• Title/Summary/Keyword: computing environment

Search Result 3,231, Processing Time 0.027 seconds

uPC player : An OS Virtualization-based Technique to Support Stateless Computing Execution Environment on Windows (uPC player : 윈도우 운영체제에서의 OS가상화 기반 무상태 컴퓨팅 실행환경 지원 기술)

  • Sung, Baek-Jae;Park, Chan-Ik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.1
    • /
    • pp.125-129
    • /
    • 2010
  • Stateless computing supports a mobility of computing environment easily. It is becoming a major technology for securing personal user's information on shared computing environment. With the advance of virtualization technology and cloud computing, stateless computing is an essential part of personal computing environment connectivity (user's setting and data is stored in remote server or some storage, and it can be restored at any computing environment) In this paper, we propose uPC player that supports stateless computing execution environment on Windows. uPC player provides Windows operating system to user by using an uPC OS virtualization module. In this paper, we leverage how uPC player is designed and implemented for supporting a stateless computing execution environment. uPC player provides a desktop switch between host-system execution environment and uPC virtual execution environment. And it needs just one second for loading uPC virtual execution environment by using OS virtualization-based technique.

A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment

  • Yiran, Zhang;Huizheng, Geng;Yanyan, Xu;Li, Su;Fei, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.450-470
    • /
    • 2023
  • Traditional cloud computing faces some challenges such as huge energy consumption, network delay and single point of failure. Edge computing is a typical distributed processing platform which includes multiple edge servers closer to the users, thus is more robust and can provide real-time computing services. Although outsourcing data to edge servers can bring great convenience, it also brings serious security threats. In order to provide image retrieval while ensuring users' data privacy, a privacy preserving image retrieval scheme in edge environment is proposed. Considering the distributed characteristics of edge computing environment and the requirement for lightweight computing, we present a privacy-preserving image retrieval scheme in edge computing environment, which two or more "honest but curious" servers retrieve the image quickly and accurately without divulging the image content. Compared with other traditional schemes, the scheme consumes less computing resources and has higher computing efficiency, which is more suitable for resource-constrained edge computing environment. Experimental results show the algorithm has high security, retrieval accuracy and efficiency.

Development of the Conceptual Model of Constructing and Operating the Integrated Computing Environment (통합전산환경 구축$\cdot$운영을 위한 개념적 모형 개발)

  • Jung, Hae-Yong;Kim, Sang-Hoon
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.4
    • /
    • pp.173-195
    • /
    • 2005
  • As the amount of informatization investment is rapidly increasing in many organizations, it becomes more inevitable to manage computing resources (information systems, computing facilities and manpower etc.) effectively. Specially, in public sector It is thought to be very important to achieve the economy of scale by integrating computing resources which are managed individually in many agencies. Also, our government have been recently making much efforts to raise the effectiveness of operating the information systems by promoting joint information use among many public agencies, enhancing the operating systems and the expertise of IS staff and applying the optimal information security systems. This study focuses on presenting the framework to effectively integrate omputing resources and proposing the ways of constructing and operating the integrated computing environment for the institutions and the affiliated groups under the Ministry of Culture & Tourism which are in charge of implementing cultural informatization. The main implications of this study are 1) building the ideal model of the integrated computing environment architecture suitable to cultural informatization area, 2) showing the criteria of deciding whether the organizations use the Integrated computing environment or not and how extensively they commit their computing resources to it, and 3) suggesting the ways of the phased integration and the change management to minimize confusion in the process of adopting the integrated computing environment and behavioral problems such as conflict and resistance of IS-related Personnel Influenced by Implementing the integrated computing environment.

  • PDF

Requirements Analysis for Access Control Model on Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서의 접근제어 모델을 위한 요구사항 분석)

  • Oh Sejong;Park Jeho
    • The KIPS Transactions:PartA
    • /
    • v.11A no.7 s.91
    • /
    • pp.563-570
    • /
    • 2004
  • Ubiquitous computing environment requires strong security and privacy. Access control is one of security areas. Access control on Ubiquitous computing is different from it on traditional information systems so that traditional access control models are not suitable for Ubiquitous comput-ing environment. This research defines Ubiquitous computing environment as an access control point of view, and shows requirements to consid-er for developing access control model for Ubiquitous computing environment. It also brings up three implementing types of access control on Ubiquitous computing environment.

