• Title/Summary/Keyword: computing infrastructure

Search Result 505, Processing Time 0.026 seconds

Security Model for Pervasive Multimedia Environment

  • Djellali, Benchaa;Lorenz, Pascal;Belarbi, Kheira;Chouarfia, Abdallah
    • Journal of Multimedia Information System
    • /
    • v.1 no.1
    • /
    • pp.23-43
    • /
    • 2014
  • With the rapidity of the development on electronic technology, various mobile devices are produced to make human life more convenient. The user is always in constant search of middle with ease of deployment. Therefore, the development of infrastructure and application with ubiquitous nature gets a growing keen interest. Recently, the number of pervasive network services is expanding into ubiquitous computing environment. To get desired services, user presents personal details about this identity, location and private information. The information transmitted and the services provided in pervasive computing environments (PCEs) are exposed to eavesdropping and various attacks. Therefore, the need to protect this environment from illegal accesses has become extremely urgent. In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users and services in PCEs. The proposed scheme integrates a biometric authentication in PKI model. The proposed authentication aims to secure access remote in PCE for guaranteeing reliability and availability. Our authentication concept can offer pervasive network service users convenience and security.

  • PDF

The Development of Measuring, Monitoring System for Concrete Bridge Using Ubiquitous Computing Technology (유비쿼터스 컴퓨팅 기술을 활용한 콘크리트교량의 계측 모니터링 시스템 적용성 검토에 관한 연구)

  • Lee, Seung-Jae;Hwang, Kyung-Hun;Park, Sung-Ki;Sung, Sang-Kyoung
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2006.05a
    • /
    • pp.586-589
    • /
    • 2006
  • Recently, the application area of wireless LAN(Internet) and CDMA have been increased, rapidly. Bridge monitoring system using this ubiquitous Computing Technology can bring more convenience of bridge maintenance and management. This paper present a automatic data acquisition, control and processing technology through this concept, and check system applicability to the concrete bridge completed. Finally, The preventive bridge monitoring through the application of this system will progress in technology and make civil infrastructure more safe and useful.

  • PDF

A GGQS-based hybrid algorithm for inter-cloud time-critical event dissemination

  • Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.23 no.6
    • /
    • pp.1259-1269
    • /
    • 2012
  • Cloud computing has rapidly become a new infrastructure for organizations to reduce their capital cost in IT investment and to develop planetary-scale distributed applications. One of the fundamental challenges in geographically distributed clouds is to provide efficient algorithms for supporting inter-cloud data management and dissemination. In this paper, we propose a geographic group quorum system (GGQS)-based hybrid algorithm for improving the interoperability of inter-cloud in time-critical event dissemination service, such as computing policy updating, message sharing, event notification and so forth. The proposed algorithm first organizes these distributed clouds into a geographic group quorum overlay to support a constant event dissemination latency. Then it uses a hybrid protocol that combines geographic group-based broad-cast with quorum-based multicast. Our numerical results show that the GGQS-based hybrid algorithm improves the efficiency as compared with Chord-based, Plume an GQS-based algorithms.

Development of Indoor Positioning System for Location-aware Services (위치인지 서비스를 위한 Indoor Positioning System 기술 개발)

  • Park, Woo-Chool;Lee, Hyung-Soo;Yoon, Myung-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.286-288
    • /
    • 2005
  • If we are to realize the everyday benefits promised by pervasive computing and context-aware applications, we must first develop the infrastructure to provide contextual location and orientation information through pervasive computing elements. We have implement indoor positioning system to supply orientation information. We have used ultrasound in indoor positioning system for distance and orientation measurements, then propose a set of methods to calculate orientation from an array of well placed ultrasonic sensors operating in the indoor positioning system. We have design and implement a indoor positioning system using a combination of hardware and software and demonstrate end-to-end functionality of the system.

  • PDF

Analysis of Trends in Hyper-connected Virtual Infrastructure Management Technology (초연결 가상 인프라 관리 기술 동향 분석)

  • Shim, J.C.;Park, P.K.;Ryu, H.Y.;Kim, T.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.4
    • /
    • pp.135-148
    • /
    • 2020
  • Virtualisation in cloud computing is vital for maintaining maximum resource utilization and easy access to operation and storage management of components. Platform virtualisation technology has the potential to be easily implemented with the support of scalability and security, which are the most important components for cloud-based services. Virtual resources must be allocated to a centralized pool called the cloud, and it is considered as cloud computing only when the virtual resources are orchestrated through management and automation software. Therefore, research and development on the latest technology for such a virtualisation platform provides both academia and industry the scope to deploy the fastest and most reliable technology in limited hardware resource. In this research, we reviewed and compared the popular current technologies for network and service management and automation technology.

