Axborot xavfsizligi ta’lim y о‘nalishi talabalari uchun individual loyihani bajarish va rasmiylashtirish b
Download 351.81 Kb. Pdf ko'rish
|
- Bu sahifa navigatsiya:
- Foydalanilgan adabiyotlar rо‘yhati
Xulosa
Ushbu individual ishni bajarish natijasida quyidagi xulosalarga erishildi: − bulutli texnologiyalarning asosiy xizmatlari, modellari va texnologiyalari tadqiq etildi va bulutda ma’lumotlarni saqlash imkoniyatlari kengligi kо‘rsatildi; − ushbu tizimlarga bо‘lishi mumkin bо‘lgan tahdidlar, xavflar va xujumlar tadqiq etildi va aloqa kanallarida va bulutli saqlash tizimlariga qaratilgan xujumlarning zarari yuqori ekanligi keltirildi; − bulutli hisoblash tizimlaridagi hujumlarni oldini olish choralari, usullari va himoya texnologiyalari tadqiq etildi; − bulutli texnologiyalarda haqiqiylikni tekshirish, butunlikni ta’minlash va konfidensiallikni ta’minlashda kriptografiyaning о‘rni tadqiq etildi; − ma’lumotlarni xavfsiz saqlashda qо‘llaniladigan kriptografik algoritmlar va kalitlarni almashish usullari keltirildi va ular asosida mujassamlashgan shifrlash algoritmi ishlab chiqildi. Yaratilgan algoritm dasturiy amalga oshirildi. 51 Foydalanilgan adabiyotlar rо‘yhati 1. О‘zbekiston Respublikasi Prezidentining farmoni. О‘zbekiston Respublikasini yanada rivojlantirish b о‘yicha Harakatlar strategiyasi tо‘g‘risida. 2017 yil. 2. Dinh H. T. et al. A survey of mobile cloud computing: architecture, applications, and approaches //Wireless communications and mobile computing. – 2013. – T. 13. – №. 18. – S. 1587-1611. 3. Krutz R. L., Vines R. D. Cloud security: A comprehensive guide to secure cloud computing. – Wiley Publishing, 2010. 4. Tsai W. T., Sun X., Balasooriya J. Service-oriented cloud computing architecture //2010 seventh international conference on information technology: new generations. – IEYEE, 2010. – S. 684-689. 5. Zissis D., Lekkas D. Addressing cloud computing security issues //Future Generation compyuter systems. – 2012. – T. 28. – №. 3. – S. 583-592. 6. Subashini S., Kavitha V. A survey on security issues in service delivery models of cloud computing //Journal of network and compyuter applications. – 2011. – T. 34. – №. 1. – S. 1-11. 7. Jensen M. et al. On technical security issues in cloud computing //2009 IEYEE International Conference on Cloud Computing. – Ieyee, 2009. – S. 109-116. 8. Feng D. G. et al. Study on cloud computing security //Journal of software. – 2011. – T. 22. – №. 1. – S. 71-83. 9. Mell P. et al. The NIST definition of cloud computing. – 2011. 10. Popovi ć K., Hocenski Ž. Cloud computing security issues and challenges //The 33rd International Convention MIPRO. – IEYEE, 2010. – S. 344- 349. 11. Van Dijk M., Juels A. On the impossibility of cryptography alone for privacy-preserving cloud computing //Hotsec. – 2010. – T. 10. – S. 1-8. Download 351.81 Kb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling