108 research outputs found

    ДослідТСння ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ розгортання Ρ…ΠΌΠ°Ρ€Π½ΠΈΡ… Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³Ρ–ΠΉ для Π±Π°Π½ΠΊΡ–Π²ΡΡŒΠΊΠΈΡ… Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΈΡ… систСм

    Get PDF
    The object of research is banking information technology (IT). One of the most problematic issues is the low efficiency of using hardware resources and, as a result, high costs and time spent on maintaining and developing banking information systems (IS). The use of cloud technologies, especially with the use of the public cloud deployment model, can greatly enhance the economic efficiency of banking IT. In addition, there is an increase in the availability, flexibility and scalability of banking IT, as well as the time to market, (TTM). In the course of the study, quantitative and qualitative indicators of the functioning of banking IS were used.An analysis of modern approaches to building a service-oriented architecture of banking IS based on cloud technologies was conducted in scope of the research. The article describes the architectural solution of information technologies for the introduction of automated banking IS taking into account the requirements of the National Bank of Ukraine and European regulators. The analysis of the main banking systems and the expediency of using different models of cloud technologies deployment are analyzed.The result obtained in quantitative parameters of the system load allows to find additional reserves for optimization of time processing of information and increase economic efficiency using the Public cloud. The greatest effect can be achieved by applying this model to the Core Banking