• Title/Summary/Keyword: cloud computing

Search Result 1,764, Processing Time 0.028 seconds

A Study on the Impacts of the PaaS Cloud Adoption on the IT Support Organization (PaaS 클라우드 도입이 IT 지원조직의 구성방식에 미치는 영향에 대한 연구)

  • Hur, Yoonseok;Park, Jong-Kook;Lee, Nam-Yong;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.61-62
    • /
    • 2014
  • With the introduction of the Cloud Computing, the IT Support organization is facing a new organizational challenge. Especially, the PaaS(Platform as a Service) cloud provisions all of the servers, the network, the storage, the OS, and the middleware installation & configurations without the IT subject experts. This change requires the researches on the new role of the IT Support staff, the collaboration among the skill groups, the conflicts between the IT Support and the Line of Business. But there is no study on this perspective. Hence this paper will study the negative forces against the adoption of the PaaS and the associated organizational changes. This finding can help the IT organization define the new organization structure and the skill set to easy the conflicts, and prepare the transformation for the PaaS adoption.

  • PDF

A Message Communication for Secure Data Communication in Smart Home Environment Based Cloud Service (클라우드 서비스 기반 스마트 홈 환경에서 안전한 데이터 통신을 위한 메시지 통신 프로토콜 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.7
    • /
    • pp.21-30
    • /
    • 2021
  • With the development of IoT technology, various cloud computing-based services such as smart cars, smart healthcare, smart homes, and smart farms are expanding. With the advent of a new environment, various problems continue to occur, such as the possibility of exposure of important information such as personal information or company secrets, financial damage cases due to hacking, and human casualties due to malicious attack techniques. In this paper, we propose a message communication protocol for smart home-based secure communication and user data protection. As a detailed process, secure device registration, message authentication protocol, and renewal protocol were newly designed in the smart home environment. By referring to the security requirements related to the smart home service, the stability of the representative attack technique was verified, and as a result of performing a comparative analysis of the performance, the efficiency of about 50% in the communication aspect and 25% in the signature verification aspect was confirmed.

A Case Study on the Experience of Using a Cloud-based Library Systems (클라우드 기반 도서관 시스템의 사용경험에 대한 사례연구)

  • Lee, Soosang
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.1
    • /
    • pp.343-364
    • /
    • 2021
  • In this study, as examples of domestic libraries currently using the cloud-based library system, the main characteristics and issues that appeared in the experience of use divided into the processes of introduction, conversion, and operation of each system were investigated, and the results are as follows. First, it is said that new systems were introduced as alternatives to problems caused by the operation of the existing system, and the current products were selected because they were cost-effective. Second, the main issues in the conversion process were data migration work, implementation of existing service functions, and linking problems of internal and external systems in the library. Third, the main advantages identified in the operation process were cost reduction, simple installation and automatic management and maintenance, and convenient use in mobile devices. The main drawbacks were the difficulty of customizing that reflects the characteristics of the library, and the need for stability of the network. The disappeared role of the information technology librarian is the regular system inspection and maintenance support, and various new roles have been suggested. The responses of librarians and users to the new system were generally satisfied rather than dissatisfied.

GPU Memory Management Technique to Improve the Performance of GPGPU Task of Virtual Machines in RPC-Based GPU Virtualization Environments (RPC 기반 GPU 가상화 환경에서 가상머신의 GPGPU 작업 성능 향상을 위한 GPU 메모리 관리 기법)

  • Kang, Jihun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.5
    • /
    • pp.123-136
    • /
    • 2021
  • RPC (Remote Procedure Call)-based Graphics Processing Unit (GPU) virtualization technology is one of the technologies for sharing GPUs with multiple user virtual machines. However, in a cloud environment, unlike CPU or memory, general GPUs do not provide a resource isolation technology that can limit the resource usage of virtual machines. In particular, in an RPC-based virtualization environment, since GPU tasks executed in each virtual machine are performed in the form of multi-process, the lack of resource isolation technology causes performance degradation due to resource competition. In addition, the GPU memory competition accelerates the performance degradation as the resource demand of the virtual machines increases, and the fairness decreases because it cannot guarantee equal performance between virtual machines. This paper, in the RPC-based GPU virtualization environment, analyzes the performance degradation problem caused by resource contention when the GPU memory requirement of virtual machines exceeds the available GPU memory capacity and proposes a GPU memory management technique to solve this problem. Also, experiments show that the GPU memory management technique proposed in this paper can improve the performance of GPGPU tasks.

Design and Implementation on Cloud-based System for O2O Disinfection Services (클라우드 기반 O2O 소독 서비스 시스템 설계 및 구현)

  • Ye-jin Jang;Jong-ho Paik
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.39-48
    • /
    • 2024
  • Due to the outbreak of COVID-19, the domestic disinfection and quarantine market has grown, and the demand for disinfection operators who want to recruit disinfectants and disinfectants who want to work has increased, but it is not easy to find jobs. In addition, there is a need for a system that can automate or efficiently manage work by hand-recording and writing a disinfection record for disinfection work. Therefore, in this paper, an O2O disinfection service system is designed using the MVC pattern and implemented through MySQL, Ejs/BootStrap view, and Node.js. Additionally, it connects with AWS cloud services so users can use the system anytime, anywhere. Through the proposed O2O disinfection service system, we hope to solve the difficulties of recruiting personnel in the domestic disinfection station market and improve the existing inefficient disinfection work process.

