• Title/Summary/Keyword: Computing technology

Search Result 4,129, Processing Time 0.033 seconds

A Novel Methodology for Auditing the Threats in Cloud Computing - A Perspective based on Cloud Storage

  • Nasreen Sultana Quadri;Kusum Yadav;Yogesh Kumar Sharma
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.124-128
    • /
    • 2024
  • Cloud computing is a technology for delivering information in which resources are retrieved from the internet through a web-based tools and applications, rather than a direct connection with the server. It is a new emerging computing based technology in which any individual or organization can remotely store or access the information. The structure of cloud computing allows to store and access various information as long as an electronic device has access to the web. Even though various merits are provided by the cloud from the cloud provides to cloud users, it suffers from various flaws in security. Due to these flaws, data integrity and confidentiality has become a challenging task for both the storage and retrieval process. This paper proposes a novel approach for data protection by an improved auditing based methodology in cloud computing especially in the process of cloud storage. The proposed methodology is proved to be more efficient in auditing the threats while storing data in the cloud computing architecture.

Technology Standard Trends in Distributed and Edge Cloud Computing (분산 및 에지 클라우드 기술 표준 동향)

  • M.K. In;K.C. Lee;S.Y. Lee
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.3
    • /
    • pp.69-78
    • /
    • 2024
  • Cloud computing technology based on centralized high-performance computing has brought about major changes across the information technology industry and led to new paradigms. However, with the rapid development of the industry and increasing need for mass generation and real-time processing of data across various fields, centralized cloud computing is lagging behind the demand. This is particularly critical in emerging technologies such as autonomous driving, the metaverse, and augmented/virtual reality that require the provision of services with ultralow latency for real-time performance. To address existing limitations, distributed and edge cloud computing technologies have recently gained attention. These technologies allow for data to be processed and analyzed closer to their point of generation, substantially reducing the response times and optimizing the network bandwidth usage. We describe distributed and edge cloud computing technologies and explore the latest trends in their standardization.

A Proposal on Analyzing and Preventing Adverse Effects of Ubiquitous Services (유비쿼터스 서비스의 역기능 분석 및 방지를 위한 제언)

  • Kang, Min-Cheol;Kwak, Soo-Hwan;Kim, Chang-Soo
    • The Journal of Information Systems
    • /
    • v.19 no.4
    • /
    • pp.87-109
    • /
    • 2010
  • The ubiquitous computing & technology is to make passive IT machinery as the smart-object to solve the problems of information management. These ubiquitous devices can be a concierge of humans lives. In addition, the ubiquitous computing & technology added with Pro-Active processing technology is the intellectual automatic process capacity that probably enhance quality of human's life. Although the social influencing power of ubiquitous computing technology is so critical, research on the social impact of ubiquitous has been studied insufficiently. And, we also need the countermeasures to protect the societies from the side effect of the ubiquitous computing technology. The purpose of this research is to minimize the loss which comes from the new ubiquitous society, by presenting the technological and systematic alternatives and by researching the various side effects. This research suggests the proper alternatives by reviewing and by researching the adverse effects of the ubiquitous computing technology.

Enhancing air traffic management efficiency through edge computing and image-aided navigation

  • Pradum Behl;S. Charulatha
    • Advances in aircraft and spacecraft science
    • /
    • v.11 no.1
    • /
    • pp.33-53
    • /
    • 2024
  • This paper presents a comprehensive investigation into the optimization of Flight Management Systems (FMS) with a particular emphasis on data processing efficiency by conducting a comparative study with conventional methods to edge-computing technology. The objective of this research is twofold. Firstly, it evaluates the performance of FMS navigation systems using conventional and edge computing methodologies. Secondly, it aims to extend the boundaries of knowledge in edge-computing technology by conducting a rigorous analysis of terrain data and its implications on flight path optimization along with communication with ground stations. The study employs a combination of simulation-based experimentation and algorithmic computations. Through strategic intervals along the flight path, critical parameters such as distance, altitude profiles, and flight path angles are dynamically assessed. Additionally, edge computing techniques enhance data processing speeds, ensuring adaptability to various scenarios. This paper challenges existing paradigms in flight management and opens avenues for further research in integrating edge computing within aviation technology. The findings presented herein carry significant implications for the aviation industry, ranging from improved operational efficiency to heightened safety measures.

