• Title/Summary/Keyword: virtualization service

검색결과 200건 처리시간 0.032초

Restful Web Services Composition Using Semantic Ontology for Elderly Living Assistance Services

  • Fattah, Sheik Mohammad Mostakim;Chong, Ilyoung
    • Journal of Information Processing Systems
    • /
    • 제14권4호
    • /
    • pp.1010-1032
    • /
    • 2018
  • Recent advances in medical science have made people live longer, which has affected many aspects of life, such as caregiver burden, increasing cost of healthcare, increasing number of disabled and depressive disorder persons, and so on. Researchers are now focused on elderly living assistance services in smart home environments. In recent years, assisted living technologies have rapidly grown due to a faster growing aging society. Many smart devices are now interconnected within the home network environment and such a home setup supports collaborations between those devices based on the Internet of Things (IoT). One of the major challenges in providing elderly living assistance services is to consider each individual's requirements of different needs. In order to solve this, the virtualization of physical things, as well as the collaboration and composition of services provided by these physical things should be considered. In order to meet these challenges, Web of Objects (WoO) focuses on the implementation aspects of IoT to bring the assorted real world objects with the web applications. We proposed a semantic modelling technique for manual and semi-automated service composition. The aim of this work is to propose a framework to enable RESTful web services composition using semantic ontology for elderly living assistance services creation in WoO based smart home environment.

Cross-Talk: D2D Potentiality Based Resource Borrowing Schema for Ultra-Low Latency Transmission in Cellular Network

  • Sun, Guolin;Dingana, Timothy;Adolphe, Sebakara Samuel Rene;Boateng, Gordon Owusu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권5호
    • /
    • pp.2258-2276
    • /
    • 2019
  • Resource sharing is one of the main goals achieved by network virtualization technology to enhance network resource utilization and enable resource customization. Though resource sharing can improve network efficiency by accommodating various users in a network, limited infrastructure capacity is still a challenge to ultra-low latency service operators. In this paper, we propose an inter-slice resource borrowing schema based on the device-to-device (D2D) potentiality especially for ultra-low latency transmission in cellular networks. An extended and modified Kuhn-Munkres bipartite matching algorithm is developed to optimally achieve inter-slice resource borrowing. Simulation results show that, proper D2D user matching can be achieved, satisfying ultra-low latency (ULL) users' quality of service (QoS) requirements and resource utilization in various scenarios.

A Performance Comparison between XEN and KVM Hypervisors While Using Cryptographic Algorithms

  • Mohammed Al-Shalabi;Waleed K. Abdulraheem;Jafar Ababneh;Nader Abdel Karim
    • International Journal of Computer Science & Network Security
    • /
    • 제24권1호
    • /
    • pp.61-70
    • /
    • 2024
  • Cloud Computing is internet-based computing, where the users are provided with whatever service they need from the resources, software, and information. Recently, the security of cloud computing is considered as one of the major issues for both cloud service providers CSP and end-users. Privacy and highly confidential data make many users refuse to store their data within cloud computing, since data on cloud computing is not dully secured. The cryptographic algorithm is a technique which is used to maintain the security and privacy of the data on the cloud. In this research, we applied eight different cryptographic algorithms on Xen and KVM as hypervisors on cloud computing, to be able to measure and compare the performance of the two hypervisors. Response time and CPU utilization while encryption and decryption have been our aspects to measure the performance. In terms of response time and CPU utilization, results show that KVM is more efficient than Xen on average at 11.5% and 11% respectively. While TripleDES cryptographic algorithm shows a more efficient time response at Xen hypervisor than KVM.

데스크탑 창 가상화를 이용한 그래픽 분할 실행 기반 온라인 SW 서비스의 설계 (A Design of Online Software Service based on Graphic Offloading Computing using Desktop Window Virtualization)

  • 최원혁;장수민;최지훈;김원영
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2012년도 한국컴퓨터종합학술대회논문집 Vol.39 No.1(A)
    • /
    • pp.299-301
    • /
    • 2012
  • 본 논문에서는 3D SW와 같은 고사양의 SW를 서버 기반의 온라인 SW 서비스로 제공하기 위하여 클라이언트의 GPU를 사용하여 그래픽 분할 실행 서비스를 제공하기 위한 데스크탑 창의 가상화에 대하여 소개한다. 그래픽 분할 실행은 서버에서 SW를 구동하고 실행되는 SW의 데이터 집중적인 작업은 서버에서 실행하고, 그래픽 작업들은 서버에서 처리되지 않고, GPU 가상화를 이용하여 클라이언트의 GPU에서 처리하여 SW를 서비스하는 방법이다. 이를 위하여 본 논문에서는 3D 그래픽 정보의 클라이언트 렌더링을 API 리모팅을 이용하여 처리하는 방법에 대하여 소개하고, 실행되는 SW의 2D 그래픽 기반 윈도우를 서버의 윈도우 관리 시스템에 독립적으로 클라이언트 PC에서 가상화하여 처리하는 방법을 제안한다. 또한, 제안된 방법이 서버의 창 관리 시스템에 종속적인 경우와 비교하여 사용자에게 유연한 서비스를 제공함을 알아본다.

