• 제목/요약/키워드: computing model

검색결과 3,322건 처리시간 0.029초

A Model to Investigate the Security Challenges and Vulnerabilities of Cloud Computing Services in Wireless Networks

  • Desta Dana Data
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.107-114
    • /
    • 2023
  • The study provides the identification of vulnerabilities in the security issues by Wireless Network. To achieve it the research focus on packet flow analysis, end to end data communication, and the security challenges (Cybercrime, insider threat, attackers, hactivist, malware and Ransomware). To solve this I have used the systematic literature review mechanisms and demonstrative tool namely Wireshark network analyzer. The practical demonstration identifies the packet flow, packet length time, data flow statistics, end- to- end packet flow, reached and lost packets in the network and input/output packet statics graphs. Then, I have developed the proposed model that used to secure the Wireless network solution and prevention vulnerabilities of the network security challenges. And applying the model that used to investigate the security challenges and vulnerabilities of cloud computing services is used to fulfill the network security goals in Wireless network. Finally the research provides the model that investigate the security challenges and vulnerabilities of cloud computing services in wireless networks

유비쿼터스 컴퓨팅 시스템의 실용적 품질 평가 모델 (UCQM: A Quality Model for Practical Evaluation of Ubiquitous Computing Systems)

  • 오상헌;김수동;류성열
    • 한국정보과학회논문지:소프트웨어및응용
    • /
    • 제34권4호
    • /
    • pp.342-358
    • /
    • 2007
  • 유비쿼터스 컴퓨팅 시스템(Ubiquitous Computing System, UCS)은 언제 어디서나 장소에 구애를 받지 않고 사용자가 컴퓨터 네트워크를 이용하여 서비스를 얻을 수 있는 시스템이다. 유비쿼터스 컴퓨팅 시스템은 개인화된 시스템으로써, 다른 시스템과 상호운영이 되는 시스템이다. 이러한 유비쿼터스 컴퓨팅 시스템은 우리 생활에 생산과 소비, 정치, 경제, 사회, 문화, 전 분야에 걸쳐 많은 변화를 가져올 것이다. 따라서 본 논문에서는 이러한 유비쿼터스 컴퓨팅 시스템을 평가하기 위하여 ISO/IEC 9126을 기반으로 체계적인 품질모델을 제안한다. 그러므로, 유비쿼터스 컴퓨팅 시스템의 품질이 좋아야 사용자에게 제공하는 서비스가 좋기 때문이다. 또한 본 논문에서는 유비쿼터스 컴퓨팅 시스템의 중요한 특징들을 식별하고, 식별된 특정을 기반으로 하여 품질속성(Quality Attribute)을 도출한다. 이렇게 도출된 품질속성을 기반으로 하여 메트릭을 정의하고, 유비쿼터스 컴퓨팅 품질모델(Ubiquitous Computing Quality Model, UCQM)을 모델링 하여 유비쿼터스 컴퓨팅 시스템의 전반적인 환경과 중요한 특정을 평가한다.

AWS Lambda Serverless Computing 기술을 활용한 효율적인 딥러닝 기반 이미지 인식 서비스 시스템 (An Efficient Deep Learning Based Image Recognition Service System Using AWS Lambda Serverless Computing Technology)

  • 이현철;이성민;김강석
    • 정보처리학회논문지:소프트웨어 및 데이터공학
    • /
    • 제9권6호
    • /
    • pp.177-186
    • /
    • 2020
  • 최근 딥러닝(Deep Learning) 기술의 발전에 따라 컴퓨터 비전(Computer Vision) 분야의 이미지 인식 성능이 향상되고 있으며, 또한 Serverless Computing이 이벤트 기반의 클라우드 애플리케이션 개발 및 서비스를 위한 차세대 클라우드 컴퓨팅 기술로 각광받고 있어 딥러닝과 Serverless Computing 기술을 접목하여 실생활에 이미지 인식 서비스를 사용하고자 하는 시도가 증가하고 있다. 따라서 본 논문에서는 Serverless Computing 기술을 활용하여 효율적인 딥러닝 기반 이미지 인식 서비스 시스템 개발 방법을 기술한다. 제안하는 시스템은 Serverless Computing 기반 AWS Lambda Server를 이용하여 적은 비용으로 대형 신경망 모델을 사용자에게 서비스할 수 있는 방법을 제안한다. 또한 AWS Lambda Server의 단점인 Cold Start Time 문제와 용량제한 문제를 해결하여 효과적으로 대형 신경망 모델을 사용하는 Serverless Computing 시스템을 구축할 수 있음을 보인다. 실험을 통해 AWS Lambda Serverless Computing 기술을 활용하여 본 논문에서 제안한 시스템이 비용 절감뿐만 아니라 처리 시간 및 용량제한 문제를 해결하여 대형 신경망 모델을 서비스하기에 효율적인 성능을 보임을 확인하였다.

