• Title/Summary/Keyword: cloud-based

Search Result 2,684, Processing Time 0.033 seconds

IBC-Based Entity Authentication Protocols for Federated Cloud Systems

  • Cao, Chenlei;Zhang, Ru;Zhang, Mengyi;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1291-1312
    • /
    • 2013
  • Cloud computing changes the service models of information systems and accelerates the pace of technological innovation of consumer electronics. However, it also brings new security issues. As one of the important foundations of various cloud security solutions, entity authentication is attracting increasing interest of many researchers. This article proposes a layered security architecture to provide a trust transmission mechanism among cloud systems maintained by different organizations. Based on the security architecture, four protocols are proposed to implement mutual authentication, data sharing and secure data transmission in federated cloud systems. The protocols not only can ensure the confidentiality of the data transferred, but also resist man-in-the-middle attacks and masquerading attacks. Additionally, the security properties of the four protocols have been proved by S-pi calculus formal verification. Finally, the performance of the protocols is investigated in a lab environment and the feasibility of the security architecture has been verified under a hybrid cloud system.

A Study on the Security Framework for IoT Services based on Cloud and Fog Computing (클라우드와 포그 컴퓨팅 기반 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1928-1939
    • /
    • 2017
  • Fog computing is another paradigm of the cloud computing, which extends the ubiquitous services to applications on many connected devices in the IoT (Internet of Things). In general, if we access a lot of IoT devices with existing cloud, we waste a huge amount of bandwidth and work efficiency becomes low. So we apply the paradigm called fog between IoT devices and cloud. The network architecture based on cloud and fog computing discloses the security and privacy issues according to mixed paradigm. There are so many security issues in many aspects. Moreover many IoT devices are connected at fog and they generate much data, therefore light and efficient security mechanism is needed. For example, with inappropriate encryption or authentication algorithm, it causes a huge bandwidth loss. In this paper, we consider issues related with data encryption and authentication mechanism in the network architecture for cloud and fog-based M2M (Machine to Machine) IoT services. This includes trusted encryption and authentication algorithm, and key generation method. The contribution of this paper is to provide efficient security mechanisms for the proposed service architecture. We implemented the envisaged conceptual security check mechanisms and verified their performance.

Adaptive Scheduling Technique Based on Reliability in Cloud Compuing Environment (클라우드 컴퓨팅 환경에서 신뢰성 기반 적응적 스케줄링 기법)

  • Cho, In-Seock;Yu, Heon-Chang
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.2
    • /
    • pp.75-82
    • /
    • 2011
  • Cloud computing is a computing paradigm that provides user's services anywhere, anytime in a virtualized form composed of large computing resources based on internet or intranet. In Cloud computing environments, reliability of system is impact factor because many applications handle large data. In this paper, we propose an adaptive scheduling technique based on reliability with fault tolerance that manages resource variable and resolves problems(change of user's requirement, failure occurrence) in Cloud computing environment. Futhermore, we verified the performance of the proposed scheduling through experiments in CloudSim Simulation.

  • PDF

An Investigation of Cloud Computing and E-Learning for Educational Advancement

  • Ali, Ashraf;Alourani, Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.216-222
    • /
    • 2021
  • Advances in technology have given educators a tool to empower them to assist with developing the best possible human resources. Teachers at universities prefer to use more modern technological advances to help them educate their students. This opens up a necessity to research the capabilities of cloud-based learning services so that educational solutions can be found among the available options. Based on that, this essay looks at models and levels of deployment for the e-learning cloud architecture in the education system. A project involving educators explores whether gement Systems (LMS) can function well in a collaborative remote learning environment. The study was performed on how Blackboard was being used by a public institution and included research on cloud computing. This test examined how Blackboard Learn performs as a teaching tool and featured 60 participants. It is evident from the completed research that computers are beneficial to student education, especially in improving how schools administer lessons. Convenient tools for processing educational content are included as well as effective organizational strategies for educational processes and better ways to monitor and manage knowledge. In addition, this project's conclusions help highlight the advantages of rolling out cloud-based e-learning in higher educational institutions, which are responsible for creating the integrated educational product. The study showed that a shift to cloud computing can bring progress to educational material and substantial improvement to student academic outcomes, which is related to the increased use of better learning tools and methods.

A Study on the Introduction of Library Services Based on Cloud Computing (클라우드 컴퓨팅 기반의 도서관 서비스 도입방안에 관한 연구)

  • Kim, Yong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.23 no.3
    • /
    • pp.57-84
    • /
    • 2012
  • With the advent of Big data era unleashed by tremendous increase of structured and unstructured data, a library needs an effective method to store, manage and preserve various information resources. Also, needs of collaboration of libraries are continuously increased in digital environment. As an effective method to handle the changes and challenges in libraries, interest on cloud computing is growing more and more. This study aims to propose a method to introduce cloud computing in libraries. To achieve the goals, this study performed the literature review to analyze problems of existing library systems. Also, this study proposed considerations, expectations, service scenario, phased strategy to introduce cloud computing in libraries. Based on the results extracted from cases that libraries have introduced cloud computing-based systems, this study proposed introduction strategy and specific applying areas in library works as considered features of cloud computing models. The proposed phased strategy and service scenario may reduce time and effort in the process of introduction of cloud computing and maximize the effect of cloud computing.

