• Title/Summary/Keyword: Security Technology Policy

Search Result 686, Processing Time 0.027 seconds

Active VM Consolidation for Cloud Data Centers under Energy Saving Approach

  • Saxena, Shailesh;Khan, Mohammad Zubair;Singh, Ravendra;Noorwali, Abdulfattah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.345-353
    • /
    • 2021
  • Cloud computing represent a new era of computing that's forms through the combination of service-oriented architecture (SOA), Internet and grid computing with virtualization technology. Virtualization is a concept through which every cloud is enable to provide on-demand services to the users. Most IT service provider adopt cloud based services for their users to meet the high demand of computation, as it is most flexible, reliable and scalable technology. Energy based performance tradeoff become the main challenge in cloud computing, as its acceptance and popularity increases day by day. Cloud data centers required a huge amount of power supply to the virtualization of servers for maintain on- demand high computing. High power demand increase the energy cost of service providers as well as it also harm the environment through the emission of CO2. An optimization of cloud computing based on energy-performance tradeoff is required to obtain the balance between energy saving and QoS (quality of services) policies of cloud. A study about power usage of resources in cloud data centers based on workload assign to them, says that an idle server consume near about 50% of its peak utilization power [1]. Therefore, more number of underutilized servers in any cloud data center is responsible to reduce the energy performance tradeoff. To handle this issue, a lots of research proposed as energy efficient algorithms for minimize the consumption of energy and also maintain the SLA (service level agreement) at a satisfactory level. VM (virtual machine) consolidation is one such technique that ensured about the balance of energy based SLA. In the scope of this paper, we explore reinforcement with fuzzy logic (RFL) for VM consolidation to achieve energy based SLA. In this proposed RFL based active VM consolidation, the primary objective is to manage physical server (PS) nodes in order to avoid over-utilized and under-utilized, and to optimize the placement of VMs. A dynamic threshold (based on RFL) is proposed for over-utilized PS detection. For over-utilized PS, a VM selection policy based on fuzzy logic is proposed, which selects VM for migration to maintain the balance of SLA. Additionally, it incorporate VM placement policy through categorization of non-overutilized servers as- balanced, under-utilized and critical. CloudSim toolkit is used to simulate the proposed work on real-world work load traces of CoMon Project define by PlanetLab. Simulation results shows that the proposed policies is most energy efficient compared to others in terms of reduction in both electricity usage and SLA violation.

A Study on the Relative Importance of the Administrative and Technical Measures for the Personal Information Protection (개인정보의 관리적·기술적 보호조치 기준의 상대적 중요도에 관한 연구)

  • Kim, Young Hee;Kook, Kwang Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.4
    • /
    • pp.135-150
    • /
    • 2014
  • As the collection and use of personal information increases, the accidents that abuse and leak personal information are continuously increasing. The nation has established new laws and strengthened related laws for the prevention of the mass leakage of personal information and the secondary damage due to the leaked personal information. The nation also established the guidelines that need to be implemented by the institutions handling personal information for the safety of the personal information. For the efficient implementation of guidelines under the limited time and resources, it is necessary to establish the priorities between guidelines. This paper compares the relative importance of the guidelines by AHP (Analytic Hierarchy Process) technique. We performed the analysis on two expert groups, the group of consultants working in information security consulting company and the group of information security staffs handling personal information directly in the company. We compared the differences between groups and recommended the relative importances of the guidelines.

A study on the exportation of the e-clearance system of Korea Customs Service to overseas aiming to lead the global trend of Customs informatization (정보화시대 글로벌 리더로의 도약을 위한 관세청 전자통관시스템 해외수출 전략에 대한 연구)

  • Seo, Jae-Yong;Jo, Jeong-Hun
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2006.06a
    • /
    • pp.45-53
    • /
    • 2006
  • Ever since the computer came into being in early 20th century, rapid development of the information technology has led to the opening of the ubiquitous age where daily works can be done anywhere, anytime, and with any devices. The information technology has drawn attention from Customs around the world as a key means to fulfill multi-faced responsibilities of strengthening regional cooperation in the international trade, simplifying clearance procedures, expediting logistics flow, and ensuring security in the global supply chain. Korea Customs Service, which began the informatization effort by establishing the electronic export declaration system in 1992, completed the 100% electronic clearance system in 2000, with a number of countries now conducting benchmarking studies on the successful use of IT by KCS. This paper is to address the changes brought to the Customs administration in the information age, the progress and achievement of the Customs informatization as a proactive strategy to deal with the changing environment, and the exportation to overseas administration of the e-clearance system of KCS which strives to become the global leader of Customs informatization. The exportation. in particular, will not only lead to increased foreign currency earnings and shared know how, but also create an opportunity to reflect Korea's system in the standardization of Customs procedures around the world.

