• Title/Summary/Keyword: cloud computing

Search Result 1,728, Processing Time 0.031 seconds

A Study on the Significant Factors Affecting the Adoption of Enterprise Cloud Computing (기업의 클라우드 컴퓨팅 도입 의사결정에 영향을 미치는 요인에 관한 연구)

  • Rim, Seong-Taek;Kong, Da-Young;Shim, Su-Jin;Han, Young-Choon
    • Journal of Information Technology Services
    • /
    • v.11 no.1
    • /
    • pp.173-196
    • /
    • 2012
  • Cloud computing is provided on demand service via the internet, allowing users to pay for the service they actually use. Since cloud computing is emerging stage in industry, many companies and government consider adopting the cloud computing. Actually a variety of factors may influence on the adopting decision making of cloud computing. The objective of this study is to explore the significant factors affecting the adoption decision of enterprise cloud computing. A research model has been suggested based on TOE framework and outsourcing decision framework. Based on 302 data collected from managers in various industries, the major findings are following. First, the benefit factors of cloud computing service such as agility and cost reduction have direct and positive effects on adoption of the service. Second, lock-in as a risk factor of cloud computing service has a negative effect while security has not. Third, both internal and external environment factors have positive effects on adoption of the service.

System Access Control Technique for Secure Cloud Computing

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.67-76
    • /
    • 2019
  • Along with the diversification of digital content services using wired/wireless networks, the market for the construction of base systems is growing rapidly. Cloud computing services are recognized for a reasonable cost of service and superior system operations. Cloud computing is convenient as far as system construction and maintenance are concerned; however, owing to the security risks associated with the system construction of actual cloud computing service, the ICT(Information and Communications Technologies) market is lacking regardless of its many advantages. In this paper, we conducted an experiment on a cloud computing security enhancement model to strengthen the security aspect of cloud computing and provide convenient services to the users. The objective of this study is to provide secure services for system operation and management while providing convenient services to the users. For secure and convenient cloud computing, a single sign-on (SSO) technique and a system access control technique are proposed. For user authentication using SSO, a security level is established for each user to facilitate the access to the system, thereby designing the system in such a manner that the rights to access resources of the accessed system are not abused. Furthermore, using a user authentication ticket, various systems can be accessed without a reauthorization process. Applying the security technique to protect the entire process of requesting, issuing, and using a ticket against external security threats, the proposed technique facilitates secure cloud computing service.

Monitoring of Virtual Machines in the Eucalyptus Cloud

  • Nandimandalam, Mohan Krishna Varma;Choi, Eunmi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.169-171
    • /
    • 2013
  • Cloud computing provides access to big volumes of data and computational resources through various services. Cloud computing also supports to process these volumes of data using set of computers. Cloud computing can satisfy resource requirements through virtualization technology. Eucalyptus is an open source cloud computing environment helps the users to setup their own private cloud based on virtualization. In this paper, monitoring of virtual machines is explained with the eucalyptus cloud setup.

A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion (Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1041-1051
    • /
    • 2012
  • Attack on Cloud Computing, an intensive service solution using network infrastructure recently released, generates service breakdown or intrusive incidents incapacitating developmental platforms, web-based software, or resource services. Therefore, it is needed to conduct research on security for the operational information of three kinds of services (3S': laaS, PaaS, SaaS) supported by the Cloud Computing system and also generated data from the illegal attack on service blocking. This paper aims to build a system providing optimal services as a 4-stage defensive method through the test on the attack and defense of Cloud Computing services. It is a defense policy that conducts 4-stage, orderly and phased access control as follows: controlling the initial access to the network, controlling virtualization services, classifying services for support, and selecting multiple routes. By dispersing the attacks and also monitoring and analyzing to control the access by stage, this study performs defense policy realization and analysis and tests defenses by the types of attack. The research findings will be provided as practical foundational data to realize Cloud Computing service-based defense policy.

A Study on the Factors Affecting the Adoption of Cloud Computing Service:Focused on the Technology Acceptance Model(TAM) and Resistance (개인사용자 중심의 클라우드서비스의 수용에 영향을 미치는 요인에 관한 연구:기술수용모형(TAM)과 저항을 중심으로)

  • Park, Yoonseo;Kim, Yongsik
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.1-23
    • /
    • 2013
  • This study examines whether key characteristics of cloud computing services would affect the intention of use for personalized cloud computing services. The research model was generated based on Technology Acceptance Model (TAM) with resistance variable, and verified statistically by undertaking a survey about the perception of personal users. As the results of this analysis, we could find the structural relationship among the factors affecting adoption of the cloud computing service. We found that the expectation of ubiquity as a representative function of the cloud computing service meaningfully affected the perceived ease of use and resistance, and that the relativeness with existing services also meaningfully affected the perceived ease of use, but not the resistance. In addition, the moderating effects of use experience in the path leading from the perceived ease of use and resistance to the intention of use were identified. This study will provide diverse implications for the companies providing personalized cloud computing services.

