를 구현하였고, 이를 통하여, 효율적인 공유와 확장을 위한 온톨로지 모델을 제안한다. 또한, 기존의 용어 매칭이 아닌 의미 정보를 이용한 검색과 정보 처리를 제안한다.

  • PDF