• Title/Summary/Keyword: computing infrastructure

Search Result 504, Processing Time 0.025 seconds

A Study on the Linux System Load and Resource for Cloud Computing Infrastructure Development (클라우드 컴퓨팅 인프라 구축을 위한 시스템 부하 및 자원에 관한 연구)

  • Jung, Sung-Jae;Bae, Yu-Mi;Jang, Rae-Young;Sung, Kyung;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.440-443
    • /
    • 2011
  • While Cloud Computing catch attention, system configuration using Server Virtualization as a core technology gains popularity. Thus analyzing existing systems and utilizing resources using server virtualization techniques are spotlighted. This paper presents a solid foundation for utilizing the system idle resources and constructing the cloud computing infrastructure by analyzing means and types of the system load and further analyzing the relationship between CPU resources and loads based on Linux system.

  • PDF

Two Factor Authentication for Cloud Computing

  • Lee, Shirly;Ong, Ivy;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.427-432
    • /
    • 2010
  • The fast-emerging of cloud computing technology today has sufficiently benefited its wide range of users from individuals to large organizations. It carries an attractive characteristic by renting myriad virtual storages, computing resources and platform for users to manipulate their data or utilize the processing resources conveniently over Internet without the need to know the exact underlying infrastructure which is resided remotely at cloud servers. However due to the loss of direct control over the systems/applications, users are concerned about the risks of cloud services if it is truly secured. In the literature, there are cases where attackers masquerade as cloud users, illegally access to their accounts, by stealing the static login password or breaking the poor authentication gate. In this paper, we propose a two-factor authentication framework to enforce cloud services' authentication process, which are Public Key Infrastructure (PKI) authentication and mobile out-of-band (OOB) authentication. We discuss the framework's security analysis in later session and conclude that it is robust to phishing and replay attacks, prohibiting fraud users from accessing to the cloud services.

Evolving IC's Role in End User Computing (최종 사용자 전산에서 정보센터의 역할)

  • Lee, Seong-Yeol;Gang, Sin-Cheol
    • Asia pacific journal of information systems
    • /
    • v.1 no.1
    • /
    • pp.103-115
    • /
    • 1991
  • End-User Computing (EUC) is one of the most significant developments in corporate computing in the 1980's. An information center (IC) supports EUC by providing end-users with technical assistance and consulting services. This study investigates the effective management and implementation of an IC in an organization with respect to the three sociotechnical factors : characteristics of end-users, social relationships with the DP/MIS department, and 3) technological infrastructure of EUC. An exploratory framework for managing IC is developed based on extensive literature review and results from interviews with IC directors of 17 large companies in the midwestern region in U.S.A.

  • PDF

Security Vulnerability and Technology Status of AMI (AMI의 보안 취약성 및 기술 현황)

  • Jo, Han-Seong;Lee, Yong-Gu;Jeong, Sang-In;Choe, Jin-Ho
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.3 no.2
    • /
    • pp.73-78
    • /
    • 2017
  • Recently, a number of foreign electric power companies including domestic Korea Electric Power Corporation (KEPCO) have actively engaged in the construction of a power grid with the concept of a smart grid. The Smart grid is a technology that increases the efficiency of the power by converging the information network with the power grid. It can maximize the energy efficiency through the two-way communication between the utility and the consumer. However, as the power grid converges with the information and communication network, security threats are increasing more than existing power grids. Due to the nature of the power grid, the damage caused by security threats is not only personal privacy but also economic loss of society. So smart grid becomes the target of hackers. In this paper, we discuss security vulnerabilities of Advanced Metering Infrastructure (AMI), which is a core technology of smart grid construction, and the corresponding security technologies to prevent security damage of smart grid.

High Performance Computing: Infrastructure, Application, and Operation

  • Park, Byung-Hoon;Kim, Youngjae;Kim, Byoung-Do;Hong, Taeyoung;Kim, Sungjun;Lee, John K.
    • Journal of Computing Science and Engineering
    • /
    • v.6 no.4
    • /
    • pp.280-286
    • /
    • 2012
  • The last decades have witnessed an increasingly indispensible role of high performance computing (HPC) in science, business and financial sectors, as well as military and national security areas. To introduce key aspects of HPC to a broader community, an HPC session was organized for the first time ever for the United States and Korea Conference (UKC) during 2012. This paper summarizes four invited talks that each covers scientific HPC applications, large-scale parallel file systems, administration/maintenance of supercomputers, and green technology towards building power efficient supercomputers of the next generation.

Security, Privacy, and Efficiency of Sustainable Computing for Future Smart Cities

  • Jeong, Young-Sik;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.1-5
    • /
    • 2020
  • Sustainable computing is a rapidly expanding field of research covering the fields of multidisciplinary engineering. With the rapid adoption of Internet of Things (IoT) devices, issues such as security, privacy, efficiency, and green computing infrastructure are increasing day by day. To achieve a sustainable computing ecosystem for future smart cities, it is important to take into account their entire life cycle from design and manufacturing to recycling and disposal as well as their wider impact on humans and the places around them. The energy efficiency aspects of the computing system range from electronic circuits to applications for systems covering small IoT devices up to large data centers. This editorial focuses on the security, privacy, and efficiency of sustainable computing for future smart cities. This issue accepted 17 articles after a rigorous review process.

An Implementation on CIS Management for Underground Social Infrastructure based on Active RFID (능동형 RFID 기반의 지하 매설물 GIS 관리 구현)

  • Baek, Jang-Mi;Hong, In-Sik
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.45-56
    • /
    • 2007
  • Recently, much research has been actively conducted for a new kind of network environment ubiquitous computing. This paper will define the smart-tag technology required by a ubiquitous environment. We will describe how to apply smart-tag-related Radio Frequency Identification(RFID) research for GIS in underground social infrastructure, a local-area wireless-communication technology. Application development is important that will be able to materialize a network environment. This research promotes various application developments, such reason currently it establishes the IT 839 from domestic. The geographic information system construction is a part of IT 839. The research which is various becomes accomplished for the ubiquitous of social base facility from domestic. Consequently, in this paper analyzes the geographic information system of existing, researches based RFID underground social infrastructure management system development. The Proposed method is complements the method of existing, and is efficient for underground social infrastructure. This system is new management system for underground social infrastructure, and provides safe administrator function using authentication of active RFID tag. It provides real processing and autonomy of administrator.

  • PDF

The Impact of Ubiquitous Factors on Intention to Use Mobile Services (유비쿼터스 특성요인이 모바일 서비스의 사용의도에 미치는 영향)

  • Cha, Yoon-Sook;Chung, Moon-Sang
    • The Journal of Information Systems
    • /
    • v.16 no.2
    • /
    • pp.69-91
    • /
    • 2007
  • The mobile computing environment has already matured and mobile services are activated throughout many industries. In the following years, these changes are expected to evolve into a ubiquitous computing environment. In the meantime, whether newly developed information technologies will thrive or diminished depends on user's intention to adopt them. Hence, the necessity of user-centered research considering ubiquitous computing in mobile computing environment is obvious. This study, thus, investigated ubiquitous factors in various literature related to ubiquitous computing and technology acceptance and it proposes a research model of the ubiquitous factors affecting user's intention to use mobile services, in terms of meaning(connectivity, mobility), service(contextual offer), compatibility(compatibility), and infrastructure(privacy, truth). The proposed model is expected to help both researchers and practitioners extend their understanding about the ubiquitous factors in mobile computing environment

  • PDF

Cryptography in the Cloud: Advances and Challenges

  • Boyd, Colin
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.17-23
    • /
    • 2013
  • Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.