• Title/Summary/Keyword: Public cloud

Search Result 310, Processing Time 0.029 seconds

Cloud Computing Strategy Recommendations for Korean Public Organizations: Based on U.S. Federal Institutions' Cloud Computing Adoption Status and SDLC Initiative (한국의 공공기관 클라우드 컴퓨팅 도입 활성화 전략: 미국 연방 공공기관 클라우드 컴퓨팅 도입현황 시사점 및 시스템 개발 수명주기(SDLC) 프로세스 전략을 중심으로)

  • Kang, Sang-Baek Chris
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.103-126
    • /
    • 2015
  • Compared to other countries, cloud computing in Korea is not popular especially in the government sector. One of the reasons for the current not-fully-blossomed situation is partly by early investment in huge government datacenters under Korea's e-government initiative; let alone, there was no strong control tower as well as no enforcing law and ordinances for driving such cloud computing initiative. However, in 2015 March 'Cloud Computing and Privacy Security Act' (hereinafter, Cloud Act) had been passed in the Parliament and from September 2015 Cloud Act was deployed in Korea. In U.S., FedRAMP (Federal Risk Assessment and Management Program) along with Obama Adminstration's 'Cloud First' strategy for U.S. federal institutions is the key momentum for federal cloud computing adoption. In 2015 January, U.S. Congressional Research Service (CRS) has published an extensive monitoring report for cloud computing in U.S. federal institutions. The CRS report which monitored U.S. government cloud computing implementation is indeed a good guideline for Korean government cloud computing services. For this reason, the purpose of the study is to (1) identify important aspects of the enacted Korean Cloud Act, (2) describe recent U.S. federal government cloud computing status, (3) suggest strategy and key strategy factors for facilitating cloud adoption in public organizations reflecting SDLC strategy, wherein.

Cloud Computing Platforms for Big Data Adoption and Analytics

  • Hussain, Mohammad Jabed;Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.290-296
    • /
    • 2022
  • Big Data is a data analysis technology empowered by late advances in innovations and engineering. In any case, big data involves a colossal responsibility of equipment and handling assets, making reception expenses of big data innovation restrictive to little and medium estimated organizations. Cloud computing offers the guarantee of big data execution to little and medium measured organizations. Big Data preparing is performed through a programming worldview known as MapReduce. Normally, execution of the MapReduce worldview requires organized joined stockpiling and equal preparing. The computing needs of MapReduce writing computer programs are frequently past what little and medium measured business can submit. Cloud computing is on-request network admittance to computing assets, given by an external element. Normal arrangement models for cloud computing incorporate platform as a service (PaaS), software as a service (SaaS), framework as a service (IaaS), and equipment as a service (HaaS).

A Study on the Technology Acceptance Factors of the Public Cloud Computing Services (공공 클라우드 컴퓨팅 서비스의 기술수용 결정요인 연구)

  • Kim, Dae Ho;Kim, Tae Hyung
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.2
    • /
    • pp.93-106
    • /
    • 2013
  • Cloud computing services have became an hot issues in business fields while the IT-related global company such as Amazon, MS, and Google took part in. The cloud computing makes it possible to share in the form of outsourcing of hardware and software through the Internet, to build a distributed computing environment via multiple terminals, and to reduce the cost using open source. Such a cloud computing services have not shown any significant growth in Korea yet compared to other countries. Therefore, in this study focusing on public cloud computing services, it is intended to analyze the determinants of public cloud computing services using the technology model. Thus, for users using public cloud services, we conducted a questionnaire survey from the beginning of January 2013 to the end of February 2013. And we derived a research model based on the Technology Acceptance Model(TAM). As a result of this study, it shows that personal aspects significantly impacts on the perceived usability, service aspects, systems aspects, and the intent of the technology acceptances. System aspects significantly effect on the intent of technology acceptances. Perceived usability significantly effects on the service aspects and the systems aspects. The main factors effecting on the intent of the technology acceptances are system aspects and perceived usability in order. And it shows that the personal aspects decreases the intent of the technology acceptances.

