БУЛУТЛИ ҲИСОБЛАШ ТИЗИМЛАРИДА ФОЙДАЛАНУВЧИЛАРНИ АУТЕНТИФИКАЦИЯЛАШ УСУЛЛАРИ ВА АЛГОРИТМЛАРИ

Authors

  • Мадина Шавкатовна Раджабова Тошкент ахборот технологиялари унверситетининг “Киберхавфсизлик ва криминалистика” кафедраси ўқитувчи-стажёр
  • Шукурулло Файзулло ўғли Хафизов Киберхавфсизлик факултети талабалари
  • Диёрбек Улуғбек ўғли Қурбонмуродов Киберхавфсизлик факултети талабалари

Keywords:

эллиптик эгри чизиқ, скаляр қиймат, паролни алмаштириш.

Abstract

Ушбу мақола мақсади булутли ҳисоблаш тизимларида, эллиптик эгри чизиққа, биргина фойдаланишли аутентификация тизими учун ишлаб чиқилган усуллар ва алгоритмлардан олинган реал ҳамда тажрибавий таҳлиллар билан изоҳланади.

 Мақола натижаларининг илмий аҳамияти булутли ҳисоблаш тизимларида, эллиптик эгри чизиққа, биргина фойдаланишли аутентификация тизими учун усул ва алгоритмларни ишлаб чиқиш ва такомиллаштириш билан изоҳланади.

 Булутли ҳисоблаш тизимларида фойдаланувчиларни ҳақиқийлигини тасдиқлашга қаратилган таҳдидларни камайтириш ва кўп сонли қайд ёзувлар учун аутентификация жараёнини ягона парол асосида амалга ошириш имконияти билан изоҳланади.

References

Шаньгин, В. Ф. Информационная безопасность компьютерных систем и сетей : учеб. пособие / В.Ф. Шаньгин. — Москва : ИД «ФОРУМ» : ИНФРА-М, 2017. — 416 с.

Акбаров Д.Е. Ахборот хавфсизлигини таъминлашнинг криптографик усуллари ва уларнинг қўлланилиши // Тошкент, 2008, -Б. - 394.

Хасанов П.Ф., Хасанов Х.П., Ахмедова О.П., Давлатов А.Б. “Криптотаҳлил ва унинг махсус усуллари” электрон ўқув қўлланма. 2010 й.

Акбаров Д.Е., Хасанов П.Ф., Хасанов Х.П., Ахмедова О.П. “Криптографиянинг математик асослари” электрон ўқув қўлланма. 2010 й.

С.К.Ганиев, М.М.Каримов, З.Т.Худойқулов, М.М.Кадиров. Толковый словарь терминов и понятий по безопасности информации на русском, узбекском и английском языках. –Т.: «Иқтисод-молия», - 2017, 480 с.

С.К.Ганиев, М.М.Каримов, К.А.Ташев. Ахборот хавфсизлиги. –Т.: «Фан ва технология», 2016, 372 бет.

Mersaid A., Gulom T. The encryption algorithm AES-RFWKIDEA32-1 based on network RFWKIDEA32-1 //International Journal of Electronics and Information Engineering. – 2016. – Т. 4. – №. 1. – С. 1-11.

Dejamfar S. M., Najafzadeh S. Authentication Techniques in Cloud Computing: A Review //International Journal of Advanced Research in Computer Science and Software Engineering. – 2017. – Т. 7. – №. 1.

Mell P. et al. The NIST definition of cloud computing. – 2011.

Leila M., Abdelhafid Z., Mahieddine D. A New Framework of Authentication Over Cloud Computing //Proceedings of the Computational Methods in Systems and Software. – Springer, Cham, 2017. – С. 262-270.

Patel K., Alabisi A. Cloud Computing Security Risks: Identification and Assessment //The Journal of New Business Ideas & Trends. – 2019. – Т. 17. – №. 2. – С. 11-19.

Tanash R. M., Ala’F K., Darabkh K. A. Communication over Cloud Computing: A Security Survey //2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). – IEEE, 2019. – С. 496-501.

Rizwan S., Zubair M. Basic Security Challenges in Cloud Computing //2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST). – IEEE, 2019. – С. 1-4.

Al_Janabi S., Hussein N. Y. The reality and future of the secure mobile cloud computing (SMCC): survey //International Conference on Big Data and Networks Technologies. – Springer, Cham, 2019. – С. 231-261.

Information Supplement: PCI SSC Cloud Computing Guidelines. Cloud Special Interest Group PCI Security Standards Council. April 2018. https://www.pcisecuritystandards.org/pdfs/PCI_SSC_Cloud_Guidelines_v3.pdf

Siyakha N. Mthunzi, Elhadj Benkhelifa, Tomasz Bosakowski, Chirine Ghedira Guegan, Mahmoud Barhamgi, Cloud computing security taxonomy: From an atomistic to a holistic view, Future Generation Computer Systems, Volume 107, 2020, Pages 620-644.

Ashish Singh and Kakali Chatterjee, Cloud security issues and challenges: a survey, Journal of Network and Computer Applications http://dx.doi.org/10.1016/j.jnca.2016.11.027

Hubbard D, Sutton M. Top threats to cloud computing v1. 0. Cloud Security Alliance. 2010 Mar.

