• 제목/요약/키워드: cloud-based application

검색결과 378건 처리시간 0.023초

An Improved Interval AHP Method for Assessment of Cloud Platform-based Electrical Safety Monitoring System

  • Wang, Shou-Xiang;Ge, Lei-Jiao;Cai, Sheng-Xia;Zhang, Dong
    • Journal of Electrical Engineering and Technology
    • /
    • 제12권2호
    • /
    • pp.959-968
    • /
    • 2017
  • Electrical safety monitoring System (ESMS) is a critical component in modern power systems, which is characterized by large-scale access points, massive users and versatile requirements. For convenience of the information integration and analysis, the software development, maintenance, and application in the system, the cloud platform based ESMS is established and assessed in this paper. Firstly the framework of the system is proposed, and then the assessment scheme with a set of evaluation indices are presented, by which the appropriate cloud product can be chosen to meet the requirements of a specific application. Moreover, to calculate the weights of the evaluation indices under uncertainty, an improved interval AHP method is adopted to take into consideration of the fuzziness of expert scoring, the qualitative consistency test, and the two normalizations in the process of eigenvectors. Case studies have been made to verify the feasibility of the assessment approach for ESMS.

증기운 폭발시의 예상최대손실 산정을 위한 전문가 시스템 개발 (A Development of Expert System for the Estimated Maximum Loss of Vapor Cloud Explosion)

  • 김원철
    • 한국화재소방학회:학술대회논문집
    • /
    • 한국화재소방학회 1996년도 학술발표회
    • /
    • pp.37-42
    • /
    • 1996
  • The assessment of catastrophic accidents such as BLEVE, vapor cloud explosion, and toxic material releases in the chemical process industries(CPI) shall be carried out according to the Requirement of PSM/SMS enforced by Korea Government Agencies, but reasonable models are not proposed for the practical application. The traditional models, TNT Equivalency Model, are well-known and helpful for the assessment of vapor cloud explosion. However, the estimated-damage-area using the traditional model has much more deviations comparing to the real damage caused by vapor cloud explosion suffered before. These are why an expert system for the assessment of vapor cloud explosion has been developed, which is based on theoretical, statistical and experimental data, and it would be helpful for CPI to evaluate the damage-area in case of vapor cloud explosion.

  • PDF

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • 제24권3호
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.

Cloud Computing to Improve JavaScript Processing Efficiency of Mobile Applications

  • Kim, Daewon
    • Journal of Information Processing Systems
    • /
    • 제13권4호
    • /
    • pp.731-751
    • /
    • 2017
  • The burgeoning distribution of smartphone web applications based on various mobile environments is increasingly focusing on the performance of mobile applications implemented by JavaScript and HTML5 (Hyper Text Markup Language 5). If application software has a simple functional processing structure, then the problem is benign. However, browser loads are becoming more burdensome as the amount of JavaScript processing continues to increase. Processing time and capacity of the JavaScript in current mobile browsers are limited. As a solution, the Web Worker is designed to implement multi-threading. However, it cannot guarantee the computing ability as a native application on mobile devices, and is not sufficient to improve processing speed. The method proposed in this research overcomes the limitation of resources as a mobile client and guarantees performance by native application software by providing high computing service. It shifts the JavaScript process of a mobile device on to a cloud-based computer server. A performance evaluation experiment revealed the proposed algorithm to be up to 6 times faster in computing speed compared to the existing mobile browser's JavaScript process, and 3 to 6 times faster than Web Worker. In addition, memory usage was also less than the existing technology.