The Effective Factors of Cloud Computing Adoption Success in Organization

  • Yoo, Seok-Keun;Kim, Bo-Young
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제6권1호
    • /
    • pp.217-229
    • /
    • 2019
  • The purpose of the research is to verify how task characteristics for business and technology characteristics, economic feasibility, technology readiness, organizational factors, environmental factors of cloud computing affect the performance of cloud computing adoption through Fit and Viability. The research aims to verify the relationship among the success factors for adopting cloud computing based on the Fit-Viability model. Respondents who work for IT companies which is using cloud computing in South Korea were chosen. The data was analyzed by the structural equating model. As a result, Task characteristics and Technology characteristics affected Fit in a positive manner, while Technology readiness, Organizational factors and Environmental factors also positively impacted Viability. Fit and Viability both affected the successful adoption of cloud equally. In particular, Environmental factors were proven to have the biggest impacts on Viability, and affected highly indirect impact on the Performance of cloud computing adoption through Viability. Entering the era of the fourth industrial revolution, corporations have established digital transformation strategies to secure a competitive edge while growing continuously, and are also carrying out various digital transformation initiatives. For the success of adoption of foundational technologies, they need to understand not only the decision-making factors of adopting cloud computing, but also the success factors of adopting cloud computing.

Ubi-SERVQUAL을 활용한 시나리오상의 유비쿼터스 서비스 품질 평가 (Applying Ubi-SERVQUAL to Assessing the Quality of Ubiquitous Service Scenarios)

  • 권오병;김지훈
    • 한국경영과학회지
    • /
    • 제32권1호
    • /
    • pp.1-13
    • /
    • 2007
  • Nowadays, ubiquitous computing services begin to be suggested from a few domains such as supply chain, logistics, and location-based services. However, to what extent the services will be successful is hard to be estimated, mainly because a sophisticated service evaluation method focusing on the ubiquitous computing perspective has not been supplied. Hence, this paper alms to build a model to assess the quality of ubiquitous computing service. To do so, an amended model, Ubi-SERVQUAL, is applied to assess the service quality mentioned in ubiquitous computing scenarios. According to the Ubi-SERVQUAL, we found that an actual service with higher quality should consider reliability. responsiveness, assurance and empathy in order to increase customer satisfaction, computer system's intimacy with users and trust.

Task Scheduling and Resource Management Strategy for Edge Cloud Computing Using Improved Genetic Algorithm

  • Xiuye Yin;Liyong Chen
    • Journal of Information Processing Systems
    • /
    • 제19권4호
    • /
    • pp.450-464
    • /
    • 2023
  • To address the problems of large system overhead and low timeliness when dealing with task scheduling in mobile edge cloud computing, a task scheduling and resource management strategy for edge cloud computing based on an improved genetic algorithm was proposed. First, a user task scheduling system model based on edge cloud computing was constructed using the Shannon theorem, including calculation, communication, and network models. In addition, a multi-objective optimization model, including delay and energy consumption, was constructed to minimize the sum of two weights. Finally, the selection, crossover, and mutation operations of the genetic algorithm were improved using the best reservation selection algorithm and normal distribution crossover operator. Furthermore, an improved legacy algorithm was selected to deal with the multi-objective problem and acquire the optimal solution, that is, the best computing task scheduling scheme. The experimental analysis of the proposed strategy based on the MATLAB simulation platform shows that its energy loss does not exceed 50 J, and the time delay is 23.2 ms, which are better than those of other comparison strategies.

ACCESS CONTROL MODEL FOR DATA STORED ON CLOUD COMPUTING

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Rehan, Akmal;Mumtaz, Imran;Ahmad, Wasi
    • International Journal of Advanced Culture Technology
    • /
    • 제7권4호
    • /
    • pp.208-221
    • /
    • 2019
  • The inference for this research was concentrated on client's data protection in cloud computing i.e. data storages protection problems and how to limit unauthenticated access to info by developing access control model then accessible preparations were introduce after that an access control model was recommend. Cloud computing might refer as technology base on internet, having share, adaptable authority that might be utilized as organization by clients. Compositely cloud computing is software's and hardware's are conveying by internet as a service. It is a remarkable technology get well known because of minimal efforts, adaptability and versatility according to client's necessity. Regardless its prevalence large administration, propositions are reluctant to proceed onward cloud computing because of protection problems, particularly client's info protection. Management have communicated worries overs info protection as their classified and delicate info should be put away by specialist management at any areas all around. Several access models were accessible, yet those models do not satisfy the protection obligations as per services producers and cloud is always under assaults of hackers and data integrity, accessibility and protection were traded off. This research presented a model keep in aspect the requirement of services producers that upgrading the info protection in items of integrity, accessibility and security. The developed model helped the reluctant clients to effectively choosing to move on cloud while considerate the uncertainty related with cloud computing.

