• Title/Summary/Keyword: mobile cloud computing

Search Result 284, Processing Time 0.027 seconds

A Study on Networking Technology for Cloud Data Centers (클라우드 데이터센터를 위한 네트워킹 기술에 관한 연구)

  • Choi, Jung-Yul
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.235-243
    • /
    • 2016
  • Legacy data centers are transforming toward cloud data centers according to the advance of mobile and Internet of Things technology, processing of big data, and development of cloud computing technology. The goal of cloud data centers is to efficiently manage energy and facility, and to rapidly provide service demands to users by operating virtualized ICT(Information and Communication Technology) resources. Accordingly, it requires to configure and operate networks for efficiently providing virtualized ICT resources. This paper analyzes networking technologies suitable for cloud data centers and presents ways to efficiently operate the data center.

Reducing Cybersecurity Risks in Cloud Computing Using A Distributed Key Mechanism

  • Altowaijri, Saleh M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.1-10
    • /
    • 2021
  • The Internet of things (IoT) is the main advancement in data processing and communication technologies. In IoT, intelligent devices play an exciting role in wireless communication. Although, sensor nodes are low-cost devices for communication and data gathering. However, sensor nodes are more vulnerable to different security threats because these nodes have continuous access to the internet. Therefore, the multiparty security credential-based key generation mechanism provides effective security against several attacks. The key generation-based methods are implemented at sensor nodes, edge nodes, and also at server nodes for secure communication. The main challenging issue in a collaborative key generation scheme is the extensive multiplication. When the number of parties increased the multiplications are more complex. Thus, the computational cost of batch key and multiparty key-based schemes is high. This paper presents a Secure Multipart Key Distribution scheme (SMKD) that provides secure communication among the nodes by generating a multiparty secure key for communication. In this paper, we provide node authentication and session key generation mechanism among mobile nodes, head nodes, and trusted servers. We analyzed the achievements of the SMKD scheme against SPPDA, PPDAS, and PFDA schemes. Thus, the simulation environment is established by employing an NS 2. Simulation results prove that the performance of SMKD is better in terms of communication cost, computational cost, and energy consumption.

LiDAR-based Mobile Robot Exploration Considering Navigability in Indoor Environments (실내 환경에서의 주행가능성을 고려한 라이다 기반 이동 로봇 탐사 기법)

  • Hyejeong Ryu;Jinwoo Choi;Taehyeon Kim
    • The Journal of Korea Robotics Society
    • /
    • v.18 no.4
    • /
    • pp.487-495
    • /
    • 2023
  • This paper presents a method for autonomous exploration of indoor environments using a 2-dimensional Light Detection And Ranging (LiDAR) scanner. The proposed frontier-based exploration method considers navigability from the current robot position to extracted frontier targets. An approach to constructing the point cloud grid map that accurately reflects the occupancy probability of glass obstacles is proposed, enabling identification of safe frontier grids on the safety grid map calculated from the point cloud grid map. Navigability, indicating whether the robot can successfully navigate to each frontier target, is calculated by applying the skeletonization-informed rapidly exploring random tree algorithm to the safety grid map. While conventional exploration approaches have focused on frontier detection and target position/direction decision, the proposed method discusses a safe navigation approach for the overall exploration process until the completion of mapping. Real-world experiments have been conducted to verify that the proposed method leads the robot to avoid glass obstacles and safely navigate the entire environment, constructing the point cloud map and calculating the navigability with low computing time deviation.

A Cloud-based Infusion Injector using Piezoelectric Micropump (피에조마이크로펌프를 이용한 클라우드기반 수액주입기)

  • Song, Young-Jin;Kang, Jung-Gu;Song, Geun-San
    • Journal of the Semiconductor & Display Technology
    • /
    • v.17 no.4
    • /
    • pp.62-65
    • /
    • 2018
  • We will provides a micro-pump infusion injector with the cloud networking for remote control. The existing infusion injector with controlled manually have an uncomfortable to use it inconveniently. The proposed remote control infusion, infusion system enables the identification and control of injected amount through the IOT function on th WEB. The micro-pump used is a piezo electric pump manufactured by using MEMS technology, and the amount of charge is varied depending on the frequency magnitude through the micro-controller. The micro-pump can adjust the speed of the fluid depending on the frequency and can be from 0.1ml / min to 7ml / min when the frequency is from 3 to 110Hz.

An Efficient Software Defined Data Transmission Scheme based on Mobile Edge Computing for the Massive IoT Environment

  • Kim, EunGyeong;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.974-987
    • /
    • 2018
  • This paper presents a novel and efficient data transmission scheme based on mobile edge computing for the massive IoT environments which should support various type of services and devices. Based on an accurate and precise synchronization process, it maximizes data transmission throughput, and consistently maintains a flow's latency. To this end, the proposed efficient software defined data transmission scheme (ESD-DTS) configures and utilizes synchronization zones in accordance with the 4 usage cases, which are end node-to-end node (EN-EN), end node-to-cloud network (EN-CN), end node-to-Internet node (EN-IN), and edge node-to-core node (EdN-CN); and it transmit the data by the required service attributes, which are divided into 3 groups (low-end group, medium-end group, and high-end group). In addition, the ESD-DTS provides a specific data transmission method, which is operated by a buffer threshold value, for the low-end group, and it effectively accommodates massive IT devices. By doing this, the proposed scheme not only supports a high, medium, and low quality of service, but also is complied with various 5G usage scenarios. The essential difference between the previous and the proposed scheme is that the existing schemes are used to handle each packet only to provide high quality and bandwidth, whereas the proposed scheme introduces synchronization zones for various type of services to manage the efficiency of each service flow. Performance evaluations show that the proposed scheme outperforms the previous schemes in terms of throughput, control message overhead, and latency. Therefore, the proposed ESD-DTS is very suitable for upcoming 5G networks in a variety of massive IoT environments with supporting mobile edge computing (MEC).

