• Title/Summary/Keyword: SaaS cloud

Search Result 96, Processing Time 0.023 seconds

Cloud computing Issues and Security measure (클라우드 컴퓨팅 보안 대책 연구)

  • Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.31-35
    • /
    • 2015
  • Cloud computing is internet-based computing technology. This is a form for exchanging service focused on the Internet. Because Cost is saved and use is easy there's a tendency that many companies are using. Cloud is in the form of a public cloud and private cloud and hybrid cloud. The service model is SaaS, PaaS, IaaS. Cloud computing use is simple but it has a security vulnerability. In particular, there is a vulnerability in virtualization and centralized information. In order to overcome this new security technology is to be developed. In particular, network security technology and authentication technology should be developed. Another way to overcome security responsibilities must be clearly and policies should be unified.

  • PDF

Determinants of Software-as-a-Service Adoption Intention Among Small and Medium-sized Korean Firms (중소기업의 Software-as-a-Service 도입의도 결정요인 연구)

  • Kim, Sung-Hyun;Jang, Si-Young
    • Korean Management Science Review
    • /
    • v.30 no.2
    • /
    • pp.11-30
    • /
    • 2013
  • Small and medium-sized enterprises (SMEs) constitute an important part of current industrial economies. Information technologies can be useful strategic weapons for SMEs by enhancing their competitiveness. Categorized as one kind of cloud computing, SaaS is a computing resource and software sharing model which can be accessed via the Internet. Based on virtualization technology, SaaS is expected to improve the efficiency and quality of the IT service level in SMEs. This study attempts to identify the determinants of SaaS adoption intention among Korean SMEs. Through the lens of the theory of planned behavior, this study adopts technological, organizational, environmental factors to explore the determinants of cloud computing adoption intention. The research population is the SMEs that have been funded by the Korean government. Partial least square method was used for empirical analysis of 190 samples collected through on-line survey. The results show that the positive attitude is influenced by business process improvements. Vender support and top management support are positively associated with subjective norm. Vendor support, top management support can relieve perceived behavior control factors. Government support directly influences adoption intention of cloud computing. These findings can provide useful strategy for both SMEs and vendors of SaaS.

User Targerting SaaS Application Mash-Up Service Framework using Complex-Context and Rule-Martix (복합 콘텍스트 및 Rule-Matrix를 활용한 사용자 맞춤형 SaaS 어플리케이션 연동 서비스 프레임워크)

  • Jung, Jong Jin;Cui, Yun;Kwon, Kyung Min;Lee, Han Ku
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.7
    • /
    • pp.1054-1064
    • /
    • 2017
  • With the development of cloud computing, internet technology and Internet of Things(IoT), most of applications are being smarter and changing from native application to SaaS (Software as a Service) application. New versatile SaaS applications are being released through various app portals (e.g. appstore, googleplay, T-Store, and so on). However, a user has a difficulty in searching, choosing an suitable application to him. It is also hard for him to know what functions of each SaaS application are useful. He wants to be recommended something inter-operated SaaS service according to his personality and his situation. Therefore, this paper presents a way of making mash-up of SaaS applications in order to provide the most convenient inter-operated SaaS service to user. This paper also presents SaaS Application Mash-up Framework (SAMF), complex context and rule matrix. The proposed SAMF is a main system that totally manage SaaS application mash-up service. Complex context and rule matrix are key components in order to recommend what SaaS applications are needed and how those SaaS applications are inter-operated. The SAMF collects complex contexts (User Description, Status Description, SaaS Service Description) in order to choose which SaaS applications are useful, analyze what functions to use, how to mash-up.

Convergence Research for Implementing NC Postprocessor Based Cloud Computing (클라우드컴퓨팅 기반의 NC포스트프로세서 구축을 위한 융합 연구)

  • Ryu, Gab-Sang
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.1
    • /
    • pp.17-23
    • /
    • 2016
  • In this paper, we describe a case of utilizing SaaS technology to build NC Post-processor(WBS) based cloud computing. Developed WPS system was implemented to provide stable and continuous system service by utilizing SCoD methodology. WPS is designed user interface module and control engine module. The interface module is downloaded in a client PC and the control engine is installed in cloud parm area. These modules are connected with computer network. WPS was completed a function test for sheet cutting field and mold manufacturing field, and it is processing a commercial service using with improve the user's convenience and adding a bill charge module.

Monitoring Platform of Clustering Resource Management as Supporting 3D Viewer with Smart Interface (스마트 환경연동 3D 뷰어제공 사용자정의 클러스터링 자원관리 모니터링 플랫폼)

  • Choi, Sung-Ja;Lee, Gang-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.12
    • /
    • pp.77-83
    • /
    • 2010
  • Recently, IT-based environment is changing rapidly as changing in web services platform, evolution of cloud computing environments and expanding the base of a smart market. Accordingly, monitoring development of environment is changing quickly. So a customizable SaaS-based monitoring tool is required to provide monitoring services. It has to support a variety of environmental monitoring and a resource managers with requested information, and by an enhanced monitoring framework in clouding environment of management system. In this paper, the 3D viewer for the management of sensor node management system was designed and built. Through the 3D viewer by enhancing the accessibility and visibility, the sensor network will allow resources to be used efficiently.

