• 제목/요약/키워드: computing infrastructure

검색결과 501건 처리시간 0.025초

Energy Efficient Software Development Techniques for Cloud based Applications

  • Aeshah A. Alsayyah;Shakeel Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • 제23권7호
    • /
    • pp.119-130
    • /
    • 2023
  • Worldwide organizations use the benefits offered by Cloud Computing (CC) to store data, software and programs. While running hugely complicated and sophisticated software on cloud requires more energy that causes global warming and affects environment. Most of the time energy consumption is wasted and it is required to explore opportunities to reduce emission of carbon in CC environment to save energy. Many improvements can be done in regard to energy efficiency from the software perspective by considering and paying attention on the energy consumption aspects of software's that run on cloud infrastructure. The aim of the current research is to propose a framework with an additional phase called parameterized development phase to be incorporated along with the traditional Software Development Life cycle (SDLC) where the developers need to consider the suggested techniques during software implementation to utilize low energy for running software on the cloud and contribute in green computing. Experiments have been carried out and the results prove that the suggested techniques and methods has enabled in achieving energy consumption.

클라우드 컴퓨팅 기술을 활용한 데스크탑 가상화 기반의 BIM 설계 환경 구축에 관한 연구 (A Study of the Establishment of BIM Design Environment based on Virtual Desktop Infrastructure(VDI) of Cloud Computing Technology)

  • 신중환;이규협;권순욱;최규성;고형렬
    • 한국건설관리학회논문집
    • /
    • 제16권4호
    • /
    • pp.118-128
    • /
    • 2015
  • BIM 기술은 현재 빠르게 건설 산업 전반에 적용 및 확산되고 있다. 그러나 고비용의 BIM 인프라, 법령의 부재, 운영 프로세스 등의 문제로 도입 초기의 기대와 달리 그 활용도면에서 만족할 만한 기대치를 채우지 못하고 있다. 설계 단계에서 수행되는 BIM 기술 기반의 협업 설계 인프라 구축은 성공적인 건설 프로젝트를 위한 필수 요소로 볼 수 있다. 현재 BIM은 클라우드 컴퓨팅기술과 결합하여 드로잉, 3D 모델링, 객체 데이터, 속성 정보 등을 생성할 수 있는 서비스 들이 파생되고 있으며 설계 인프라를 위한 핵심으로 떠오르고 있다. 본 논문은 VDI 시스템 환경 설정 및 구축을 통해 BIM 모델링, Viewing, 모델 체크, 마크업 등 BIM을 수행할 수 있는 서버 인프라 서비스 구축 방안을 제시한다. VDI 성능 시스템 테스트를 통하여 BIM 설계 환경에 필요한 가상 머신 리소스를 산정하고 배분하는 방식을 제안하여 클라우드 컴퓨팅 기반 BIM 설계 및 BIM 설계정보를 활용 프로젝트 운영 방향을 제시하고자 한다.

CTaG: An Innovative Approach for Optimizing Recovery Time in Cloud Environment

  • Hung, Pham Phuoc;Aazam, Mohammad;Huh, Eui-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권4호
    • /
    • pp.1282-1301
    • /
    • 2015
  • Traditional infrastructure has been superseded by cloud computing, due to its cost-effective and ubiquitous computing model. Cloud computing not only brings multitude of opportunities, but it also bears some challenges. One of the key challenges it faces is recovery of computing nodes, when an Information Technology (IT) failure occurs. Since cloud computing mainly depends upon its nodes, physical servers, that makes it very crucial to recover a failed node in time and seamlessly, so that the customer gets an expected level of service. Work has already been done in this regard, but it has still proved to be trivial. In this study, we present a Cost-Time aware Genetic scheduling algorithm, referred to as CTaG, not only to globally optimize the performance of the cloud system, but also perform recovery of failed nodes efficiently. While modeling our work, we have particularly taken into account the factors of network bandwidth and customer's monetary cost. We have implemented our algorithm and justify it through extensive simulations and comparison with similar existing studies. The results show performance gain of our work over the others, in some particular scenarios.

