• Title, Summary, Keyword: cloud computing system

Search Result 555, Processing Time 0.047 seconds

Personal Information Management System (PIMS) improvement research using cloud computing security (개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구)

  • Jeong, Hyein;Kim, Seongjun
    • Journal of the Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.

System Access Control Technique for Secure Cloud Computing

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.67-76
    • /
    • 2019
  • Along with the diversification of digital content services using wired/wireless networks, the market for the construction of base systems is growing rapidly. Cloud computing services are recognized for a reasonable cost of service and superior system operations. Cloud computing is convenient as far as system construction and maintenance are concerned; however, owing to the security risks associated with the system construction of actual cloud computing service, the ICT(Information and Communications Technologies) market is lacking regardless of its many advantages. In this paper, we conducted an experiment on a cloud computing security enhancement model to strengthen the security aspect of cloud computing and provide convenient services to the users. The objective of this study is to provide secure services for system operation and management while providing convenient services to the users. For secure and convenient cloud computing, a single sign-on (SSO) technique and a system access control technique are proposed. For user authentication using SSO, a security level is established for each user to facilitate the access to the system, thereby designing the system in such a manner that the rights to access resources of the accessed system are not abused. Furthermore, using a user authentication ticket, various systems can be accessed without a reauthorization process. Applying the security technique to protect the entire process of requesting, issuing, and using a ticket against external security threats, the proposed technique facilitates secure cloud computing service.

Analysis of Billing System using AHP for Cloud Computing Services (클라우드 컴퓨팅 환경에서 AHP를 이용한 서비스 과금체계 연구)

  • Chang, Pil Sik;Choi, Il Young;Choi, Ju Cheol;Kim, Jae Kyeong
    • Journal of Information Technology Services
    • /
    • v.11 no.3
    • /
    • pp.129-159
    • /
    • 2012
  • Cloud-computing is in the limelight with expectation for cost reduction, because it alleviates the burden of initial investment and maintenance cost and based on pay-as-you-use billing policy. However, many suppliers of Cloud-computing service are suggesting diverse and complicated billing policies without consideration for setting reasonable service billing policy and definite criteria of properties to determine service billing system. So companies willing to use Cloud-computing service are hard to understand the billing system and often spend more expensive cost than necessary. Therefore, this study invested billing system properties of four representative suppliers. Based on these properties of billing system, this study found priorities using AHP survey which conducted to experts who are able to make decisions for adopting Cloud-computing in the company using or willing to use Cloud-computing service. We expect that this study can suggest basic guideline for comparing and analyzing properties of Cloud-computing service with standardized and objective method.

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.55-61
    • /
    • 2017
  • Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.

Analysis of K-Defense Cloud Computing Service Availability Considering of Cloud Computing Traffic Growth (클라우드 컴퓨팅 트래픽 증가를 고려한 국방 클라우드 컴퓨팅 서비스 가용성 분석)

  • Lee, Sung-Tae;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.93-100
    • /
    • 2013
  • In 2012, According to 'Cisco Global Cloud Index 2011-2016', the Cisco company forecasted that global data center traffic will nearly quadruple and cloud traffic will nearly sextuple by 2016. Such a rapid growing of traffic is caused by traffic inside the data center and cloud computing workloads. In 2010, the Ministry of National Defense decided to build a Mega Center including the cloud computing technology by 2014, as part of the '2012 Information Service Plan', which is now underway. One of the factors to consider is cloud computing traffic to build a Mega Center. Since the K-defense cloud computing system is built, K-defense cloud computing traffic will increase steadily. This paper, analyzed the availability of K-defense cloud computing service with the K-defense cloud computing traffic increasing using K-Defense cloud computing test system and CloudAnalyst simulation tool. Created 3 scenarios and Simulated with these scenarios, the results are derived that the availability of K-defense cloud computing test system is fulfilled, even cloud workloads are increased as muh as forecasted cloud traffic growth from now until 2016.

