Кваліфікаційні роботи магістрів (Маг_ІКІ)
Постійний URI для цієї колекції
Перегляд
Перегляд Кваліфікаційні роботи магістрів (Маг_ІКІ) за темою "cloud computing"
Зараз показано 1 - 2 з 2
Результатів на сторінку
Варіанти сортування
Публікація Аналіз методів криптозахисту даних в хмарних обчисленнях(2023) Якдува Усман ХассанThe object of research is the processes of functioning of telecommunication systems using cloud computing. The subject of the research is the characteristics of telecommunication systems using cloud computing. The purpose of the work is to analyze the architecture and technology parameters of telecommunication systems using cloud computing, as well as to improve the methods of information protection of such systems. Research methods – empirical analysis, comparison, analytical modeling. Today, the topic of data protection in cloud computing networks is relevant, as nowadays there is a significant increase in the number of users and information flows in cloud computing systems. The paper analyzes modern cloud computing systems, their threats and vulnerabilities. It is proposed to improve the method of information protection of data in cloud computing. A performance study of the data protection algorithm in cloud storage was performed. Recommendations for increasing the protection of cloud computing systems have been developed.Публікація Дослідження кібербезпеки технології Інтернету речей (IoT) з використанням хмарних обчислень(2023) Ларабі ФоуадThe object of research is the processes of functioning of IoT telecommunication systems using cloud computing. The subject of the research is the characteristics of IoT telecommunication systems using cloud computing. The purpose of the work is to analyze the architecture and technology parameters of IoT telecommunication systems using cloud computing, as well as to improve the methods of information protection of such systems. Research methods – empirical analysis, comparison, analytical modeling. Today, the topic of introducing a new generation of IoT networks using cloud computing is relevant, as nowadays there is a substantial increase in the number of users and information flows in IoT networks. The paper analyzes modern IoT networks using Fog Computing and Cloud Computing technologies. It is proposed to improve the method of information protection of IoT systems. The probability of threat reflection in the IoT system has been calculated. Recommendations for increasing the protection of IoT systems have been developed.