Hong J. B. et al. Systematic identification of threats in the cloud: A survey //Computer Networks. – 2019. – Т. 150. – С. 46-69.

Ramachandra G., Iftikhar M., Khan F. A. A comprehensive survey on security in cloud computing //Procedia Computer Science. – 2017. – Т. 110. – С. 465-472.

Khan M. A. A survey of security issues for cloud computing //Journal of network and computer applications. – 2016. – Т. 71. – С. 11-29.

Abdurachman E. et al. Survey on Threats and Risks in the Cloud Computing Environment //Procedia Computer Science. – 2019. – Т. 161. – С. 1325-1332.

Lim S. Y., Kiah M. L. M., Ang T. F. Security Issues and Future Challenges of Cloud Service Authentication //Acta Polytechnica Hungarica. – 2017. – Т. 14. – №. 2. – С. 69-89.

Sood SK. A combined approach to ensure data security in cloud computing. Journal of Network and Computer Applications. 2012 Nov30; 35(6): pp. 1831-1838.

Tang Y, Lee PP, Lui J, Perlman R. Secure overlay cloud storage with access control and assured deletion. Dependable and Secure Computing, IEEE Transactions on. 2012 Nov; 9(6): pp. 903-916.

Wei L, Zhu H, Cao Z, Dong X, Jia W, Chen Y, Vasilakos AV. Security and privacy for storage and computation in cloud computing. Information Sciences. 2014 Feb 10; 258:371-86.

Gennaro R, Gentry C, Parno B. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. InAdvances in CryptologyCRYPTO 2010 2010 Jan 1 (pp. 465-482). Springer Berlin Heidelberg.

Li S, Sadeghi AR, Heisrath S, Schmitz R, Ahmad JJ. hPIN/hTAN: A lightweight and low-cost e-banking solution against untrusted computers. InFinancial Cryptography and Data Security 2012 Jan 1 (pp. 235-249). Springer Berlin Heidelberg.

Wang C, Wang Q, Ren K, Cao N, Lou W. Toward secure and dependable storage services in cloud computing. Services Computing, IEEE Transactions on. 2012 Apr;5(2):220-32.

J. Shen, T. Zhou, D. He, Y. Zhang, X. Sun and Y. Xiang, "Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing," in IEEE Transactions on Dependable and Secure Computing, vol. 16, no. 6, pp. 996-1010, 1 Nov.-Dec. 2019.

J. Xiong et al., "A Secure Data Self-Destructing Scheme in Cloud Computing," in IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 448-458, 1 Oct.-Dec. 2014.

P. Mishra, K. Khurana, S. Gupta and M. K. Sharma, "VMAnalyzer: Malware Semantic Analysis using Integrated CNN and Bi-Directional LSTM for Detecting VM-level Attacks in Cloud," 2019 Twelfth International Conference on Contemporary Computing (IC3), Noida, India, 2019, pp. 1-6.

S. Muthurajkumar, M. Vijayalakshmi, S. Ganapathy and A. Kannan, "Agent based intelligent approach for the malware detection for infected cloud data storage files," 2015 Seventh International Conference on Advanced Computing (ICoAC), Chennai, 2015, pp. 1-5.

J. Darrous, S. Ibrahim, A. C. Zhou and C. Perez, "Nitro: Network-Aware Virtual Machine Image Management in Geo-Distributed Clouds," 2018 18th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), Washington, DC, 2018, pp. 553-562.

H. Liu, B. He, X. Liao and H. Jin, "Towards Declarative and Data-Centric Virtual Machine Image Management in IaaS Clouds," in IEEE Transactions on Cloud Computing, vol. 7, no. 4, pp. 1124-1138, 1 Oct.-Dec. 2019.

S. M. Neamul Islam and M. Rahman, "Securing virtual machine images of cloud by encryption through Kerberos," 2017 2nd International Conference for Convergence in Technology (I2CT), Mumbai, 2017, pp. 1074-1079.

X. Yue, L. Xiao, W. Zhan, Z. Xu, L. Ruan and R. Liu, "An Optimized Approach to Protect Virtual Machine Image Integrity in Cloud Computing," 2016 7th International Conference on Cloud Computing and Big Data (CCBD), Macau, 2016, pp. 75-80.

F. Zhang, J. Wang, K. Sun and A. Stavrou, "HyperCheck: A Hardware-AssistedIntegrity Monitor," in IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 4, pp. 332-344, July-Aug. 2014.

Wu C, Wang Z, Jiang X. Taming Hosted Hypervisors with (Mostly) Deprivileged Execution. InNDSS 2013 Feb.

Li C, Raghunathan A, Jha NK. A trusted virtual machine in an untrusted management environment. Services Computing, IEEE Transactions on. 2012 Sep 1;5(4): pp. 472-483.

Downloads

Published

2023-02-15

How to Cite

Раджабова, М. Ш., Хафизов, Ш. Ф. ў., & Қурбонмуродов, Д. У. ў. (2023). БУЛУТЛИ ҲИСОБЛАШ ТИЗИМЛАРИДА ФОЙДАЛАНУВЧИЛАРНИ АУТЕНТИФИКАЦИЯЛАШ УСУЛЛАРИ ВА АЛГОРИТМЛАРИ . Innovative Development in Educational Activities, 2(3), 158–172. Retrieved from https://openidea.uz/index.php/idea/article/view/760