• Title/Summary/Keyword: Enterprise Cloud

Search Result 77, Processing Time 0.023 seconds

Qualitative Study on Service Features for Cloud Computing (클라우드 컴퓨팅의 서비스 특성에 관한 질적연구)

  • Ra, Jong-Hei
    • Journal of Digital Contents Society
    • /
    • v.12 no.3
    • /
    • pp.319-327
    • /
    • 2011
  • Cloud computing is the probated transmission-platform that provide the enterprise or individual with efficient and cost-effective IT service on internet. Cloud computing serve as data or computing is moved from desktop or portable PC to the massive data center. Searching for the services offered by cloud computing indicates that their current service feature needs to be improved to satisfy current and future customers. This study attempted to satisfy this need by identifying the service's features for the cloud computing service environment through qualitative approaches. Finally, we classify into seven features(Security, Reliability, Availability, Inter-operating, Economic, Intellectual Property) of cloud computing service.

Distributed Data Platform Collaboration Agent Design Using EMRA

  • Park, Ho-Kyun;Moon, Seok-Jae
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.40-46
    • /
    • 2022
  • Recently, as the need for data access by integrating information in a distributed cloud environment increases in enterprise-wide enterprises, interoperability for collaboration between existing legacy systems is emphasized. In order to interconnect independent legacy systems, it is necessary to overcome platform heterogeneity and semantic heterogeneity. To solve this problem, middleware was built using EMRA (Extended MetaData Registry Access) based on ISO/IEC 11179. However, the designed middleware cannot guarantee the efficiency of information utilization because it does not have an adjustment function for each node's resource status and work status. Therefore, it is necessary to manage and adjust the legacy system. In this paper, we coordinate the correct data access between the information requesting agent and the information providing agent, and integrate it by designing a cooperative agent responsible for information monitoring and task distribution of each legacy system and resource management of local nodes. to make efficient use of the available information.

An Operation of Cloud System for the Centralization Services of Business Documents (업무문서 중앙화 서비스 제공을 위한 클라우드 시스템 운영방안)

  • Yoon, Yong;Kim, Younsung
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.309-324
    • /
    • 2014
  • This case study focuses on the preparing a guide for the plan to the companies that want to build a business document system for the centralized services under the cloud computing. Total 3 Operating companies with regard to cloud computing issues are introduced for this purpose. Analyzing the usage and development direction of the selected companies were performed to set up plans. Through this in-depth needs of the user's point of view for the management of business documents, The necessary improvements in the process of collaboration and document sharing were derived. Business documents centralized service plans were proposed based on cloud computing models. Practical experiences of the companies were helpful to present the details of the operational strategy and operational plans. Especially with minimal staff input and verification process, Sample method for the automatic generating of the new document file name is introduced. A test bed before operating the enterprise-wide system were presented with information that is to be considered when building systems.

Retrieval Framework for Enterprise Information Integration based on Concept Net in Cloud Environment (클라우드 환경에서 전사적 정보 연계를 위한 개념 망 기반의 검색 프레임워크)

  • Jung, Kye-Dong;Moon, Seok-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.2
    • /
    • pp.453-460
    • /
    • 2013
  • This study proposes a framework that enables efficient integration and usage of enterprise data using semantic based concept net. Integration of enterprise information that has been increasing geometrically in cloud environment. The concept net is very similar in approaching way to existing ontology. However, it builds correlation between object and concept to help user's information integration retrieval more efficiently. In this study, concept nets are divided into 3 kinds and are applied to the proposed framework independently. The concept net in this study is built in ontology format based on master information concept net, keyword concept net and business process concept net. This concept net enables retrieval and usage of data based on correlation among data according to user's request. Then, through combination of master information concept and keyword concept, it provides frequency trace of keyword and category thus improving convenience and speed of retrieval.

A Study on Service Security Framework for SW-IaaS Cloud (SW-IaaS 클라우드 서비스 보안 프레임워크에 관한 연구 - SW-IaaS를 중심으로)

  • Choi, Myeonggil;Park, Choonsik;Jeong, Jaehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.319-325
    • /
    • 2016
  • Cloud computing-related security incidents have occurred recently are beyond the scope of a enterprise's security incident is expanded to the entire range of customers who use the cloud computing environment. The control technology for the overall integrated security of the cloud data center is required for this purpose. This study research integrated and additional security elements for the cloud data center control to understand the existing control technology. It is a better understanding of the IaaS cloud environment to build the IaaS cloud environment by CloudStack. SW-IaaS cloud structure by combining CloudStack and IaaS cloud model presented by NIST is proposed in this study. This paper derive a security framework to consider in each layer of The SW-IaaS cloud components, which are composed of the Cloud Manager, Cluster Manager, and Computer Manager.

