• Title/Summary/Keyword: Internet Computing

Search Result 3,581, Processing Time 0.028 seconds

A study of network mobility for internet service in railway system (철도에서 네트워크 이동성 적용 방안)

  • Cho, B.K.
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.255-257
    • /
    • 2004
  • The study for ubiquitous computing infra is proceeding actively, it make possible to use service and access network anywhere, anytime because of wire/wireless communication technology and progress of hardware. Domestically, study for the network mobility support technology which is the key technology for future ubiquitous computing realization have progressed, but that is insufficient. Especially, there is no study for independent mobility support study about railway wireless network. So, this study propose network mobility management technology for mobile network infra in railway and proper network model in train.

  • PDF

A study on the security analysis and evaluation of the web based metering/billing system for the value storage electricity meter (전력전자상거래(VSEM)를 위한 웹기반 미터링/과금 시스템의 보안성 분석 및 평가에 관한 연구)

  • Kang Hwan-Il;Song Young-Ki;Kang Hwan-Soo;Jo Jin-Hyung;Jang Woo-Seok
    • Proceedings of the KIPE Conference
    • /
    • 2006.06a
    • /
    • pp.462-464
    • /
    • 2006
  • 본 연구는 제4세대 미터링(Metering) 기술을 이용한 전력전자상거래 즉 VSEM(Value Storage Electricity Meter)을 위한 웹기반 미터링 시스템의 보안성 분석 및 평가에 관한 연구이다. 특히 수요자 측면에서 스마트카드(지불결제)를 이용한 본인 확인(SIM카드), 키 값 확인, VSEM서버에서의 각 수요자와 공급자 데이터 사이의 무결성 확인(Integrity)과 부인 방지(Non-repudiation)를 위한 기존 시스템의 보안 문제를 분석하고 이를 해결할 수 있는 보안 모델을 제안한다.

  • PDF

Prediction Method about Power Consumption by Using Utilization Rate of Resources in Cloud Computing Environment (클라우드 컴퓨팅 환경에서 자원의 사용률을 이용한 소비전력 예측 방안)

  • Park, Sang-myeon;Mun, Young-song
    • Journal of Internet Computing and Services
    • /
    • v.17 no.1
    • /
    • pp.7-14
    • /
    • 2016
  • Recently, as cloud computing technologies are developed, it enable to work anytime and anywhere by smart phone and computer. Also, cloud computing technologies are suited to reduce costs of maintaining IT infrastructure and initial investment, so cloud computing has been developed. As demand about cloud computing has risen sharply, problems of power consumption are occurred to maintain the environment of data center. To solve the problem, first of all, power consumption has been measured. Although using power meter to measure power consumption obtain accurate power consumption, extra cost is incurred. Thus, we propose prediction method about power consumption without power meter. To proving accuracy about proposed method, we perform CPU and Hard disk test on cloud computing environment. During the tests, we obtain both predictive value by proposed method and actual value by power meter, and we calculate error rate. As a result, error rate of predictive value and actual value shows about 4.22% in CPU test and about 8.51% in Hard disk test.

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.55-61
    • /
    • 2017
  • Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.

Task Scheduling in Fog Computing - Classification, Review, Challenges and Future Directions

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.89-100
    • /
    • 2022
  • With the advancement in the Internet of things Technology (IoT) cloud computing, billions of physical devices have been interconnected for sharing and collecting data in different applications. Despite many advancements, some latency - specific application in the real world is not feasible due to existing constraints of IoT devices and distance between cloud and IoT devices. In order to address issues of latency sensitive applications, fog computing has been developed that involves the availability of computing and storage resources at the edge of the network near the IoT devices. However, fog computing suffers from many limitations such as heterogeneity, storage capabilities, processing capability, memory limitations etc. Therefore, it requires an adequate task scheduling method for utilizing computing resources optimally at the fog layer. This work presents a comprehensive review of different task scheduling methods in fog computing. It analyses different task scheduling methods developed for a fog computing environment in multiple dimensions and compares them to highlight the advantages and disadvantages of methods. Finally, it presents promising research directions for fellow researchers in the fog computing environment.

A Hadoop-based Multimedia Transcoding System for Processing Social Media in the PaaS Platform of SMCCSE

  • Kim, Myoungjin;Han, Seungho;Cui, Yun;Lee, Hanku;Jeong, Changsung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.11
    • /
    • pp.2827-2848
    • /
    • 2012
  • Previously, we described a social media cloud computing service environment (SMCCSE). This SMCCSE supports the development of social networking services (SNSs) that include audio, image, and video formats. A social media cloud computing PaaS platform, a core component in a SMCCSE, processes large amounts of social media in a parallel and distributed manner for supporting a reliable SNS. Here, we propose a Hadoop-based multimedia system for image and video transcoding processing, necessary functions of our PaaS platform. Our system consists of two modules, including an image transcoding module and a video transcoding module. We also design and implement the system by using a MapReduce framework running on a Hadoop Distributed File System (HDFS) and the media processing libraries Xuggler and JAI. In this way, our system exponentially reduces the encoding time for transcoding large amounts of image and video files into specific formats depending on user-requested options (such as resolution, bit rate, and frame rate). In order to evaluate system performance, we measure the total image and video transcoding time for image and video data sets, respectively, under various experimental conditions. In addition, we compare the video transcoding performance of our cloud-based approach with that of the traditional frame-level parallel processing-based approach. Based on experiments performed on a 28-node cluster, the proposed Hadoop-based multimedia transcoding system delivers excellent speed and quality.

