• Title/Summary/Keyword: Enterprise Cloud Computing

Search Result 54, Processing Time 0.075 seconds

A Study on Service Security Framework for SW-IaaS Cloud (SW-IaaS 클라우드 서비스 보안 프레임워크에 관한 연구 - SW-IaaS를 중심으로)

  • Choi, Myeonggil;Park, Choonsik;Jeong, Jaehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.319-325
    • /
    • 2016
  • Cloud computing-related security incidents have occurred recently are beyond the scope of a enterprise's security incident is expanded to the entire range of customers who use the cloud computing environment. The control technology for the overall integrated security of the cloud data center is required for this purpose. This study research integrated and additional security elements for the cloud data center control to understand the existing control technology. It is a better understanding of the IaaS cloud environment to build the IaaS cloud environment by CloudStack. SW-IaaS cloud structure by combining CloudStack and IaaS cloud model presented by NIST is proposed in this study. This paper derive a security framework to consider in each layer of The SW-IaaS cloud components, which are composed of the Cloud Manager, Cluster Manager, and Computer Manager.

Research on Cloud Computing-Based SME Informatization Platform Policy (정부의 클라우드 컴퓨팅 기반 중소기업 정보화 플랫폼 정책 연구)

  • Han, Hyun-Soo;Yang, Hee-Dong;Kim, Kiho
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.5
    • /
    • pp.117-128
    • /
    • 2014
  • In this paper, we proposed the necessary government policies for the SME's informatization as the computing environment evolves towards cloud computing. We started with the review of the current SME's computing environment and limitations of current policies, and then addressed the new roles, visions, and missions of the government for the SME informatization. Based upon these arguments, we proposed the mid-term vision and designed the architecture for the cloud computing-based services for SMEs. The major contribution of this paper is to extend the enterprise-based informatization strategies to the context of the government policies so that the government can adopt our arguments as guidelines for the future policies.

The Blockchain-Based Decentralized Approaches for Cloud Computing to Offer Enhanced Quality of Service in terms of Privacy Preservation and Security: A Review.

  • Arun Kumar, B.R.;Komala, R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.115-122
    • /
    • 2021
  • In the recent past enormous enterprise applications have migrated into the cloud computing (CC). The researchers have contributed to this ever growing technology and as a result several innovations strengthened to offer the quality of service (QoS) as per the demand of the customer. It was treated that management of resources as the major challenge to offer the QoS while focusing on the trade-offs among the performance, availability, reliability and the cost. Apart from these regular key focuses to meet the QoS other key issues in CC are data integrity, privacy, transparency, security and legal aspects (DIPTSL). This paper aims to carry out the literature survey by reflecting on the prior art of the work with regard to QoS in CC and possible implementation of block chain to implement decentralised CC solutions governing DIPTSL as an integral part of QoS.

Robust Web Server System Using Virtual Machine Against DOS Attack (가상머신을 이용한 DoS 공격에 강건한 웹 서버 시스템)

  • Park, Seung Kyu;Yang, Hawan Seok;Kim, Bae Hyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.1-7
    • /
    • 2013
  • The cloud computing is technology which gives flexible and solid infrastructure to IT environment. With this technology multiple computing environment can be consolidated in to a single server so that maximize system resource utilization. Better processing power can be achieved with less system resource. IT manager can cope with increasing unnecessary cost for additional server and management cost as well. This means a enterprise is able to provide services with better quality and create new services with surplus resource. The time required for recovery from system failure will be reduced from days to minutes. Enhanced availability and continuity of enterprise business minimize the codt and the risk produced by service discontinuity. In this paper, we propose framework architecture that is strong against denial-of-service attack.

Classification Model for Cloud-based Public Service (클라우드 기반의 공공 서비스 유형 분류 모델)

  • Ra, Jong-Hei;Lee, Ji-Yeon;Shin, Sun-Young;Kim, Jeong-Yeop;Choi, Young-Jin
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.4
    • /
    • pp.509-516
    • /
    • 2013
  • Cloud services are recognized the essential IT infrastructure in the optimal smart society which is changing rapidly as a low-cost and high-efficiency. This service of starting from prominent overseas companies such as Google, Amazon, had influenced on the introduction of the service for the various policies of foreign governments, including the United States and the United Kingdom. Such countries adopting to the cloud computing and make transform to the cloud service of existing public service for the effective management of information resources. In this study, we have proposed the main determining factors of cloud adoption, the model of cloud governance for the adoption of public cloud service.

