• Title/Summary/Keyword: cloud service

Search Result 1,313, Processing Time 0.028 seconds

Energy and Service Level Agreement Aware Resource Allocation Heuristics for Cloud Data Centers

  • Sutha, K.;Nawaz, G.M.Kadhar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5357-5381
    • /
    • 2018
  • Cloud computing offers a wide range of on-demand resources over the internet. Utility-based resource allocation in cloud data centers significantly increases the number of cloud users. Heavy usage of cloud data center encounters many problems such as sacrificing system performance, increasing operational cost and high-energy consumption. Therefore, the result of the system damages the environment extremely due to heavy carbon (CO2) emission. However, dynamic allocation of energy-efficient resources in cloud data centers overcomes these problems. In this paper, we have proposed Energy and Service Level Agreement (SLA) Aware Resource Allocation Heuristic Algorithms. These algorithms are essential for reducing power consumption and SLA violation without diminishing the performance and Quality-of-Service (QoS) in cloud data centers. Our proposed model is organized as follows: a) SLA violation detection model is used to prevent Virtual Machines (VMs) from overloaded and underloaded host usage; b) for reducing power consumption of VMs, we have introduced Enhanced minPower and maxUtilization (EMPMU) VM migration policy; and c) efficient utilization of cloud resources and VM placement are achieved using SLA-aware Modified Best Fit Decreasing (MBFD) algorithm. We have validated our test results using CloudSim toolkit 3.0.3. Finally, experimental results have shown better resource utilization, reduced energy consumption and SLA violation in heterogeneous dynamic cloud environment.

User Authentication Technology using Multiple SSO in the Cloud Computing Environment

  • Cho, Min-Hee;Jang, Eun-Gyeom;Choi, Yong-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.4
    • /
    • pp.31-38
    • /
    • 2016
  • The interface between servers and clients and system management in the cloud computing environment is different from the existing computing environment. The technology for information protection. Management and user authentication has become an important issue. For providing a more convenient service to users, SSO technology is applied to this cloud computing service. In the SSO service environment, system access using a single key facilitates access to several servers at the same time. This SSO authentication service technology is vulnerable to security of several systems, once the key is exposed. In this paper, we propose a technology to solve problems, which might be caused by single key authentication in SSO-based cloud computing access. This is a distributed agent authentication technology using a multiple SSO agent to reinforce user authentication using a single key in the SSO service environment. For user authentication reinforcement, phased access is applied and trackable log information is used when there is a security problem in system to provide a safe cloud computing service.

A Study on Innovation Resistance of Digital Trade Based On Cloud Services (클라우드 서비스를 활용한 디지털무역 사용자의 혁신저항에 관한 연구)

  • Lee, In-Seong;Kim, Sok-Tae
    • Asia-Pacific Journal of Business
    • /
    • v.12 no.4
    • /
    • pp.313-329
    • /
    • 2021
  • Purpose - Digital trade, which started in the early 2000s, is showing a sharp increase due to the recent pandemic. However, despite this proliferation, users' acceptance of innovation is very slow. Cloud services are at the center of digital trade activation. This study aims to contribute to the spread of digital trade through empirical analysis of the resistance factors that hinder the use of cloud service-based digital trade using the innovation resistance theory and the status quo bias theory. Design/Methodology/Approach - In order to achieve the research purpose, this study was conducted with 171 entrepreneurs using cloud service-based digital trade. Structural equation model(SEM) was used through empirical analysis. Findings - As a result of the study, it was found that the complexity of technology, perceived risk, compatibility, and trust in service providers had a significant effect on innovation resistance, and policy trust did not affect innovation resistance. Also, security concerns and institutional trust were analyzed to have a significant effect on the trust of service providers. Research Implications - This study is meaningful to help the rapid diffusion of innovative technologies through empirical analysis of factors that lower the intention to accept cloud service-based digital trade.

Cloud Attack Detection with Intelligent Rules

  • Pradeepthi, K.V;Kannan, A
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4204-4222
    • /
    • 2015
  • Cloud is the latest buzz word in the internet community among developers, consumers and security researchers. There have been many attacks on the cloud in the recent past where the services got interrupted and consumer privacy has been compromised. Denial of Service (DoS) attacks effect the service availability to the genuine user. Customers are paying to use the cloud, so enhancing the availability of services is a paramount task for the service provider. In the presence of DoS attacks, the availability is reduced drastically. Such attacks must be detected and prevented as early as possible and the power of computational approaches can be used to do so. In the literature, machine learning techniques have been used to detect the presence of attacks. In this paper, a novel approach is proposed, where intelligent rule based feature selection and classification are performed for DoS attack detection in the cloud. The performance of the proposed system has been evaluated on an experimental cloud set up with real time DoS tools. It was observed that the proposed system achieved an accuracy of 98.46% on the experimental data for 10,000 instances with 10 fold cross-validation. By using this methodology, the service providers will be able to provide a more secure cloud environment to the customers.