New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing

  • Zhang, Leyou;Hu, Yupu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1343-1356
    • /
    • 2013
  • Cloud computing has emerged as perhaps the hottest development in information technology at present. This new computing technology requires that the users ensure that their infrastructure is safety and that their data and applications are protected. In addition, the customer must ensure that the provider has taken the proper security measures to protect their information. In order to achieve fine-grained and flexible access control for cloud computing, a new construction of hierarchical attribute-based encryption(HABE) with Ciphertext-Policy is proposed in this paper. The proposed scheme inherits flexibility and delegation of hierarchical identity-based cryptography, and achieves scalability due to the hierarchical structure. The new scheme has constant size ciphertexts since it consists of two group elements. In addition, the security of the new construction is achieved in the standard model which avoids the potential defects in the existing works. Under the decision bilinear Diffie-Hellman exponent assumption, the proposed scheme is provable security against Chosen-plaintext Attack(CPA). Furthermore, we also show the proposed scheme can be transferred to a CCA(Chosen-ciphertext Attack) secure scheme.

PRESSURE BASED ROUTING PROTOCOL FOR UNDERWATER WIRELESS SENSOR NETWORKS: A SURVEY

  • Khasawneh, Ahmad;Bin Abd Latiff, Muhammad Shafie;Chizari, Hassan;Tariq, MoeenUddin;Bamatraf, Abdullah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.504-527
    • /
    • 2015
  • Underwater wireless sensor networks (UWSNs) are similar to the terrestrial sensor networks. Nevertheless, there are different characteristics among them such as low battery power, limited bandwidth and high variable propagation delay. One of the common major problems in UWSNs is determining an efficient and reliable routing between the source node and the destination node. Therefore, researchers tend to design efficient protocols with consideration of the different characteristics of underwater communication. Furthermore, many routing protocols have been proposed and these protocols may be classified as location-based and location-free routing protocols. Pressure-based routing protocols are a subcategory of the location-free routing protocols. This paper focuses on reviewing the pressure-based routing protocols that may further be classified into non-void avoidance protocols and void avoidance protocols. Moreover, non-void avoidance protocols have been classified into single factor based and multi factor based routing protocols. Finally, this paper provides a comparison between these protocols based on their features, performance and simulation parameters and the paper concludes with some future works on which further study can be conducted.

A Study of Factors Affecting the Performance of Collaborative Cloud SaaS Services (과업특성 및 기술특성이 클라우드 SaaS를 통한 협업 성과에 미치는 영향에 관한 연구)

  • Shim, Sujin
    • Journal of Information Technology Services
    • /
    • v.14 no.2
    • /
    • pp.253-273
    • /
    • 2015
  • Cloud computing is provided on demand service via the internet, allowing users to pay for the service they actually use. Categorized as one kind of cloud computing, SaaS is computing resource and software sharing model with can be accessed via the internet. Based on virtualization technology, SaaS is expected to improve the efficiency and quality of the IT service level and performance in company. Therefore this research limited cloud services to SaaS especially focused on collaborative application service, and attempts to identify the factors which impact the performance of collaboration and intention to use. This study adopts technological factors of cloud SaaS services and factors of task characteristics to explore the determinants of collaborative performance and intention to use. An experimental study using student subjects with Google Apps provided empirical validation for our proposed model. Based on 337 data collected from respondents, the major findings are following. First, the characteristics of cloud computing services such as collaboration support, service reliability, and ease of use have positive effects on perceived usefulness of collaborative application while accessability, service reliability, and ease to use have positive effects on intention to use. Second, task interdependence has a positive effects on collaborative performance while task ambiguity factor has not. Third, perceived usefulness of collaborative application have positive effects on intention to use.

Design and Implementation of a Proxy-based Mobile Grid Services Framework (프록시 기반의 모바일 그리드 서비스 프레임워크 설계 및 구현)

  • Kim, Min-Gyu;Park, Si-Yong;Lee, Bong-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.85-98
    • /
    • 2007
  • In distributed computing paradigm, mobile surrogate systems have not gained wide acceptance because of security concerns that have not been suitably addressed yet. Currently even the widely used Grid middleware, Globus, does not have a host authentication mechanism, which makes it hard to provide high performance Grid computing capabilities to mobile clients. In this paper, a mobile Grid service framework is designed and implemented in order to provide Grid services to mobile host such as PDA. The surrogate host-based system allows mobile hosts to be provided with Grid services while moving. The implemented mobile Grid services system has been applied to mobile healthcare system which utilizes Grid computing for ECG signal processing. The presented system framework can be used as a secure enterprise mobile healthcare system for hospital physicians.

  • PDF