Deep Learning Based Security Model for Cloud based Task Scheduling

  • Devi, Karuppiah;Paulraj, D.;Muthusenthil, Balasubramanian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3663-3679
    • /
    • 2020
  • Scheduling plays a dynamic role in cloud computing in generating as well as in efficient distribution of the resources of each task. The principle goal of scheduling is to limit resource starvation and to guarantee fairness among the parties using the resources. The demand for resources fluctuates dynamically hence the prearranging of resources is a challenging task. Many task-scheduling approaches have been used in the cloud-computing environment. Security in cloud computing environment is one of the core issue in distributed computing. We have designed a deep learning-based security model for scheduling tasks in cloud computing and it has been implemented using CloudSim 3.0 simulator written in Java and verification of the results from different perspectives, such as response time with and without security factors, makespan, cost, CPU utilization, I/O utilization, Memory utilization, and execution time is compared with Round Robin (RR) and Waited Round Robin (WRR) algorithms.

Study on Security Considerations in the Cloud Computing (클라우드 컴퓨팅에서의 보안 고려사항에 관한 연구)

  • Park, Choon-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.3
    • /
    • pp.1408-1416
    • /
    • 2011
  • Cloud computing provides not only cost savings and efficiencies for computing resources, but the ability to expend and enhance services. However, cloud service users(enterprisers) are very concerned about the risks created by the characteristics of cloud computing. In this paper, we discuss major concerns about cloud computing environments including concerns regarding security. We also analyze the security concerns specifically, identify threats to cloud computing, and propose general countermeasures to reduce the security risks.

Adaptive Scheduling for QoS-based Virtual Machine Management in Cloud Computing

  • Cao, Yang;Ro, Cheul Woo
    • International Journal of Contents
    • /
    • v.8 no.4
    • /
    • pp.7-11
    • /
    • 2012
  • Cloud Computing can be viewed as a dynamically-scalable pool of resources. Virtualization is one of the key technologies enabling Cloud Computing functionalities. Virtual machines (VMs) scheduling and allocation is essential in Cloud Computing environment. In this paper, two dynamic VMs scheduling and allocating schemes are presented and compared. One dynamically on-demand allocates VMs while the other deploys optimal threshold to control the scheduling and allocating of VMs. The aim is to dynamically allocate the virtual resources among the Cloud Computing applications based on their load changes to improve resource utilization and reduce the user usage cost. The schemes are implemented by using SimPy, and the simulation results show that the proposed adaptive scheme with one threshold can be effectively applied in a Cloud Computing environment both performance-wise and cost-wise.

An Empirical Study on Factors Affecting the Assimilation of Inter-Organizational Cloud Computing and Performance and the Moderating Effect of Trust (기업 간 클라우드 컴퓨팅 동화 및 성과에 영향을 미치는 기술 및 환경 요인과 신뢰의 조절효과에 관한 연구)

  • Park, Hyunsun;Kim, Sanghyun
    • Journal of Information Technology Services
    • /
    • v.13 no.3
    • /
    • pp.1-23
    • /
    • 2014
  • This study investigates the effect of technological and environmental factors on the cloud computing assimilation, which then affects firms' performance. The technological characteristics include cost-savings, technology use advantage, technology infrastructure, and technology compatibility while environmental characteristics include partner cooperation, competitive pressure, environmental uncertainty, and business agility. Furthermore, we examine inter-organizational trust as a moderating effect between environmental characteristics and cloud computing assimilation. Data from a sample of 219 firms show the significant impacts of proposed variables with exception of technology infrastructure and technology compatibility. The findings also show that inter-organizational trust has a significant moderating effect in all paths except the one between business agility and cloud computing assimilation. The implication of this study suggests a theoretical framework explaining cloud computing assimilation and performance within inter-organizational environment.

The Effect of Perceived Risk and Trust on Users' Acceptance of Cloud Computing : Mobile Cloud Computing (인지된 위험과 신뢰가 Cloud Computing 사용의도에 미치는 영향 : 모바일 Cloud Computing을 중심으로)

  • Kim, Jun-Woo;Kim, Yong-Gu
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.35 no.3
    • /
    • pp.70-76
    • /
    • 2012
  • This research tested how the perceived risk and the trust affect the usage intention of the cloud computing. To this end, this research setups a research model and tests it with the statistic tools. In order to build the model, TAM (Technology Acceptance Model) and UTAUT (Unified Theory of Acceptance and Use of Technology) were employed and, the factors such as the perceived risk, the trust and the intention of the cloud computing use were derived. This research finds that the perceived risk does not affect the intention of usage. Also the perceived risk has the negative effect for the trust. Thus this research has the following suggestions.