DOI QR코드

DOI QR Code

Study on Hybrid Type Cloud System

하이브리드형 클라우드 시스템에 관한 연구

  • 장재열 (경동대학교 정보보안학과) ;
  • 김도문 (경동대학교 정보보안학과) ;
  • 최철재 (경동대학교 정보보안학과)
  • Received : 2016.05.12
  • Accepted : 2016.06.24
  • Published : 2016.06.30

Abstract

The suggested paper studies communications network and system technology, designing data to sync to both USB memories and cloud storages at the same time, which would allow users to safely keep and manage data even in case of network troubles, affecting cloud storages, and/or loss of physical USB memories, resulting in lost data in the physical memory. The need of secure data management policy for cloud storage users form the basis of this study, offering solutions to network failures and loss of physical storage by creating hybrid cloud system. To provide convenience to windows users, the UI design should integrate that of windows explorer to maximize security and convenience.

제안한 논문은 통신 네트워크 및 관련 시스템 기술에 관한 연구로 USB메모리와 클라우드 스토리지 영역을 동시에 동기화하여 네트워크 오류에 따른 클라우드 스토리지 영역 사용부재 또는 USB 메모리를 분실하는 상황이 발생되더라도 데이터를 안전하게 유지관리하기 위한 기술설계이다. 클라우드를 활용하는 사용자들의 안전한 문서관리 정책의 필요성을 기반으로 매체의 분실 및 네트워크의 오류에 따른 대책을 하이브리드형 클라우드 시스템으로 설계구축하고, 사용자의 편리성에 따른 자동 및 수동 동기화 방법을 설계한다. 마지막으로 윈도우즈 환경에 적합한 사용자의 편의보장을 위해 탐색기형 스토리지 UI를 설계함으로써 점차 늘어나는 클라우드 사용자의 안전성과 편리성을 모두 보장해주기 위한 시스템설계이다.

Keywords

References

  1. H. Kim, E. Jun, and S. Kim, "Study on security management in cloud computing environment," Korean Review of Management Consulting, vol. 2, no. 1, 2011, pp. 127-144.
  2. C. Kim, "A Study for Transaction Processing Supporting Scalability in the Cloud," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, 2012, pp. 873-879. https://doi.org/10.13067/JKIECS.2012.7.4.873
  3. C. Kim, "An Adaptation of Consistency Criteria for Applications in the Cloud," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 2, 2012, pp. 341-347. https://doi.org/10.13067/JKIECS.2012.7.2.341
  4. C. Kim, "A Range Query Method using Index in Large-scale Database Systems," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 5, 2012, pp. 1095-1101. https://doi.org/10.13067/JKIECS.2012.7.5.1095
  5. C. Ryu, "Context Inference and Sensor Data Classification of Big Data Stream Environment," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 10, 2014, pp. 1079-1085. https://doi.org/10.13067/JKIECS.2014.9.10.1079
  6. S. Lee and H. Yoon, "The Study on Development of Technology for Electronic Government of S. Korea with Cloud Computing analysed by the Application of Scenario Planning," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 6, 2012, pp. 1245-1258. https://doi.org/10.13067/JKIECS.2012.7.6.1245
  7. K. Park, K. Kim, K. Ban, and W. Kim, "Design and Implementation of Cloud-based Sensor Data Management System," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 6, 2010, pp. 672-677.
  8. B. Cha, D. Kim, J. Kim, N. Kim, and S. Choi, "Design of Searchable Image Encryption System of Streaming Media based on Cloud Computing," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, 2012, pp. 811-819. https://doi.org/10.13067/JKIECS.2012.7.4.811
  9. Y. Kim, S. Him, M. Jo, and W. Kim, "The Bigdata Processing Environment Building for the Learning System," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 6, Aug. 2014, pp. 791-797. https://doi.org/10.13067/JKIECS.2014.9.7.791
  10. M. Kim, H. Hwang, K. Kim, T. Chang, M. Kim, and B. Noh, "Vulnerability Analysis Method of Software-based Secure USB," J. of the Korea Institute of Information Security and Cryptologys, vol. 22, no. 6, 2012, pp. 1345-1354.