• 제목/요약/키워드: computing technology

검색결과 4,171건 처리시간 0.03초

DTSTM: Dynamic Tree Style Trust Measurement Model for Cloud Computing

  • Zhou, Zhen-Ji;Wu, Li-Fa;Hong, Zheng;Xu, Ming-Fei;Pan, Fan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권1호
    • /
    • pp.305-325
    • /
    • 2014
  • In cloud computing infrastructure, current virtual machine trust measurement methods have many shortcomings in dynamism, security and concurrency. In this paper, we present a new method to measure the trust of virtual machine. Firstly, we propose "behavior trace" to describe the state of virtual machine. Behavior trace is a sequence of behaviors. The measurement of behavior trace is conducted on the basis of anticipated trusted behavior, which not only ensures security of the virtual machine during runtime stage but also reduces complexity of the trust measurement. Based on the behavior trace, we present a Dynamic Tree Style Trust Measurement Model (DTSTM). In this model, the measurement of system domain and user domain is separated, which enhances the extensibility, security and concurrency of the measurement. Finally, based on System Call Interceptor (SCI) and Virtual Machine Introspection (VMI) technology, we implement a DTSTM prototype system for virtual machine trust measurement. Experimental results demonstrate that the system can effectively verify the trust of virtual machine and requires a relatively low performance overhead.

Mitigating Threats and Security Metrics in Cloud Computing

  • Kar, Jayaprakash;Mishra, Manoj Ranjan
    • Journal of Information Processing Systems
    • /
    • 제12권2호
    • /
    • pp.226-233
    • /
    • 2016
  • Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.

클라우드 컴퓨팅으로의 사용전환 결정요인에 관한 연구: 구글 Docs 사례를 중심으로 (A Study on Factors Affecting Intention to Switch for Using Cloud Computing: A Case of Goolgle Docs)

  • 박상철;권순재
    • 한국IT서비스학회지
    • /
    • 제10권3호
    • /
    • pp.149-166
    • /
    • 2011
  • While the importance of adopting cloud computing service has been emerged, comparatively little research has been conducted on examining factors of an individual user's intention to switch toward cloud computing service. Hereafter, this study presents and empirically tests users' intention to switch to cloud computing. Our model posits that the characteristics of cloud computing such as collaboration support, accessability, trust to cloud service affect perceived value, which in turn, influences intention to switch. An experimental study using student subjects provided empirical validation for our proposed model. Survey data from 106 respondents was used to test the model using partial least square analysis. According to our results, the characteristics of cloud computing were found to have significant impact on users' intention to switch that partially mediated by perceived value. Based on our research findings, we hope that this research will stimulate researchers' interest in the emerging area of cloud computing adoption.

Web-Based KNHANES System in Cloud Computing

  • Park, Mi-Yeon;Park, Pil-Sook;Kim, Guk-Boh;Park, Jin-Yong;Jeong, Gu-Beom
    • 한국멀티미디어학회논문지
    • /
    • 제17권3호
    • /
    • pp.353-363
    • /
    • 2014
  • Cloud computing is an internet-based technology, providing services to the virtualized IT environment, and allowing users to add or remove resources of hardware or software at their discretion. Since Cloud computing can construct virtually integrated environments out of multiple local computing environments, various information services can be provided by it. In addition, state organizations also strive to build the cloud computing environments due to the benefits of reduced costs to introduce the system and of reduced time to build and provide the IT services. This study suggests a web-based cloud computing system for the computing environments, to be applied for the Korean National Health and Nutrition Examination Survey (KNHANES) by the Ministry of Health and Welfare, Republic of Korea.

A Study on the Implementation Method for the Achievement of the Korea High-Performance Computing Innovation Strategy

  • Choi, Youn Keun;Koh, Myoungju;Jung, Youg Hwan;Hur, YoungJu;Lee, Yeonjae;On, Noori;Hahm, Jaegyoon
    • Journal of Information Science Theory and Practice
    • /
    • 제10권spc호
    • /
    • pp.76-85
    • /
    • 2022
  • At the 8th National High-Performance Computing (HPC) Committee convened in 2021, the "National High-Performance Computing Innovation Strategy (draft) for the 4th Industrial Revolution Era" was deliberated and the original draft was approved. In this proposal, the Ministry of Science and ICT in KOREA announced three major plans and nine detailed projects with the vision of "Realizing the 4th industrial revolution quantum jumping by leaping into a high-performance computing powerhouse." Thereby the most important policy about national mid-term and long-term HPC development was established and called the HPC innovation strategy (hereinafter "the innovation strategy"). The three plans of the innovation strategy proposed by the government are: Strategic HPC infrastructure expansion; Secure source technologies; and Activate innovative HPC utilization. Each of the detailed projects has to be executed nationally and strategically. In this paper, we propose a strategy for the implementation of two items ("Strategic HPC infrastructure expansion" and "activate innovative HPC utilization") among these detailed plans.

