• Title/Summary/Keyword: Iaas

Search Result 9, Processing Time 0.026 seconds

Design and Implementation of Internet Auction Agent System (IAAS) (인터넷 경매 에이전트 시스템(IAAS)의 설계 및 구현)

  • Cho, Kyung-San;Won, You-Seuk
    • The KIPS Transactions:PartD
    • /
    • v.9D no.5
    • /
    • pp.963-970
    • /
    • 2002
  • In this paper, after defining the requirements to improve the processing of Internet auction, we design and implement Internet Auction Agent System (IAAS) based on the requirements. IAAS consists of a multi - agent system with buying/selling/negotiation agents for auction processing in accordance with the given price strategy, a graphic interface for supporting price strategies, an information agent for supplying real time information and remote control of agents, and DB. For the mobility, scalability, functionality and communication efficiency of agents, IAAS is implemented by using Java JDK1.3, Servlet, RMI and socket. Through the comparative analysis, we show that IAAS fulfills the requirements defined. IAAS can improve the convenience of users and the efficiency of auction processing, and thus increase the utilization of Internet auction.

Semantic Interoperability Framework for IAAS Resources in Multi-Cloud Environment

  • Benhssayen, Karima;Ettalbi, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.1-8
    • /
    • 2021
  • Cloud computing has proven its efficiency, especially after the increasing number of cloud services offered by a wide range of cloud providers, from different domains. Despite, these cloud services are mostly heterogeneous. Consequently, and due to the rising interest of cloud consumers to adhere to a multi-cloud environment instead of being locked-in to one cloud provider, the need for semantically interconnecting different cloud services from different cloud providers is a crucial and important task to ensure. In addition, considerable research efforts proposed interoperability solutions leading to different representation models of cloud services. In this work, we present our solution to overcome this limitation, precisely in the IAAS service model. This solution is a framework permitting the semantic interoperability of different IAAS resources in a multi-cloud environment, in order to assist cloud consumers to retrieve the cloud resource that meets specific requirements.

Openstack based Cloud Platform Test Case Generator (OpenStack기반 클라우드 플랫폼 테스트 케이스 생성기)

  • Sim, Jinsup;Kim, Woongsup
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.895-898
    • /
    • 2015
  • OpenStack는 오픈소스 클라우드 플렛폼이며, Iaas 서비스를 제공하고 있다. Iaas 서비스를 제공하기 위해 많은 서비스 제공되고 있는 데, 이런 다양한 서비스를 테스트하기 위해, OpenStack에서는 Tempest 라는 테스팅 도구를 제공하고 있다. 우리의 논문에서는 이 Tempest라는 테스팅 툴에서 사용하는 테스트 시나리오를 사용자가 XML을 통해 손쉽게 작성하고, 사용자가 원하는 테스트 내용에 맞게 커스터 마이징 하는 방법을 제안한다.

The Construction and Utilization of Cloud Computing Environment with Openstack (Openstack을 이용한 Cloud Computing 환경 구축 및 활용)

  • Kim, YoungHoon;Ji, Hoyoung;Moon, BongKyo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.60-63
    • /
    • 2017
  • Cloud Computing 환경은 사용자로 하여금 네트워크를 통하여 운영플랫폼, 저장매체 등이 운영 가능한 컴퓨터 자원을 신속하게 이용할 수 있는 컴퓨팅 환경이다. 이 환경을 이용하여 사용자들에게 가상의 컴퓨팅 공간을 만들어 resource를 사용하게 만들어주는 Iaas(Infrastructure as a Service)가 급증하고 있다. OpenStack은 Cloud Computing 환경을 이용하여 사용자로 하여금 *aaS제공을 가능하게 해주는 오픈소스 소프트웨어 프로젝트이다. 이 연구는 Openstack을 활용하여 Cloud환경을 구축하고, 이를 활용 하는 방안에 대한 연구이다. GitLab를 이용한 GitLab Service Launching을 시도하고, Hadoop을 통하여 Cloud 환경을 활용한 분산처리 시스템을 구현, Cloud의 활용 방안을 탐구한다.

