• Title/Summary/Keyword: computing infrastructure

Search Result 501, Processing Time 0.026 seconds

Robust Web Server System Using Virtual Machine Against DOS Attack (가상머신을 이용한 DoS 공격에 강건한 웹 서버 시스템)

  • Park, Seung Kyu;Yang, Hawan Seok;Kim, Bae Hyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.1-7
    • /
    • 2013
  • The cloud computing is technology which gives flexible and solid infrastructure to IT environment. With this technology multiple computing environment can be consolidated in to a single server so that maximize system resource utilization. Better processing power can be achieved with less system resource. IT manager can cope with increasing unnecessary cost for additional server and management cost as well. This means a enterprise is able to provide services with better quality and create new services with surplus resource. The time required for recovery from system failure will be reduced from days to minutes. Enhanced availability and continuity of enterprise business minimize the codt and the risk produced by service discontinuity. In this paper, we propose framework architecture that is strong against denial-of-service attack.

Concord: A Proactive Lightweight Middleware to Enable Seamless Connectivity in a Pervasive Environment

  • Hsu Sam;Mutha Mahesh;Pandya A.S.;Lho Young-Uhg
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.5 no.3
    • /
    • pp.189-195
    • /
    • 2005
  • One of the major components of any pervasive system is its proactive behavior. Various models have been developed to provide system wide changes which would enable proactive behavior. A major drawback of these approaches is that they do not address the need to make use of existing applications without modifying the applications. To overcome this drawback, a middleware architecture called 'Concord' is proposed. Concord is based on a simple model which consists of Lookup Server and Database. The rewards for this simple model are many. First, Concord uses the existing computing infrastructure. Second, Concord standardizes the interfaces for all services and platforms. Third, new services can be added dynamically without any need for reconfiguration. Finally, Concord consists of Database that can maintain and publish the active set of available resources. Thus Concord provides a solid system for integration of various entities to provide seamless connectivity and enable proactive behavior.

JXTA based P2P communication in MANET Networks (MANET 네트워크에서의 JXTA 기반의 P2P 통신)

  • Jeong Wang-Boo;Suh Hyun-Gon;Kim Ki-Hyung;Sohn Young-Ho
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.05a
    • /
    • pp.139-143
    • /
    • 2005
  • The P2P is a network environment supporting data exchange which is directly connected peers without limit of existing server-client and intervening central server for resource or offered service with each peer. JXTA is a representative of P2P system. JXTA is a typical distributed computing model that proposed by Sun Microsystems. JXTA that doesn't require centralized services or resources is adaptable in extreme changes of network organization. MANET(Mobile Ad Hoc Network) is a representative wireless network that is composed of mobile nodes without infrastructure. So MANET establishes the path for the communication of each peers and maintains the newest routing information by exchanging routing information. In this paper, we propose a technique of JXTAMAUET which implements JXTA which is the P2P network system from the wireless network which is becoming the foundation of ubiquitous computing. For the performance evaluation of the JXTAMANET, we use simulation.

  • PDF

Production Equipment Monitoring System Based on Cloud Computing for Machine Manufacturing Tools

  • Kim, Sungun;Yu, Heung-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.2
    • /
    • pp.197-205
    • /
    • 2022
  • The Cyber Physical System(CPS) is an important concept in achieving SMSs(Smart Manufacturing Systems). Generally, CPS consists of physical and virtual elements. The former involves manufacturing devices in the field space, whereas the latter includes the technologies such as network, data collection and analysis, security, and monitoring and control technologies in the cyber space. Currently, all these elements are being integrated for achieving SMSs in which we can control and analyze various kinds of producing and diagnostic issues in the cyber space without the need for human intervention. In this study, we focus on implementing a production equipment monitoring system related to building a SMS. First, we describe the development of a fog-based gateway system that links physical manufacturing devices with virtual elements. This system also interacts with the cloud server in a multimedia network environment. Second, we explain the proposed network infrastructure to implement a monitoring system operating on a cloud server. Then, we discuss our monitoring applications, and explain the experience of how to apply the ML(Machine Learning) method for predictive diagnostics.

A Survey on Cloud Storage System Security via Encryption Mechanisms

  • Alsuwat, Wejdan;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.181-186
    • /
    • 2022
  • Cloud computing is the latest approach that is developed for reducing the storage of space to store the data and helps the quick sharing of the data. An increase in the cloud computing users is observed that is also making the users be prone to hacker's attacks. To increase the efficiency of cloud storage encryption mechanisms are used. The encryption techniques that are discussed in this survey paper are searchable encryption, attribute-based, Identity-based encryption, homomorphic encryption, and cloud DES algorithms. There are several limitations and disadvantages of each of the given techniques and they are discussed in this survey paper. Techniques are found to be effective and they can increase the security of cloud storage systems.