유비쿼터스 컴퓨팅 환경에서 상황인식 미들웨어 설계 (Design of Context-Aware Middleware in Ubiquitous Computing Environment)

  • 김효남;박용
    • 한국컴퓨터정보학회논문지
    • /
    • 제10권5호
    • /
    • pp.115-122
    • /
    • 2005
  • 최근에 유비쿼터스라는 용어가 대중매체 등에서 사용되고 있고, 선진국에서는 이미 유비쿼터스 컴퓨팅의 상업화가 나타나고 있다. 현재 우리나라에서도 유비쿼터스 컴퓨팅 시대의 비즈니스 모델에 많은 연구를 하고 있다. 유비쿼터스 컴퓨팅은 언제, 어디서나 사용하는 컴퓨팅 환경을 지칭하는 말로 다양한 종류의 컴퓨터가 사람, 사물, 환경 속에 내재되어 있고, 이들이 서로 연결되어 필요한 곳에서 컴퓨팅을 구현할 수 있는 환경을 의미한다. 본 논문에서는 유비쿼터스 컴퓨팅 환경의 홈 네트워킹 시스템의 보다 효율적인 상황인식을 위한 서비스인프라 구조를 제시한다. 지금까지 연구된 상황인식 시스템은 지정된 공간에서 상황을 발생시키는 사용자를 식별하는 일과 식별된 사용자가 발생하는 상황의 인식에 주된 초점을 두고 있다. 그러나 본 논문에서는 보다 효율적인 상황인식을 위해서 구체적인 미들웨어 시스템 구조를 제시한다.

  • PDF

Performance analysis of local exit for distributed deep neural networks over cloud and edge computing

  • Lee, Changsik;Hong, Seungwoo;Hong, Sungback;Kim, Taeyeon
    • ETRI Journal
    • /
    • 제42권5호
    • /
    • pp.658-668
    • /
    • 2020
  • In edge computing, most procedures, including data collection, data processing, and service provision, are handled at edge nodes and not in the central cloud. This decreases the processing burden on the central cloud, enabling fast responses to end-device service requests in addition to reducing bandwidth consumption. However, edge nodes have restricted computing, storage, and energy resources to support computation-intensive tasks such as processing deep neural network (DNN) inference. In this study, we analyze the effect of models with single and multiple local exits on DNN inference in an edge-computing environment. Our test results show that a single-exit model performs better with respect to the number of local exited samples, inference accuracy, and inference latency than a multi-exit model at all exit points. These results signify that higher accuracy can be achieved with less computation when a single-exit model is adopted. In edge computing infrastructure, it is therefore more efficient to adopt a DNN model with only one or a few exit points to provide a fast and reliable inference service.

BCOR 접근법을 이용한 클라우드 컴퓨팅 도입의 의사결정 요인에 관한 연구 (A Study on Decision Making Factors of Cloud Computing Adoption Using BCOR Approach)

  • 이영찬;당응웬하인
    • 한국IT서비스학회지
    • /
    • 제11권1호
    • /
    • pp.155-171
    • /
    • 2012
  • With the continuous and outstanding development of information technology(IT), human being is coming to the new computing era which is called cloud computing. This era brings lots of huge benefits also at the same time release the resources of IT infrastructure and data boom for man. In the future no longer, most of IT service providers, enterprises, organizations and systems will adopt this new computing model. There are three main deployment models in cloud computing including public cloud, private cloud and hybrid cloud; each one also has its own cons and pros. While implementing any kind of cloud services, customers have to choose one of three above deployment models. Thus, our paper aims to represent a practical framework to help the adopter select which one will be the best suitable deployment model for their requirements by evaluating each model comprehensively. The framework is built by applying the analytic hierarchy process(AHP), namely benefit-cost-opportunity-risk(BCOR) model as a powerful and effective tool to serve the problem. The gained results hope not only to provide useful information for the readers but also to contribute valuable knowledge to this new area. In addition, it might support the practitioners' effective decision making process in case they meet the same issue and have a positive influence on the increase of right decision for the organization.

