• Title/Summary/Keyword: computing

Search Result 14,880, Processing Time 0.037 seconds

Trust Assurance of Data in Cloud Computing Environment (클라우드 컴퓨팅 환경의 데이터 신뢰 확보)

  • Jung, Im-Y.;Jo, In-Soon;Yu, Young-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9B
    • /
    • pp.1066-1072
    • /
    • 2011
  • Cloud Computing Environment provides users with a blue print of IT Utopia with virtualization; unbounded computing power and data storage free from the cost and the responsibility of maintenance for the IT resources. But, there are several issues to be addressed for the Cloud Computing Environment to be realized as the blue print because users cannot control the IT resources provided by the Cloud Computing Environment but can only use them. One of the issues is how to secure and to trust data in the Cloud Computing Environment. In this paper, an efficient and practical trust assurance of data with provenance in Cloud Computing Environment.

Grid Transaction Network Modeling and Simulation for Resource Management in Grid Computing Environment (그리드 컴퓨팅 환경에서의 효율적인 자원 관리를 위한 그리드 거래망 모델링과 시뮬레이션)

  • Jang, Sung-Ho;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.3
    • /
    • pp.1-9
    • /
    • 2006
  • As an effective solution to resolve complex computing problems and to handle geographically dispersed data sets, grid computing has been noticed. Grid computing separates an application to several parts and executes on heterogeneous computing platforms simultaneously. The most important problem in grid computing environments is to manage grid resources and to schedule grid resources. This paper proposes a grid transaction network model that is applicable for resource management and scheduling in grid computing environment and presents a grid resource bidding algorithm for grid users and grid resource providers. Using DEVSJAVA modeling and simulation, this paper evaluates usefulness and efficiency of the proposed model.

  • PDF

The Design of Dynamic Fog Cloud System using mDBaaS

  • Hwang, Chigon;Shin, Hyoyoung;Lee, Jong-Yong;Jung, Kyedong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.59-66
    • /
    • 2017
  • Cloud computing has evolved into a core computing infrastructure for the internet that encompasses content, as well as communications, applications and commerce. By providing powerful computing and communications capabilities in the palm of the hand everywhere with a variety of smart devices, mobile applications such as virtual reality, sensing and navigation have emerged and radically changed the patterns people live. The data that is generated is getting bigger. Cloud computing, on the other hand, has problems with system load and speed due to the collection, processing and control of remote data. To solve this problem, fog computing has been proposed in which data is collected and processed at an edge. In this paper, we propose a system that dynamically selects a fog server that acts as a cloud in the edge. It serves as a mediator in the cloud, and provides information on the services and systems belonging to the cloud to the mobile device so that the mobile device can act as a fog. When the role of the fog system is complete, we provide it to the cloud to virtualize the fog. The heterogeneous problem of data of mobile nodes can be solved by using mDBaaS (Mobile DataBase as a Service) and we propose a system design method for this.

Issues and Suggestions for "Act on the Development of Cloud Computing" and Protection of its Users ("클라우드컴퓨팅 발전 및 이용자 보호에 관한 법률"의 쟁점 및 개선방안)

  • Lee, Jung Koo;Min, Daihwan;Kwon, Hun Yeong
    • Journal of Information Technology Applications and Management
    • /
    • v.24 no.1
    • /
    • pp.81-91
    • /
    • 2017
  • In Korea, "Act on the Development of Cloud Computing and Protection of its Users" has been enforced since September 28, 2015. Many countries implemented 'Cloud First' policies and global companies such as Amazon, Microsoft, IBM started cloud services in Korea. Under these circumstance, the Act was established for developing the cloud computing industry. The Act includes clauses for encouraging the use of private cloud computing by public organizations, supporting small- and medium-size cloud service providers, and utilizing secure cloud computing services by users. However, some terms appear to be similar but have different meanings from "Act on Promotion of Information and Communications Network Utilization and Information Protection, etc." and "Personal Information Protection Act". This generated some confusion and conflicts in relation to providing user information to a 3rd party and notifying the intrusion in the Cloud Computing Act. This paper discusses these issues and suggestions for revision of the Cloud Computing Act.

An Empirical Study on Factors Influencing the Assimilation and Expected Benefits of Cloud Computing and the Moderating Effect of Organizational Readiness (기업의 클라우드 컴퓨팅 내재화 및 기대이익에 영향을 미치는 기술주도/수요견인 요인과 조직 준비성의 조절효과에 대한 실증연구)

  • Kim, Sanghyun;Kim, Geuna
    • Korean Management Science Review
    • /
    • v.30 no.2
    • /
    • pp.63-77
    • /
    • 2013
  • Recently, many companies are interested in adopting cloud computing as their IT strategy. However, no distinct results have appeared in the substantial implementation of this technology. The main reason for such result is from the absence of research models leading to high impact studies on cloud computing. Thus, this study attempts to find a possible answer for the following research question : what factors influence an organizational assimilation of cloud computing? This study investigates Technology-Push (TP)/Need-Pull (NP) theory as a main factor affecting cloud computing assimilation. Also, the study examines the moderating role of organizational readiness. TP includes of perceived benefits, vendor pressure, cost savings, and IT activity intensity while NP includes competitor orientation, information technology policy, technological turbulence, and performance gaps. In addition, organizational readiness suggests two variables, financial resources and technological knowledge. Result from 217 adopting organizations showed that all of these factors with exception of competitor orientation and vendor pressure, have statistically significant impact on assimilation of cloud computing. The implications of the findings propose a theoretical framework for the foundation of studies on cloud computing assimilation, which can server as important practical guidelines for technology development.