An Ontology-based Cloud Storage for Reusing Weapon Models (무기체계 모델 재사용을 위한 온톨로지 기반 클라우드 저장소 연구)

  • Kim, Tae-Sup;Park, Chan-Jong;Kim, Hyun-Hwi;Lee, Kang-Sun
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.3
    • /
    • pp.35-42
    • /
    • 2012
  • Defense Modeling and Simulation aims to provide a computerized war environment where we can analyze weapon systems realistically. As we invest significant efforts to represent weapon systems and their operational environments on the computer, there has been an increasing need to reuse predefined weapon models. In this paper, we introduce OB-Cloud (Ontology-Based Cloud storage) to utilize predefined weapon models. OB-Cloud has been implemented as a repository for OpenSIM (Open Simulation engine for Interoperable Models), which is an integrated simulation environment for aiding weapons effectiveness analysis, under the development of our research team. OB-Cloud uses weapon ontology and thesaurus dictionaries to provide semantic search for reusable models. In this paper, we present repository services of OB-Cloud, including registration of weapon models and semantic retrieval of similar models, and illustrate how we can improve reusability of weapon models, through an example.

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.

Cloud computing Issues and Security measure (클라우드 컴퓨팅 보안 대책 연구)

  • Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.31-35
    • /
    • 2015
  • Cloud computing is internet-based computing technology. This is a form for exchanging service focused on the Internet. Because Cost is saved and use is easy there's a tendency that many companies are using. Cloud is in the form of a public cloud and private cloud and hybrid cloud. The service model is SaaS, PaaS, IaaS. Cloud computing use is simple but it has a security vulnerability. In particular, there is a vulnerability in virtualization and centralized information. In order to overcome this new security technology is to be developed. In particular, network security technology and authentication technology should be developed. Another way to overcome security responsibilities must be clearly and policies should be unified.

  • PDF

Linkage Base of Geo-based Processing Service and Open PaaS Cloud (오픈소스 PaaS 클라우드와 공간정보 처리서비스 연계 기초)

  • KIM, Kwang-Seob;LEE, KI-Won
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.20 no.4
    • /
    • pp.24-38
    • /
    • 2017
  • The awareness and demand for technological elements in the field of cloud computing and their application models have increased. Cloud-based service information systems are being expanded for use in many applications. Advancements in information technology are directly related to spatial information. PaaS is an important platform for implementing a substantial cloud ecosystem to develop geo-based application services. For this reason, it is necessary to analyze the PaaS cloud technology prior to the development of SaaS. The PaaS cloud supports sharing of related extensions, database operations and management, and application development and deployment. The development of geo-spatial information systems or services based on PaaS in ranging the domestic and overseas range is in the initial stages of both research and application. In this study, state-of-the-art cloud computing is reviewed and a conceptual design for geo-based applications is presented. The proposed model is based on container methods, which are the core elements of PaaS cloud technology based on open source. It is thought that these technologies contribute to the applicability and scalability of the geo-spatial information industry that addresses cloud computing. It is expected that the results of this study will provide a technological base for practical service implementation and experimentation for geo-based applications.

The Impact of Perceived Risks and Switching Costs on Switching Intention to Cloud Services: Based on PPM Model (지각된 위험과 전환비용이 클라우드 서비스로의 전환의도에 미치는 영향에 관한 연구: PPM 모델 중심으로)

  • Lee, Seung Hee;Jeong, Seok Chan
    • The Journal of Information Systems
    • /
    • v.30 no.3
    • /
    • pp.65-91
    • /
    • 2021
  • Purpose In this study, we investigated the impact of perceived risk and switching costs on switching intention to cloud service based on PPM (Pull-Push-Mooring) model. Design/methodology/approach We focused on revealing the switching factors of the switching intention to the cloud services. The switching factors to the cloud services were defined as perceived risk consisting of performance risk, economic risk, and security risk, and switching costs consisting of financial and learning costs. On the PPM model, we defined the pull factors consisting of perceived usefulness and perceived ease of use, and the push factor as satisfaction of the legacy system, and the mooring factor as policy supports. Findings The results of this study as follows; (1) Among the perceived risk factors, performance risk has a negative effect on the ease of use of pull factors, and finally it was found to affect the switching intention to the cloud services. Therefore, cloud service providers need to improve trust in cloud services, service timeliness, and linkage to the legacy systems. And it was found that economic risk and security risk among the perceived risk factors did not affect the switching intention to the cloud services. (2) Of the perceived risk factors, financial cost and learning cost did not affect the satisfaction of the legacy system, which is a push factor. It indicates that the respondents are positively considering switching to cloud service in the future, despite the fact that the respondents are satisfied with the use of the legacy system and are aware of the switching cost to cloud service. (3) Policy support was found to improve the switching intention to cloud services by alleviating the financial and learning costs required for cloud service switching.