  • PDF

An Analysis of Economic Effects of The Cloud Computing Industry (산업연관분석을 이용한 클라우드 컴퓨팅 산업의 경제적 파급효과 분석)

  • Kim, Dong Wook;Ban, Seung Hyun;Leem, Choon Seong
    • Journal of Information Technology Services
    • /
    • v.17 no.3
    • /
    • pp.37-51
    • /
    • 2018
  • Recently, cloud computing market is growing geometrically in both private and public area, and many global companies in various domains have developed and provided cloud computing services. In such situation, Korean government made multiple plans for domestic cloud computing industry. However, most research institutes have focused on market size and status information, which makes actual effectiveness of cloud computing service hard to recognize. In this study, we define cloud computing Industry by rearranging Input-Output table published by the Bank of Korea to use Input-Output Analysis. The Input-Output Analysis was devised in 1963 by Leontief and it is used in many fields of study until now. It produces various coefficients that are able to identify production-inducing effect, value-added effect, labor-inducing effect, front and rear chain effect. The analysis results show that production-inducing effect, front and rear chain effect of cloud computing industry is low compared to other industries. However, cloud computing Industry possesses relatively high value-added effect and labor-inducing effect. It is because industry magnitude of cloud computing is smaller than other industries such as manufacturing, chemical industries. The economic effects of the cloud computing industry are not remarkable, but this result is significant to emerging markets and industries and presents the fresh way of analyzing cloud computing research field.

Experience in Practical Implementation of Abstraction Interface for Integrated Cloud Resource Management on Multi-Clouds

  • Kim, Huioon;Kim, Hyounggyu;Chun, Kyungwon;Chung, Youngjoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.18-38
    • /
    • 2017
  • Infrastructure-as-a-Service (IaaS) clouds provide infrastructure as a pool of virtual resources, and the public IaaS clouds, e.g. Amazon Web Service (AWS) and private IaaS cloud toolkits, e.g. OpenStack, CloudStack, etc. provide their own application programming interfaces (APIs) for managing the cloud resources they offer. The heterogeneity of the APIs, however, makes it difficult to access and use the multiple cloud services concurrently and collectively. In this paper, we explore previous efforts to solve this problem and present our own implementation of an integrated cloud API, which can make it possible to access and use multiple clouds collectively in a uniform way. The implemented API provides a RESTful access and hides underlying cloud infrastructures from users or applications. We show the implementation details of the integrated API and performance evaluation of it comparing the proprietary APIs based on our cloud testbed. From the evaluation results, we could conclude that the overhead imposed by our interface is negligibly small and can be successfully used for multi-cloud access.

Issues and Suggestions for "Act on the Development of Cloud Computing" and Protection of its Users ("클라우드컴퓨팅 발전 및 이용자 보호에 관한 법률"의 쟁점 및 개선방안)

  • Lee, Jung Koo;Min, Daihwan;Kwon, Hun Yeong
    • Journal of Information Technology Applications and Management
    • /
    • v.24 no.1
    • /
    • pp.81-91
    • /
    • 2017
  • In Korea, "Act on the Development of Cloud Computing and Protection of its Users" has been enforced since September 28, 2015. Many countries implemented 'Cloud First' policies and global companies such as Amazon, Microsoft, IBM started cloud services in Korea. Under these circumstance, the Act was established for developing the cloud computing industry. The Act includes clauses for encouraging the use of private cloud computing by public organizations, supporting small- and medium-size cloud service providers, and utilizing secure cloud computing services by users. However, some terms appear to be similar but have different meanings from "Act on Promotion of Information and Communications Network Utilization and Information Protection, etc." and "Personal Information Protection Act". This generated some confusion and conflicts in relation to providing user information to a 3rd party and notifying the intrusion in the Cloud Computing Act. This paper discusses these issues and suggestions for revision of the Cloud Computing Act.

Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure

  • Mahajan, Komal;Makroo, Ansuyia;Dahiya, Deepak
    • Journal of Information Processing Systems
    • /
    • v.9 no.3
    • /
    • pp.379-394
    • /
    • 2013
  • Cloud computing is an evolving computing paradigm that has influenced every other entity in the globalized industry, whether it is in the public sector or the private sector. Considering the growing importance of cloud, finding new ways to improve cloud services is an area of concern and research focus. The limitation of the available Virtual Machine Load balancing policies for cloud is that they do not save the state of the previous allocation of a virtual machine to a request from a Userbase and the algorithm requires execution each time a new request for Virtual Machine allocation is received from the Userbase. This problem can be resolved by developing an efficient virtual machine load balancing algorithm for the cloud and by doing a comparative analysis of the proposed algorithm with the existing algorithms.

A Study of IT competitiveness of SMEs by Cloud Services (클라우드 성공참조모델 발굴을 통한 중소기업 IT경쟁력 강화 연구)

  • Choi, Sung
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.59-71
    • /
    • 2013
  • Cloud service (Amazon Web Services, etc.) to take advantage of the growing global competitiveness of small and medium companies with online services (eg Zynga, paprika wrap) are strenthening the growing global competitiveness by taking advantage of cloud utilization, and financial market analysis services by cloud use have appeared, but the domestic company's cloud still staying in the low-level. SMEs in Korea IT infrastructure needs as well as commercial services such as simulation, test environment configuration, to perform tasks that require a step-by-step in the product development process, which requires different IT Infrastructure Outsourcing workforce commitment, according to the rapid changes in the size of the organization's efficient IT infrastructure such as cloud services because of the lack of capacity to respond to a sudden demand for IT measures required.

Design and Implementation of Multi-Cloud Service Common Platform (멀티 클라우드 서비스 공통 플랫폼 설계 및 구현)

  • Kim, Sooyoung;Kim, Byoungseob;Son, Seokho;Seo, Jihoon;Kim, Yunkon;Kang, Dongjae
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.1
    • /
    • pp.75-94
    • /
    • 2021
  • The 4th industrial revolution needs a fusion of artificial intelligence, robotics, the Internet of Things (IoT), edge computing, and other technologies. For the fusion of technologies, cloud computing technology can provide flexible and high-performance computing resources so that cloud computing can be the foundation technology of new emerging services. The emerging services become a global-scale, and require much higher performance, availability, and reliability. Public cloud providers already provide global-scale services. However, their services, costs, performance, and policies are different. Enterprises/ developers to come out with a new inter-operable service are experiencing vendor lock-in problems. Therefore, multi-cloud technology that federatively resolves the limitations of single cloud providers is required. We propose a software platform, denoted as Cloud-Barista. Cloud-Barista is a multi-cloud service common platform for federating multiple clouds. It makes multiple cloud services as a single service. We explain the functional architecture of the proposed platform that consists of several frameworks, and then discuss the main design and implementation issues of each framework. To verify the feasibility of our proposal, we show a demonstration which is to create 18 virtual machines on several cloud providers, combine them as a single resource, and manage it.

A Secure Data Processing Using ID-Based Key Cryptography in Mobile Cloud Computing (모바일 클라우드 컴퓨팅 환경에서 ID-기반 키 암호화를 이용한 안전한 데이터 처리 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.3-8
    • /
    • 2015
  • Most mobile cloud computing system use public key cryptography to provide data security and mutual authentication. A variant of traditional public key technologies called Identity-Based Cryptography(IBC) has recently received considerable attention. The certificate-free approach of IBC may well match the dynamic qualities of cloud environment. But, there is a need for a lightweight secure framework that provides security with minimum processing overhead on mobile devices. In this paper, we propose to use hierarchical ID-Based Encryption in mobile cloud computing. It is suitable for a mobile network since it can reduce the workload of root Public Key Generators by delegating the privilege of user authentication and private key generation. The Identity-Based Encryption and Identity-Based Signature are also proposed and an ID-Based Authentication scheme is presented to secure data processing. The proposed scheme is designed by one-way hash functions and XOR operations, thus has low computation costs for mobile users.