• Title/Summary/Keyword: cloud-based application

Search Result 374, Processing Time 0.024 seconds

A Performance Test of Mobile Cloud Service for Bayesian Image Fusion (베이지안 영상융합을 적용한 모바일 클라우드 성능실험)

  • Kang, Sanggoo;Lee, Kiwon
    • Korean Journal of Remote Sensing
    • /
    • v.30 no.4
    • /
    • pp.445-454
    • /
    • 2014
  • In recent days, trend technologies for cloud, bigdata, or mobile, as the important marketable keywords or paradigm in Information Communication Technology (ICT), are widely used and interrelated each other in the various types of platforms and web-based services. Especially, the combination of cloud and mobile is recognized as one of a profitable business models, holding benefits of their own. Despite these challenging aspects, there are a few application cases of this model dealing with geo-based data sets or imageries. Among many considering points for geo-based cloud application on mobile, this study focused on a performance test of mobile cloud of Bayesian image fusion algorithm with satellite images. Two kinds of cloud platform of Amazon and OpenStack were built for performance test by CPU time stamp. In fact, the scheme for performance test of mobile cloud is not established yet, so experiment conditions applied in this study are to check time stamp. As the result, it is revealed that performance in two platforms is almost same level. It is implied that open source mobile cloud services based on OpenStack are enough to apply further applications dealing with geo-based data sets.

Service Deployment and Priority Optimization for Multiple Service-Oriented Applications in the Cloud (클라우드에서 서비스 지향 응용을 위한 최적 서비스 배치와 우선순위 결정 기법)

  • Kim, Kilhwan;Keum, Changsup;Bae, Hyun Joo
    • Journal of Information Technology Services
    • /
    • v.13 no.3
    • /
    • pp.201-219
    • /
    • 2014
  • This paper considers service deployment and priority optimization for multiple service-oriented applications sharing reusable services, which are deployed as multiple instances in the cloud. In order to handle variations in the workloads of the multiple applications, service instances of the individual reusable services are dynamically provisioned in the cloud. Also service priorities for each application in a particular reusable service are dynamically adjusted. In this paper, we propose an analytic performance model, based on a queueing network model, to predict the expected sojourn times of multiple service-oriented applications, given the number of service instances and priority disciplines in individual reusable services. We also propose a simple heuristic algorithm to search an optimal number of service instances in the cloud and service priority disciplines for each application in individual reusable services. A numerical example is also presented to demonstrate the applicability of the proposed performance model and algorithm to the proposed optimal decision problem.

Mobile Cloud Computing-based Agent Application Model (모바일 클라우드 기반 에이전트 모델)

  • Ahn, Kwang-Min;Lee, Bong-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.608-611
    • /
    • 2012
  • In this paper, a mobile cloud-based agent model is proposed in order to overcome the resource constraints and the difficulties of installing a variety of complex applications in mobile devices. The proposed software architecture overcomes the disadvantages of mobile devices and maximizes usage of cloud services by implementing the function of mobile agent concept. The significant portion of the cloud services is run in the cloud server and the client application implemented in the mobile device can call and control appropriate service from the cloud server. Thus, the inherent weakness of the mobile can be overcome by executing the target applications on cloud nodes.

  • PDF

A Study of the Shirt Design Applied with Traditional Cloud Pattern (전통 운문(雲紋)을 모티브로 한 셔츠디자인 연구)

  • Kim, Sun-Young
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.36 no.5
    • /
    • pp.573-582
    • /
    • 2012
  • This work is to develop a T-shirt by adopting a unique cloud pattern (a good auspicious sign as design material) from traditional native Korean patterns for application to various cultural products and textile design cloth patterns; subsequently, a T-shirt design was processed based on this. As a research method, computer design programs Adobe Illustrator CS3 and Adobe Photoshop CS3 were used along with a literature examination as part of motive for design development and pattern realization. Three basic motives were selected as a new formative image in this work, utilizing graphical elements such as abridgement and simplicity of pattern, where flower-shaped cloud pattern, uprising cloud pattern, and 卍-shaped or swastika-shaped pattern of traditional cloud patterns were selected. Each motive diverged into two motives via the shape transformation and the application of different colors. The newly developed basic motive was further processed into a combination of one-time repeat pattern, stripe pattern, and application pattern with mixed cloud motives (that were previously developed), which altogether turned out to be 36 pieces of textile design. In addition, with newly developed motive designs and textile designs, a total of 12 shirt designs for 4 pieces were developed for these three each. The shirt design was developed into a shirt blouse, sleeveless T-shirt, half-sleeve T-shirt, and sports T-shirt among others in order to fit various uses and purposes.

A Secure Social Networking Site based on OAuth Implementation

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.308-315
    • /
    • 2016
  • With the advancement in the area of cloud storage services as well as a tremendous growth of social networking sites, permission for one web service to act on the behalf of another has become increasingly vital as social Internet services such as blogs, photo sharing, and social networks. With this increased cross-site media sharing, there is a upscale of security implications and hence the need to formulate security protocols and considerations. Recently, OAuth, a new protocol for establishing identity management standards across services, is provided as an alternative way to share the user names and passwords, and expose personal information to attacks against on-line data and identities. Moreover, OwnCloud provides an enterprise file synchronizing and sharing that is hosted on user's data center, on user's servers, using user's storage. We propose a secure Social Networking Site (SSN) access based on OAuth implementation by combining two novel concepts of OAuth and OwnCloud. Security analysis and performance evaluation are given to validate the proposed scheme.