Efficient Offloading for Workload Processing based on Mobile Cloud (모바일 클라우드의 성능 기반 균등한 작업처리를 위한 효율적인 오프로드 방법)

  • Byun, HwiRim;Mu, He;Han, Seok-Hyeon;Kim, Hyun-Woo;Song, Eun-Ha;Yi, Gangman;Jeong, Young-Sik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.151-153
    • /
    • 2016
  • 모바일 디바이스의 성능 발전에 따라 높은 연산 능력을 요구하는 어플리케이션이 증가하고 있다. 3D 프로세싱, 영상 인코팅, 벡터 이미지 처리 등 연산량이 많아 기존에 데스크탑 컴퓨터에서 처리하던 작업들이 모바일 디바이스로 이전되고 있다. 그러나 모바일 디바이스 하드웨어의 발전 속도와 상이하게 사용자의 모바일 디바이스 교체 주기는 발전 속도를 따라잡지 못하고 있다. 따라서 추가적인 비용부담 없이 모바일 디바이스의 연산 능력을 향상시키기 위해 Mobile Cloud Computing(MCC)의 필요성이 대두되고 있다. MCC는 다수의 모바일 디바이스 리소스를 통합 관리하고 자원 서비스를 제공함으로써 작업 처리 및 자원 고가용성등의 성능 향상이 가능하다. 본 연구에서는 MCC 인프라 구축 방법인 Mobile Resource Integration(MRI)와 MRI에 적용되는 오프로드 방법을 제안한다. 모바일 디바이스로만 구성된 MRI는 분산된 모바일 디바이스로 작업를 분할 전송 처리는 방법이다. 이를 통해 중거리 및 원거리 통신망 연결이 어려운 경우에 단일 모바일 디바이스의 작업 처리 대비 높은 향상 속도를 보인다.

cMac : A Context-aware Mobile Apps-on-a-Cloud Architecture Empowering smart devices by leveraging Platform as a Service (PaaS) (클라우드 아키텍처 기반 상황인지 모바일 애플리케이션)

  • Amin, Muhammad Bilal;Lee, Sung-Young;Lee, Young-Koo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.40-42
    • /
    • 2011
  • Smart hand-held devices like iPhone, iPad, Andriod and other mobile-OS machines are becoming a well known part of our daily lives. Utilization of these devices has gone beyond the expectations of their inventors. Evolution of Apple's iOS from a mobile phone Operating System to a wholesome platform for Portable Gaming is an adequate proof. Using these smart devices people are downloading applications from numerous online App Stores. Utilizing remote storage facilities and confining themselves to computing power far below than an entry level laptop, netbooks have emerged. Google's idea of Chrome OS coupled with Google's AppEngine is an eye-opener for researchers and developers. Keeping all these industry-proven innovations in mind we are proposing a Context-Driven Cloud-Oriented Application Architecture for smart devices. This architecture enables our smart devices to behave smarter by utilizing very less of local resources.

The Design of Extensible Transport Protocol (확장 가능한 전송 프로토콜의 설계)

  • Park, Kihyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.142-146
    • /
    • 2014
  • The mobile computing has been a main mean of computing, because of recent development of smartphone and mobile communication network. The new service technologies, such as cloud computing, big data, SDN (Software Defined Network), and NFV (Network Function Virtualization), are appearing due to activating of the data center. These changes have brought various requirements for transport layer protocol. In addition, the transport protocol should have a extensible function to adapt additional technologies. This paper proposed that transport layer divide into three layer structure for extensible function, and designed the ETP(Extensible Transport Protocol) which is located in the bottom layer.

  • PDF

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.

User Authentication Method Based on Biometrics in a Mobile Cloud Environments (모바일 클라우드 환경에서 생체 인식 기반 사용자 인증 방법 설계)

  • Song, Seokhwa;Park, Sanghyeon;Kwon, Jisoo;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.803-805
    • /
    • 2015
  • 최근 스마트 폰이 대중화 되면서 기존 클라우드와 이동성 단말기가 결합된 형태인 모바일 클라우드가 확산되고 있다. 그러나 사용자가 모바일 기기를 이용하여 모바일 클라우드에 접속하는 인증 과정에서 사용되는 사용자 개인 정보는 유출되거나 탈취 되기 쉽기 때문에 프라이버시 침해의 보안 위협이 존재한다. 따라서 본 논문에서는 모바일 클라우드 환경에서 안전한 사용자 인증을 위해 다양한 생체 정보를 이용한 생체 인식 기반 사용자 인증 방법을 제안한다.