• 제목/요약/키워드: service computing

검색결과 2,594건 처리시간 0.027초

Cloud Computing Platforms for Big Data Adoption and Analytics

  • Hussain, Mohammad Jabed;Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.290-296
    • /
    • 2022
  • Big Data is a data analysis technology empowered by late advances in innovations and engineering. In any case, big data involves a colossal responsibility of equipment and handling assets, making reception expenses of big data innovation restrictive to little and medium estimated organizations. Cloud computing offers the guarantee of big data execution to little and medium measured organizations. Big Data preparing is performed through a programming worldview known as MapReduce. Normally, execution of the MapReduce worldview requires organized joined stockpiling and equal preparing. The computing needs of MapReduce writing computer programs are frequently past what little and medium measured business can submit. Cloud computing is on-request network admittance to computing assets, given by an external element. Normal arrangement models for cloud computing incorporate platform as a service (PaaS), software as a service (SaaS), framework as a service (IaaS), and equipment as a service (HaaS).

User Authentication Technology using Multiple SSO in the Cloud Computing Environment

  • Cho, Min-Hee;Jang, Eun-Gyeom;Choi, Yong-Rak
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권4호
    • /
    • pp.31-38
    • /
    • 2016
  • The interface between servers and clients and system management in the cloud computing environment is different from the existing computing environment. The technology for information protection. Management and user authentication has become an important issue. For providing a more convenient service to users, SSO technology is applied to this cloud computing service. In the SSO service environment, system access using a single key facilitates access to several servers at the same time. This SSO authentication service technology is vulnerable to security of several systems, once the key is exposed. In this paper, we propose a technology to solve problems, which might be caused by single key authentication in SSO-based cloud computing access. This is a distributed agent authentication technology using a multiple SSO agent to reinforce user authentication using a single key in the SSO service environment. For user authentication reinforcement, phased access is applied and trackable log information is used when there is a security problem in system to provide a safe cloud computing service.

Many-objective joint optimization for dependency-aware task offloading and service caching in mobile edge computing

  • Xiangyu Shi;Zhixia Zhang;Zhihua Cui;Xingjuan Cai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권5호
    • /
    • pp.1238-1259
    • /
    • 2024
  • Previous studies on joint optimization of computation offloading and service caching policies in Mobile Edge Computing (MEC) have often neglected the impact of dependency-aware subtasks, edge server resource constraints, and multiple users on policy formulation. To remedy this deficiency, this paper proposes a many-objective joint optimization dependency-aware task offloading and service caching model (MaJDTOSC). MaJDTOSC considers the impact of dependencies between subtasks on the joint optimization problem of task offloading and service caching in multi-user, resource-constrained MEC scenarios, and takes the task completion time, energy consumption, subtask hit rate, load variability, and storage resource utilization as optimization objectives. Meanwhile, in order to better solve MaJDTOSC, a many-objective evolutionary algorithm TSMSNSGAIII based on a three-stage mating selection strategy is proposed. Simulation results show that TSMSNSGAIII exhibits an excellent and stable performance in solving MaJDTOSC with different number of users setting and can converge faster. Therefore, it is believed that TSMSNSGAIII can provide appropriate sub-task offloading and service caching strategies in multi-user and resource-constrained MEC scenarios, which can greatly improve the system offloading efficiency and enhance the user experience.

IaaS 유형의 클라우드 컴퓨팅 서비스에 대한 디지털 포렌식 연구 (Digital Forensic Methodology of IaaS Cloud Computing Service)

