• Title/Summary/Keyword: Private cloud

Search Result 138, Processing Time 0.025 seconds

Development of an Integrated IaaS+PaaS Environment for Providing Cloud Computing Service in a BIM Platform for Harbor Facilities (항만 BIM 플랫폼의 클라우드 서비스를 위한 IaaS+PaaS 통합 환경 개발)

  • Moon, Hyoun-Seok;Hyun, Keun-Ju;Kim, Won-Sik
    • Journal of KIBIM
    • /
    • v.9 no.4
    • /
    • pp.62-74
    • /
    • 2019
  • Because the existing BIM platform is based on user services, the focus is on the development of SaaS (Software as a Service), which provides business services online. However, since a harbor is a security facility, the harbor BIM platform is preferably provided in a private form, rather than relying on the infrastructure environment provided by external cloud providers. Therefore, this study analyzes and reviews the main functions to be provided as SaaS services of the harbor BIM platform. The goal is to build a cloud-based harbor BIM platform that can provide this service to users. To this end, we built IaaS (Infrastructure as a Service) environment of the harbor BIM platform based on the open source Open Stack and integrate and develop PaaS environment with Open Shift applied with IaaS. We applied the GPU to the harbor BIM platform to verify the performance of the harbor BIM platform, and found that the rendering and loading times are improved. In particular, it is expected to reduce the cost of introduction and provide it as the basic cloud environment of similar BIM platform for infrastructure facilities.

Light-weight Preservation of Access Pattern Privacy in Un-trusted Storage

  • Yang, Ka;Zhang, Jinsheng;Zhang, Wensheng;Qiao, Daji
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.5
    • /
    • pp.282-296
    • /
    • 2013
  • With the emergence of cloud computing, more and more sensitive user data are outsourced to remote storage servers. The privacy of users' access pattern to the data should be protected to prevent un-trusted storage servers from inferring users' private information or launching stealthy attacks. Meanwhile, the privacy protection schemes should be efficient as cloud users often use thin client devices to access the data. In this paper, we propose a lightweight scheme to protect the privacy of data access pattern. Comparing with existing state-of-the-art solutions, our scheme incurs less communication and computational overhead, requires significantly less storage space at the user side, while consuming similar storage space at the server. Rigorous proofs and extensive evaluations have been conducted to show that the proposed scheme can hide the data access pattern effectively in the long run after a reasonable number of accesses have been made.

  • PDF

A Study on Automatic Service Creation Method of Cloud-based Mobile Contents

  • Park, Jong-Youel
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.19-24
    • /
    • 2018
  • Recently, people can create small content by themselves and it improved into a form that can be promoted. Also, as active small business owners increase, they produce the content for promotion by themselves without external professional help and they utilize it. This paper studies the method to make Mobile Apps, Mobile Web and homepage services available by automatically generating the mobile based mini content. The automated content creation system suggests the method that small business owners and groups can easily communicate with new people by bringing Single Page Application, hybrid mobile web app, N-Screen based content building, private cloud-based PaaS building technology, P2P network based file sharing and multimedia thread technologies together and creating the content.

Introducing Mobile Cloud Computing-Cloudlet for implementing mobile APP (모바일앱을 구현하기 위한 모바일 클라우드 도입)

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.304-307
    • /
    • 2015
  • Virtualization lacks capabilities for enabling the application to scale efficiently because of new applications components which are raised to be configured on demand. In this paper, we propose an architecture that affords mobile app based on nomadic smartphone using not only mobile cloud computing-cloudlet architecture but also a dedicated platform that relies on using virtual private mobile networks to provide reliable connectivity through Long Term Evolution (LTE) wireless communication. The design architecture lies with how the cloudlet host discovers service and sends out the cloudlet IP and port while locating the user mobile device. We demonstrate the effectiveness of the proposed architecture by implementing an android application responsible of real time analysis by using a vehicle to applications smart phones interface approach that considers the smartphones to act as a remote users which passes driver inputs and delivers outputs from external applications.

  • PDF

Security Requirements Analysis for construction of Secure Cloud Data Center (안전한 클라우드 데이터센터 구축을 위한 보안요구사항 분석)

  • Byun, Yun-Sang;Kwak, Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.931-933
    • /
    • 2012
  • IT기술 및 인터넷의 발전으로 시 공간의 제약 없이 다양한 서비스를 제공받을 수 있는 클라우드 컴퓨팅 기술이 등장하게 되었다. 이로 인해 기존 데이터센터를 가상화 및 클라우드 컴퓨팅 기술과 융합한 클라우드 데이터센터로 전환하여 개인용 클라우드 서비스(Private Cloud Service)나 외부 기업 등에게 아웃소싱 하여 공개형 클라우드 서비스(Public Cloud Service)를 제공하고 있다. 그러나 클라우드 환경은 기존의 IT환경에서 발생한 악성코드를 이용한 데이터 해킹 및 유출과 같은 보안 위협이 존재하며, 새로운 보안 위협들이 발생하고 있다. 따라서 본 논문에서는 안전한 클라우드 데이터센터 구축을 위한 보안요구사항에 대해서 분석한다.