System (CBS). In order to comply with the requirements and to take into account restrictions on the placement of client data, the article proposes a mechanism for depersonalization.This ensures the possibility of obtaining the most optimal values of indicators. Compared to similar well-known services, such as virtualization, it benefits because there is no need to purchase, or lease hardware, and the computing power can be scaled in a much wider range.ΠžΠ±ΡŠΠ΅ΠΊΡ‚ΠΎΠΌ исслСдования ΡΠ²Π»ΡΡŽΡ‚ΡΡ банковскиС ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Π΅ Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈ (Π΄Π°Π»Π΅Π΅ ИВ). Одним ΠΈΠ· самых ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΠ½Ρ‹Ρ… мСст являСтся низкая ΡΡ„Ρ„Π΅ΠΊΡ‚ΠΈΠ²Π½ΠΎΡΡ‚ΡŒ использования Π°ΠΏΠΏΠ°Ρ€Π°Ρ‚Π½Ρ‹Ρ… рСсурсов ΠΈ ΠΊΠ°ΠΊ слСдствиС высокиС Π·Π°Ρ‚Ρ€Π°Ρ‚Ρ‹ Π²Ρ€Π΅ΠΌΠ΅Π½ΠΈ ΠΈ Π±ΡŽΠ΄ΠΆΠ΅Ρ‚Π° Π½Π° ΠΏΠΎΠ΄Π΄Π΅Ρ€ΠΆΠΊΡƒ ΠΈ Ρ€Π°Π·Π²ΠΈΡ‚ΠΈΠ΅ банковских ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… систСм (Π΄Π°Π»Π΅Π΅ ИБ). ΠŸΡ€ΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ ΠΎΠ±Π»Π°Ρ‡Π½Ρ‹Ρ… Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΠΉ, особСнно ΠΏΡ€ΠΈ использовании ΠΌΠΎΠ΄Π΅Π»ΠΈ развСртывания Public Cloud, позволяСт Π·Π½Π°Ρ‡ΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎ ΠΏΠΎΠ²Ρ‹ΡΠΈΡ‚ΡŒ ΡΠΊΠΎΠ½ΠΎΠΌΠΈΡ‡Π΅ΡΠΊΡƒΡŽ ΡΡ„Ρ„Π΅ΠΊΡ‚ΠΈΠ²Π½ΠΎΡΡ‚ΡŒ банковских ИВ. ΠšΡ€ΠΎΠΌΠ΅ этого, ΠΏΠΎΠ²Ρ‹ΡˆΠ°Π΅Ρ‚ΡΡ ΠΎΡ‚ΠΊΠ°Π·ΠΎΡƒΡΡ‚ΠΎΠΉΡ‡ΠΈΠ²ΠΎΡΡ‚ΡŒ, Π³ΠΈΠ±ΠΊΠΎΡΡ‚ΡŒ ΠΈ ΠΌΠ°ΡΡˆΡ‚Π°Π±ΠΈΡ€ΡƒΠ΅ΠΌΠΎΡΡ‚ΡŒ банковских ИВ, Π° Ρ‚Π°ΠΊΠΆΠ΅ ΠΏΠΎΠΊΠ°Π·Π°Ρ‚Π΅Π»ΡŒ скорости Π²Ρ‹Π²ΠΎΠ΄Π° ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚ΠΎΠ² Π½Π° Ρ€Ρ‹Π½ΠΎΠΊ (ΠΎΡ‚ Π°Π½Π³Π». time to market). Π’ Ρ…ΠΎΠ΄Π΅ исслСдования использовались количСствСнныС ΠΈ качСствСнныС ΠΏΠΎΠΊΠ°Π·Π°Ρ‚Π΅Π»ΠΈ функционирования банковских ИБ.