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

Survey and Analysis on Security Control Schema in Cloud Assurance Criteria

  • Kim, Jong-Chul;Kim, Nam-Ju;Kou, Kab-Seung;Min, Young-Gi
    • Journal of Security Engineering
    • /
    • v.14 no.5
    • /
    • pp.337-344
    • /
    • 2017
  • On September 9, 2015, the South Korean Ministry of Science and ICT(the "MSIT") established and announced the "Information Protection Measures for Vitalization of Cloud Services" in anticipation that the use of cloud computing would actively increase based on the implementation of the Act on Cloud Computing Advancement and User Protection(the "Cloud Computing Act") on September 28, 2015. In addition, the K-ICT Cloud Computing Activation Plan(Nov. 15) announced the basic plan for the development of cloud computing, and decided to establish info rmation security scheme to improve the level of cloud information protection. Accordingly, The Korea Internet Security Agency(the "KISA") has implemented the "Cloud Security Assurance Program". In this paper survey and analyze the international cloud security criteria and security certification criteria of major countries, and discusses the status of Korea cloud certification system.

Web-Based KNHANES System in Cloud Computing

  • Park, Mi-Yeon;Park, Pil-Sook;Kim, Guk-Boh;Park, Jin-Yong;Jeong, Gu-Beom
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.3
    • /
    • pp.353-363
    • /
    • 2014
  • Cloud computing is an internet-based technology, providing services to the virtualized IT environment, and allowing users to add or remove resources of hardware or software at their discretion. Since Cloud computing can construct virtually integrated environments out of multiple local computing environments, various information services can be provided by it. In addition, state organizations also strive to build the cloud computing environments due to the benefits of reduced costs to introduce the system and of reduced time to build and provide the IT services. This study suggests a web-based cloud computing system for the computing environments, to be applied for the Korean National Health and Nutrition Examination Survey (KNHANES) by the Ministry of Health and Welfare, Republic of Korea.

The Design of Dynamic Fog Cloud System using mDBaaS

  • Hwang, Chigon;Shin, Hyoyoung;Lee, Jong-Yong;Jung, Kyedong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.59-66
    • /
    • 2017
  • Cloud computing has evolved into a core computing infrastructure for the internet that encompasses content, as well as communications, applications and commerce. By providing powerful computing and communications capabilities in the palm of the hand everywhere with a variety of smart devices, mobile applications such as virtual reality, sensing and navigation have emerged and radically changed the patterns people live. The data that is generated is getting bigger. Cloud computing, on the other hand, has problems with system load and speed due to the collection, processing and control of remote data. To solve this problem, fog computing has been proposed in which data is collected and processed at an edge. In this paper, we propose a system that dynamically selects a fog server that acts as a cloud in the edge. It serves as a mediator in the cloud, and provides information on the services and systems belonging to the cloud to the mobile device so that the mobile device can act as a fog. When the role of the fog system is complete, we provide it to the cloud to virtualize the fog. The heterogeneous problem of data of mobile nodes can be solved by using mDBaaS (Mobile DataBase as a Service) and we propose a system design method for this.

Building a Private Cloud-Computing System for Greenhouse Control

  • Kim, JoonYong;Lee, Chun Gu;Park, Dong-Hyeok;Park, Heun Dong;Rhee, Joong-Yong
    • Journal of Biosystems Engineering
    • /
    • v.43 no.4
    • /
    • pp.440-444
    • /
    • 2018
  • Purpose: Cloud-computing technology has several advantages, including maintenance, management, accessibility, and computing power. A greenhouse-control system utilizing these advantages was developed using a private cloud-computing system. Methods: A private cloud needs a collection of servers and a suite of software tools to monitor and control cloud-computing resources. In this study, a server farm, operated by OpenStack as a cloud platform, was constructed using servers, and other network devices. Results: The greenhouse-control system was developed according to the fundamental cloud service models: infrastructure as a service, platform as a service, and software as a service. This system has four additional advantages - security, control function, public data use, and data exchange. There are several considerations that must be addressed, such as service level agreement, data ownership, security, and the differences between users. Conclusions: When the advantages are utilized and the considerations are addressed, cloud-computing technology will be beneficial for agricultural use.