모바일 서비스에 기반한 유비쿼터스 컴퓨팅의 사용자 수용에 영향을 미치는 요인 (Factors Affecting User Acceptance of Ubiquitous Computing based on Mobile Services)

  • 노미진;김병곤;박순창
    • Journal of Information Technology Applications and Management
    • /
    • 제18권1호
    • /
    • pp.55-74
    • /
    • 2011
  • The growth in the use of ubiquitous computing based on mobile services as an enabler to conduct business more effectively has been phenomenal. Technology acceptance model (TAM) has been applied in different contexts to examine a wide range of information technologies (IT). As more and more companies are finding ways to utilize ubiquitous computing based on mobile services, an important issue is to understand what factors will impact the decisions of consumers in adopting the services. Based on TAM with three additional groups of external factors, i.e., service-related factors (ubiquitous access, context awareness) and technology-related factors (perceived security risk, network connectivity) that are theoretically justified as having influence on both perceived usefulness and perceived ease of use which are additionally considered, a research model for the investigated technology acceptance was developed and empirically examined, using responses from more than intended users of ubiquitous computing based on mobile services. The specific purposes of this study are as follows. Firstly, this study is to identify service beliefs considering unique characteristics for ubiquitous services such as perceived ubiquitous access and perceived context awareness. Secondly, this study is to investigate network characteristics beliefs such as perceived security and perceived connectivity. Thirdly, this paper investigates the relationship among variables such as ubiquitous characteristics, network characteristics, behavioral beliefs, and intention to use ubiquitous web services. This study uses a structural equation model to test the research model. The major results of this study are as follows. Firstly, ubiquitous access has a influence on perceived usefulness and perceived ease of use. Context awareness has an influence on perceived usefulness. Secondly, User familiarity has an influence on perceived usefulness and perceived ease of use, and intention to use. User innovativeness has an influence on perceived ease of use. Thirdly, perceived security risk has an influence on perceived usefulness and perceived ease of use. Network connectivity has an influence on perceived usefulness and perceived ease of use. Fourth, there exist differential effects among factors in structural model among information, transaction, and entertainment services.

모바일 컴퓨팅 환경에서 BISLD를 이용한 회복모델 개선 (Recovery Model Improvement using BISLD in Mobile Computing Environment)

  • 조성제;한성수
    • 한국산학기술학회논문지
    • /
    • 제13권10호
    • /
    • pp.4786-4793
    • /
    • 2012
  • 최근 모바일 컴퓨팅 환경에서 실시간 트랜잭션 처리에 대한 트랜잭션 모델에 대한 연구가 활발히 진행되고 있다. 그러나 회복모델에 대한 연구는 상대적으로 미흡하다. 이러한 모바일 컴퓨팅 환경에서는 핸드오프가 발생하였을 경우 데이터 손실이 발생하므로 데이터베이스의 안정성을 위한 모바일 회복기법은 매우 중요하다. 그래서 모바일 컴퓨팅 환경에서는 입출력을 줄일 수 있는 효율적인 회복기법에 대한 연구가 절실히 요구된다. SLL기법은 순차파일로 구성되어 있기 때문에 입출력시간이 증가된다. 본 연구에서는 모바일 컴퓨팅 환경에서 효율적인 모바일 회복 기법을 제안하였다. 마지막으로 제한한 회복기법의 성능평가를 수행하여 효율성을 입증하였다.

유비쿼터스 공간에서의 정보 연결 (A Connection of Information in the Ubiquitous Space)

  • 고성범
    • 인터넷정보학회논문지
    • /
    • 제5권2호
    • /
    • pp.1-15
    • /
    • 2004
  • 현재의 인터넷 공간은 소위 유비쿼터스 공간으로 진화해 가고 있다. 인터넷 공간과는 달리, 유비쿼터스 공간에서는 정보가 컴퓨터 메모리, 인간의 두뇌 그리고 물리적 사물에 골고루 분포하게 된다. ‘하이퍼텍스트’ 는 컴퓨터 메모리(즉, 전자 공간)를 전제로 한 정보 연결 모델로, 유비쿼터스 공간에는 잘 맞지 않는다. 이점에 착안하여, 본 논문에서는 CPM모델을 제안하였다. CPM 모델은 아날로그 컴퓨팅, 디지털 컴퓨팅, 휴먼 컴퓨팅 등 세 가지 연산 메커니즘을 포괄할 수 있도록 설계되었다. 본 논문에서는, CPM 모델이 갖는 이러한 속성이 유비쿼터스 공간에서의 정보 연결 목적에 부합됨을 보였다.

  • PDF