Study of Danger-Theory-Based Intrusion Detection Technology in Virtual Machines of Cloud Computing Environment

  • Zhang, Ruirui;Xiao, Xin
    • Journal of Information Processing Systems
    • /
    • 제14권1호
    • /
    • pp.239-251
    • /
    • 2018
  • In existing cloud services, information security and privacy concerns have been worried, and have become one of the major factors that hinder the popularization and promotion of cloud computing. As the cloud computing infrastructure, the security of virtual machine systems is very important. This paper presents an immune-inspired intrusion detection model in virtual machines of cloud computing environment, denoted I-VMIDS, to ensure the safety of user-level applications in client virtual machines. The model extracts system call sequences of programs, abstracts them into antigens, fuses environmental information of client virtual machines into danger signals, and implements intrusion detection by immune mechanisms. The model is capable of detecting attacks on processes which are statically tampered, and is able to detect attacks on processes which are dynamically running. Therefore, the model supports high real time. During the detection process, the model introduces information monitoring mechanism to supervise intrusion detection program, which ensures the authenticity of the test data. Experimental results show that the model does not bring much spending to the virtual machine system, and achieves good detection performance. It is feasible to apply I-VMIDS to the cloud computing platform.

Building a Private Cloud-Computing System for Greenhouse Control

  • Kim, JoonYong;Lee, Chun Gu;Park, Dong-Hyeok;Park, Heun Dong;Rhee, Joong-Yong
    • Journal of Biosystems Engineering
    • /
    • 제43권4호
    • /
    • pp.440-444
    • /
    • 2018
  • Purpose: Cloud-computing technology has several advantages, including maintenance, management, accessibility, and computing power. A greenhouse-control system utilizing these advantages was developed using a private cloud-computing system. Methods: A private cloud needs a collection of servers and a suite of software tools to monitor and control cloud-computing resources. In this study, a server farm, operated by OpenStack as a cloud platform, was constructed using servers, and other network devices. Results: The greenhouse-control system was developed according to the fundamental cloud service models: infrastructure as a service, platform as a service, and software as a service. This system has four additional advantages - security, control function, public data use, and data exchange. There are several considerations that must be addressed, such as service level agreement, data ownership, security, and the differences between users. Conclusions: When the advantages are utilized and the considerations are addressed, cloud-computing technology will be beneficial for agricultural use.

Enhancing Service Availability in Multi-Access Edge Computing with Deep Q-Learning

  • 루숭구 조쉬 음와싱가;샤이드 무하마드 라자;리덕 타이;김문성;추현승
    • 인터넷정보학회논문지
    • /
    • 제24권2호
    • /
    • pp.1-10
    • /
    • 2023
  • The Multi-access Edge Computing (MEC) paradigm equips network edge telecommunication infrastructure with cloud computing resources. It seeks to transform the edge into an IT services platform for hosting resource-intensive and delay-stringent services for mobile users, thereby significantly enhancing perceived service quality of experience. However, erratic user mobility impedes seamless service continuity as well as satisfying delay-stringent service requirements, especially as users roam farther away from the serving MEC resource, which deteriorates quality of experience. This work proposes a deep reinforcement learning based service mobility management approach for ensuring seamless migration of service instances along user mobility. The proposed approach focuses on the problem of selecting the optimal MEC resource to host services for high mobility users, thereby reducing service migration rejection rate and enhancing service availability. Efficacy of the proposed approach is confirmed through simulation experiments, where results show that on average, the proposed scheme reduces service delay by 8%, task computing time by 36%, and migration rejection rate by more than 90%, when comparing to a baseline scheme.

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • 제24권3호
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.