Design and Implementation of Context-Aware Computing System based on UPnP Sensor Network (UPnP 센서네트워크 기반 상황인식 시스템의 설계 및 구현)

  • Kim, Jong-Pan;Oh, Am-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.185-193
    • /
    • 2010
  • In this paper, we Provide context-aware services based on UPnP Device Module including sensor unit in existing PLC network without additional infrastructure. so existing PLC devices are controlled based on knowledge context and can be used in a ubiquitous environment. And efficient remote control and device management based on UPnP can also be provided.

Cloud System Construction for Availability of University Information System

  • Jang, Hae-Sook;Park, Ki-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.12
    • /
    • pp.179-186
    • /
    • 2017
  • Managing students' data is a high prioritized duty of the university administration since most of the school affairs are proceed based on that database. Universities have invested in IT assets such as servers, storage, database, and networks. However, continuing investment in IT infrastructure is impossible due to limited budget and rapid changes in the educational environment. As cloud computing diffuse, universities are trying to reduce costs and improve efficiency by increasing server utilization, unlike when physically investing. We designed a hypothetical academic information management system based on cloud computing by utilizing the advanced server virtualization technology. This administrative cloud system allows universities to improve the availability of the system with low cost. The system demonstrates its flexibility of using data resources and immediacy of resumption.

A Study on Improvement Stability of Cloud Service using Attack Information Collection (공격정보 수집을 이용한 클라우드 서비스의 안전성 향상에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.2
    • /
    • pp.73-79
    • /
    • 2013
  • Cloud computing is a form which provides IT resources through network and pays the cost as much as you used. And it has advantages that it doesn't need to construct infrastructure and can be offered a variety of environments. The main core of these computing is virtualization technology. Security mechanism about attacks using vulnerabilities of virtualization technology isn't provided right and existing security tools can't be applied as it is. In this paper, we proposed honeyVM structure that can cope actively by collecting the information about attacks using virtualization vulnerability. Mamdani fuzzy inference is used to adjust dynamically the number of formed honeyVM depending on the load of system. Security structure to protect actual virtual machine from attacks and threats is proposed. The performance of the proposed structure in this paper measured occurred attack detection rate and resource utilization rate.

Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure

  • Mahajan, Komal;Makroo, Ansuyia;Dahiya, Deepak
    • Journal of Information Processing Systems
    • /
    • v.9 no.3
    • /
    • pp.379-394
    • /
    • 2013
  • Cloud computing is an evolving computing paradigm that has influenced every other entity in the globalized industry, whether it is in the public sector or the private sector. Considering the growing importance of cloud, finding new ways to improve cloud services is an area of concern and research focus. The limitation of the available Virtual Machine Load balancing policies for cloud is that they do not save the state of the previous allocation of a virtual machine to a request from a Userbase and the algorithm requires execution each time a new request for Virtual Machine allocation is received from the Userbase. This problem can be resolved by developing an efficient virtual machine load balancing algorithm for the cloud and by doing a comparative analysis of the proposed algorithm with the existing algorithms.

Context-Awareness Scenario for Ubiquitous Environment : Case of Water Supply (유비쿼터스 환경기반의 상황인식 시나리오 연구 - 상수도 사례를 중심으로 -)

  • Jeong, Jin-Seok;Lee, Yong-Joo;Byun, In-Sun;Kim, Tae-Hoon;Song, Yong-Hak
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.17 no.2
    • /
    • pp.47-53
    • /
    • 2009
  • Recently, context-awareness computing becomes prerequisite to pervasive computing, called ubiquitous paradigm. Especially, it plays much of roll as a part of the ubiquitous infrastructures, one of three ubiquitous city components. This paper proposes the optimized procedures to deal with the various hypothetical water-leaking situations in the water supply systems. These procedures suggested in this paper will be employed to develop the context-awareness modules or models for urban infrastructure maintenance in the future works.

  • PDF