Bulutli hisoblashda xavfsizlik masalalari

Mualliflar

  • Asadullayev Safarali Hikmatjonovich Farg‘ona davlat texnika universiteti

##semicolon##

bulutli hisoblash##common.commaListSeparator## xavfsizlik##common.commaListSeparator## ma’lumotlarni himoyalash##common.commaListSeparator## virtualizatsiya, DDoS, autentifikatsiya, shifrlash.##common.commaListSeparator## virtualizatsiya##common.commaListSeparator## DDoS##common.commaListSeparator## autentifikatsiya##common.commaListSeparator## shifrlash

Annotatsiya

Ushbu maqolada bulutli hisoblash texnologiyalarida uchraydigan xavfsizlik masalalari, tahdidlar, zaifliklar va ularni bartaraf etish mexanizmlari keng yoritib beriladi. Hozirgi kunda bulutli xizmatlardan foydalanish korxonalar, davlat tashkilotlari, ta’lim muassasalari va internet foydalanuvchilari uchun asosiy ehtiyojga aylangan. Biroq bulutli infratuzilmalarda ma’lumotlarni himoya qilish, autentifikatsiya, identifikatsiya, ma’lumotlar butunligi, maxfiylik va xizmatlarning uzluksiz ishlashi kabi talablar doimo dolzarb bo‘lib kelmoqda. Mazkur maqolada bulutli hisoblashda xavfsizlikni ta’minlashning konseptual modeli, ruxsatsiz kirish, xizmatni rad etish (DDoS), virtualizatsiya zaifliklari, multi-tenant arxitektura muammolari va bulutli provayderlar qo‘llaydigan himoya choralari batafsil ko‘rib chiqiladi

##submission.citations##

1. Mell, P., Grance, T. “The NIST Definition of Cloud Computing.” National Institute of Standards and Technology.

2. Hashizume, K., Rosado, D. G., Fernandez-Medina, E., & Fernandez, E. “An analysis of security issues for cloud computing.”

3. Kaufman, L. M. “Data security in the world of cloud computing.”

4. Pearson, S. “Privacy, Security and Trust in Cloud Computing.”

5. Rittinghouse, J., & Ransome, J. “Cloud Computing: Implementation, Management, and Security.”

6. Zissis, D., & Lekkas, D. “Addressing security issues in cloud computing.”

7. Hashizume, K. “Cloud Computing Threats and Security.”

8. Subashini, S., & Kavitha, V. “A survey on security issues in service delivery models of cloud computing.”

9. Jensen, M., Schwenk, J., & Gruschka, N. “On technical security issues in cloud computing.”

10. Winkler, V. “Securing the Cloud: Cloud Computer Security Techniques and Tactics.”

##submission.downloads##

Chop etilgan

2025-12-18

Nashr

Bo'lim

Статьи

##plugins.generic.recommendBySimilarity.heading##

1 2 3 4 5 6 7 8 9 10 > >> 

##plugins.generic.recommendBySimilarity.advancedSearchIntro##

##plugins.generic.recommendByAuthor.heading##