• Title/Summary/Keyword: Server Based Computing

Search Result 673, Processing Time 0.026 seconds

A Development of Adaptive VM Migration Techniques in Cloud Computing (클라우드 컴퓨팅에서 적응적 VM 마이그레이션 기법 개발)

  • Lee, HwaMin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.9
    • /
    • pp.315-320
    • /
    • 2015
  • In cloud computing, server virtualization supports one or more virtual machines loaded on multiple operating systems on a single physical host server. Migration of a VM is moving the VM running on a source host to another physical machine called target host. A VM live migration is essential to support task performance optimization, energy efficiency and energy saving, fault tolerance and load balancing. In this paper, we propose open source based adaptive VM live migration technique. For this, we design VM monitoring module to decide VM live migration and open source based full-virtualization hypervisor.

An Efficient Cache Consistency Method for Mobile Clients in Wireless Environments (무선 환경에서의 이동 클라이언트를 위한 효율적인 캐시 일관성 유지 방안)

  • 송원민;정성원
    • Journal of KIISE:Databases
    • /
    • v.30 no.6
    • /
    • pp.606-628
    • /
    • 2003
  • Recently, there have been many research efforts reported in the literature that focus on the cache consistency problems of mobile clients resulting from their frequent disconnections with a server in mobile environments. To cope with this problem, a number of methods based on the invalidation report scheme has been proposed. However, these proposed methods are sensitive to the disconnection time of mobile clients and independent of the frequency of data updates in the server. As a result, although the number of data updated in the server is small, the traditional methods can not guarantee the cache consistency of mobile clients if their disconnection time is over the time period the invalidation report is allowed to cover. In this paper, we propose an efficient cache consistency method called CCI(Cost-based Cache Invalidation) for mobile clients that take into account not only the disconnection time but also the frequencies of data updates in the server We also present an in-depth experimental analysis by comparing CCI method with BT(Broadcasting Time stamp) method based on Invalidation Report.

Privacy-assured Boolean Adjacent Vertex Search over Encrypted Graph Data in Cloud Computing

  • Zhu, Hong;Wu, Bin;Xie, Meiyi;Cui, Zongmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.5171-5189
    • /
    • 2016
  • With the popularity of cloud computing, many data owners outsource their graph data to the cloud for cost savings. The cloud server is not fully trusted and always wants to learn the owners' contents. To protect the information hiding, the graph data have to be encrypted before outsourcing to the cloud. The adjacent vertex search is a very common operation, many other operations can be built based on the adjacent vertex search. A boolean adjacent vertex search is an important basic operation, a query user can get the boolean search results. Due to the graph data being encrypted on the cloud server, a boolean adjacent vertex search is a quite difficult task. In this paper, we propose a solution to perform the boolean adjacent vertex search over encrypted graph data in cloud computing (BASG), which maintains the query tokens and search results privacy. We use the Gram-Schmidt algorithm and achieve the boolean expression search in our paper. We formally analyze the security of our scheme, and the query user can handily get the boolean search results by this scheme. The experiment results with a real graph data set demonstrate the efficiency of our scheme.

A Study on Network Game Based on Client/Server (클라이언트/서버 기반의 네트워크 게임 연구)

  • Byun, Young-Ki;Lee, Han-Kwon;Kim, Jong-Gyeum;Cho, Tae-Kyung
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.55 no.2
    • /
    • pp.73-77
    • /
    • 2006
  • A server is simply a computer that is running software that enables it to serve specific requests from other computers, called 'clients.' Distributed systems are considered by some to be the 'next wave' of computing. A collection of probably heterogeneous distribution systems is transparent to the user so that the system appears as one local machine. This paper is going to search about whole of Client/Server distributed systems environment through network game. This paper presents game by one example of network game. The ladder game uses JAVA and embody to do random every time using Random function and remainder operation repeatedly. Analyze execution principle of network game through this tame and investigate about Client/Server's distributed environment through this.

Design and Implegmentation of an Enterprise Server for Component-based Geographic Information Systems (컴포넌트 기반 지리 정보 시스템을 위한 엔터프라이즈 서버의 설계 및 구현)

  • Lee, Kang-Jun;Hong, Dong-Suk;Park, Ji-Woong;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.1 no.2 s.2
    • /
    • pp.5-20
    • /
    • 1999
  • Recently, the new software paradigm in information technology (IT) is the component-based development (CBD) technology that has brought as a result of the distributed computing environment (DCE). The CBD has reduced a program developing time and has been designed to make a distributed computing environment easier in the Internet and Intranet environments. These changes of software technology have influence on the geographic information system (GIS) and the CBD technology is highly needed as a point of view of the technique and policy of the geographic information system. In this paper, we designed and implemented an Enterprise Server for the efficient development and management of GIS components. Especially, the Enterprise Server was developed with the Enterprise JavaBeans Specification 1.1 that had been proposed as an industry standard by the Sun Microsystems. The Enterprise Server can allows users to manage the Unified Modeling Language (UML) and Design Patterns for the development of GIS components, develop a GIS component container which obeyed the Open Geodata Interoperability Specification (OpenGlS), manage spatial metadata through a spatial XML (eXtensible Markup Language) engine, and implement a TESTBED server for testing and verification of developed GIS components.