Vulnerability and Security Management System from the Perspective of the Cloud Service Users (클라우드 서비스 사용자 관점에서의 취약점과 보안관리체계)

  • Choi, Young-Jin;Ra, Jong-Hei;Ky, Hong Pil;Lee, Sang-Hak
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.401-411
    • /
    • 2012
  • There has been increased interest for cloud computing services that can promote cost savings while increasing investment in information resources. Cloud computing, however, has a disadvantage physically located in the external information resources to take advantage of the economic benefits, the advantages and increase the vulnerability of information protection and control of information assets. In this study, due to the unique properties of the new services, including vulnerability, the vulnerability of cloud computing derive the vulnerability of cloud computing and control items were derived through the mapping between vulnerability and control items, that are not being managed to identify vulnerabilities Cloud computing risk factors are presented.

A Fully Distributed Secure Approach using Nondeterministic Encryption for Database Security in Cloud

  • Srinu Banothu;A. Govardhan;Karnam Madhavi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.140-150
    • /
    • 2024
  • Database-as-a-Service is one of the prime services provided by Cloud Computing. It provides data storage and management services to individuals, enterprises and organizations on pay and uses basis. In which any enterprise or organization can outsource its databases to the Cloud Service Provider (CSP) and query the data whenever and wherever required through any devices connected to the internet. The advantage of this service is that enterprises or organizations can reduce the cost of establishing and maintaining infrastructure locally. However, there exist some database security, privacychallenges and query performance issues to access data, to overcome these issues, in our recent research, developed a database security model using a deterministic encryption scheme, which improved query execution performance and database security level.As this model is implemented using a deterministic encryption scheme, it may suffer from chosen plain text attack, to overcome this issue. In this paper, we proposed a new model for cloud database security using nondeterministic encryption, order preserving encryption, homomorphic encryptionand database distribution schemes, andour proposed model supports execution of queries with equality check, range condition and aggregate operations on encrypted cloud database without decryption. This model is more secure with optimal query execution performance.

A Secure Social Networking Site based on OAuth Implementation

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.308-315
    • /
    • 2016
  • With the advancement in the area of cloud storage services as well as a tremendous growth of social networking sites, permission for one web service to act on the behalf of another has become increasingly vital as social Internet services such as blogs, photo sharing, and social networks. With this increased cross-site media sharing, there is a upscale of security implications and hence the need to formulate security protocols and considerations. Recently, OAuth, a new protocol for establishing identity management standards across services, is provided as an alternative way to share the user names and passwords, and expose personal information to attacks against on-line data and identities. Moreover, OwnCloud provides an enterprise file synchronizing and sharing that is hosted on user's data center, on user's servers, using user's storage. We propose a secure Social Networking Site (SSN) access based on OAuth implementation by combining two novel concepts of OAuth and OwnCloud. Security analysis and performance evaluation are given to validate the proposed scheme.

Open Source Cloud Computing: An Experience Case of Geo-based Image Handling in Amazon Web Services

  • Lee, Ki-Won
    • Korean Journal of Remote Sensing
    • /
    • v.28 no.3
    • /
    • pp.337-346
    • /
    • 2012
  • In the view from most application system developers and users, cloud computing becomes popular in recent years and is still evolving. But in fact it is not easy to reach at the level of actual operations. Despite, it is known that the cloud in the practical stage provides a new pattern for deploying a geo-spatial application. However, domestically geo-spatial application implementation and operation based on this concept or scheme is on the beginning stage. It is the motivation of this works. Although this study is an introductory level, a simple and practical processed result was presented. This study was carried out on Amazon web services platform, as infrastructure as a service in the geo-spatial areas. Under this environment, cloud instance, a web and mobile system being previously implemented in the multi-layered structure for geo-spatial open sources of database and application server, was generated. Judging from this example, it is highly possible that cloud services with the functions of geo-processing service and large volume data handling are the crucial point, leading a new business model for civilian remote sensing application and geo-spatial enterprise industry. The further works to extend geo-spatial applications in cloud computing paradigm are left.