  • PDF

Privacy Preserving Source Based Deduplicaton Method (프라이버시 보존형 소스기반 중복제거 방법)

  • Nam, Seung-Soo;Seo, Chang-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.175-181
    • /
    • 2016
  • Cloud storage servers do not detect duplication of conventionally encrypted data. To solve this problem, convergent encryption has been proposed. Recently, various client-side deduplication technology has been proposed. However, this propositions still cannot solve the security problem. In this paper, we suggest a secure source-based deduplication technology, which encrypt data to ensure the confidentiality of sensitive data and apply proofs of ownership protocol to control access to the data, from curious cloud server and malicious user.

A Study on Features of Smart Phone Users (스마트 폰 사용자 특성에 관한 탐색적 연구)

  • Ha, Tai-Hyun
    • Journal of Digital Convergence
    • /
    • v.8 no.4
    • /
    • pp.177-184
    • /
    • 2010
  • Mobile phones users are not only able to use smart phone services in real time whenever and wherever they desire, but also they can acquire appropriate information that they need. The features of smart phone services and users are examined in this study because there are not enough studies on such unique features of smart phone services. In accordance with the results of the study the features of smart phone services and users can be categorized as follows: 1) the requisite features of smart phone services are immediate connectivity and. 2) The requisite features for smart phone users are user friendliness and user innovation. 3) The requisite features of smart phone technology are security and linkage.

  • PDF

The Strategies of the Acquisition and Use of Scientific and Technological Information of the Former USSR (구소련(舊蘇聯) 과학기술(科學技術) 정보의 수집 및 활용전략(活用戰略))

  • Kwack, Dong-Chul
    • Journal of Information Management
    • /
    • v.24 no.2
    • /
    • pp.1-18
    • /
    • 1993
  • It is just two years that our country drived forward the project acquiring and using the scientific and technological information of the former USSR. The activities acquiring information are necessary to stir up the scientific and technological cooperation with the former USSR. But it is impossible for any man or institution to accomplish the activities acquiring the scientific and technological information of the former USSR, on the whole, considering political and economic confusion, perfect security policy, and 6,000 research institutes in the former USSR and so on. Thus the support of specialists and budgets should be realized in the national level, along with taking a proper step on mutual cooperation between the related institutions.

  • PDF

Polymorphic Path Transferring for Secure Flow Delivery

  • Zhang, Rongbo;Li, Xin;Zhan, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2805-2826
    • /
    • 2021
  • In most cases, the routing policy of networks shows a preference for a static one-to-one mapping of communication pairs to routing paths, which offers adversaries a great advantage to conduct thorough reconnaissance and organize an effective attack in a stress-free manner. With the evolution of network intelligence, some flexible and adaptive routing policies have already proposed to intensify the network defender to turn the situation. Routing mutation is an effective strategy that can invalidate the unvarying nature of routing information that attackers have collected from exploiting the static configuration of the network. However, three constraints execute press on routing mutation deployment in practical: insufficient route mutation space, expensive control costs, and incompatibility. To enhance the availability of route mutation, we propose an OpenFlow-based route mutation technique called Polymorphic Path Transferring (PPT), which adopts a physical and virtual path segment mixed construction technique to enlarge the routing path space for elevating the security of communication. Based on the Markov Decision Process, with considering flows distribution in the network, the PPT adopts an evolution routing path scheduling algorithm with a segment path update strategy, which relieves the press on the overhead of control and incompatibility. Our analysis demonstrates that PPT can secure data delivery in the worst network environment while countering sophisticated attacks in an evasion-free manner (e.g., advanced persistent threat). Case study and experiment results show its effectiveness in proactively defending against targeted attacks and its advantage compared with previous route mutation methods.

