• Title/Summary/Keyword: computing infrastructure

Search Result 509, Processing Time 0.033 seconds

Implementation of big web logs analyzer in estimating preferences for web contents (웹 컨텐츠 선호도 측정을 위한 대용량 웹로그 분석기 구현)

  • Choi, Eun Jung;Kim, Myuhng Joo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.83-90
    • /
    • 2012
  • With the rapid growth of internet infrastructure, World Wide Web is evolving recently into various services such as cloud computing, social network services. It simply go beyond the sharing of information. It started to provide new services such as E-business, remote control or management, providing virtual services, and recently it is evolving into new services such as cloud computing and social network services. These kinds of communications through World Wide Web have been interested in and have developed user-centric customized services rather than providing provider-centric informations. In these environments, it is very important to check and analyze the user requests to a website. Especially, estimating user preferences is most important. For these reasons, analyzing web logs is being done, however, it has limitations that the most of data to analyze are based on page unit statistics. Therefore, it is not enough to evaluate user preferences only by statistics of specific page. Because recent main contents of web page design are being made of media files such as image files, and of dynamic pages utilizing the techniques of CSS, Div, iFrame etc. In this paper, large log analyzer was designed and executed to analyze web server log to estimate web contents preferences of users. With mapreduce which is based on Hadoop, large logs were analyzed and web contents preferences of media files such as image files, sounds and videos were estimated.

Design of Mobile Phone Middleware based on Integrated Context Provisioning Strategy (통합 상황 프로비저닝 전략을 기반으로 한 모바일 폰 미들웨어의 설계)

  • Jeong, Hyun-Jin;Won, You-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.89-98
    • /
    • 2007
  • In these days, the use of context in application running on mobile devices such as PDAs and smart Phone has become a crucial requirement for several research areas, including ubiquitous computing. mobile computing. Previous middlewares which support context provisioning uses single strategy. But, this paper proposed middleware integrated multiple strategies for context provisioning, namely internal sensors-based, external infrastructure-based, and distributed provisioning in ad hoc networks. Applications can query needed context items using SQL like context query language and require context information to use different provisioning mechanisms depending on resource availability and presence of external infrastructures.

  • PDF

User Centered Context-aware Smart Home Applications (사용자 중심의 환경맥락 기반 스마트 홈 응용)

  • 오유수;장세이;우운택
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.2
    • /
    • pp.111-125
    • /
    • 2004
  • In this paper, we applied user-centered context to Smart Home Applications. Current research activities on smart home have just focused on the infrastructure without considering user's contexts and implementation cost. We first realized the user-centered personalized services using ubi-UCAM (a Unified Context-aware Application Model), which exploited contexts from various kinds of smart sensors. We, then, verified its usefulness in the ubiquitous computing-enabled home environment. It can be extended to various application areas since it guarantees independence between sensors and services. Accordingly, it will play a key role in future smart home environment.

The Convergence of Web service by BPM (BPM을 이용한 웹서비스 융·복합 방안)

  • Im, Sang-mook;Jo, In-June
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.495-498
    • /
    • 2009
  • In Ubiquitous computing environment, as the requirements of various services and combination of personal digital assistant are increasing, the standards and technologies have been developing all over the world. Also, ubiquitous government is planning to provide seamless service therefore, the demand is very high about infrastructure of service combination which connects various governmental systems. As a result, it is required that the Service-Oriented Architecture (SOA) and technical developments which combine various services, devices and terminal accepting to use seamless service convergence in ubiquitous computing environment. In this paper, I suggest to combine for a single web service to use Business Process Management (BPM). It can be expected to develop technologies efficiently and effectively by reusing web services, and reducing mistakes and faults of the development.

  • PDF

CacheSCDefender: VMM-based Comprehensive Framework against Cache-based Side-channel Attacks

  • Yang, Chao;Guo, Yunfei;Hu, Hongchao;Liu, Wenyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6098-6122
    • /
    • 2018
  • Cache-based side-channel attacks have achieved more attention along with the development of cloud computing technologies. However, current host-based mitigation methods either provide bad compatibility with current cloud infrastructure, or turn out too application-specific. Besides, they are defending blindly without any knowledge of on-going attacks. In this work, we present CacheSCDefender, a framework that provides a (Virtual Machine Monitor) VMM-based comprehensive defense framework against all levels of cache attacks. In designing CacheSCDefender, we make three key contributions: (1) an attack-aware framework combining our novel dynamic remapping and traditional cache cleansing, which provides a comprehensive defense against all three cases of cache attacks that we identify in this paper; (2) a new defense method called dynamic remapping which is a developed version of random permutation and is able to deal with two cases of cache attacks; (3) formalization and quantification of security improvement and performance overhead of our defense, which can be applicable to other defense methods. We show that CacheSCDefender is practical for deployment in normal virtualized environment, while providing favorable security guarantee for virtual machines.

Identity-based Provable Data Possession for Multicloud Storage with Parallel Key-Insulation

  • Nithya, S. Mary V.;Rhymend Uthariaraj, V.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3322-3347
    • /
    • 2021
  • Cloud Storage is the primary component of many businesses on cloud. Majority of the enterprises today are adopting a multicloud strategy to keep away from vendor lock-in and to optimize cost. Auditing schemes are used to ascertain the integrity of cloud data. Of these schemes, only the Provable Data Possession schemes (PDP) are resilient to key-exposure. These PDP schemes are devised using Public Key Infrastructure (PKI-) based cryptography, Identity-based cryptography, etc. PKI-based systems suffer from certificate-related communication/computational complexities. The Identity-based schemes deal with the exposure of only the auditing secret key (audit key). But with the exposure of both the audit key and the secret key used to update the audit key, the auditing process itself becomes a complete failure. So, an Identity-based PDP scheme with Parallel Key-Insulation is proposed for multiple cloud storage. It reduces the risk of exposure of both the audit key and the secret key used to update the audit key. It preserves the data privacy from the Third Party Auditor, secure against malicious Cloud Service Providers and facilitates batch auditing. The resilience to key-exposure is proved using the CDH assumption. Compared to the existing Identity-based multicloud schemes, it is efficient in integrity verification.

