• Title/Summary/Keyword: cloud-based

검색결과 2,639건 처리시간 0.03초

SSO based Security Management in Cloud Computing Environment

  • Jing, Si Da;Jung, Young-Min;Chung, Mok-Dong
    • 정보처리학회지
    • /
    • 제17권2호
    • /
    • pp.18-29
    • /
    • 2010
  • In this paper, we surveyed SSO based security management including the knowledge domain of the area of cloud and its relevant components. Cloud computing refers to the delivery of software and other technology services over the Internet by a service provider. SSO refers to the ability to log on to a single security system once, rather than logging on separately to multiple security systems. Existing SSO solutions in cloud computing environment suggest several methods. SSO-based security Issues illustrate these key items in cloud computing environment such as risks and security vulnerabilities of SSO. SSO supports for multiple and different domains in cloud computing environment.

  • PDF

Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service

  • Chen, Liqing;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1523-1545
    • /
    • 2019
  • Cloud computing is now a widespread and economical option when data owners need to outsource or share their data. Designing secure and efficient data access control mechanism is one of the most challenging issues in cloud storage service. Anonymous broadcast encryption is a promising solution for its advantages in the respects of computation cost and communication overload. We bring forward an efficient anonymous identity-based broadcast encryption construction combined its application to the data access control mechanism in cloud storage service. The lengths for public parameters, user private key and ciphertext in the proposed scheme are all constant. Compared with the existing schemes, in terms of encrypting and decrypting computation cost, the construction of our scheme is more efficient. Furthermore, the proposed scheme is proved to achieve adaptive security against chosen-ciphertext attack adversaries in the standard model. Therefore, the proposed scheme is feasible for the system of data access control in cloud storage service.

Palette-based Color Attribute Compression for Point Cloud Data

  • Cui, Li;Jang, Euee S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.3108-3120
    • /
    • 2019
  • Point cloud is widely used in 3D applications due to the recent advancement of 3D data acquisition technology. Polygonal mesh-based compression has been dominant since it can replace many points sharing a surface with a set of vertices with mesh structure. Recent point cloud-based applications demand more point-based interactivity, which makes point cloud compression (PCC) becomes more attractive than 3D mesh compression. Interestingly, an exploration activity has been started to explore the feasibility of PCC standard in MPEG. In this paper, a new color attribute compression method is presented for point cloud data. The proposed method utilizes the spatial redundancy among color attribute data to construct a color palette. The color palette is constructed by using K-means clustering method and each color data in point cloud is represented by the index of its similar color in palette. To further improve the compression efficiency, the spatial redundancy between the indices of neighboring colors is also removed by marking them using a flag bit. Experimental results show that the proposed method achieves a better improvement of RD performance compared with that of the MPEG PCC reference software.

An Interactive Multi-Factor User Authentication Framework in Cloud Computing

  • Elsayed Mostafa;M.M. Hassan;Wael Said
    • International Journal of Computer Science & Network Security
    • /
    • 제23권8호
    • /
    • pp.63-76
    • /
    • 2023
  • Identity and access management in cloud computing is one of the leading significant issues that require various security countermeasures to preserve user privacy. An authentication mechanism is a leading solution to authenticate and verify the identities of cloud users while accessing cloud applications. Building a secured and flexible authentication mechanism in a cloud computing platform is challenging. Authentication techniques can be combined with other security techniques such as intrusion detection systems to maintain a verifiable layer of security. In this paper, we provide an interactive, flexible, and reliable multi-factor authentication mechanisms that are primarily based on a proposed Authentication Method Selector (AMS) technique. The basic idea of AMS is to rely on the user's previous authentication information and user behavior which can be embedded with additional authentication methods according to the organization's requirements. In AMS, the administrator has the ability to add the appropriate authentication method based on the requirements of the organization. Based on these requirements, the administrator will activate and initialize the authentication method that has been added to the authentication pool. An intrusion detection component has been added to apply the users' location and users' default web browser feature. The AMS and intrusion detection components provide a security enhancement to increase the accuracy and efficiency of cloud user identity verification.