  • PDF

A Study on Medical Information Platform Based on Big Data Processing and Edge Computing for Supporting Automatic Authentication in Emergency Situations (응급상황에서 자동인증지원을 위한 빅데이터 처리 및 에지컴퓨팅 기반의 의료정보플랫폼 연구)

  • Ham, Gyu-Sung;Kang, Mingoo;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.87-95
    • /
    • 2022
  • Recently, with the development of smart technology, in medical information platform, patient's biometric data is measured in real time and accumulated into database, and it is possible to determine the patient's emergency situations. Medical staff can easily access patient information after simple authentication using a mobile terminal. However, in accessing medical information using the mobile terminal, it is necessary to study authentication in consideration of the patient situations and mobile terminal. In this paper, we studied on medical information platforms based on big data processing and edge computing for supporting automatic authentication in emergency situations. The automatic authentication system that we had studied is an authentication system that simultaneously performs user authentication and mobile terminal authentication in emergency situations, and grants upper-level access rights to certified medical staff and mobile terminal. Big data processing and analysis techniques were applied to the proposed platform in order to determine emergency situations in consideration of patient conditions such as high blood pressure and diabetes. To quickly determine the patient's emergency situations, edge computing was placed in front of the medical information server so that the edge computing determine patient's situations instead of the medical information server. The medical information server derived emergency situation decision values using the input patient's information and accumulated biometric data, and transmit them to the edge computing to determine patient-customized emergency situation. In conclusion, the proposed medical information platform considers the patient's conditions and determine quick emergency situations through big data processing and edge computing, and enables rapid authentication in emergency situations through automatic authentication, and protects patient's information by granting access rights according to the patient situations and the role of the medical staff.

The Collaborative Image Editing Tool based On the Cloud Computing (클라우드 컴퓨팅 기반의 협업 이미지 제작 도구)

  • Lim, Yang Mi
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1456-1463
    • /
    • 2017
  • In recent times, IaaS (Infrastructure as a Services) have been rapidly evolving to allow developers to easily and efficiently access work in the server and network areas for development of a web of App based on cloud computing. In this study, we developed the collaborative image editing tool App based on Cloud-computing, by adopting AWS of representative company that develops IaaS. First, it is crucial to understand various situation conditions for representative infrastructure services: AWS, Azure and Google (GCP). This may have the effect of reducing manpower and development time, but as each company has different policy and technical support, we need a new study every time the environment changes of infrastructure services. We tried to develop a hybrid-App so that users with various devices can collaborate work each other by utilizing the infrastructure service AWS through the process of developing the image editing authoring tool based on the cloud computing. The future studies should continue about compatibility issues and support issues in order to minimize the problems of overseas infrastructure services, but we think that domestic cloud computing policies and developments should be urgently considered.

A Clustering based Wireless Internet Proxy Server (클러스터링 기반의 무선 인터넷 프록시 서버)

  • 곽후근;우재용;정윤재;김동승;정규식
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.1
    • /
    • pp.101-111
    • /
    • 2004
  • As different from wired internet, wireless internet has limitations due to the following characteristics; low bandwidth, frequent disconnection, low computing power, small screen in user terminal, and user mobility. Also, wireless internet server should be scalable to handle a large scale traffic due to rapidly growing users. Wireless proxy servers are used for the wireless internet because their caching and transcoding functions are helpful to overcome the above limitation. TranSend was proposed as a clustering based wireless proxy server but its scalability is difficult to achieve because there is no systematic way to do it. In this Paper. we proposed a clustering based wireless internet proxy server which can be scalable in a systematic way. We performed experiments using 16 PCs and experimental results show 32.17% performance improvement of the proposed system compared to TranSend system.

An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards

  • Reddy, Alavalapati Goutham;Das, Ashok Kumar;Yoon, Eun-Jun;Yoo, Kee-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3371-3396
    • /
    • 2016
  • Authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in computing technologies and associated constraints. Lu et al. recently proposed a biometrics and smartcards-based authentication scheme for multi-server environment. The careful analysis of this paper demonstrates Lu et al.'s protocol is susceptible to user impersonation attacks and comprises insufficient data. In addition, this paper proposes an improved authentication with key-agreement protocol for multi-server architecture based on biometrics and smartcards. The formal security of the proposed protocol is verified using the widely accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our protocol can withstand active and passive attacks. The formal and informal security analysis, and performance analysis sections determines that our protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

QoS Guarantee in Partial Failure of Clustered VOD Server (클러스터 VOD 서버의 부분적 장애에서 QoS 보장)

  • Lee, Joa-Hyoung;Jung, In-Bum
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.363-372
    • /
    • 2009
  • For large scale VOD service, cluster servers are spotlighted to their high performance and low cost. A cluster server usually consists of a front-end node and multiple back-end nodes. Though increasing the number of back-end nodes can result in the more QoS streams for clients, the possibility of failures in back-end nodes is proportionally increased. The failure causes not only the stop of all streaming service but also the loss of the current playing positions. In this paper, when a back-end node becomes a failed state, the recovery mechanisms are studied to support the unceasing streaming service. For the actual VOD service environment, we implement a cluster-based VOD servers composed of general PCs and adopt the parallel processing for MPEG movies. From the implemented VOD server, a video block recovery mechanism is designed on parity algorithms. However, without considering the architecture of cluster-based VOD server, the application of the basic technique causes the performance bottleneck of the internal network for recovery and also results in the inefficiency CPU usage of back-end nodes. To address these problems, we propose a new failure recovery mechanism based on the pipeline computing concept.