ΠŸΡ€ΠΎΠ²Π΅Π΄Π΅Π½ Π°Π½Π°Π»ΠΈΠ· соврСмСнных ΠΏΠΎΠ΄Ρ…ΠΎΠ΄ΠΎΠ² ΠΊ ΠΏΠΎΡΡ‚Ρ€ΠΎΠ΅Π½ΠΈΡŽ сСрвисно-ΠΎΡ€ΠΈΠ΅Π½Ρ‚ΠΈΡ€ΠΎΠ²Π°Π½Π½ΠΎΠΉ Π°Ρ€Ρ…ΠΈΡ‚Π΅ΠΊΡ‚ΡƒΡ€Ρ‹ банковских ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… систСм Π½Π° основС ΠΎΠ±Π»Π°Ρ‡Π½Ρ‹Ρ… Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΠΉ. ΠŸΡ€ΠΈΠ²Π΅Π΄Π΅Π½ΠΎ описаниС Π°Ρ€Ρ…ΠΈΡ‚Π΅ΠΊΡ‚ΡƒΡ€Π½ΠΎΠ³ΠΎ Ρ€Π΅ΡˆΠ΅Π½ΠΈΡ ИВ ΠΏΠΎ Π²Π½Π΅Π΄Ρ€Π΅Π½ΠΈΡŽ Π°Π²Ρ‚ΠΎΠΌΠ°Ρ‚ΠΈΠ·ΠΈΡ€ΠΎΠ²Π°Π½Π½Ρ‹Ρ… банковских ИБ с ΡƒΡ‡Π΅Ρ‚ΠΎΠΌ Ρ‚Ρ€Π΅Π±ΠΎΠ²Π°Π½ΠΈΠΉ ΠΠ°Ρ†ΠΈΠΎΠ½Π°Π»ΡŒΠ½ΠΎΠ³ΠΎ Π‘Π°Π½ΠΊΠ° Π£ΠΊΡ€Π°ΠΈΠ½Ρ‹ ΠΈ ЕвропСйских рСгуляторов. ΠŸΡ€ΠΎΠ°Π½Π°Π»ΠΈΠ·ΠΈΡ€ΠΎΠ²Π°Π½Ρ‹ основныС банковскиС ИБ ΠΈ Ρ†Π΅Π»Π΅ΡΠΎΠΎΠ±Ρ€Π°Π·Π½ΠΎΡΡ‚ΡŒ примСнСния ΠΊ Π½ΠΈΠΌ Ρ€Π°Π·Π»ΠΈΡ‡Π½Ρ‹Ρ… ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ развСртывания ΠΎΠ±Π»Π°Ρ‡Π½Ρ‹Ρ… Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³ΠΈΠΉ.ΠŸΠΎΠ»ΡƒΡ‡Π΅Π½Π½Ρ‹ΠΉ Ρ€Π΅Π·ΡƒΠ»ΡŒΡ‚Π°Ρ‚ Π² количСствСнном Π²Ρ‹Ρ€Π°ΠΆΠ΅Π½ΠΈΠΈ ΠΏΠΎΠΊΠ°Π·Π°Ρ‚Π΅Π»Π΅ΠΉ Π½Π°Π³Ρ€ΡƒΠ·ΠΊΠΈ Π½Π° систСму позволяСт Π½Π°ΠΉΡ‚ΠΈ Π΄ΠΎΠΏΠΎΠ»Π½ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹Π΅ Ρ€Π΅Π·Π΅Ρ€Π²Ρ‹ для ΠΎΠΏΡ‚ΠΈΠΌΠΈΠ·Π°Ρ†ΠΈΠΈ Π²Ρ€Π΅ΠΌΠ΅Π½ΠΈ ΠΎΠ±Ρ€Π°Π±ΠΎΡ‚ΠΊΠΈ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ ΠΈ ΠΏΠΎΠ²Ρ‹ΡˆΠ΅Π½ΠΈΡ экономичСской эффСктивности Π·Π° счСт примСнСния Public Cloud. НаибольшСго эффСкта ΠΌΠΎΠΆΠ½ΠΎ Π΄ΠΎΡΡ‚ΠΈΡ‡ΡŒ, ΠΏΡ€ΠΈΠΌΠ΅Π½ΠΈΠ² эту модСль ΠΊ Π°Π²Ρ‚ΠΎΠΌΠ°Ρ‚ΠΈΠ·ΠΈΡ€ΠΎΠ²Π°Π½Π½ΠΎΠΌΡƒ ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΌΡƒ дню Π±Π°Π½ΠΊΠ° (ΠΎΡ‚ Π°Π½Π³Π». Core Banking System). Для соблюдСния Ρ‚Ρ€Π΅Π±ΠΎΠ²Π°Π½ΠΈΠΉ ΠΈ ΡƒΡ‡Π΅Ρ‚Π° ΠΎΠ³Ρ€Π°Π½ΠΈΡ‡Π΅Π½ΠΈΠΉ ΠΏΠΎ Ρ€Π°Π·ΠΌΠ΅Ρ‰Π΅Π½ΠΈΡŽ клиСнтских Π΄Π°Π½Π½Ρ‹Ρ… Π² Ρ€Π°Π±ΠΎΡ‚Π΅ ΠΏΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½ ΠΌΠ΅Ρ…Π°Π½ΠΈΠ·ΠΌ дСпСрсонализации.