• Title/Summary/Keyword: Computing technology

Search Result 4,142, Processing Time 0.034 seconds

Cryptography in the Cloud: Advances and Challenges

  • Boyd, Colin
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.17-23
    • /
    • 2013
  • Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.

The Security Architecture for Secure Cloud Computing Environment

  • Choi, Sang-Yong;Jeong, Kimoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.81-87
    • /
    • 2018
  • Cloud computing is a computing environment in which users borrow as many IT resources as they need to, and use them over the network at any point in time. This is the concept of leasing and using as many IT resources as needed to lower IT resource usage costs and increase efficiency. Recently, cloud computing is emerging to provide stable service and volume of data along with major technological developments such as the Internet of Things, artificial intelligence and big data. However, for a more secure cloud environment, the importance of perimeter security such as shared resources and resulting secure data storage and access control is growing. This paper analyzes security threats in cloud computing environments and proposes a security architecture for effective response.

Interaction Logic and Algorithm in Smart Cloud Computing (스마트 클라우드 컴퓨팅의 상호작용 로직 및 알고리즘)

  • Lee, Tae-Gyu;Shin, Seong-Yoon;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.203-206
    • /
    • 2014
  • This paper discuss both cloud computing and smart computing, and then debates structural and functional issues about how the two computing systems interact for offering user-friendly information solutions. Smart Table is proposed to configure cloud resources. Smart Control algorithm is proposed to choose the best resources. The information interaction between cloud computing and smart computing services is realized for efficient construction of information systems and for user's convenience of information services.

  • PDF

Proposal of Electronic Engineering Exploration Learning Operation Using Computing Thinking Ability

  • LEE, Seung-Woo;LEE, Sangwon
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.110-117
    • /
    • 2021
  • The purpose of the study is to develop effective teaching methods to strengthen the major learning capabilities of electronic engineering learners through inquiry learning using computing thinking ability. To this end, first, in the electronic engineering curriculum, we performed teaching-learning through an inquiry and learning model related to mathematics, probability, and statistics under the theme of various majors in electronic engineering, focusing on understanding computing thinking skills. Second, an efficient electronic engineering subject inquiry class operation using computing thinking ability was conducted, and electronic engineering-linked education contents based on the components of computer thinking were presented. Third, by conducting a case study on inquiry-style teaching using computing thinking skills in the electronic engineering curriculum, we identified the validity of the teaching method to strengthen major competency. In order to prepare for the 4th Industrial Revolution, by implementing mathematics, probability, statistics-related linkage, and convergence education to foster convergent talent, we tried to present effective electronic engineering major competency enhancement measures and cope with innovative technological changes.

United States-China Competition for Technological Supremacy in Quantum Computing and Policy Trends (미중 기술패권 경쟁과 양자컴퓨팅 정책 동향)

  • S.J. Lee;S.H. Jeong;B.S. Cho
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.4
    • /
    • pp.47-57
    • /
    • 2023
  • The competition for technological supremacy is unfolding in the high-tech field, and quantum computing can be determinant for economic and security ripple effects. The United States and China, leaders in quantum computing, have developed this field through adequate policies. The United States has fostered quantum computing through government policies and competition among private companies, while China has secured world-class technology through large-scale government investment and attracting foreign talent. In quantum computing, securing talented people is essential to guarantee independent technology development regarding academic attributes and security. We analyze quantum computing policies in the United States and China on a timeline and determine their policy trends. In addition, the policies for securing talent in these countries are reviewed, and the policy effects are compared based on literature analysis. Through the analysis of policy cases between the United States and China, bilateral policy implications for Korea are delineated.

The Security and Privacy Issues of Fog Computing

  • Sultan Algarni;Khalid Almarhabi;Ahmed M. Alghamdi;Asem Alradadi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.25-31
    • /
    • 2023
  • Fog computing diversifies cloud computing by using edge devices to provide computing, data storage, communication, management, and control services. As it has a decentralised infrastructure that is capable of amalgamating with cloud computing as well as providing real-time data analysis, it is an emerging method of using multidisciplinary domains for a variety of applications; such as the IoT, Big Data, and smart cities. This present study provides an overview of the security and privacy concerns of fog computing. It also examines its fundamentals and architecture as well as the current trends, challenges, and potential methods of overcoming issues in fog computing.

