• Title/Summary/Keyword: Multi-Cloud Environment

Search Result 118, Processing Time 0.024 seconds

Semantic Interoperability Framework for IAAS Resources in Multi-Cloud Environment

  • Benhssayen, Karima;Ettalbi, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.1-8
    • /
    • 2021
  • Cloud computing has proven its efficiency, especially after the increasing number of cloud services offered by a wide range of cloud providers, from different domains. Despite, these cloud services are mostly heterogeneous. Consequently, and due to the rising interest of cloud consumers to adhere to a multi-cloud environment instead of being locked-in to one cloud provider, the need for semantically interconnecting different cloud services from different cloud providers is a crucial and important task to ensure. In addition, considerable research efforts proposed interoperability solutions leading to different representation models of cloud services. In this work, we present our solution to overcome this limitation, precisely in the IAAS service model. This solution is a framework permitting the semantic interoperability of different IAAS resources in a multi-cloud environment, in order to assist cloud consumers to retrieve the cloud resource that meets specific requirements.

Multi-cloud Technology Introduction and Research Trends (멀티 클라우드 기술 개요 및 연구 동향)

  • Kim, B.S.;Jung, Y.W.;Oh, B.T.;Kim, S.Y.;Son, S.;Seo, J.H.;Bae, S.J.;Lee, G.C.;Kang, D.J.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.3
    • /
    • pp.45-54
    • /
    • 2020
  • The cloud computing industry has focused on establishing a cloud-based business environment for enterprises with efforts to convert using their own on-premise computing infrastructures to using cloud services. With these efforts, using cloud services has become natural, especially for the IT industry. The cloud computing industry is moving toward proliferation of the cloud computing environment into various evolving industries. Along with industrial trends, new technical trends such as edge computing and multi-cloud are emerging. These trends are expected to create new business models and develop related service ecosystems, providing new opportunities for service providers and new experiences for users. A mong those emerging technologies, multi-cloud technology is expected to realize unlimited global cloud computing resources by unifying cloud resources from multiple public cloud service providers. In this paper, we introduce the concept and related trends of multi-cloud technology. Subsequently, we analyze the main functionalities and several use cases of multi-cloud technology. Finally, we summarize the effects and usefulness of multi-cloud technology in the domestic cloud industry.

A Study on a Distributed Data Fabric-based Platform in a Multi-Cloud Environment

  • Moon, Seok-Jae;Kang, Seong-Beom;Park, Byung-Joon
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.321-326
    • /
    • 2021
  • In a multi-cloud environment, it is necessary to minimize physical movement for efficient interoperability of distributed source data without building a data warehouse or data lake. And there is a need for a data platform that can easily access data anywhere in a multi-cloud environment. In this paper, we propose a new platform based on data fabric centered on a distributed platform suitable for cloud environments that overcomes the limitations of legacy systems. This platform applies the knowledge graph database technique to the physical linkage of source data for interoperability of distributed data. And by integrating all data into one scalable platform in a multi-cloud environment, it uses the holochain technique so that companies can easily access and move data with security and authority guaranteed regardless of where the data is stored. The knowledge graph database mitigates the problem of heterogeneous conflicts of data interoperability in a decentralized environment, and Holochain accelerates the memory and security processing process on traditional blockchains. In this way, data access and sharing of more distributed data interoperability becomes flexible, and metadata matching flexibility is effectively handled.

A Design of Interdependent Multi Session Authentication Scheme for Secure Cloud Service (안전한 클라우드 서비스를 위한 상호의존적 다중세션 인증 기법 설계)

  • Song, Jun Ho;Choi, Do Hyun;Park, Jung Oh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.181-196
    • /
    • 2014
  • Cloud computer technology currently provides diverse services based on a comprehensive environment ranging from hardware to solution, network and service. While the target of services has been extended from institutions and corporations to personal infrastructure and issues were made about security problems involved with protection of private information, measures on additional security demands for such service characteristics are insufficient. This paper proposes a multi-session authentication technique based on the characteristics of SaaS (Software as a Service) among cloud services. With no reliable authentication authority, the proposed technique reinforced communication sessions by performing key agreement protocol safe against key exposure and multi-channel session authentication, providing high efficiency of performance through key renewal using optimzied key table. Each formed sessions have resistance against deprivation of individual confirmation and service authority. Suggested confirmation technique that uses these features is expected to provide safe computing service in clouding environment.

An Authentication Scheme and Integration of Medical Information Using Broker in Multi-Cloud Environment (멀티클라우드 환경에서 중개기관을 이용한 의료정보 통합 및 인증 기법)

  • You, Mi-kyeong;Woo, Sung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.603-605
    • /
    • 2014
  • With a fast progress of medical information technology, there are many ongoing studies on utilization and integration of medical information in medical industries. But for now, the integration of medical information is a heavy burden to medical facilities since they have to change their systems in general. So the studies tend to introduce EMR system in a cloud base. The centralized system can have a lot of problems that exposure to health information in a cloud environment. This paper proposes a method for integration and authentication of medical information using broker agent in multi-cloud environment.