  • 정일훈;오정훈;박정흠;이상진
    • 정보보호학회논문지
    • /
    • 제21권6호
    • /
    • pp.55-65
    • /
    • 2011
  • 최근 유무선 통신 네트워크의 확산 및 고속화에 따라 인터넷 기술을 활용한 높은 수준의 확장성을 제공하는 클라우드 컴퓨팅 서비스(Cloud Computing Service) 이용이 증가하고 있다. 클라우드 컴퓨팅 서비스란 네트워크, 서버, 스토리지, 응용프로그램 등 다양한 컴퓨팅 자원들의 공유된 풀에 네트워크로 접근하여 언제든지 편리하게 사용 가능한 컴퓨팅 방식으로써 컴퓨팅 환경의 가상화라는 클라우드 컴퓨팅 서비스의 본질적인 특성으로 인해 디지털 포렌식 관점에서 사건 수사 시 데이터를 확보하는 일 자체가 어려운 현실에 직면했다. 본 논문에서는 클라우드 컴퓨팅 서비스에 대한 디지털 포렌식 관점의 연구와 IaaS 형태의 클라우드 컴퓨팅서비스 중 시장 점유율의 대부분을 차지하고 있는 AWS(Amazon Web Service)와 Rackspace에 대한 증거데이터 수집 및 분석방안을 제시한다.

Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구 (A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion)

  • 서우석;박대우;전문석
    • 한국전자통신학회논문지
    • /
    • 제7권5호
    • /
    • pp.1041-1051
    • /
    • 2012
  • 최근 공개되어진 네트워크 인프라를 활용한 서비스 집약 솔루션인 Cloud Computing에 대한 공격은 개발 플랫폼과 웹 기반 제공 소프트웨어, 자원 서비스 등을 무력화시키는 침해 사고와 서비스 장애를 발생시키고 있다. 따라서 불법적인 서비스 차단에 대한 공격으로부터 Cloud Computing 시스템이 지원하는 3가지 서비스 (3S' : laaS, PaaS, SaaS)의 운영정보와 생성된 자료에 대한 보안연구가 필요하다. 본 논문은 Cloud Computing 서비스에 대한 공격과 방어 실험을 단계별 4-Stage 기반의 방어기법으로 최적의 서비스가 가능한 시스템 구축에 관한 연구이다. 최초 네트워크에 대한 접근을 관제하고 가상화 서비스 제어와 지원 서비스 분류, 다중화 경로 선정 등의 순차적이며, 단계적인 4-Stage 접근 제어를 실시하는 방어정책으로 공격을 분산시키고 각 Stage별 접근 제어를 위한 모니터링과 분석을 통해 방어정책 구현과 분석을 시행함으로써 공격 유형별 방어를 실험하고 연구 결과는 Cloud Computing 서비스 기반의 방어정책 구현을 위한 실무적인 기초자료를 제공하고자 한다.

The Security Establishment for Cloud Computing through CASE Study

  • Choi, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • 제27권6호
    • /
    • pp.89-99
    • /
    • 2020
  • Cloud computing is rapidly increasing for achieving comfortable computing. Cloud computing has essentially security vulnerability of software and hardware. For achieving secure cloud computing, the vulnerabilities of cloud computing could be analyzed in a various and systematic approach from perspective of the service designer, service operator, the designer of cloud security and certifiers of cloud systems. The paper investigates the vulnerabilities and security controls from the perspective of administration, and systems. For achieving the secure operation of cloud computing, this paper analyzes technological security vulnerability, operational weakness and the security issues in an enterprise. Based on analysis, the paper suggests secure establishments for cloud computing.

멀티 액세스 엣지 컴퓨팅을 위한 Mobility-Aware Service Migration (MASM) 알고리즘 (Mobility-Aware Service Migration (MASM) Algorithms for Multi-Access Edge Computing)