Implementation of Data processing of the High Availability for Software Architecture of the Cloud Computing (클라우드 서비스를 위한 고가용성 대용량 데이터 처리 아키텍쳐)

  • Lee, Byoung-Yup;Park, Junho;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.2
    • /
    • pp.32-43
    • /
    • 2013
  • These days, there are more and more IT research institutions which foresee cloud services as the predominant IT service in the near future and there, in fact, are actual cloud services provided by some IT leading vendors. Regardless of physical location of the service and environment of the system, cloud service can provide users with storage services, usage of data and software. On the other hand, cloud service has challenges as well. Even though cloud service has its edge in terms of the extent to which the IT resource can be freely utilized regardless of the confinement of hardware, the availability is another problem to be solved. Hence, this paper is dedicated to tackle the aforementioned issues; prerequisites of cloud computing for distributed file system, open source based Hadoop distributed file system, in-memory database technology and high availability database system. Also the author tries to body out the high availability mass distributed data management architecture in cloud service's perspective using currently used distributed file system in cloud computing market.

Analysis of Use Intention of Mobile Cloud Service using a Convergence Technology Acceptance Model (융합기술수용모델을 이용한 모바일 클라우드 서비스 이용의도 분석)

  • Seo, Kwang-Kyu
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.105-110
    • /
    • 2016
  • As smart devices have proliferated and network speed and accessibility of mobile have accelerated, mobile cloud services that can do the same tasks by various devices are promoted. This paper explores the analysis of use intention of mobile cloud services and influencing factors. We develop and apply a convergence technology acceptance model which combines TAM, VAM and UTAUT. The proposed model verifies some hypotheses to aware the significant factors of use intention of mobile cloud services with TAM, VAM and UTAUT including additional mobile cloud service characteristics such as mobility, high availability, easy accessibility and scalability. Eventually, this research can not only help users gain insights into mobile cloud service use intention, but also help mobile cloud service providers to develop more effective mobile cloud service and their business strategy in the future.

Digital Forensic Methodology of IaaS Cloud Computing Service (IaaS 유형의 클라우드 컴퓨팅 서비스에 대한 디지털 포렌식 연구)

  • Jeong, Il-Hoon;Oh, Jung-Hoon;Park, Jung-Heum;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.55-65
    • /
    • 2011
  • Recently, use of cloud computing service is dramatically increasing due to wired and wireless communications network diffusion in a field of high performance Internet technique. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. In a view of digital forensic investigation, it is difficult to obtain data from cloud computing service environments. therefore, this paper suggests analysis method of AWS(Amazon Web Service) and Rackspace which take most part in cloud computing service where IaaS formats presented for data acquisition in order to get an evidence.

Testing Implementation of Remote Sensing Image Analysis Processing Service on OpenStack of Open Source Cloud Platform (오픈소스 클라우드 플랫폼 OpenStack 기반 위성영상분석처리 서비스 시험구현)

  • Kang, Sang-Goo;Lee, Ki-Won
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.16 no.4
    • /
    • pp.141-152
    • /
    • 2013
  • The applications and concerned technologies of cloud computing services, one of major trends in the information communication technology, are widely progressing and advancing. OpenStack, one of open source cloud computing platforms, is comprised of several service components; using these, it can be possible to build public or private cloud computing service for a given target application. In this study, a remote sensing image analysis processing service on cloud computing environment has designed and implemented as an operational test application in the private cloud computing environment based on OpenStack. The implemented service is divided into instance server, web service, and mobile app. A instance server provides remote sensing image processing and database functions, and the web service works for storage and management of remote sensing image from user sides. The mobile app provides functions for remote sensing images visualization and some requests.

Outsourcing Business to cloud computing with communication services

  • Chou, Nory;Lee, Minsoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.146-147
    • /
    • 2010
  • This paper describes business on cloud computing service and the development of solution in the business Architecture in outsourced services environment for communication. Cloud computing is so popular and make people life easier. Business process outsourcing has become attractive to both large and small businesses with the advent of service oriented and specifically web service technology.

Analysis of K-Defense Cloud Computing Service Availability Considering of Cloud Computing Traffic Growth (클라우드 컴퓨팅 트래픽 증가를 고려한 국방 클라우드 컴퓨팅 서비스 가용성 분석)

  • Lee, Sung-Tae;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.93-100
    • /
    • 2013
  • In 2012, According to 'Cisco Global Cloud Index 2011-2016', the Cisco company forecasted that global data center traffic will nearly quadruple and cloud traffic will nearly sextuple by 2016. Such a rapid growing of traffic is caused by traffic inside the data center and cloud computing workloads. In 2010, the Ministry of National Defense decided to build a Mega Center including the cloud computing technology by 2014, as part of the '2012 Information Service Plan', which is now underway. One of the factors to consider is cloud computing traffic to build a Mega Center. Since the K-defense cloud computing system is built, K-defense cloud computing traffic will increase steadily. This paper, analyzed the availability of K-defense cloud computing service with the K-defense cloud computing traffic increasing using K-Defense cloud computing test system and CloudAnalyst simulation tool. Created 3 scenarios and Simulated with these scenarios, the results are derived that the availability of K-defense cloud computing test system is fulfilled, even cloud workloads are increased as muh as forecasted cloud traffic growth from now until 2016.