Operation Plan of Big Data Prediction Model using Cut-off-Voting Classifier in Administrative Big Data Environment (행정 빅데이터 환경에서 컷오프-투표 분류기를 활용한 빅데이터 예측모형의 실험)

  • Woosik Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.145-154
    • /
    • 2024
  • In order to operate predictive models utilizing administrative big data, it is crucial to consider policy changes and the characteristics of highly volatile data. Considering this scenario, this study proposes the Cut-off Voting Classifier (CVC) algorithm. This proposed algorithm prevents a sharp decline in accuracy by utilizing multiple weak classifiers. The study validates the proposed algorithm's performance through experiments. The performance evaluation demonstrates the ability to maintain stable prediction rates even in situations with a sharp decline in predictive model accuracy.

A Study on the Impact of Competency of Technology: Based Startups on Performance Using ETRI Technology (ETRI 기술을 활용한 기술창업기업의 역량이 경영성과에 미치는 영향에 관한 연구)

  • Bae, Hongbeom;Song, Minkyung;Kim, Seokyun
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.13 no.1
    • /
    • pp.61-72
    • /
    • 2018
  • In a rapidly changing environment, such as globalization, technology-based startups are attracting attention as a new growth engine that creates jobs and added value and promotes national competitiveness. At present, countries around the world recognize the development of technology-based start-up companies as a major policy task and strive to make policy efforts to revitalize start-ups and strengthen innovation capabilities of companies. Especially, in order to secure superiority in the fierce market competition, it is becoming more and more important for the growth and development of technological start-up companies that pioneer new markets and energize the economy based on original and innovative technologies. Therefore, it is necessary to study systematically and plan for survival and growth of technology start-up companies. The purpose of this study is to investigate the entrepreneurial spirit of Innovation, Entrepreneurship, Risk Sensibility and Technology Innovation Capacity, R&D ability, Technology Accumulation Capacity, Technology Innovation System, The results of this study are as follows. the effects of marketing ability on technical performance and financial performance are examined. First, the CEO 's entrepreneurial spirit has an effect on the technical performance and financial performance of the management performance. Second, the technology accumulation ability and the R & D capability have a positive effect on the technical performance. Finally, it was found that the ability to commercialize the technology commercialization capacity affects both technical performance and financial performance. The policy implications that can be gained through this are as follows. First, by strengthening cooperation between universities and research institutes, related technology entrepreneurship education programs should be upgraded so that technology entrepreneurs or preliminary entrepreneurs can capture business opportunities and secure market price competitiveness. Secondly, R & D for the purpose of start-up should be developed and marketable technology should be developed and linked to direct start-up. Third, it is necessary to activate the program to match the company with the honorary retirement manpower of large enterprises and SMEs, which have more experience in field experience than the founders.

Improving the Decision-Making Process in the Higher Learning Institutions via Electronic Records Management System Adoption

  • Mukred, Muaadh;Yusof, Zawiyah M.;Mokhtar, Umi Asma';Sadiq, Ali Safaa;Hawash, Burkan;Ahmed, Waleed Abdulkafi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.90-113
    • /
    • 2021
  • Electronic Records Management System (ERMS) is a computer program or set of applications that is utilized for keeping up to date records along with their storage. ERMS has been extensively utilized for enhancing the performance of academic institutions. The system assists in the planning and decision-making processes, which in turn enhances the competencies. However, although ERMS is significant in supporting the process of decision-making, the majority of organizations have failed to take an initiative to implement it, taking into account that are some implementing it without an appropriate framework, and thus resulted in the practice which does not meet the accepted standard. Therefore, this study identifies the factors influencing the adoption of ERMS among employees of HLI in Yemen and the role of such adoption in the decision-making process, using the Unified Theory of Acceptance and Use of Technology (UTAUT) along with Technology, Organization and Environment (TOE) as the underpinning theories. The study conducts a cross-sectional survey with a questionnaire as the technique for data collection, distributed to 364 participants in various Yemeni public Higher Learning Institutions (HLI). Using AMOS as a statistical method, the findings revealed there are significant and positive relationships between technology factors (effort expectancy, performance expectancy, IT infrastructure and security), organizational factors (top management support, financial support, training, and policy),environmental factors (competitiveness pressure, facilitating conditions and trust) and behavioral intention to adopt ERMS, which in return has a significant relationship with the process of decision-making in HLI. The study also presents a variety of theoretical and empirical contributions that enrich the body of knowledge in the field of technology adoption and the electronic record's domain.