  • PDF

A Survey of State-of-the-Art Multi-Authority Attribute Based Encryption Schemes in Cloud Environment

  • Reetu, Gupta;Priyesh, Kanungo;Nirmal, Dagdee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.145-164
    • /
    • 2023
  • Cloud computing offers a platform that is both adaptable and scalable, making it ideal for outsourcing data for sharing. Various organizations outsource their data on cloud storage servers for availing management and sharing services. When the organizations outsource the data, they lose direct control on the data. This raises the privacy and security concerns. Cryptographic encryption methods can secure the data from the intruders as well as cloud service providers. Data owners may also specify access control policies such that only the users, who satisfy the policies, can access the data. Attribute based access control techniques are more suitable for the cloud environment as they cover large number of users coming from various domains. Multi-authority attribute-based encryption (MA-ABE) technique is one of the propitious attribute based access control technique, which allows data owner to enforce access policies on encrypted data. The main aim of this paper is to comprehensively survey various state-of-the-art MA-ABE schemes to explore different features such as attribute and key management techniques, access policy structure and its expressiveness, revocation of access rights, policy updating techniques, privacy preservation techniques, fast decryption and computation outsourcing, proxy re-encryption etc. Moreover, the paper presents feature-wise comparison of all the pertinent schemes in the field. Finally, some research challenges and directions are summarized that need to be addressed in near future.

Context-Aware Security System for Cloud Computing Environment (클라우드 컴퓨팅 환경을 위한 상황인식 보안 시스템)

  • Lee, Hyun-Dong;Chung, Mok-Dong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.19-27
    • /
    • 2010
  • Many security issues occur in cloud computing service environment such as authentication, access control, and so on. In this paper, we propose an effective authentication and access control model which provide integrated management and control when we access various resources in cloud computing environment. To address these problems, we suggest a context-aware single sign-on and access control system using context-awareness, integrated authentication, access control, and OSGi service platform in cloud computing environment. And we show design and implementation of context-aware single sign-on and access control system. Also we verified the flexibility and convenience of the proposed system through multi fact based integrated authentication in cloud computing environment. We could provide flexible and secure seamless security service by user context in cloud computing environment.

An Attack-based Filtering Scheme for Slow Rate Denial-of-Service Attack Detection in Cloud Environment

  • Gutierrez, Janitza Nicole Punto;Lee, Kilhung
    • Journal of Multimedia Information System
    • /
    • v.7 no.2
    • /
    • pp.125-136
    • /
    • 2020
  • Nowadays, cloud computing is becoming more popular among companies. However, the characteristics of cloud computing such as a virtualized environment, constantly changing, possible to modify easily and multi-tenancy with a distributed nature, it is difficult to perform attack detection with traditional tools. This work proposes a solution which aims to collect traffic packets data by using Flume and filter them with Spark Streaming so it is possible to only consider suspicious data related to HTTP Slow Rate Denial-of-Service attacks and reduce the data that will be stored in Hadoop Distributed File System for analysis with the FP-Growth algorithm. With the proposed system, we also aim to address the difficulties in attack detection in cloud environment, facilitating the data collection, reducing detection time and enabling an almost real-time attack detection.

Depth-based Mesh Modeling for Virtual Environment Generation (가상 환경 생성을 위한 깊이 기반 메쉬 모델링)

  • 이원우;우운택
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.111-114
    • /
    • 2003
  • In this paper, we propose a depth-based mesh modeling method to generate virtual environment. The proposed algorithm constructs mesh model from unorganized point cloud obtained from a multi-view camera. We separate the point cloud consisting objects from the background. Then, we apply triangulation to each object and background. Since the objects and the background are modeled independently, it is possible to construct effective virtual environment. The application of proposed modeling method is applicable to entertainment, such as movie and video game and effective virtual environment generation.

  • PDF

Object Detection and Localization on Map using Multiple Camera and Lidar Point Cloud

  • Pansipansi, Leonardo John;Jang, Minseok;Lee, Yonsik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.422-424
    • /
    • 2021
  • In this paper, it leads the approach of fusing multiple RGB cameras for visual objects recognition based on deep learning with convolution neural network and 3D Light Detection and Ranging (LiDAR) to observe the environment and match into a 3D world in estimating the distance and position in a form of point cloud map. The goal of perception in multiple cameras are to extract the crucial static and dynamic objects around the autonomous vehicle, especially the blind spot which assists the AV to navigate according to the goal. Numerous cameras with object detection might tend slow-going the computer process in real-time. The computer vision convolution neural network algorithm to use for eradicating this problem use must suitable also to the capacity of the hardware. The localization of classified detected objects comes from the bases of a 3D point cloud environment. But first, the LiDAR point cloud data undergo parsing, and the used algorithm is based on the 3D Euclidean clustering method which gives an accurate on localizing the objects. We evaluated the method using our dataset that comes from VLP-16 and multiple cameras and the results show the completion of the method and multi-sensor fusion strategy.

  • PDF