• Foydalanilgan adabiyotlar ro’yhati
  • Aхbоrоt tехnоlоgiyalari univеrsitеti




    Download 0,69 Mb.
    bet13/14
    Sana15.05.2024
    Hajmi0,69 Mb.
    #236731
    1   ...   6   7   8   9   10   11   12   13   14
    Bog'liq
    bulutli Abdurahim

    Xulosa


    Ushbu individual ishni bajarish natijasida quyidagi xulosalarga erishildi:

    • bulutli texnologiyalarning asosiy xizmatlari, modellari va texnologiyalari tadqiq etildi va bulutda ma’lumotlarni saqlash imkoniyatlari kengligi ko’rsatildi;

    • ushbu tizimlarga bo’lishi mumkin bo’lgan tahdidlar, xavflar va xujumlar tadqiq etildi va aloqa kanallarida va bulutli saqlash tizimlariga qaratilgan xujumlarning zarari yuqori ekanligi keltirildi;

    • bulutli hisoblash tizimlaridagi hujumlarni oldini olish choralari, usullari va himoya texnologiyalari tadqiq etildi;

    • bulutli texnologiyalarda haqiqiylikni tekshirish, butunlikni ta’minlash va konfidensiallikni ta’minlashda kriptografiyaning o’rni tadqiq etildi;

    • ma’lumotlarni xavfsiz saqlashda qo’llaniladigan kriptografik algoritmlar va kalitlarni almashish usullari keltirildi va ular asosida mujassamlashgan shifrlash algoritmi ishlab chiqildi. Yaratilgan algoritm dasturiy amalga oshirildi.

    Foydalanilgan adabiyotlar ro’yhati


    1. O’zbekiston Respublikasi Prezidentining farmoni. O’zbekiston Respublikasini yanada rivojlantirish bo’yicha Harakatlar strategiyasi to’g’risida. 2017 yil.

    2. Dinh H. T. et al. A survey of mobile cloud computing: architecture, applications, and approaches //Wireless communications and mobile computing. – 2013. – Т. 13. – №. 18. – С. 1587-1611.

    3. Krutz R. L., Vines R. D. Cloud security: A comprehensive guide to secure cloud computing. – Wiley Publishing, 2010.

    4. Tsai W. T., Sun X., Balasooriya J. Service-oriented cloud computing architecture //2010 seventh international conference on information technology: new generations. – IEEE, 2010. – С. 684-689.

    5. Zissis D., Lekkas D. Addressing cloud computing security issues //Future Generation computer systems. – 2012. – Т. 28. – №. 3. – С. 583-592.

    6. Subashini S., Kavitha V. A survey on security issues in service delivery models of cloud computing //Journal of network and computer applications. – 2011. – Т. 34. – №. 1. – С. 1-11.

    7. Jensen M. et al. On technical security issues in cloud computing //2009 IEEE International Conference on Cloud Computing. – Ieee, 2009. – С. 109-116.

    8. Feng D. G. et al. Study on cloud computing security //Journal of software. – 2011. – Т. 22. – №. 1. – С. 71-83.

    9. Mell P. et al. The NIST definition of cloud computing. – 2011.

    10. Popović K., Hocenski Ž. Cloud computing security issues and challenges //The 33rd International Convention MIPRO. – IEEE, 2010. – С. 344- 349.

    11. Van Dijk M., Juels A. On the impossibility of cryptography alone for privacy-preserving cloud computing //HotSec. – 2010. – Т. 10. – С. 1-8.

    Download 0,69 Mb.
    1   ...   6   7   8   9   10   11   12   13   14




    Download 0,69 Mb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Aхbоrоt tехnоlоgiyalari univеrsitеti

    Download 0,69 Mb.