Exploring the Korean Government Policies for Cloud Computing Service (국내 클라우드 정책 분석 및 발전방향에 관한 연구)

  • Baek, Seung Ik;Shin, Ji Yeon;Kim, Jong Woo
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.1-15
    • /
    • 2013
  • Recently, many companies have been interested in the cloud computing as a new IT service. They have believed that the technology enables them to save cost and enhance productivity. However, because of the management and operational problems of the technology, they hesitate to adopt the technology into their businesses rapidly. The developed countries in the IT field, such as USA, UK, and Japan, have deployed various policies to promote the use of the cloud computing in their countries. The Korean Government also has started investing a lot of resources to make the technology used widely. This study examines the current status of the Korean Government's technology policies for the cloud computing by using three analysis frameworks, which can be used to identify the government's roles in government-leading technology initiatives. The results show that the Korean Government's current policies have focused on service providers, not service consumers, and focused on public sectors, not private sectors. The unbalanced policies might interfere with the rapid and massive adoption of the cloud computing.

A Survey of applying Fully Homomorphic Encryption in the Cloud system (클라우드 컴퓨팅 환경에서의 개인정보보호를 위한 완전 동형 암호 적용 방안 고찰)

  • Kim, Sehwan;Yoon, Hyunsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.941-949
    • /
    • 2014
  • Demands for cloud computing service rapidly increased along with the expansion of supplying smart devices. Interest in cloud system has led to the question whether it is really safe. Due to the nature of cloud system, cloud service provider can get a user's private information and disclose it. There is a large range of opinion on this issue and recently many researchers are looking into fully homomorphic encryption as a solution for this problem. Fully homomorphic encryption can permit arbitrary computation on encrypted data. Many security threats will disappear by using fully homomorphic encryption, because fully homomorphic encryption keeps the confidentiality. In this paper, we research possible security threats in cloud computing service and study on the application method of fully homomorphic encryption for cloud computing system.

A Case Study on the Development of Epidemiological Investigation Support System through Inter-ministerial Collaboration (정부 부처간 협업을 통한 온라인 역학조사 지원시스템 개발 사례 연구)

  • Kim, Su Jung;Kim, Jae Ho;Eum, Gyu Ri;Kim, Tae Hyung
    • The Journal of Information Systems
    • /
    • v.29 no.4
    • /
    • pp.123-135
    • /
    • 2020
  • Purpose The purpose of this study is to investigate the development process and the effectiveness of the EISS (epidemiological investigation support system), which prevents the spread of infectious diseases like a novel corona virus disease, COVID-19. Design/methodology/approach This study identified the existing epidemiological support system for MERS through prior research and studied the case of the development of a newly developed epidemiological support system based on cloud computing infrastructure for COVID-19 through inter-ministerial collaboration in 2020. Findings The outbreak of COVID-19 drove the Korean Government began the development of the EISS with private companies. This system played a significant role in flattening the spread of infection during several waves in which the number of confirmed cases increased rapidly in Korea, However, we need to be careful in handling confirmed patients' private data affecting their privacy.

Cloud Computing for Healthcare IT Infrastructure Utilization models for Hybrid and Community Clouds

  • Amin, Muhammad Bilal;Khan, Wajahat Ali;Lee, Sung-Young;Lee, Young-Koo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06a
    • /
    • pp.112-115
    • /
    • 2011
  • Healthcare is one of the biggest industries that consume IT Infrastructure as a necessity. A reliable reach to secure private information is the essential goal. Most of the healthcare organizations either have their own custom solutions developed or third part CRM software tailored to their needs. This culture satisfies the usability internal to the organization but lacks the ability to provide public access to the users or even to take a step ahead and collaborate with like minded institutes for research and potential growth. Emergence of cloud computing has provided us the opportunity to take a step ahead and build applications available to users on a secure platform, with ability to scale the resources depending on the requirements. The effective use of hybrid and community cloud can create rock solid foundations for healthcare IT Infrastructure. These cloud deployment models not only caters the present needs of healthcare IT Infrastructure but also opens the possibilities to build applications and provide secure and reliable access beyond the limits of organizational boundaries.

A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4576-4598
    • /
    • 2018
  • In big data age, flexible and affordable cloud storage service greatly enhances productivity for enterprises and individuals, but spontaneously has their outsourced data susceptible to integrity breaches. Provable Data Possession (PDP) as a critical technology, could enable data owners to efficiently verify cloud data integrity, without downloading entire copy. To address challenging integrity problem on multiple clouds for multiple owners, an identity-based batch PDP scheme was presented in ProvSec 2016, which attempted to eliminate public key certificate management issue and reduce computation overheads in a secure and batch method. In this paper, we firstly demonstrate this scheme is insecure so that any clouds who have outsourced data deleted or modified, could efficiently pass integrity verification, simply by utilizing two arbitrary block-tag pairs of one data owner. Specifically, malicious clouds are able to fabricate integrity proofs by 1) universally forging valid tags and 2) recovering data owners' private keys. Secondly, to enhance the security, we propose an improved scheme to withstand these attacks, and prove its security with CDH assumption under random oracle model. Finally, based on simulations and overheads analysis, our batch scheme demonstrates better efficiency compared to an identity based multi-cloud PDP with single owner effort.