Research and Modelling of Methods for Building Cloud Computing Platforms

Students Name: Vrublevskyi Vitalii Vasylovych
Qualification Level: magister
Speciality: System Administration of Telecommunications Networks
Institute: Institute of Telecommunications, Radioelectronics and Electronic Engineering
Mode of Study: full
Academic Year: 2022-2023 н.р.
Language of Defence: ukrainian
Abstract: Cloud technologies are very popular among active users of the Internet, as they provide a wide range of services in terms of multi-user structure, ease of operation, costeffectiveness, and this, in turn, improves the quality of users’ work and entails the popularization of clouds on the market IT services. A very important aspect is the costeffectiveness of cloud technologies, which is available to various segments of the population for saving information data. Some enterprises use public clouds for work that requires temporary computing, instead of setting up their own internal infrastructure, it is convenient from a financial point of view, the calculation goes only for the time of use. It must be remembered that the use of cloud technologies causes increased risks of information loss and, in addition, the possibility of control is limited. Studying the features of cloud computing from the point of view of ensuring information security can be structured as follows: saving data from an uninterested party; the ability to manage and control security issues if necessary; monitoring of violations in real time; organization of cloud service performance; solving the issue of training qualified personnel in the direction of cloud systems security organization; regular investment in cloud security infrastructure development. If we consider the public cloud, then it, like many other systems operating on the Internet, can be attacked. The following types of attacks are typical for cloud systems: standard attacks on software; attacks are aimed at the client; network attacks; attacks that focus on cloud servers; implementation of various threats [2, 3, 5]. If a hacker attack is successfully organized, the threat of information security violations (integrity, privacy, confidentiality) hangs over almost every element of the cloud. An important aspect of the organization of a high level of security is the transfer of private data to an uninterested party, which determines the existence of additional work protocols between the consumer and the provider of the necessary cloud system services. In this regard, the study of known approaches to information protection when using cloud computing and the development of the latest ones are relevant. The purpose of the master’s qualification work is to develop a method for building a secure cloud computing platform. Achieving the set goal is carried out by solving the following tasks: 1) research methods of building cloud computing platforms; 2) determine the principles of cloud computing platform modeling; 3) to propose subsystems of threat analysis and forecasting and planning of information security measures of the cloud computing platform; 4) reveal the algorithm for predicting threats to information security; 5) analyze the operation of the cloud computing platform information security threat forecasting algorithm; 6) carry out a numerical simulation of the effectiveness of the algorithm for predicting information security threats of the cloud computing platform; 7) provide verification of research results. The object of research is cloud computing platforms. The subject of research is the process of modeling secure cloud computing platforms. Research methods. In the work, an analysis of literary sources on the chosen topic of research was carried out, a comparison of methods of forecasting threats to information security in cloud services, quantitative data processing was used. The first section reveals the concept, essence and genesis of cloud computing platforms. The mechanism of modeling cloud computing platforms is defined and the existing types of threats to the information security of cloud computing platforms are outlined. The second section reveals an algorithm for predicting information security threats based on the analysis of data from thematic Internet forums. The methods of building cloud computing platforms are determined and modeling is carried out. In the third section, subsystems for analyzing and forecasting threats and planning information security measures for cloud computing platforms are proposed. In the fourth section, the analysis of the algorithm for predicting information security threats to the cloud computing platform is carried out, the numerical simulation of the algorithm is carried out, and the verification of the research results is proposed. The fifth section is devoted to economic substantiation. Economic calculations show the effectiveness of implementing a set of methods to ensure information security in the cloud environment. According to the calculations, the payback of solutions will occur in the first quarter of use. That is a very minimal financial burden