Trends in Edge Computing Technology (엣지 컴퓨팅 기술 동향)

  • Hong, J.H.;Lee, K.C.;Lee, S.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.6
    • /
    • pp.78-87
    • /
    • 2020
  • With the evolution of the Internet of Things (IoT), a computing paradigm shift from cloud to edge computing is rapidly taking place to effectively manage the rapidly increasing volume of data generated by various IoT devices. Edge computing is computing that occurs at or near the physical location of a user or data source. Placing computing services closer to these locations allows users to benefit from faster and more reliable services, and enterprises can take advantage of the flexibility of hybrid cloud computing. This paper describes the concept and main benefits of edge computing and presents the trends and future prospects for edge computing technology.

Task Scheduling on Cloudlet in Mobile Cloud Computing with Load Balancing

  • Poonam;Suman Sangwan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.73-80
    • /
    • 2023
  • The recent growth in the use of mobile devices has contributed to increased computing and storage requirements. Cloud computing has been used over the past decade to cater to computational and storage needs over the internet. However, the use of various mobile applications like Augmented Reality (AR), M2M Communications, V2X Communications, and the Internet of Things (IoT) led to the emergence of mobile cloud computing (MCC). All data from mobile devices is offloaded and computed on the cloud, removing all limitations incorporated with mobile devices. However, delays induced by the location of data centers led to the birth of edge computing technologies. In this paper, we discuss one of the edge computing technologies, i.e., cloudlet. Cloudlet brings the cloud close to the end-user leading to reduced delay and response time. An algorithm is proposed for scheduling tasks on cloudlet by considering VM's load. Simulation results indicate that the proposed algorithm provides 12% and 29% improvement over EMACS and QRR while balancing the load.

A Study on Technology Trends and Researches for Ubiquitous Devices (유비쿼터스 디바이스 기술동향과 연구실태에 관한 조사)

  • Jin, Tae-Seok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.836-841
    • /
    • 2008
  • Ubiquitous computing represents the most explicit attempt yet to move computing technology beyond the confines of tool usage towards a pervasive penetration of everyday life. In this report, as a general introduction of Ubiquitous computing, a trend of Ubiquitous computing devices is proposed for the applied technology fields and our everyday life. We outline a broad analysis of this technology based on a close examination of the researches advancing it. After introducing a framework for understanding modem device technology, we develop an interpretation of ubiquitous computing concentrating on its guiding principles, technological infrastructure, and trends.

  • PDF

Five Forces Model of Computational Power: A Comprehensive Measure Method

  • Wu, Meixi;Guo, Liang;Yang, Xiaotong;Xie, Lina;Wang, Shaopeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2239-2256
    • /
    • 2022
  • In this paper, a model is proposed to comprehensively evaluate the computational power. The five forces model of computational power solves the problem that the measurement units of different indexes are not unified in the process of computational power evaluation. It combines the bidirectional projection method with TOPSIS method. This model is more scientific and effective in evaluating the comprehensive situation of computational power. Lastly, an example shows the validity and practicability of the model.

Speculative Parallelism Characterization Profiling in General Purpose Computing Applications

  • Wang, Yaobin;An, Hong;Liu, Zhiqin;Li, Li;Yu, Liang;Zhen, Yilu
    • Journal of Computing Science and Engineering
    • /
    • v.9 no.1
    • /
    • pp.20-28
    • /
    • 2015
  • General purpose computing applications have not yet been thoroughly explored in procedure level speculation, especially in the light-weighted profiling way. This paper proposes a light-weighted profiling mechanism to analyze speculative parallelism characterization in several classic general purpose computing applications from SPEC CPU2000 benchmark. By comparing the key performance factors in loop and procedure-level speculation, it includes new findings on the behaviors of loop and procedure-level parallelism under these applications. The experimental results are as follows. The best gzip application can only achieve a 2.4X speedup in loop level speculation, while the best mcf application can achieve almost 3.5X speedup in procedure level. It proves that our light-weighted profiling method is also effective. It is found that between the loop-level and procedure-level TLS, the latter is better on several cases, which is against the conventional perception. It is especially shown in the applications where their 'hot' procedure body is concluded as 'hot' loops.