Network Virtualization using MPLS for Cloud Computing (클라우드 컴퓨팅에서 MPLS 를 이용한 네트워크 가상화)

  • Jang, Dong Hoon;Ahn, Deuck Hyeon;Eom, Young Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.584-586
    • /
    • 2011
  • 네트워크 가상화(Network virtualization)란 물리적인 네트워크 자원들의 사용 효율을 높이기 위한 방법으로 자원들을 논리적으로 분리하는 기술이다. 네트워크 가상화는 클라우드 컴퓨팅(Cloud computing) 구현을 위한 네트워크 인프라(Infrastructure) 제공 기술로 각광받고 있다. 또한 MPLS(Multiprotocol Label Switching)기술은 빠른 고속 전송을 위한 라우팅 기술로서 가상 사설망을 구성하는 기술로 많이 사용되고 있다. 본 논문에서는 MPLS 라우팅 기술을 활용하여 클라우드 컴퓨팅 서버 간의 패킷 전송에 다양한 장점을 활용할 수 있는 방법을 제시한다. 제안하는 시스템은 독립성, 유연성, 성능과 비용의 요구사항을 만족하며, 논리적인 망분리를 통해 다양한 클라우드 컴퓨팅에 맞는 인프라를 서비스할 수 있다.

KubEVC-Agent : Kubernetes Edge Vision Cluster Agent for Optimal DNN Inference and Operation (KubEVC-Agent : 머신러닝 추론 엣지 컴퓨팅 클러스터 관리 자동화 시스템)

  • Moohyun Song;Kyumin Kim;Jihun Moon;Yurim Kim;Chaewon Nam;Jongbin Park;Kyungyong Lee
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.6
    • /
    • pp.293-301
    • /
    • 2023
  • With the advancement of artificial intelligence and its various use cases, accessing it through edge computing environments is gaining traction. However, due to the nature of edge computing environments, efficient management and optimization of clusters distributed in different geographical locations is considered a major challenge. To address these issues, this paper proposes a centralization and automation tool called KubEVC-Agent based on Kubernetes. KubEVC-Agent centralizes the deployment, operation, and management of edge clusters and presents a use case of the data transformation for optimizing intra-cluster communication. This paper describes the components of KubEVC-Agent, its working principle, and experimental results to verify its effectiveness.

A Layered Architecture for Robot Automated Services on Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서 로봇 자동화 서비스를 위한 계층적 아키텍처)

  • Choi, Jong-Sun;Choi, Jae-Young;Cho, Yong-Yun
    • The Journal of Korea Robotics Society
    • /
    • v.6 no.4
    • /
    • pp.353-364
    • /
    • 2011
  • In ubiquitous computing environments, users want to receive the robot services regardless of various physical status or devices such as time, place, various sensors, and high-performance servers. Thus, the ubiquitous service robots have to provide users with automated services according to situational information that they properly recognize. Beyond these problems, robot software has to establish a foundation to support the functions with the network infrastructure that are not able to be solved by a single independent resource. On the basis of a robot middleware that is capable of minimizing dependencies among hierarchy structures, the robot software also has to provide execution environment to control the flow of robot application services. In this paper, we propose a layered architecture to provide users with automated services through ubiquitous robots. The proposed architecture is based on CAWL (Context-Aware Workflow Language) and RSEL (Robot Services Execution Language). CAWL easily represents the flow of robot services from user application service levels, and RSEL is able to support the composition and reusability of robot services through abstraction of robot device services. In our experiments, we applied the proposed architecture to an example of "booth guide robot service".

Open Source Cloud Computing: An Experience Case of Geo-based Image Handling in Amazon Web Services

  • Lee, Ki-Won
    • Korean Journal of Remote Sensing
    • /
    • v.28 no.3
    • /
    • pp.337-346
    • /
    • 2012
  • In the view from most application system developers and users, cloud computing becomes popular in recent years and is still evolving. But in fact it is not easy to reach at the level of actual operations. Despite, it is known that the cloud in the practical stage provides a new pattern for deploying a geo-spatial application. However, domestically geo-spatial application implementation and operation based on this concept or scheme is on the beginning stage. It is the motivation of this works. Although this study is an introductory level, a simple and practical processed result was presented. This study was carried out on Amazon web services platform, as infrastructure as a service in the geo-spatial areas. Under this environment, cloud instance, a web and mobile system being previously implemented in the multi-layered structure for geo-spatial open sources of database and application server, was generated. Judging from this example, it is highly possible that cloud services with the functions of geo-processing service and large volume data handling are the crucial point, leading a new business model for civilian remote sensing application and geo-spatial enterprise industry. The further works to extend geo-spatial applications in cloud computing paradigm are left.

An Efficient Role Based Access Control Technique by Structuring of Role Specification Certificate (역할 명세 인증서의 구조화에 의한 효율적 역할기반 접근제어 기법)

  • Yang, Soo-Mi
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.1-9
    • /
    • 2005
  • In a role based access control through attribute certificate, the use of role assignment certificates and role specification certificates can reduce management cost and the overhead incurred by changing roles, Highly distributed computing environments such as ubiquitous computing environments not having global or broad control. need another attribute certificate management technique, Actually just having role specification certificate separately reduce management cost, But for better performance we structure role specification, We group roles and make the role group relation tree, It results secure and efficient role renewing and distribution, For scalable role specification certificate distribution, the multicasting of packets is used, We take into account the packet lass and quantify performance enhancements of structuring role specification certificates.

  • PDF