• Title/Summary/Keyword: private cloud

Search Result 140, Processing Time 0.022 seconds

Reference Architecture and Operation Model for PPP (Public-Private-Partnership) Cloud

  • Lee, Youngkon;Lee, Ukhyun
    • Journal of Information Processing Systems
    • /
    • v.17 no.2
    • /
    • pp.284-296
    • /
    • 2021
  • The cloud has already become the core infrastructure of information systems, and government institutions are rapidly migrating information systems to the cloud. Government institutions in several countries use private clouds in their closed networks. However, because of the advantages of public clouds over private clouds, the demand for public clouds is increasing, and government institutions are expected to gradually switch to public clouds. When all data from government institutions are managed in the public cloud, the biggest concern for government institutions is the leakage of confidential data. The public-private-partnership (PPP) cloud provides a solution to this problem. PPP cloud is a form participation in a public cloud infrastructure and the building of a closed network data center. The PPP cloud prevents confidential data leakage and leverages the benefits of the public cloud to build a cloud quickly and easily maintain the cloud. In this paper, based on the case of the PPP cloud applied to the Korean government, the concept, architecture, operation model, and contract method of the PPP cloud are presented.

IoT Data Processing Framework Design using Mobile Agent in Private Cloud Environment (Private Cloud 환경 내에서 모바일 에이전트를 이용한 IoT 데이터 처리 프레임워크 설계)

  • Choi, Kang-im;Choi, Young-keun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.329-330
    • /
    • 2016
  • In the Private Cloud Environment, the data are collected by a variety of IoT devices and Cloud service users be provided with a variety of data collected. To take advantage of this convenient data, we propose the IoT data Processing framework using mobile agent.

  • PDF

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

Building a Private Cloud-Computing System for Greenhouse Control

  • Kim, JoonYong;Lee, Chun Gu;Park, Dong-Hyeok;Park, Heun Dong;Rhee, Joong-Yong
    • Journal of Biosystems Engineering
    • /
    • v.43 no.4
    • /
    • pp.440-444
    • /
    • 2018
  • Purpose: Cloud-computing technology has several advantages, including maintenance, management, accessibility, and computing power. A greenhouse-control system utilizing these advantages was developed using a private cloud-computing system. Methods: A private cloud needs a collection of servers and a suite of software tools to monitor and control cloud-computing resources. In this study, a server farm, operated by OpenStack as a cloud platform, was constructed using servers, and other network devices. Results: The greenhouse-control system was developed according to the fundamental cloud service models: infrastructure as a service, platform as a service, and software as a service. This system has four additional advantages - security, control function, public data use, and data exchange. There are several considerations that must be addressed, such as service level agreement, data ownership, security, and the differences between users. Conclusions: When the advantages are utilized and the considerations are addressed, cloud-computing technology will be beneficial for agricultural use.

Cloud computing Issues and Security measure (클라우드 컴퓨팅 보안 대책 연구)

  • Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.31-35
    • /
    • 2015
  • Cloud computing is internet-based computing technology. This is a form for exchanging service focused on the Internet. Because Cost is saved and use is easy there's a tendency that many companies are using. Cloud is in the form of a public cloud and private cloud and hybrid cloud. The service model is SaaS, PaaS, IaaS. Cloud computing use is simple but it has a security vulnerability. In particular, there is a vulnerability in virtualization and centralized information. In order to overcome this new security technology is to be developed. In particular, network security technology and authentication technology should be developed. Another way to overcome security responsibilities must be clearly and policies should be unified.