베이지안 영상융합을 적용한 모바일 클라우드 성능실험 (A Performance Test of Mobile Cloud Service for Bayesian Image Fusion)

  • 강상구;이기원
    • 대한원격탐사학회지
    • /
    • 제30권4호
    • /
    • pp.445-454
    • /
    • 2014
  • 현재 정보통신기술 분야의 핵심 용어라고 할 수 있는 클라우드, 빅데이터, 모바일 등이 다양한 플랫폼 및 서비스에 따라 상호 연결되면서 활용되고 있다. 특히 모바일과 연계된 클라우드는 모바일의 장점과 클라우드 컴퓨팅 기술 적용에 따른 장점을 모두 유지하고 향상시킬 수 있다. 그러나 아직 다른 나라에서도 공간영상정보의 처리나 분석 등과 같은 모바일 공공 클라우드 서비스를 제공하는 사례는 거의 없으며 실무적인 적용을 위한 실험 연구가 필요한 상황이다. 이번 연구에서는 위성영상정보의 베이지안 영상융합 기법을 적용한 모바일 클라우드 서비스 성능 실험을 수행하였다. 두 가지 플랫폼을 대상으로 하였는바, Amazon 클라우드 서비스 환경과 오픈소스 기반의 클라우드 컴퓨팅 환경인 OpenStack을 기반으로 한 자체적인 클라우드 환경을 구축하였다. 모바일 클라우드 성능 비교에 대한 기준이 아직 설정되어 있지 않는 실정이므로 가능한 간단하고 유사한 실험 조건을 적용한 실험 결과로 두 가지 클라우드 환경에서 처리 결과가 큰 차이는 없는 것으로 나타났다. 이는 오픈소스 기반의 모바일 클라우드 환경을 공간정보 서비스 분야에서도 충분히 적용할 수 있음을 의미한다.

전자의무기록의 클라우드 기반 저장소 이동시 고려사항 (Considerations for the Migration of Electronic Medical Records to Cloud Based Storage)

  • 이명호
    • 한국도서관정보학회지
    • /
    • 제47권1호
    • /
    • pp.149-173
    • /
    • 2016
  • 클라우드 컴퓨팅에 대한 관심이 많아짐으로 인해 많은 기관들이 클라우드 컴퓨팅으로 전환을 결정하고 있다. 확장성, 비용 효율성, 접근성 등 다양한 장점으로 인해 의료 기관들도 정보 인프라를 클라우드 기반으로 전환하는 것을 추진하고 있다. 이러한 장점에도 불구하고 많은 양의 민감한 개인정보를 이동 (migration) 하는 것에 대한 여러 가지가 고려되어야 한다. 의료 기관은 민감한 환자 정보에 대한 보안, 안정성, 가용성을 고려하고 또한 HIPPA와 같은 법적인 요구 사항을 만족시켜야 한다. 본 연구는 전자의무기록을 클라우드 기반 저장소로 이동시 장점 및 문제점을 조사하고 또한 고려사항을 제안하고자 한다.

Optimization of Data Placement using Principal Component Analysis based Pareto-optimal method for Multi-Cloud Storage Environment