Research on the current state of practical applications and limitations of quantum computing technology

  • Jaehyung, Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.3
    • /
    • pp.1-9
    • /
    • 2023
  • In this paper, we identify the factors that hinder the application of quantum computing technology to solve meaningful real-world problems, and suggest related research trends and directions. To this end, we summarize the basic knowledge of quantum mechanics from the perspective of computer science, which is necessary to understand the difficulties in applying quantum computing technology, and analyze the currently commercialized quantum computers and quantum programming layers from the literature. Through an analysis of the current status and utilization of cloud-based commercial quantum computing services, we identify four factors that currently hinder the practical application of quantum computing: high barriers to entry for quantum computer programming, constraints on noisy intermediate-scale quantum computers, a still-growing open source ecosystem, and difficulties in simulating realistic problem sizes, and suggest trends and directions for related research. In doing so, it is expected to contribute to laying the groundwork for practical applications of quantum computing technology.

A Strategic Grid for Implementing Ubiquitous Computing

  • Yeon, Seung-Jun
    • ETRI Journal
    • /
    • v.29 no.2
    • /
    • pp.252-254
    • /
    • 2007
  • This letter offers a general framework representing the most effective strategies for implementing ubiquitous computing, given different levels of organizational information system capacity and business needs. The strategic grid offered here identifies promising movements which may potentially have a significant effect on the future development of ubiquitous computing.

  • PDF

A study on the Context-Aware Architecture for Ubiquitous on Computing System (유비쿼터스 컴퓨팅 시스템을 위한 상황인식 구조에 관한 연구)

  • Doo, Kyoung-Min;Chi, Sam-Hyun;Kim, Sun-Guk;Chen, Yun;Lee, Kang-Whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.418-422
    • /
    • 2007
  • Ubiquitous Computing System란, 언제 어디서나 통신 및 컴퓨팅이 가능하고 컴퓨팅 시스템이 상호간에 정보를 공유하고 협력하는 컴퓨팅 시스템이다. 이로써 기존의 컴퓨팅 환경과 같이 사용자와 컴퓨터간의 대화형 상호작용이 아닌 물리적인 환경 상황(Context)등을 시스템이 스스로 인식하고 이를 기반으로 사용자와의 상호 작용을 지원하는 상황인식 기술이 필수적인 요소로 부각되고 있다. Ubiquitous Computing System을 위해 사용자 및 주변 환경의 정보를 감지하는 센서(Sensor) 기술이 필요하다. 하지만 사용자 및 주변 환경으로부터 입력되는 불확실하거나 모호한 상황정보에 대한 표현과 추론에 대한 연구는 부족한 실정이다. 본 논문은 Rule based System을 활용하여 CRS(Context Recognition Switch)라는 새로운 개념을 도입한 Context Aware Architecture를 제시한다. CRS는 유비쿼터스 컴퓨팅 시스템을 위해서는 센서로부터 복합적으로 인지된 사용자 정보 및 주변환경의 정보를 사용자로부터 수동적으로 설정되거나 System의 지속적으로 수집된 정보의 통계 값인 Reference Value와 비교하여, 각 상황에 따른 개별적이고 특화된 서비스를 실행을 하도록 제공한다. 이로써 같은 정보의 입력이 들어와도 그 주변 환경의 상황에 따라 사용자의 필요에 최적화된 실행을 할 수 있다. 마지막으로, Ubiquitous Computing System의 향후 발전 가능성을 예상해고, 본 논문에서 제시한 Context Aware Architecture의 유용성을 짐작해 본다.

  • PDF

Challenges and Issues of Resource Allocation Techniques in Cloud Computing

  • Abid, Adnan;Manzoor, Muhammad Faraz;Farooq, Muhammad Shoaib;Farooq, Uzma;Hussain, Muzammil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.2815-2839
    • /
    • 2020
  • In a cloud computing paradigm, allocation of various virtualized ICT resources is a complex problem due to the presence of heterogeneous application (MapReduce, content delivery and networks web applications) workloads having contentious allocation requirements in terms of ICT resource capacities (resource utilization, execution time, response time, etc.). This task of resource allocation becomes more challenging due to finite available resources and increasing consumer demands. Therefore, many unique models and techniques have been proposed to allocate resources efficiently. However, there is no published research available in this domain that clearly address this research problem and provides research taxonomy for classification of resource allocation techniques including strategic, target resources, optimization, scheduling and power. Hence, the main aim of this paper is to identify open challenges faced by the cloud service provider related to allocation of resource such as servers, storage and networks in cloud computing. More than 70 articles, between year 2007 and 2020, related to resource allocation in cloud computing have been shortlisted through a structured mechanism and are reviewed under clearly defined objectives. Lastly, the evolution of research in resource allocation techniques has also been discussed along with salient future directions in this area.