• Title/Summary/Keyword: private cloud

Search Result 140, Processing Time 0.022 seconds

Design of Appliance for BI Services Based on Private Cloud + R Engine (Private Cloud+R Engine 기반 BI 서비스 어플라이언스 설계)

  • Shim, Jae-Sung;Park, Seok-Cheon
    • Annual Conference of KIPS
    • /
    • 2015.04a
    • /
    • pp.236-238
    • /
    • 2015
  • 최근 다양한 데이터를 수집 및 분석하여 급변하는 기업에서 고객 니즈의 변화에 능동적인 대용이 필요하나 중소기업의 경우 비용 및 인력 문제로 인해 데이터 분석 및 정보를 수집하는데 어려움이 있다. 따라서 본 논문에서는 중소기업에서 다양한 고객 니즈 분석을 통해 맞춤형 상품과 서비스 제공이 가능하고, 중소기업들의 전략적이고 신속한 의사결정 지원을 위해서 BI, 프라이빗 클라우드, R-엔진을 분석하여, 프라이빗 클라우드 + R 엔진 기반의 BI 서비스 어플라이언스 설계 하였다.

A study on Development of Certification Schemes for Cloud Security (국내 클라우드 보안 인증스킴 개발에 관한 연구)

  • Jung, Jin-Woo;Kim, Jungduk;Song, Myeong-Gyun;Jin, Chul-Gu
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.43-49
    • /
    • 2015
  • As the cloud computing law was passed in March, 2015, many private companies and public organizations give consideration to introduce cloud computing services. However, most of them are still concerned about the security issues in cloud computing services. To solve the problem, a certification system of cloud security is necessary as an enabler for adoption of the trusted cloud services. There have been a number of studies about certification systems for cloud security, but only few studies exist about certification scheme of cloud security. Therefore, in this study, foreign certification systems for cloud security are analyzed to draw requirements for developing a domestic certification scheme for cloud security. Based on the result of analysis, this study proposes the three certification schemes of cloud security, which have been reviewed by the focus group interview method to draw advantages and disadvantages of each scheme.

Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing

  • Zhao, Zhiyuan;Wang, Jianhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3254-3272
    • /
    • 2017
  • With the development of wireless access technologies and the popularity of mobile intelligent terminals, cloud computing is expected to expand to mobile environments. Attribute-based encryption, widely applied in cloud computing, incurs massive computational cost during the encryption and decryption phases. The computational cost grows with the complexity of the access policy. This disadvantage becomes more serious for mobile devices because they have limited resources. To address this problem, we present an efficient verifiable outsourced scheme based on the bilinear group of prime order. The scheme is called the verifiable outsourced computation ciphertext-policy attribute-based encryption scheme (VOC-CP-ABE), and it provides a way to outsource intensive computing tasks during encryption and decryption phases to CSP without revealing the private information and leaves only marginal computation to the user. At the same time, the outsourced computation can be verified by two hash functions. Then, the formal security proofs of its (selective) CPA security and verifiability are provided. Finally, we discuss the performance of the proposed scheme with comparisons to several related works.

A Case Study on the Establishment of Cloud Management System in Data Centers: Focusing onG-Cloud Application Case (데이터센터 클라우드관리시스템 구축 사례 연구 : G-Cloud 적용사례 중심으로)

  • Jang, Hee-Don;Kim, Seung-Cheon
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.33-37
    • /
    • 2019
  • According to the enforcement of the Cloud Computing Development and User Protection Act, a new paradigm called as Cloud Computing is coming to the fore among public and private domestic enterprises. Therefore, domestic companies should develop SaaS products specialized for the domestic market and try to preempt the IaaS market ahead of global companies. Now we are facing a necessity to combine all the cloud systems in Korean government to operate seamlessly in a harmony. In this paper, we will look at the prospect of future development of related industry through cloud computing concept and G-cloud's cloud management system (G-CMS). G-CMS can be seen as the first system to comprehensively manage heterogeneous Unix virtualization systems. G-CMS can also save costs by managing heterogeneous virtualization systems in data centers.

A Study on the Adoption Behavior of B2C Public Cloud Service in Korea (B2C 클라우드 서비스 채택의도의 영향요인에 관한 연구)

  • Roh, Doo-Hwan;Chang, Suk-Gwon
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.37 no.3
    • /
    • pp.57-68
    • /
    • 2012
  • The recent proliferation of various smart devices like the smartphone, tablet PC, and smart TV enables consumers to download various applications from the network and to access private files stored in their desktop server at any time and at any place. The trend of ubiquitous access seems to have become stronger and more diversified toward a ubiquitous network computing environment with the aggressive deployment of commercial cloud services. Recently, many Korean network service providers launched commercial B2C public cloud services, which were widely adopted by smart device users. They include Daum cloud, N drive, ucloud, and uplus box, mostly provided by major Korean telecom companies and portals. This paper aims to explore consumers' adoption behaviors toward the B2C public cloud services that were recently deployed in the Korean market. In order to achieve the goal, we identified key influencing factors that affect the consumers' adoption behaviors, based on an extension of the technology acceptance model (TAM). Several hundred smart device users were surveyed to test the generic regression model with the extended set of TAM variables.