Study on Intrusion Detection System under Cloud Computing Environment (클라우드 컴퓨팅 환경을 위한 침입탐지시스템 특징 분석)

  • Yang, Hwan-Seok;Lee, Byoung-Cheon;Yoo, Seung-Jea
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.59-65
    • /
    • 2012
  • Clouding computing which is developing newly as IT and network technology develops become changed to internet and service environment of company. Especially, it can lend IT resource at low costs and no need to build up infra. Clouding computing environment become popular more and more because various computing environment using virtualization is provided. The attack threat range also becomes wider in proportion to broaden various connection ways and service supply range at these clouding computing. Therefore, intrusion detection system which can protect resource from various attack having malignant attempts is necessary. In this study, we analyzed about characteristic of intrusion detection system at cloud computing environment having big damage than other computing environment when intrusion happen by sharing of resource and virtualization.

A Secure Attribute-based Authentication Scheme for Cloud Computing (클라우드 컴퓨팅을 위한 안전한 속성기반 인증 기법)

  • Moon, Jongho;Choi, Younsung;Won, Dongho
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.8
    • /
    • pp.345-350
    • /
    • 2016
  • Cloud computing services have different characteristics from the traditional computing environment such as resource sharing, virtualization, etc. These characteristics of cloud computing environment necessitate specific properties such as user identify, access control, security control property, etc. Recently, Yoo proposed an attribute-based authentication scheme for secure cloud computing. However, Yoo's authentication scheme is vulnerable to customer attack and an adversary can modify the authentication request message. In this paper, we propose a secure and efficient attribute-based authentication scheme for cloud computing based on Yoo's scheme.

A Context-aware Task Offloading Scheme in Collaborative Vehicular Edge Computing Systems

  • Jin, Zilong;Zhang, Chengbo;Zhao, Guanzhe;Jin, Yuanfeng;Zhang, Lejun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.383-403
    • /
    • 2021
  • With the development of mobile edge computing (MEC), some late-model application technologies, such as self-driving, augmented reality (AR) and traffic perception, emerge as the times require. Nevertheless, the high-latency and low-reliability of the traditional cloud computing solutions are difficult to meet the requirement of growing smart cars (SCs) with computing-intensive applications. Hence, this paper studies an efficient offloading decision and resource allocation scheme in collaborative vehicular edge computing networks with multiple SCs and multiple MEC servers to reduce latency. To solve this problem with effect, we propose a context-aware offloading strategy based on differential evolution algorithm (DE) by considering vehicle mobility, roadside units (RSUs) coverage, vehicle priority. On this basis, an autoregressive integrated moving average (ARIMA) model is employed to predict idle computing resources according to the base station traffic in different periods. Simulation results demonstrate that the practical performance of the context-aware vehicular task offloading (CAVTO) optimization scheme could reduce the system delay significantly.

Strategy for Task Offloading of Multi-user and Multi-server Based on Cost Optimization in Mobile Edge Computing Environment

  • He, Yanfei;Tang, Zhenhua
    • Journal of Information Processing Systems
    • /
    • v.17 no.3
    • /
    • pp.615-629
    • /
    • 2021
  • With the development of mobile edge computing, how to utilize the computing power of edge computing to effectively and efficiently offload data and to compute offloading is of great research value. This paper studies the computation offloading problem of multi-user and multi-server in mobile edge computing. Firstly, in order to minimize system energy consumption, the problem is modeled by considering the joint optimization of the offloading strategy and the wireless and computing resource allocation in a multi-user and multi-server scenario. Additionally, this paper explores the computation offloading scheme to optimize the overall cost. As the centralized optimization method is an NP problem, the game method is used to achieve effective computation offloading in a distributed manner. The decision problem of distributed computation offloading between the mobile equipment is modeled as a multi-user computation offloading game. There is a Nash equilibrium in this game, and it can be achieved by a limited number of iterations. Then, we propose a distributed computation offloading algorithm, which first calculates offloading weights, and then distributedly iterates by the time slot to update the computation offloading decision. Finally, the algorithm is verified by simulation experiments. Simulation results show that our proposed algorithm can achieve the balance by a limited number of iterations. At the same time, the algorithm outperforms several other advanced computation offloading algorithms in terms of the number of users and overall overheads for beneficial decision-making.

A Study on the Environmental Elements for Physical Computing Game Development (피지컬 컴퓨팅 게임 개발을 위한 환경적 요소에 관한 연구)

  • Lee, Jun Suk;Rhee, Dae Woong
    • Journal of Korea Game Society
    • /
    • v.21 no.1
    • /
    • pp.81-90
    • /
    • 2021
  • In this study, we derive the important environmental elements for developing physical computing game. Environmental elements are selected based on the analysis of the physical computing environment in the area including physical computing itself, existing physical computing games, digital art, and information education. The derived elements are verified by Delphi's investigation methodology. The 27 factors are chosen in terms of development environment, development case, and development service. Among them the environmental aspects of physical computing are ranked as the highest importance.