Performances of Intermittently Aerated and Dynamic Flow Activated Sludge Process (2단간헐폭기 및 유로변경 간헐폭기 활성슬러지 시스템을 이용한 도시하수 처리)

  • 원성연;민경국;이상일
    • Journal of environmental and Sanitary engineering
    • /
    • v.13 no.1
    • /
    • pp.26-31
    • /
    • 1998
  • Removal of nitrogen and phosphate in wastewater is concerned to important for the prevention of eutrophication in receiving water and lake. Conventional activated sludge system designed for organics removal can be retrofitted only by modification of aeration basin to maintain anaerobic and aerobic state. Biological nutrient removal processes(BNR) such as Bardenpho, A$^{2}$/O, UCT, VIP were generally used for the treatment of wastewater. However these BNR processes used in large scale WWTP were not suitable in small scale WWTP(i.e., package type WWTP) due to relatively large fluctuation of flow rate and concentration of pollutants. The purpose of this research was to develop the compact, effective and economical package type WWTP for the removals of carbon and nitrogen in small scale wastewater. Intermittently aerated activated sludge system (IADFAS) were investigated for removal of nitrogen in both domestic wastewater, Bardenpho process was also evaluated. Nitrogen removal of IAAS, IADFAS, Bardenpho were 75, 77 and 67%, respectively.

  • PDF

A Study on Lightweight User Authentication Protocol for Mobile Device in Cloud Service Environment (클라우드 서비스 환경에서 모바일 디바이스의 경량화된 사용자 인증 프로토콜 연구)

  • Kim, Jeong-Ho;Lee, Ah-young;Hyun, Young-Hun;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.800-802
    • /
    • 2015
  • 클라우드 시스템은 온라인상에서 사용자가 원하는 형태에 따라 Saas, Paas, Iaas 등의 다양한 방식으로 자원을 할당받아 사용할 수 있는 시스템을 말한다. 또한 모바일 하드웨어의 성능이 나날이 발전함에 따라 클라우드 시스템을 모바일 환경에서 이용하는 것이 가능해졌는데, 모바일 환경에서는 편리한 이동성이라는 장점을 지니고 있지만, 무선의 방식으로 통신하기 때문에 전력 소모량에 대하여 한계점이 있다. 이를 해결하기 위해서 본 논문에서는 모바일 디바이스 이용자들이 클라우드 서비스를 이용하고자 할 때, 전력 소모를 줄인 경량화된 사용자의 인증 프로토콜을 제안하였다.

Dynamics of the mobile insert helix in the domain III-IV of Aux/IAA17 probed by site-directed spin labeling and paramagnetic NMR spectroscopy

  • Han, Mookyoung;Suh, Jeong-Yong
    • Journal of the Korean Magnetic Resonance Society
    • /
    • v.19 no.2
    • /
    • pp.61-66
    • /
    • 2015
  • The plant hormone auxin is involved in all stages of plant development. Aux/IAAs are the transcriptional repressors that bind to the Auxin Response Factors (ARFs) to regulate the gene expression upon auxin release. Aux/IAA have highly conserved C-terminal domains (domains III-IV) that mediate both homotypic and heterotypic interactions between Aux/IAA and ARF family proteins. Recent studies revealed that the conserved domains III-IV share a common ${\beta}$-grasp fold that oligomerizes in a front-to-back manner. In particular, Aux/IAA contains a mobile insert helix in the domain III-IV, whereas ARFs do not. Here, we investigated the dynamics of the insert helix using paramagnetic NMR spectroscopy. The insert helix exhibited fast motions in the ps-ns time scale from $^{15}N$ relaxation data, but the amplitude of the motion is likely limited to the local neighborhood. Our result suggests that the motion of the helix may have functional implications in protein-protein interactions for transcriptional regulations.

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.

A Study on the Realization of Diskless and Stateless Security Policy Based High-speed Synchronous Network Infrastructure (Diskless와 Stateless 보안정책 기반의 고속화 동기 네트워크 인프라 구현에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.673-681
    • /
    • 2011
  • Among the network information services combined with a number of security technologies and required security policies, Infrastructure as a Service, a hardware plat-form service of Cloud Computing, has been provided since 2011. It is more or less similar to the existing central concentration method services, in terms of the specifications and technical aspects for given hardware category, but it is entirely different from them in that it overcomes the spatial limitations of specific network and targets the public network. Information security technology has also been prospering so that it could ensure the stability of offered hardware plat-forms. As currently supported hardware, Internet Data Center has been provided by virtualizing the previously offered servers and discs (backup discs), but the hardware plat-forms offered are somewhat limited. Meanwhile, the areas of security fields for offered services are confined to the center or include the TCP/IP-based SSL (Secure Sockets Layer) for the public network connected with clients, which shows that microscopic access security policies have been used. Therefore, this study was aimed to provide a realistic security mechanism for realizing defense policy, by expanding service areas into security devices and suggesting Diskless and Stateless security policy based high-speed synchronous network infrastructure.