The Design of Remote Monitoring and Warning System for Dangerous Chemicals Based on CPS

  • Kan, Zhe;Wang, Xiaolei
    • Journal of Information Processing Systems
    • /
    • 제15권3호
    • /
    • pp.632-644
    • /
    • 2019
  • The remote monitoring and warning system for dangerous chemicals is designed with the concept of the Cyber-Physical System (CPS) in this paper. The real-time perception, dynamic control, and information service of major hazards chemicals are realized in this CPS system. The CPS system architecture, the physical layer and the applacation layer, are designed in this paper. The terminal node is mainly composed of the field collectors which complete the data acquisition of sensors and video in the physical layers, and the use of application layer makes CPS system safer and more reliable to monitor the hazardous chemicals. The cloud application layer completes the risk identification and the prediction of the major hazard sources. The early intelligent warning of the major dangerous chemicals is realized and the security risk images are given in the cloud application layer. With the CPS technology, the remote network of hazardous chemicals has been completed, and a major hazard monitoring and accident warning online system is formed. Through the experiment of the terminal node, it can be proved that the terminal node can complete the mass data collection and classify. With this experiment it can be obtained the CPS system is safe and effective. In order to verify feasible, the multi-risk warning based on CPS is simulated, and results show that the system solves the problem of hazardous chemicals enterprises safety management.

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.

A Study on Automatic Service Creation Method of Cloud-based Mobile Contents

  • Park, Jong-Youel
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제10권4호
    • /
    • pp.19-24
    • /
    • 2018
  • Recently, people can create small content by themselves and it improved into a form that can be promoted. Also, as active small business owners increase, they produce the content for promotion by themselves without external professional help and they utilize it. This paper studies the method to make Mobile Apps, Mobile Web and homepage services available by automatically generating the mobile based mini content. The automated content creation system suggests the method that small business owners and groups can easily communicate with new people by bringing Single Page Application, hybrid mobile web app, N-Screen based content building, private cloud-based PaaS building technology, P2P network based file sharing and multimedia thread technologies together and creating the content.

중소 조선기자재 업체를 위한 클라우드 컴퓨팅기반 BPM-ERP 시스템 개발 및 적용 (The Development and Application of Cloud Computing-based BPM-ERP System for Small and Medium Marine Equipment Makers)

  • 정동규;조지운;남용식
    • 산업공학
    • /
    • 제23권2호
    • /
    • pp.126-138
    • /
    • 2010
  • Marine equipment makers today face a multitude of challenges including the needs of an internal system for easy management of their business processes and a collaboration system to streamline communications with the parent company, increasing product complexity and heightened requirements for information technology. In this research, a BPM-ERP system called Biz $Tower^{(R)}$ was implemented based on cloud computing for especially, small and medium marine equipment makers to standardize and visualize the entire business process from order placement to release. This system also provides their parent company with visibility into the status of orders and user can easily access the system on the web at a low price through cloud computing service. Thus far, this paper demonstrates the applicability of Biz $Tower^{(R)}$ to improve management visibility, process performance, and collaboration with the parent company for small and medium marine equipment makers.

클라우드 컴퓨팅 공동 환경의 네스티드 세션관리에서의 응용 및 오류 훅킹 (An Application and Error Hooking running on Nested Session Management of Cloud Computing Collaboration Environment)

  • 고응남
    • 한국항행학회논문지
    • /
    • 제16권1호
    • /
    • pp.145-150
    • /
    • 2012
  • 본 논문은 규칙-기반 DEVS 모델링과 시뮬레이션 기법을 사용하면서 클라우드 컴퓨팅 공동 환경의 네스티드 세션 관리에서의 오류 감지 시스템의 성능 분석을 설명한다. 본 논문은 FDA(Fault Detection Agent)의 설계와 구축을 설명한다. FDA는 클라우드 컴퓨팅 공동 환경의 네스티드 세션 관리에서 멀티미디어 원격 제어를 위한 소프트웨어 오류를 감지하기에 적합한 에이전트이다.

GCaaS: A Light-weight Grid Computing Web Application

  • 류사오;우균
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2015년도 춘계학술발표대회
    • /
    • pp.121-124
    • /
    • 2015
  • Recent global and cloud computing render the Internet and Web application to be a paramount field since it is uncomplicated to access and less time and space limitation. On the other hand, a growing number of computations using grid computing techniques indicates the requirements and quantities of large-scale computations are becoming foremost progressively. Therefore, that will be much practicable if there is a Web-based service that could provide Grid computing functions. In this paper, Several similar Web-based cloud and parallel computing systems will be discussed and a model of Web application termed GCaaS which supports grid computing services will be introduced.