라이프 케어 위해서 실시간 서비스를 지원하는 가상 기계 스케줄 (SCHEDULE VIRTUAL MACHINES TO SUPPORT REAL-TIME SERVICES FOR U-LIFE CARE)

  • 윈트롱휴;하산 아비드;이영구;이승룡
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2011년도 한국컴퓨터종합학술대회논문집 Vol.38 No.1(B)
    • /
    • pp.17-20
    • /
    • 2011
  • This paper presents an approach for integrating u-Life care applications into the Cloud computing based on virtual resources to support real-time services and to improve quality of service (QoS) requirement. We propose an architecture for virtualization resources scheduling. The proposed is based on the concepts of Cloud computing and Wireless sensor networks. In this paper, we focus on the scheduling u-Life care applications run on the virtual machine (VM) resources in Cloud computing.

클라우드 네트워크 가상화 서비스의 안전한 제공을 위한 정책 방안 연구 (Study on Policy for Secure Provision of Cloud Network Virtualization Service)

  • 이은지;배원일;곽진
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2017년도 춘계학술발표대회
    • /
    • pp.254-257
    • /
    • 2017
  • 클라우드 컴퓨팅 환경은 가상화 인프라를 제공하며 클라우드 서비스 참여자는 이러한 가상화 자원을 사용하여 서비스를 제공 및 활용한다. 그러나, 클라우드 가상화 환경에서의 보안위협이 지속적으로 증가하고 있는 반면, 안전한 클라우드 가상화를 위한 정책 연구는 미비한 실정이다. 이에 따라, 본 논문은 클라우드 가상화 인프라 중 클라우드 네트워크 가상화의 서비스를 안전하게 제공하기 위한 정책 방안을 제안한다. 제안하는 방안에서 클라우드 네트워크 가상화 환경에서 발생 가능한 보안위협을 도출하고 이에 따른 보안요구사항을 도출한다. 결과적으로, 클라우드 네트워크 가상화 서비스를 안전하게 제공하기 위한 정책 마련 시 클라우드 서비스 제공자가 고려해야할 보안요구사항 도출을 목표로 한다.

Web-Based KNHANES System in Cloud Computing

  • Park, Mi-Yeon;Park, Pil-Sook;Kim, Guk-Boh;Park, Jin-Yong;Jeong, Gu-Beom
    • 한국멀티미디어학회논문지
    • /
    • 제17권3호
    • /
    • pp.353-363
    • /
    • 2014
  • Cloud computing is an internet-based technology, providing services to the virtualized IT environment, and allowing users to add or remove resources of hardware or software at their discretion. Since Cloud computing can construct virtually integrated environments out of multiple local computing environments, various information services can be provided by it. In addition, state organizations also strive to build the cloud computing environments due to the benefits of reduced costs to introduce the system and of reduced time to build and provide the IT services. This study suggests a web-based cloud computing system for the computing environments, to be applied for the Korean National Health and Nutrition Examination Survey (KNHANES) by the Ministry of Health and Welfare, Republic of Korea.

클라우드 컴퓨팅 보안의 취약성에 관한 연구 (A study on the vulnerability of the Cloud computing security)

  • 전정훈
    • 정보보호학회논문지
    • /
    • 제23권6호
    • /
    • pp.1239-1246
    • /
    • 2013
  • 최근 클라우드 컴퓨팅 기술은 전 세계적으로 중요한 이슈로 부각되고 있으며, 기술과 서비스에 있어, 많은 주목을 받고 있다. 그러나 클라우드 컴퓨팅의 긍정적인 측면과는 달리, 여러 취약점들로 인해, 해킹기술의 진화에 따른 다양한 공격과 피해가 예상되고 있다. 따라서 본 논문은 클라우드 컴퓨팅의 위협과 취약성에 대해 실험 및 사례연구를 통해 관리 모델들을 분석함으로써, 향후, 클라우드 컴퓨팅의 보안 설계와 성능 향상을 위한 자료로 활용될 것으로 기대한다.

모바일앱을 구현하기 위한 모바일 클라우드 도입 (Introducing Mobile Cloud Computing-Cloudlet for implementing mobile APP)

  • 라이오넬;장종욱
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2015년도 춘계학술대회
    • /
    • pp.304-307
    • /
    • 2015
  • Virtualization lacks capabilities for enabling the application to scale efficiently because of new applications components which are raised to be configured on demand. In this paper, we propose an architecture that affords mobile app based on nomadic smartphone using not only mobile cloud computing-cloudlet architecture but also a dedicated platform that relies on using virtual private mobile networks to provide reliable connectivity through Long Term Evolution (LTE) wireless communication. The design architecture lies with how the cloudlet host discovers service and sends out the cloudlet IP and port while locating the user mobile device. We demonstrate the effectiveness of the proposed architecture by implementing an android application responsible of real time analysis by using a vehicle to applications smart phones interface approach that considers the smartphones to act as a remote users which passes driver inputs and delivers outputs from external applications.

  • PDF

클라우드 컴퓨팅의 신뢰성 향상 방안에 관한 연구 (A Study on Improving the Reliability of Cloud Computing)

  • 양정모
    • 디지털산업정보학회논문지
    • /
    • 제8권4호
    • /
    • pp.107-113
    • /
    • 2012
  • Cloud computing has brought changes to the IT environment. Due to the spread of LTE, users of cloud services are growing more. This which provides IT resources to meet the needs of users of cloud services are noted as a core industry. But it is not activated because of the security of personal data and the safety of the service. In order to solve this, intrusion detection system is constructed as follows. This protects individual data safely which exists in the cloud and also protects information exhaustively from malicious attack. The cause of most attack risk which exists to cloud computing can find in distributed environment. In this study, we analyzed about necessary property of network-based intrusion detection system that process and analyze large amount of data which occur in cloud computing environment. Also, we studied functions which detect and correspond attack occurred in interior of virtualization.