A Basic Study of Thermal-Fluid Flow Analysis Using Grid Computing (그리드 컴퓨팅을 이용한 열유동 해석 기법에 관한 기초 연구)

  • Hong, Seung-Do;Ha, Yeong-Man;Cho, Kum-Won
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.28 no.5
    • /
    • pp.604-611
    • /
    • 2004
  • Simulation of three-dimensional turbulent flow with LES and DNS lakes much time and expense with currently available computing resources and requires big computing resources especially for high Reynolds number. The emerging alternative to provide the required computing power and working environment is the Grid computing technology. We developed the CFD code which carries out the parallel computing under the Grid environment. We constructed the Grid environment by connecting different PC-cluster systems located at two different institutes of Pusan National University in Busan and KISTI in Daejeon. The specification of PC-cluster located at two different institutes is not uniform. We run our parallelized computer code under the Grid environment and compared its performance with that obtained using the homogeneous computing environment. When we run our code under the Grid environment, the communication time between different computer nodes takes much larger time than the real computation time. Thus the Grid computing requires the highly fast network speed.

Trust Assurance of Data in Cloud Computing Environment (클라우드 컴퓨팅 환경의 데이터 신뢰 확보)

  • Jung, Im-Y.;Jo, In-Soon;Yu, Young-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9B
    • /
    • pp.1066-1072
    • /
    • 2011
  • Cloud Computing Environment provides users with a blue print of IT Utopia with virtualization; unbounded computing power and data storage free from the cost and the responsibility of maintenance for the IT resources. But, there are several issues to be addressed for the Cloud Computing Environment to be realized as the blue print because users cannot control the IT resources provided by the Cloud Computing Environment but can only use them. One of the issues is how to secure and to trust data in the Cloud Computing Environment. In this paper, an efficient and practical trust assurance of data with provenance in Cloud Computing Environment.

Study on Intrusion Detection System under Cloud Computing Environment (클라우드 컴퓨팅 환경을 위한 침입탐지시스템 특징 분석)

  • Yang, Hwan-Seok;Lee, Byoung-Cheon;Yoo, Seung-Jea
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.59-65
    • /
    • 2012
  • Clouding computing which is developing newly as IT and network technology develops become changed to internet and service environment of company. Especially, it can lend IT resource at low costs and no need to build up infra. Clouding computing environment become popular more and more because various computing environment using virtualization is provided. The attack threat range also becomes wider in proportion to broaden various connection ways and service supply range at these clouding computing. Therefore, intrusion detection system which can protect resource from various attack having malignant attempts is necessary. In this study, we analyzed about characteristic of intrusion detection system at cloud computing environment having big damage than other computing environment when intrusion happen by sharing of resource and virtualization.

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.55-61
    • /
    • 2017
  • Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.

A Study on the Isolated Cloud Security Using Next Generation Network

  • Park, Jae-Kyung;Lee, Won Joo;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.11
    • /
    • pp.9-16
    • /
    • 2017
  • In this paper, we propose to present a model of cloud security that has emerged as the biggest topic of cloud computing, replacing the traditional IT environment. While cloud computing is an extension of existing IT technology, security issues and threats can be applied to traditional security technologies. However, the biggest difference between a typical computing environment and a cloud computing environment is a virtualized environment with a hypervisor. Currently, there are many weaknesses in the virtualized environment, and there are few related security products. In order for a cloud computing environment to function as a reliable IT environment, we expect more research on hypervisor-based security technologies, and we expect to secure safer cloud services through a secure model over the next generation of new-based networks.

A Statistical Pattern Recognition Method for Providing User Demand in Community Computing (커뮤니티 컴퓨팅에서 사용자 요구 반영을 위한 통계적 패턴 인식 기법)

  • Kim, Sung-Bin;Jung, Hye-Dong;Lee, Hyung-Su;Kim, Seok-Yoon
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.287-289
    • /
    • 2009
  • The conventional computing is a centralizing system, but it has been gradually going to develop ubiquitous computing which moves roles away from the main. The Community Computing, a new paradigm, is proposed to implement environment of ubiquitous computing. In this environment, it is important to accept the user demand. Hence in this paper recognizes pattern of user's activity statistically and proposes a method of pattern estimation in community computing. In addition, user's activity varies with time and the activity has the priority We reflect these. Also, we improve accuracy of the method through Knowledge Base organization and the feedback system. We make program using Microsoft Visual C++ for evaluating performance of proposed method, then simulate it. We can confirm it from the experiment result that using proposal method is better in environment of community computing.

  • PDF