Effects of Innovation Characteristics of Cloud Computing Services, Technostress on Innovation Resistance and Acceptance Intention: Focused on Public Sector (클라우드 컴퓨팅 서비스의 혁신특성, 테크노스트레스가 혁신저항 및 수용의도에 미치는 영향: 공공부문 도입을 중심으로)

  • Shin, Woochan;Ahn, Hyunchul
    • Knowledge Management Research
    • /
    • v.20 no.2
    • /
    • pp.59-86
    • /
    • 2019
  • As the era of the 4th Industrial Revolution evolves, not only private companies but also government agencies and institutions in public sector are adopting cloud computing services converged by new information technologies such as IoT, big data, and artificial intelligence to strengthen competitiveness and create new business values. The purpose of this study is to investigate the relationship between innovation characteristics, innovation resistance, and acceptance of innovative technologies from the perspective of cloud computing services in the public sector. In this study, we collected the survey data from 190 employees of IT division in the public sector, and analyzed the causal relationship between innovation characteristics, technostress, innovation resistance, and intention to adopt the cloud computing service that they perceived. As a result of the analysis, we demonstrated that innovation characteristics, technostress have significant effect on innovation resistance and acceptance intention, and that top executive commitment and innovation resistance also have significant effect on acceptance intention. This study provides meaningful practical implications for the staffs preparing for adoption of cloud computing services and the executives who make the final decision in public sector.

Integrated Verification of Hadoop Cluster Prototypes and Analysis Software for SMB (중소기업을 위한 하둡 클러스터의 프로토타입과 분석 소프트웨어의 통합된 검증)

  • Cha, Byung-Rae;Kim, Nam-Ho;Lee, Seong-Ho;Ji, Yoo-Kang;Kim, Jong-Won
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.2
    • /
    • pp.191-199
    • /
    • 2014
  • Recently, researches to facilitate utilization by small and medium business (SMB) of cloud computing and big data paradigm, which is the booming adoption of IT area, has been on the increase. As one of these efforts, in this paper, we design and implement the prototype to tentatively build up Hadoop cluster under private cloud infrastructure environments. Prototype implementation are made on each hardware type such as single board, PC, and server and performance is measured. Also, we present the integrated verification results for the data analysis performance of the analysis software system running on top of realized prototypes by employing ASA (American Standard Association) Dataset. For this, we implement the analysis software system using several open sources such as R, Python, D3, and java and perform a test.

Intelligent Video Surveillance Incubating Security Mechanism in Open Cloud Environments (개방형 클라우드 환경의 지능형 영상감시 인큐베이팅 보안 메커니즘 구조)

  • Kim, Jinsu;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.5
    • /
    • pp.105-116
    • /
    • 2019
  • Most of the public and private buildings in Korea are installing CCTV for crime prevention and follow-up action, insider security, facility safety, and fire prevention, and the number of installations is increasing each year. In the questionnaire conducted on the increasing CCTV, many reactions were positive in terms of the prevention of crime that could occur due to the installation, rather than negative views such as privacy violation caused by CCTV shooting. However, CCTV poses a lot of privacy risks, and when the image data is collected using the cloud, the personal information of the subject can be leaked. InseCam relayed the CCTV surveillance video of each country in real time, including the front camera of the notebook computer, which caused a big issue. In this paper, we introduce a system to prevent leakage of private information and enhance the security of the cloud system by processing the privacy technique on image information about a subject photographed through CCTV.

An Anti-Overload Model for OpenStack Based on an Effective Dynamic Migration

  • Ammar, Al-moalmi;Luo, Juan;Tang, Zhuo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4165-4187
    • /
    • 2016
  • As an emerging technology, cloud computing is a revolution in information technology that attracts significant attention from both public and private sectors. In this paper, we proposed a dynamic approach for live migration to obviate overloaded machines. This approach is applied on OpenStack, which rapidly grows in an open source cloud computing platform. We conducted a cost-aware dynamic live migration for virtual machines (VMs) at an appropriate time to obviate the violation of service level agreement (SLA) before it happens. We conducted a preemptive migration to offload physical machine (PM) before the overload situation depending on the predictive method. We have carried out a distributed model, a predictive method, and a dynamic threshold policy, which are efficient for the scalable environment as cloud computing. Experimental results have indicated that our model succeeded in avoiding the overload at a suitable time. The simulation results from our solution remarked the very efficient reduction of VM migrations and SLA violation, which could help cloud providers to deliver a good quality of service (QoS).