A Case Study on the Development of Epidemiological Investigation Support System through Inter-ministerial Collaboration (정부 부처간 협업을 통한 온라인 역학조사 지원시스템 개발 사례 연구)

  • Kim, Su Jung;Kim, Jae Ho;Eum, Gyu Ri;Kim, Tae Hyung
    • The Journal of Information Systems
    • /
    • v.29 no.4
    • /
    • pp.123-135
    • /
    • 2020
  • Purpose The purpose of this study is to investigate the development process and the effectiveness of the EISS (epidemiological investigation support system), which prevents the spread of infectious diseases like a novel corona virus disease, COVID-19. Design/methodology/approach This study identified the existing epidemiological support system for MERS through prior research and studied the case of the development of a newly developed epidemiological support system based on cloud computing infrastructure for COVID-19 through inter-ministerial collaboration in 2020. Findings The outbreak of COVID-19 drove the Korean Government began the development of the EISS with private companies. This system played a significant role in flattening the spread of infection during several waves in which the number of confirmed cases increased rapidly in Korea, However, we need to be careful in handling confirmed patients' private data affecting their privacy.

Design and Evaluation of a Fault-tolerant Publish/Subscribe System for IoT Applications (IoT 응용을 위한 결함 포용 발행/구독 시스템의 설계 및 평가)

  • Bae, Ihn-Han
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1101-1113
    • /
    • 2021
  • The rapid growth of sense-and-respond applications and the emerging cloud computing model present a new challenge: providing publish/subscribe middleware as a scalable and elastic cloud service. The publish/subscribe interaction model is a promising solution for scalable data dissemination over wide-area networks. In addition, there have been some work on the publish/subscribe messaging paradigm that guarantees reliability and availability in the face of node and link failures. These publish/subscribe systems are commonly used in information-centric networks and edge-fog-cloud infrastructures for IoT. The IoT has an edge-fog cloud infrastructure to efficiently process massive amounts of sensing data collected from the surrounding environment. In this paper. we propose a quorum-based hierarchical fault-tolerant publish/subscribe systems (QHFPS) to enable reliable delivery of messages in the presence of link and node failures. The QHFPS efficiently distributes IoT messages to the publish/subscribe brokers in fog overlay layers on the basis of proposing extended stepped grid (xS-grid) quorum for providing tolerance when faced with node failures and network partitions. We evaluate the performance of QHFPS in three aspects: number of transmitted Pub/Sub messages, average subscription delay, and subscritpion delivery rate with an analytical model.

Artificial Neural Network-based Weight Factor Determination Method for the Enhanced XML Schema Matching of Bridge Engineering Documents (교량 건설 문서의 강화된 XML 스키마 매칭을 위한 인공신경망 기반의 요소 가중치 선정 방안)

  • Park, Sang I.;Kwon, Tae-Ho;Park, Junwon;Seo, Kyung-Wan;Yoon, Young-Cheol
    • Journal of the Korean Society of Safety
    • /
    • v.37 no.1
    • /
    • pp.41-48
    • /
    • 2022
  • Bridge engineering documents have essential contents that must be referenced continuously throughout a structure's entire life cycle, but research related to the quality of the contents is still lacking. XML schema matching is an excellent technique to improve the quality of stored data; however, it takes excessive computing time when applied to documents with many contents and a deep hierarchical structure, such as bridge engineering documents. Moreover, it requires a manual parametric study for matching elements' weight factors, maintaining a high matching accuracy. This study proposes an efficient weight-factor determination method based on an artificial neural network (ANN) model using the simplified XML schema-matching method proposed in a previous research to reduce the computing time. The ANN model was generated and verified using 580 data of document properties, weight factors, and matching accuracy. The proposed ANN-based schema-matching method showed superiority in terms of accuracy and efficiency compared with the previous study on XML schema matching for bridge engineering documents.

A Fully Distributed Secure Approach using Nondeterministic Encryption for Database Security in Cloud

  • Srinu Banothu;A. Govardhan;Karnam Madhavi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.140-150
    • /
    • 2024
  • Database-as-a-Service is one of the prime services provided by Cloud Computing. It provides data storage and management services to individuals, enterprises and organizations on pay and uses basis. In which any enterprise or organization can outsource its databases to the Cloud Service Provider (CSP) and query the data whenever and wherever required through any devices connected to the internet. The advantage of this service is that enterprises or organizations can reduce the cost of establishing and maintaining infrastructure locally. However, there exist some database security, privacychallenges and query performance issues to access data, to overcome these issues, in our recent research, developed a database security model using a deterministic encryption scheme, which improved query execution performance and database security level.As this model is implemented using a deterministic encryption scheme, it may suffer from chosen plain text attack, to overcome this issue. In this paper, we proposed a new model for cloud database security using nondeterministic encryption, order preserving encryption, homomorphic encryptionand database distribution schemes, andour proposed model supports execution of queries with equality check, range condition and aggregate operations on encrypted cloud database without decryption. This model is more secure with optimal query execution performance.