Protection of Personal Information on Cloud Service Models (클라우드 서비스 유형별 개인정보보호 방안)

  • Lee, Bosung;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1245-1255
    • /
    • 2015
  • As cloud computing services become popular, the concern on the data security of cloud services increases and the efforts for the data security become essential. In this paper, we describe the pros and cons of cloud computing including the definition of cloud. Then, we discuss the regulations about the protection of user data defined in cloud promotion act. Previous studies related to the privacy protection and the entrustment of personal information in cloud computing are reviewed. We examine how to store the personal information depending on the cloud service model. As a result, we argue that the entrustment of personal information should vary according to the cloud service model and we propose how to protect the personal information on IaaS and SaaS cloud service models.

A Study on Current Status of Central Government's Cloud-System Adoption (공공기관의 클라우드 도입 배경 및 현황)

  • Yu, Young-Moon
    • Proceedings of Korean Society of Archives and Records Management
    • /
    • 2019.05a
    • /
    • pp.51-54
    • /
    • 2019
  • The transition of the central government system to the cloud-based infrastructure is being conducted as the National Information Resources Service (NIRS, Ministry of the Interior and Safety) attempts government resource integration. In the early days, it was attempted as Infrastructure as a Service (IaaS) for cloud service for HW, but now it is being converted to Software as a Service (SaaS) for ordinary service. General tasks of the system are document creation for government service as well as public records management. To this end, government cloud systems were deployed to central government agencies from 2015 to 2018 and planned to be gradually deployed in 2018. Nowadays, records management is conducted with cloud RMS, the cloud RMS system is distributed to the central government from 2016 to 2018, and the dissemination to local government is scheduled to be carried out considering the adoption of On-Nara system.

A VPC-based SaaS Framework for Secure Collaboration (안전한 협업을 위한 VPC 기반 SaaS 프레임워크)

  • Lee, Jaekyung;Son, Junggab;Eun, Hasoo;Oh, Heekuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.849-852
    • /
    • 2013
  • 클라우드 컴퓨팅은 인터넷 기술을 기반으로 하드웨어, 소프트웨어 등의 가상화된 컴퓨팅 자원을 제공하는 기술로 제공되는 서비스의 수준에 따라 IaaS(Infrastructure as a Service), PaaS(Platform as a Service), SaaS(Software as a Service), 세 가지 유형으로 분류된다. 최근에는 기업이나 조직에서 이들 유형 중 SaaS 도입에 대한 관심이 증가하고 있다. 이는 SaaS를 이용하면 기업이나 조직 간의 협업 시스템을 구축하기가 쉬워 업무 효율을 증진시킬 수 있기 때문이다. 하지만 SaaS는 서비스 제공자가 접근 권한을 가지고 있기 때문에 문서에 포함된 정보가 노출될 가능성이 있다. 이러한 문제를 해결하기 위해 본 논문에서는 VPC(Virtual Private Cloud)를 기반으로 하는 SaaS 프레임워크를 제안한다. 제안하는 프레임워크는 VPC 내부에서 SaaS를 운영하기 때문에 서비스 제공자의 개입을 최소화할 수 있으며, 독자적인 인증 관리 시스템과 모니터링 기능을 두어 SaaS에 대한 모든 접근을 관리할 수 있다.

A Classification Technique for Configuration Requirements Elicitation of SaaS (SaaS의 설정 요구사항 추출을 위한 분류 기법)

  • Han, Jong-Dae;Shim, Jae-Kun;Lee, Byung-Jeong;Oh, Jae-Won;Wu, Chi-Su
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.12
    • /
    • pp.1259-1263
    • /
    • 2010
  • SaaS is an emerging paradigm for software development and deployment, expected to able to reduce cost. SaaS is also considered as a crucial technology for implementation of cutting-edge technology, such as distributed computing, green computing, and cloud computing. SaaS is requested to be configurable software to satisfy various customers, therefore it is very important to consider every configurability requirement during requirement elicitation. Our research suggests a classification technique to secure completeness of configuration requirement.

A Design of Interdependent Multi Session Authentication Scheme for Secure Cloud Service (안전한 클라우드 서비스를 위한 상호의존적 다중세션 인증 기법 설계)

  • Song, Jun Ho;Choi, Do Hyun;Park, Jung Oh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.181-196
    • /
    • 2014
  • Cloud computer technology currently provides diverse services based on a comprehensive environment ranging from hardware to solution, network and service. While the target of services has been extended from institutions and corporations to personal infrastructure and issues were made about security problems involved with protection of private information, measures on additional security demands for such service characteristics are insufficient. This paper proposes a multi-session authentication technique based on the characteristics of SaaS (Software as a Service) among cloud services. With no reliable authentication authority, the proposed technique reinforced communication sessions by performing key agreement protocol safe against key exposure and multi-channel session authentication, providing high efficiency of performance through key renewal using optimzied key table. Each formed sessions have resistance against deprivation of individual confirmation and service authority. Suggested confirmation technique that uses these features is expected to provide safe computing service in clouding environment.