  • 하지크;리 덕 타이;김문성;추현승
    • 인터넷정보학회논문지
    • /
    • 제21권4호
    • /
    • pp.1-8
    • /
    • 2020
  • 5G 목표 중 하나인 초신뢰성 저지연 통신에 도달하기 위해 멀티액세스 엣지 컴퓨팅 패러다임이 탄생했다. 이 패러다임은 클라우드 컴퓨팅 기술을 네트워크 엣지에 더 가깝게 하며 서비스 지연 시간을 줄이기 위해서는 네트워크 엣지에 있는 여러 Edge Cloud에서 서비스 호스팅된다. 모바일 사용자의 경우 서비스 품질 유지를 위해 서비스를 가장 적합한 Edge Cloud로 마이그레이션하는 것은 중요하고 고이동성 시나리오에서는 서비스 마이그레이션 문제가 더욱 복잡해진다. 고정 이동 경로에서 사용자 이동성과 Edge Cloud 선택에 대한 어떤 영향을 미치는 건지 관찰하는 것이 이 연구의 목표다. Mobility-Aware Service Migration (MASM)은 고이동성 시나리오 동안 라우팅 비용과 서비스 마이그레이션 비용이라는 두 가지 주요 매개변수를 기반으로 서비스 마이그레이션을 최적화하기 위해 제안된다. 제안된 알고리즘을 기존의 그리디 알고리즘과 비교하여 평가한다.

클라우드 컴퓨팅 서비스의 도입특성이 조직의 성과기대 및 사용의도에 미치는 영향에 관한 연구: 혁신확산 이론 관점 (A Study on the Effect of the Introduction Characteristics of Cloud Computing Services on the Performance Expectancy and the Intention to Use: From the Perspective of the Innovation Diffusion Theory)

  • 임재수;오재인
    • Asia pacific journal of information systems
    • /
    • 제22권3호
    • /
    • pp.99-124
    • /
    • 2012
  • Our society has long been talking about necessity for innovation. Since companies in particular need to carry out business innovation in their overall processes, they have attempted to apply many innovation factors on sites and become to pay more attention to their innovation. In order to achieve this goal, companies has applied various information technologies (IT) on sites as a means of innovation, and consequently IT have been greatly developed. It is natural for the field of IT to have faced another revolution which is called cloud computing, which is expected to result in innovative changes in software application via the Internet, data storing, the use of devices, and their operations. As a vehicle of innovation, cloud computing is expected to lead the changes and advancement of our society and the business world. Although many scholars have researched on a variety of topics regarding the innovation via IT, few studies have dealt with the issue of could computing as IT. Thus, the purpose of this paper is to set the variables of innovation attributes based on the previous articles as the characteristic variables and clarify how these variables affect "Performance Expectancy" of companies and the intention of using cloud computing. The result from the analysis of data collected in this study is as follows. The study utilized a research model developed on the innovation diffusion theory to identify influences on the adaptation and spreading IT for cloud computing services. Second, this study summarized the characteristics of cloud computing services as a new concept that introduces innovation at its early stage of adaptation for companies. Third, a theoretical model is provided that relates to the future innovation by suggesting variables for innovation characteristics to adopt cloud computing services. Finally, this study identified the factors affecting expectation and the intention to use the cloud computing service for the companies that consider adopting the cloud computing service. As the parameter and dependent variable respectively, the study deploys the independent variables that are aligned with the characteristics of the cloud computing services based on the innovation diffusion model, and utilizes the expectation for performance and Intention to Use based on the UTAUT theory. Independent variables for the research model include Relative Advantage, Complexity, Compatibility, Cost Saving, Trialability, and Observability. In addition, 'Acceptance for Adaptation' is applied as an adjustment variable to verify the influences on the expected performances from the cloud computing service. The validity of the research model was secured by performing factor analysis and reliability analysis. After confirmatory factor analysis is conducted using AMOS 7.0, the 20 hypotheses are verified through the analysis of the structural equation model, accepting 12 hypotheses among 20. For example, Relative Advantage turned out to have the positive effect both on Individual Performance and on Strategic Performance from the verification of hypothesis, while it showed meaningful correlation to affect Intention to Use directly. This indicates that many articles on the diffusion related Relative Advantage as the most important factor to predict the rate to accept innovation. From the viewpoint of the influence on Performance Expectancy among Compatibility and Cost Saving, Compatibility has the positive effect on both Individual Performance and on Strategic Performance, while it showed meaningful correlation with Intention to Use. However, the topic of the cloud computing service has become a strategic issue for adoption in companies, Cost Saving turns out to affect Individual Performance without a significant influence on Intention to Use. This indicates that companies expect practical performances such as time and cost saving and financial improvements through the adoption of the cloud computing service in the environment of the budget squeezing from the global economic crisis from 2008. Likewise, this positively affects the strategic performance in companies. In terms of effects, Trialability is proved to give no effects on Performance Expectancy. This indicates that the participants of the survey are willing to afford the risk from the high uncertainty caused by innovation, because they positively pursue information about new ideas as innovators and early adopter. In addition, they believe it is unnecessary to test the cloud computing service before the adoption, because there are various types of the cloud computing service. However, Observability positively affected both Individual Performance and Strategic Performance. It also showed meaningful correlation with Intention to Use. From the analysis of the direct effects on Intention to Use by innovative characteristics for the cloud computing service except the parameters, the innovative characteristics for the cloud computing service showed the positive influence on Relative Advantage, Compatibility and Observability while Complexity, Cost saving and the likelihood for the attempt did not affect Intention to Use. While the practical verification that was believed to be the most important factor on Performance Expectancy by characteristics for cloud computing service, Relative Advantage, Compatibility and Observability showed significant correlation with the various causes and effect analysis. Cost Saving showed a significant relation with Strategic Performance in companies, which indicates that the cost to build and operate IT is the burden of the management. Thus, the cloud computing service reflected the expectation as an alternative to reduce the investment and operational cost for IT infrastructure due to the recent economic crisis. The cloud computing service is not pervasive in the business world, but it is rapidly spreading all over the world, because of its inherited merits and benefits. Moreover, results of this research regarding the diffusion innovation are more or less different from those of the existing articles. This seems to be caused by the fact that the cloud computing service has a strong innovative factor that results in a new paradigm shift while most IT that are based on the theory of innovation diffusion are limited to companies and organizations. In addition, the participants in this study are believed to play an important role as innovators and early adapters to introduce the cloud computing service and to have competency to afford higher uncertainty for innovation. In conclusion, the introduction of the cloud computing service is a critical issue in the business world.