Factor Analysis를 이용한 유비쿼터스 컴퓨팅 기반 정보시스템의 요구사항 분석 (Extracting Requirements for Ubiquitous Computing Technology-based IS Deploying Factor Analysis)

  • Em, Natalia V.;Yoo, Kee-Dong;Suh, Eui-Ho
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회/대한산업공학회 2005년도 춘계공동학술대회 발표논문
    • /
    • pp.140-151
    • /
    • 2005
  • This paper discusses an empirical study on extracting requirements for ubiquitous computing technology-based information system (ubi-IS) using factor analysis. After preliminary review of related literature, features specific to ubiquitous computing technology have been retrieved, selected in terms of main elements of information system (IS) (network, device, user interface, and operating system), and further used as variables during conducting factor analysis. Quantitative data was collected through questionnaire approach. The results of factor analysis manifested 5 factors containing 15 variables, and eventually, based upon the extracted factors the requirements for ubi-IS were identified.

  • PDF

통합전산환경 구축$\cdot$운영을 위한 개념적 모형 개발 (Development of the Conceptual Model of Constructing and Operating the Integrated Computing Environment)

  • 정해용;김상훈
    • Journal of Information Technology Applications and Management
    • /
    • 제12권4호
    • /
    • pp.173-195
    • /
    • 2005
  • As the amount of informatization investment is rapidly increasing in many organizations, it becomes more inevitable to manage computing resources (information systems, computing facilities and manpower etc.) effectively. Specially, in public sector It is thought to be very important to achieve the economy of scale by integrating computing resources which are managed individually in many agencies. Also, our government have been recently making much efforts to raise the effectiveness of operating the information systems by promoting joint information use among many public agencies, enhancing the operating systems and the expertise of IS staff and applying the optimal information security systems. This study focuses on presenting the framework to effectively integrate omputing resources and proposing the ways of constructing and operating the integrated computing environment for the institutions and the affiliated groups under the Ministry of Culture & Tourism which are in charge of implementing cultural informatization. The main implications of this study are 1) building the ideal model of the integrated computing environment architecture suitable to cultural informatization area, 2) showing the criteria of deciding whether the organizations use the Integrated computing environment or not and how extensively they commit their computing resources to it, and 3) suggesting the ways of the phased integration and the change management to minimize confusion in the process of adopting the integrated computing environment and behavioral problems such as conflict and resistance of IS-related Personnel Influenced by Implementing the integrated computing environment.

  • PDF

유비쿼터스 컴퓨팅의 실태와 발전에 관한 연구 (The Study on the Status and Development of International Ubiquitous Computing)

  • 김경우
    • 한국컴퓨터정보학회논문지
    • /
    • 제9권4호
    • /
    • pp.221-231
    • /
    • 2004
  • 유비쿼터스 컴퓨팅이란 마크 와이저의 주장처럼 급진적이지 않으며 포괄적으로 유비쿼터스 컴퓨팅을 정의할 수 있는 적절한 정의로 판단된다. 각국의 실태에서 미국이나 유럽에서 실시되고 있는 프로젝트는 전반적으로 유비퀴터스 컴퓨팅 인프라 구축을 위한 연구와 사물의 지능화, 인간-컴퓨터 상호작용 연구, 공간의 지능화 등을 목표로 반면 일본은 어디서나 컴퓨터의 능력이 발휘되는 네트워크의 편재화를 위한 연구가 중심을 이룬다. 유비퀴터스 컴퓨팅 연구는 컴퓨터 과학의 특정 분야에 국한된 것이 아니라 사회, 경제, 윤리, 법 등 다양한 측면에서 연구되고 있으며, 국가의 적극적 지원을 기반으로 한다. 유비쿼터스 컴퓨팅이 다양한 센서를 통해 정보를 받아들이고, 판단하며, 커뮤니케이션 기술을 등을 제시하였다. 이를 근거로 유비쿼터스 컴퓨팅의 발전모델을 제시하였으며 진화과정에서 정형화된 가치시스템에 한계가 있으나 5가지 유형의 비즈니스모델이 나타날 것으로 전망한다.

  • PDF