  • PDF

A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud

  • Hong, Hanshu;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2394-2406
    • /
    • 2016
  • ABE has become an effective tool for data protection in cloud computing. However, since users possessing the same attributes share the same private keys, there exist some malicious users exposing their private keys deliberately for illegal data sharing without being detected, which will threaten the security of the cloud system. Such issues remain in many current ABE schemes since the private keys are rarely associated with any user specific identifiers. In order to achieve user accountability as well as provide key exposure protection, in this paper, we propose a key-insulated ciphertext policy attribute based encryption with key exposure accountability (KI-CPABE-KEA). In our scheme, data receiver can decrypt the ciphertext if the attributes he owns match with the self-centric policy which is set by the data owner. Besides, a unique identifier is embedded into each user's private key. If a malicious user exposes his private key for illegal data sharing, his identity can be exactly pinpointed by system manager. The key-insulation mechanism guarantees forward and backward security when key exposure happens as well as provides efficient key updating for users in the cloud system. The higher efficiency with proved security make our KI-CPABE-KEA more appropriate for secure data sharing in cloud computing.

One Improved RLWE-based FHE and Fast Private Information Retrieval

  • Song, Wei-Tao;Hu, Bin;Zhao, Xiu-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6260-6276
    • /
    • 2019
  • With the rapid development of cloud computing, it raises real questions on privacy protection, which greatly limits the use of cloud computing. However, fully homomorphic encryption (FHE) can make cloud computing consistent with privacy. In this paper, we propose a simpler FHE scheme based on ring LWE problem, with a smaller size of ciphertext and a lower noise-expansion factor for homomorphic multiplication. Then based on our optimized RLWE-based FHE scheme, we propose a fast single-database private information retrieval protocol, combining with batching and number theoretic transform technology.

A private cloud gateway for smart homes (스마트 홈을 위한 프라이빗 클라우드 게이트웨이)

  • Hussain, Shujaat;Amin, Muhammad Bilal;Ahmad, Mahmood;Lee, Sungyoung;Chung, Tae Choong
    • Annual Conference of KIPS
    • /
    • 2013.05a
    • /
    • pp.478-479
    • /
    • 2013
  • Smart home is one of the emerging domains to come up after advances in home appliances and automation technologies. There are many commercial solutions for smart homes yet many of them have yet to truly exploit the potential of private cloud for low level contextual services and ability to migrate to public cloud for more processing and storage. We propose a private cloud gateway for smart home which will have the ability to sense the new devices, ability to detect context of the situation and act in an appropriate way. It will also record the user logs which will be audited for improvement of the overall system.

A Study on the Security Requirement for Transforming Cloud Data Center : Focusing on N - Data Center (클라우드 데이터센터로의 전환을 위한 보안요건 - N데이터센터를 중심으로)

  • Ra, Jong-Hei;Lee, Jae-Sook
    • Journal of Digital Convergence
    • /
    • v.12 no.11
    • /
    • pp.299-307
    • /
    • 2014
  • N-Data Center which provide of cloud computing service for the Government departments, will be prepared transforming to cloud data center and transformed into an 'IT service' provided as a service to the information resources required by each department. N-Data center already provide a cloud service to the departments as maintains a high level of security, and plan to connecting with the private sector as a precondition of security. Therefore, in order to promote them effectively, it is necessary to determine the level of security in the cloud data center, and we have proposed appropriate measures. In this paper, we analyze security requirements of cloud data centers in developed countries and identify the leading private cloud data center security. In addition, we identify the N-data center security level, and analyzes the data center and private cloud gap and provide a transition strategy in terms of security finally.

A Probe Detection based on Private Cloud using BlockChain (블록체인을 적용한 사설 클라우드 기반 침입시도탐지)

  • Lee, Seyul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.11-17
    • /
    • 2018
  • IDS/IPS and networked computer systems are playing an increasingly important role in our society. They have been the targets of a malicious attacks that actually turn into intrusions. That is why computer security has become an important concern for network administrators. Recently, various Detection/Prevention System schemes have been proposed based on various technologies. However, the techniques, which have been applied in many systems is useful for existing intrusion patterns on standard-only systems. Therefore, probe detection of private clouds using BlockChain has become a major security protection technology to detection potential attacks. In addition, BlockChain and Probe detection need to take into account the relationship between the various factors. We should develop a new probe detection technology that uses BlockChain to fine new pattern detection probes in cloud service security in the end. In this paper, we propose a probe detection using Fuzzy Cognitive Map(FCM) and Self Adaptive Module(SAM) based on service security using BlockChain technology.