  • PDF

A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing

  • Jing Yixin;Kim, Jin-Hyung;Jeong, Dong-Won
    • Journal of Information Processing Systems
    • /
    • 제2권1호
    • /
    • pp.28-33
    • /
    • 2006
  • The initial research of Task Computing in the ubiquitous computing (UbiComp) environment revealed the need for access control of services. Context-awareness of service requests in ubiquitous computing necessitates a well-designed model to enable effective and adaptive invocation. However, nowadays little work is being undertaken on service access control under the UbiComp environment, which makes the exposed service suffer from the problem of ill-use. One of the research focuses is how to handle the access to the resources over the network. Policy-Based Access Control is an access control method. It adopts a security policy to evaluate requests for resources but has a light-weight combination of the resources. Motivated by the problem above, we propose a universal model and an algorithm to enhance service access control in UbiComp. We detail the architecture of the model and present the access control implementation.

클라우드 컴퓨팅 서비스 제공자의 개인정보보호 조치방안에 대한 연구 (A Study on the Privacy Security Management under the Cloud Computing Service Provider)

  • 유우영;임종인
    • 정보보호학회논문지
    • /
    • 제22권2호
    • /
    • pp.337-346
    • /
    • 2012
  • 인터넷 기술을 활용한 클라우드 컴퓨팅 서비스의 확산에 따라 개인정보 유출 위험과 정보에 대한 통제가 불가능해질 수 있는 보안 위협이 증가되고 있으나, 현재 클라우드 컴퓨팅 서비스 제공자는 개인정보보호에 대한 충분한 보호조치를 서비스 이용자에게 제공하지 못하고 있는 상황이다. 본 논문에서는 클라우드 컴퓨팅 서비스에 대한 개인정보보호 고려 사항을 살펴보고, 클라우드 컴퓨팅 서비스 환경에서의 개인정보보호 위협에 대응하는 방안을 제안한다.