  • Latha, V.L. Padma;Reddy, N. Sudhakar;Babu, A. Suresh
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.248-256
    • /
    • 2021
  • Now that we're in the big data era, data has taken on a new significance as the storage capacity has exploded from trillion bytes to petabytes at breakneck pace. As the use of cloud computing expands and becomes more commonly accepted, several businesses and institutions are opting to store their requests and data there. Cloud storage's concept of a nearly infinite storage resource pool makes data storage and access scalable and readily available. The majority of them, on the other hand, favour a single cloud because of the simplicity and inexpensive storage costs it offers in the near run. Cloud-based data storage, on the other hand, has concerns such as vendor lock-in, privacy leakage and unavailability. With geographically dispersed cloud storage providers, multicloud storage can alleviate these dangers. One of the key challenges in this storage system is to arrange user data in a cost-effective and high-availability manner. A multicloud storage architecture is given in this study. Next, a multi-objective optimization problem is defined to minimise total costs and maximise data availability at the same time, which can be solved using a technique based on the non-dominated sorting genetic algorithm II (NSGA-II) and obtain a set of non-dominated solutions known as the Pareto-optimal set.. When consumers can't pick from the Pareto-optimal set directly, a method based on Principal Component Analysis (PCA) is presented to find the best answer. To sum it all up, thorough tests based on a variety of real-world cloud storage scenarios have proven that the proposed method performs as expected.

클라우드 서비스 품질·성능 관리체계의 개선방안 (Improvement of Cloud Service Quality and Performance Management System)

  • 김남주;함재춘;서광규
    • 반도체디스플레이기술학회지
    • /
    • 제20권4호
    • /
    • pp.83-88
    • /
    • 2021
  • Cloud services have become the core infrastructure of the digital economy as a basis for collecting, storing, and processing large amounts of data to trigger artificial intelligence-based services and industrial innovation. Recently, cloud services have been spotlighted as a means of responding to corporate crises and changes in the work environment in a national disaster caused by COVID-19. While the cloud is attracting attention, the speed of adoption and diffusion of cloud services is not being actively carried out due to the lack of trust among users and uncertainty about security, performance, and cost. This study compares and analyzes the "Cloud Service Quality and Performance Management System" and the "Cloud Service Certification System" and suggests complementary points and improvement measures for the cloud service quality and performance management system.

Mitigating TCP Incast Issue in Cloud Data Centres using Software-Defined Networking (SDN): A Survey

  • Shah, Zawar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권11호
    • /
    • pp.5179-5202
    • /
    • 2018
  • Transmission Control Protocol (TCP) is the most widely used protocol in the cloud data centers today. However, cloud data centers using TCP experience many issues as TCP was designed based on the assumption that it would primarily be used in Wide Area Networks (WANs). One of the major issues with TCP in the cloud data centers is the Incast issue. This issue arises because of the many-to-one communication pattern that commonly exists in the modern cloud data centers. In many-to-one communication pattern, multiple senders simultaneously send data to a single receiver. This causes packet loss at the switch buffer which results in TCP throughput collapse that leads to high Flow Completion Time (FCT). Recently, Software-Defined Networking (SDN) has been used by many researchers to mitigate the Incast issue. In this paper, a detailed survey of various SDN based solutions to the Incast issue is carried out. In this survey, various SDN based solutions are classified into four categories i.e. TCP Receive Window based solutions, Tuning TCP Parameters based solutions, Quick Recovery based solutions and Application Layer based solutions. All the solutions are critically evaluated in terms of their principles, advantages, and shortcomings. Another important feature of this survey is to compare various SDN based solutions with respect to different performance metrics e.g. maximum number of concurrent senders supported, calculation of delay at the controller etc. These performance metrics are important for deployment of any SDN based solution in modern cloud data centers. In addition, future research directions are also discussed in this survey that can be explored to design and develop better SDN based solutions to the Incast issue.

Monitoring of Virtual Machines in the Eucalyptus Cloud

  • Nandimandalam, Mohan Krishna Varma;Choi, Eunmi
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2013년도 추계학술발표대회
    • /
    • pp.169-171
    • /
    • 2013
  • Cloud computing provides access to big volumes of data and computational resources through various services. Cloud computing also supports to process these volumes of data using set of computers. Cloud computing can satisfy resource requirements through virtualization technology. Eucalyptus is an open source cloud computing environment helps the users to setup their own private cloud based on virtualization. In this paper, monitoring of virtual machines is explained with the eucalyptus cloud setup.