A Study on the remote acuisition of HejHome Air Cloud artifacts (스마트 홈 헤이 홈 Air의 클라우드 아티팩트 원격 수집 방안 연구)

  • Kim, Ju-eun;Seo, Seung-hee;Cha, Hae-seong;Kim, Yeok;Lee, Chang-hoon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.69-78
    • /
    • 2022
  • As the use of Internet of Things (IoT) devices has expanded, digital forensics coverage of the National Police Agency has expanded to smart home areas. Accordingly, most of the existing studies conducted to acquire smart home platform data were mainly conducted to analyze local data of mobile devices and analyze network perspectives. However, meaningful data for evidence analysis is mainly stored on cloud storage on smart home platforms. Therefore, in this paper, we study how to acquire stored in the cloud in a Hey Home Air environment by extracting accessToken of user accounts through a cookie database of browsers such as Microsoft Edge, Google Chrome, Mozilia Firefox, and Opera, which are recorded on a PC when users use the Hey Home app-based "Hey Home Square" service. In this paper, the it was configured with smart temperature and humidity sensors, smart door sensors, and smart motion sensors, and artifacts such as temperature and humidity data by date and place, device list used, and motion detection records were collected. Information such as temperature and humidity at the time of the incident can be seen from the results of the artifact analysis and can be used in the forensic investigation process. In addition, the cloud data acquisition method using OpenAPI proposed in this paper excludes the possibility of modulation during the data collection process and uses the API method, so it follows the principle of integrity and reproducibility, which are the principles of digital forensics.

The Physical Properties of the Smart Education Space (스마트교육 공간의 물리특성)

  • Kim, Hyoung-Jun;Yi, Yong-Kyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.7
    • /
    • pp.3247-3252
    • /
    • 2013
  • The convergence of ICT and cloud computing is treated as a main issue all over the fields including education. This development leads to change from e-learning to u-learning and smart education. Therefore, we need to study in term of the systematic and a long-term viewpoint how smart education environment have an influence on the practical space. And we need a concrete study for smart education space based on property of space. Under these critical mind, this study understands the smart education space in terms of the convergence of computing space and physical space. As a Result, smart education space have major property such as flexibility, communication, polyvalence.

Energy-Efficient Subpaging for the MRAM-based SSD File System (MRAM 기반 SSD 파일 시스템의 에너지 효율적 서브페이징)

  • Lee, JaeYoul;Han, Jae-Il;Kim, Young-Man
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.369-380
    • /
    • 2013
  • The advent of the state-of-the-art technologies such as cloud computing and big data processing stimulates the provision of various new IT services, which implies that more servers are required to support them. However, the need for more servers will lead to more energy consumption and the efficient use of energy in the computing environment will become more important. The next generation nonvolatile RAM has many desirable features such as byte addressability, low access latency, high density and low energy consumption. There are many approaches to adopt them especially in the area of the file system involving storage devices, but their focus lies on the improvement of system performance, not on energy reduction. This paper suggests a novel approach for energy reduction in which the MRAM-based SSD is utilized as a storage device instead of the hard disk and a downsized page is adopted instead of the 4KB page that is the size of a page in the ordinary file system. The simulation results show that energy efficiency of a new approach is very effective in case of accessing the small number of bytes and is improved up to 128 times better than that of NAND Flash memory.

A Classification Algorithm using Extended Representation (확장된 표현을 이용하는 분류 알고리즘)

  • Lee, Jong Chan
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.2
    • /
    • pp.27-33
    • /
    • 2017
  • To efficiently provide cloud computing services to users over the Internet, IT resources must be configured in the data center based on virtualization and distributed computing technology. This paper focuses specifically on the problem that new training data can be added at any time in a wide range of fields, and new attributes can be added to training data at any time. In such a case, rule generated by the training data with the former attribute set can not be used. Moreover, the rule can not be combined with the new data set(with the newly added attributes). This paper proposes further development of the new inference engine that can handle the above case naturally. Rule generated from former data set can be combined with the new data set to form the refined rule.

Auto-configurable Security Mechanism for NFV

  • Kim, HyunJin;Park, PyungKoo;Ryou, Jaecheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.786-799
    • /
    • 2018
  • Recently, NFV has attracted attention as a next-generation network virtualization technology for hardware -independent and efficient utilization of resources. NFV is a technology that not only virtualize computing, server, storage, network resources based on cloud computing but also connect Multi-Tenant of VNFs, a software network function. Therefore, it is possible to reduce the cost for constructing a physical network and to construct a logical network quickly by using NFV. However, in NFV, when a new VNF is added to a running Tenant, authentication between VNFs is not performed. Because of this problem, it is impossible to identify the presence of Fake-VNF in the tenant. Such a problem can cause an access from malicious attacker to one of VNFs in tenant as well as other VNFs in the tenant, disabling the NFV environment. In this paper, we propose Auto-configurable Security Mechanism in NFV including authentication between tenant-internal VNFs, and enforcement mechanism of security policy for traffic control between VNFs. This proposal not only authenticate identification of VNF when the VNF is registered, but also apply the security policy automatically to prevent malicious behavior in the tenant. Therefore, we can establish an independent communication channel for VNFs and guarantee a secure NFV environment.