Analysis of IMO Maritime Cloud client for developing e-Navigation application service (이내비게이션 응용 서비스 개발을 위한 IMO 마리타임 클라우드 클라이언트 분석)

  • Lee, Jea-Wook;Mun, Chang-Ho;Lee, Seo-jeong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.10a
    • /
    • pp.5-6
    • /
    • 2015
  • Maritime Cloud has been progressed by IMO as a part of the e-Navigation Strategy Implementation Plan. Development of maritime cloud enables safe and reliable information exchange among maritime stakeholders. The research conducted static analysis of open source-based maritime cloud for design and development of e-Navigation application service. As a result, configuration and role of component of MMS, one of core technologies of maritime cloud, was found out. Also, in order to grasp maritime cloud-based application, we found operation process and relationship between maritime cloud and client by analyzing EPD. The findings of the research could be utilized for developing future e-Navigation service.

  • PDF

Machine Learning-based Detection of HTTP DoS Attacks for Cloud Web Applications (머신러닝 기반 클라우드 웹 애플리케이션 HTTP DoS 공격 탐지)

  • Jae Han Cho;Jae Min Park;Tae Hyeop Kim;Seung Wook Lee;Jiyeon Kim
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.66-75
    • /
    • 2023
  • Recently, the number of cloud web applications is increasing owing to the accelerated migration of enterprises and public sector information systems to the cloud. Traditional network attacks on cloud web applications are characterized by Denial of Service (DoS) attacks, which consume network resources with a large number of packets. However, HTTP DoS attacks, which consume application resources, are also increasing recently; as such, developing security technologies to prevent them is necessary. In particular, since low-bandwidth HTTP DoS attacks do not consume network resources, they are difficult to identify using traditional security solutions that monitor network metrics. In this paper, we propose a new detection model for detecting HTTP DoS attacks on cloud web applications by collecting the application metrics of web servers and learning them using machine learning. We collected 18 types of application metrics from an Apache web server and used five machine learning and two deep learning models to train the collected data. Further, we confirmed the superiority of the application metrics-based machine learning model by collecting and training 6 additional network metrics and comparing their performance with the proposed models. Among HTTP DoS attacks, we injected the RUDY and HULK attacks, which are low- and high-bandwidth attacks, respectively. As a result of detecting these two attacks using the proposed model, we found out that the F1 scores of the application metrics-based machine learning model were about 0.3 and 0.1 higher than that of the network metrics-based model, respectively.

Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service

  • Chen, Liqing;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1523-1545
    • /
    • 2019
  • Cloud computing is now a widespread and economical option when data owners need to outsource or share their data. Designing secure and efficient data access control mechanism is one of the most challenging issues in cloud storage service. Anonymous broadcast encryption is a promising solution for its advantages in the respects of computation cost and communication overload. We bring forward an efficient anonymous identity-based broadcast encryption construction combined its application to the data access control mechanism in cloud storage service. The lengths for public parameters, user private key and ciphertext in the proposed scheme are all constant. Compared with the existing schemes, in terms of encrypting and decrypting computation cost, the construction of our scheme is more efficient. Furthermore, the proposed scheme is proved to achieve adaptive security against chosen-ciphertext attack adversaries in the standard model. Therefore, the proposed scheme is feasible for the system of data access control in cloud storage service.

Example of Application of Drone Mapping System based on LiDAR to Highway Construction Site (드론 LiDAR에 기반한 매핑 시스템의 고속도로 건설 현장 적용 사례)

  • Seung-Min Shin;Oh-Soung Kwon;Chang-Woo Ban
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.26 no.6_3
    • /
    • pp.1325-1332
    • /
    • 2023
  • Recently, much research is being conducted based on point cloud data for the growth of innovations such as construction automation in the transportation field and virtual national space. This data is often measured through remote control in terrain that is difficult for humans to access using devices such as UAVs and UGVs. Drones, one of the UAVs, are mainly used to acquire point cloud data, but photogrammetry using a vision camera, which takes a lot of time to create a point cloud map, is difficult to apply in construction sites where the terrain changes periodically and surveying is difficult. In this paper, we developed a point cloud mapping system by adopting non-repetitive scanning LiDAR and attempted to confirm improvements through field application. For accuracy analysis, a point cloud map was created through a 2 minute 40 second flight and about 30 seconds of software post-processing on a terrain measuring 144.5 × 138.8 m. As a result of comparing the actual measured distance for structures with an average of 4 m, an average error of 4.3 cm was recorded, confirming that the performance was within the error range applicable to the field.

Cloud Broadcasting Service Platform (클라우드 방송 서비스 플랫폼)

  • Kim, Hong-Ik;Lee, Dong-Ik;Lee, Jong-Han
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.3
    • /
    • pp.623-638
    • /
    • 2017
  • Application fields of cloud technologies have been gradually expanded with development of technology development and diversification of services. Cloud technology is used for investment efficiency, operation efficiency and service competitive advantage in digital broadcasting platform. Recently, Cloud broadcasting platform commercialized for UI(User Interface) and data broadcasting in Korea, and broadcasting service competition becomes fierce. Cloud technology of broadcasting provides remove a service dependency hardware resource and software architecture on STB device, and unified operation of user interface and service using cloud server without legacy separating management of STB types. In this paper, we explain application effects in image based cloud broadcasting service platform.