A Study on the Importance Analysis of Reliability, Security, Economic Efficiency Factors that Companies Should Determine When Adopting Cloud Computing Services (클라우드 컴퓨팅 서비스 채택 시 기업이 판단해야 하는 신뢰성, 보안성, 경제성 요인의 중요도 분석)

  • Kang, Da-Yeon
    • Journal of Digital Convergence
    • /
    • v.19 no.9
    • /
    • pp.75-81
    • /
    • 2021
  • The purpose of this research is to derive and evaluate priorities for critical factors that must be determined before an enterprise adopts a cloud computing service. AHP analysis techniques were used to reflect decisions made by experts as research methods. AHP is a decision-making technique that expresses complex decision-making problems hierarchically and derives the best alternatives through pairwise comparison between the items of the hierarchy. Compared to the existing statistical decision making techniques, the decision making process is systematic and simple, making it easy to understand. In addition, the procedure is also reasonable by providing an indicator to determine the consistency of the decision maker in the analysis process. The analysis results of this research showed that security was the first priority, reliability was the second priority, and economic efficiency was the third priority. Among the factors in the first-priority security items, the access control rights and the safety factors of external threats are the most important factors. Research results can be used as a guideline in future practice, and it is necessary to evaluate, compare and analyze the satisfaction of companies that have adopted cloud computing services in the future.

The Important Factors in Security for Introducing the Cloud Services (클라우드 서비스 도입을 위한 보안 중요도 인식에 대한 연구)

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • Journal of Internet Computing and Services
    • /
    • v.13 no.6
    • /
    • pp.33-40
    • /
    • 2012
  • The cloud service has become the significant factor to save the IT operation cost and to improve the productivities in companies. It was introduced to Korea for enterprise services of major companies in 2008. As the increase of recognition for its effect, more small businesses and public institutions plan to introduce the cloud computing services. The cloud computing researches have only focused on the security threats and response technologies to them. Therefore, this research analyzed the importances of responses to security threats in specific domains. The domains were divided into managerial, physical, and technical security. The specific factors in three domains were used for the analysis in this research as well. The ordered logit model was used for the analysis and the analysis results showed that physical security and managerial security are considered to be significantly important in the cloud computing security. The results also presented that the security policy, the control and surveillance to service infrastructure, and application security are highly important in the respect of specific factors. This research will contribute to enterprises or institutions in Korea, which want to introduce the cloud computing services, by aiding the establishment of effective security strategies.

Data processing techniques applying data mining based on enterprise cloud computing (데이터 마이닝을 적용한 기업형 클라우드 컴퓨팅 기반 데이터 처리 기법)

  • Kang, In-Seong;Kim, Tae-Ho;Lee, Hong-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.8
    • /
    • pp.1-10
    • /
    • 2011
  • Recently, cloud computing which has provided enabling convenience that users can connect from anywhere and user friendly environment that offers on-demand network access to a shared pool of configurable computing resources such as smart-phones, net-books and PDA etc, is to be watched as a service that leads the digital revolution. Now, when business practices between departments being integrated through a cooperating system such as cloud computing, data streaming between departments is getting enormous and then it is inevitably necessary to find the solution that person in charge and find data they need. In previous studies the clustering simplifies the search process, but in this paper, it applies Hash Function to remove the de-duplicates in large amount of data in business firms. Also, it applies Bayesian Network of data mining for classifying the respect data and presents handling cloud computing based data. This system features improved search performance as well as the results Compared with conventional methods and CPU, Network Bandwidth Usage in such an efficient system performance is achieved.

Access Control Mechanism based on MAC for Cloud Convergence (클라우드 융합을 위한 MAC 정책 기반 접근통제 메커니즘)

  • Choi, Eun-Bok;Lee, Sang-Joon
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.1
    • /
    • pp.1-8
    • /
    • 2016
  • Cloud computing technology offers function that share each other computer resource, software and infra structure based on network. Virtualization is a very useful technology for operation efficiency of enterprise's server and reducing cost, but it can be target of new security threat when it is used without considering security. This paper proposes access control mechanism based on MAC(Mandatory Access Control) for cloud convergence that solve various problem that can occur in cloud environment. This mechanism is composed of set of state rules, security characteristics and algorithm. Also, we prove that the machine system with access control mechanism and an initial secure state is a secure system. This policy module of mechanism is expected to not only provide the maintenance but also provide secure resource sharing between virtual machines.

SDN-Based Enterprise and Campus Networks: A Case of VLAN Management

  • Nguyen, Van-Giang;Kim, Young-Han
    • Journal of Information Processing Systems
    • /
    • v.12 no.3
    • /
    • pp.511-524
    • /
    • 2016
  • The Virtual Local Area Network (VLAN) has been used for a long time in campus and enterprise networks as the most popular network virtualization solution. Due to the benefits and advantages achieved by using VLAN, network operators and administrators have been using it for constructing their networks up until now and have even extended it to manage the networking in a cloud computing system. However, their configuration is a complex, tedious, time-consuming, and error-prone process. Since Software Defined Networking (SDN) features the centralized network management and network programmability, it is a promising solution for handling the aforementioned challenges in VLAN management. In this paper, we first introduce a new architecture for campus and enterprise networks by leveraging SDN and OpenFlow. Next, we have designed and implemented an application for easily managing and flexibly troubleshooting the VLANs in this architecture. This application supports both static VLAN and dynamic VLAN configurations. In addition, we discuss the hybrid-mode operation where the packet processing is involved by both the OpenFlow control plane and the traditional control plane. By deploying a real test-bed prototype, we illustrate how our system works and then evaluate the network latency in dynamic VLAN operation.