Благодаря этому обСспСчиваСтся Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡ‚ΡŒ получСния Π½Π°ΠΈΠ±ΠΎΠ»Π΅Π΅ ΠΎΠΏΡ‚ΠΈΠΌΠ°Π»ΡŒΠ½Ρ‹Ρ… Π·Π½Π°Ρ‡Π΅Π½ΠΈΠΉ ΠΏΠΎΠΊΠ°Π·Π°Ρ‚Π΅Π»Π΅ΠΉ. По ΡΡ€Π°Π²Π½Π΅Π½ΠΈΡŽ с Π°Π½Π°Π»ΠΎΠ³ΠΈΡ‡Π½Ρ‹ΠΌΠΈ извСстными сСрвисами, Ρ‚Π°ΠΊΠΈΠΌΠΈ ΠΊΠ°ΠΊ виртуализация, это обСспСчиваСт прСимущСство, вСдь Π½Π΅Ρ‚ нСобходимости приобрСтСния ΠΈΠ»ΠΈ Π°Ρ€Π΅Π½Π΄Ρ‹ оборудования, Π° Π²Ρ‹Ρ‡ΠΈΡΠ»ΠΈΡ‚Π΅Π»ΡŒΠ½Π°Ρ ΠΌΠΎΡ‰Π½ΠΎΡΡ‚ΡŒ ΠΌΠΎΠΆΠ΅Ρ‚ ΠΌΠ°ΡΡˆΡ‚Π°Π±ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒΡΡ Π² Π·Π½Π°Ρ‡ΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎ Π±ΠΎΠ»Π΅Π΅ ΡˆΠΈΡ€ΠΎΠΊΠΎΠΌ Π΄ΠΈΠ°ΠΏΠ°Π·ΠΎΠ½Π΅.Об'Ρ”ΠΊΡ‚ΠΎΠΌ дослідТСння Ρ” Π±Π°Π½ΠΊΡ–Π²ΡΡŒΠΊΡ– Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½Ρ– Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³Ρ–Ρ— (Π½Π°Π΄Π°Π»Ρ– Π†Π’). Одним Π· Π½Π°ΠΉΠ±Ρ–Π»ΡŒΡˆ ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΠ½ΠΈΡ… ΠΌΡ–ΡΡ†ΡŒ Ρ” низька Π΅Ρ„Π΅ΠΊΡ‚ΠΈΠ²Π½Ρ–ΡΡ‚ΡŒ використання Π°ΠΏΠ°Ρ€Π°Ρ‚Π½ΠΈΡ… рСсурсів Ρ‚Π° як наслідок високі Π²ΠΈΡ‚Ρ€Π°Ρ‚ΠΈ часу Ρ‚Π° Π±ΡŽΠ΄ΠΆΠ΅Ρ‚Ρƒ Π½Π° ΠΏΡ–Π΄Ρ‚Ρ€ΠΈΠΌΠΊΡƒ Ρ‚Π° Ρ€ΠΎΠ·Π²ΠΈΡ‚ΠΎΠΊ Π±Π°Π½ΠΊΡ–Π²ΡΡŒΠΊΠΈΡ… Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–ΠΉΠ½ΠΈΡ… систСм (Π½Π°Π΄Π°Π»Ρ– Π†Π‘). Застосування Ρ…ΠΌΠ°Ρ€Π½ΠΈΡ… Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³Ρ–ΠΉ, особливо Π·Π° ΡƒΠΌΠΎΠ²ΠΈ використання ΠΌΠΎΠ΄Π΅Π»Ρ– розгортання Public Cloud, дозволяє Π·Π½Π°Ρ‡Π½ΠΎ ΠΏΡ–Π΄Π²ΠΈΡ‰ΠΈΡ‚ΠΈ Π΅ΠΊΠΎΠ½ΠΎΠΌΡ–Ρ‡Π½Ρƒ Π΅Ρ„Π΅ΠΊΡ‚ΠΈΠ²Π½Ρ–ΡΡ‚ΡŒ Π±Π°Π½ΠΊΡ–Π²ΡΡŒΠΊΠΈΡ… Π†Π’. ΠšΡ€Ρ–ΠΌ Ρ†ΡŒΠΎΠ³ΠΎ, ΠΏΡ–Π΄Π²ΠΈΡ‰ΡƒΡ”Ρ‚ΡŒΡΡ Π²Ρ–Π΄ΠΌΠΎΠ²ΠΎΡΡ‚Ρ–ΠΉΠΊΡ–ΡΡ‚ΡŒ, Π³Π½ΡƒΡ‡ΠΊΡ–ΡΡ‚ΡŒ Ρ‚Π° ΠΌΠ°ΡΡˆΡ‚Π°Π±ΠΎΠ²Π°Π½Ρ–ΡΡ‚ΡŒ Π±Π°Π½ΠΊΡ–Π²ΡΡŒΠΊΠΈΡ… Π†Π’, Π° Ρ‚Π°ΠΊΠΎΠΆ ΠΏΠΎΠΊΠ°Π·Π½ΠΈΠΊ ΡˆΠ²ΠΈΠ΄ΠΊΠΎΡΡ‚Ρ– Π²ΠΈΠ²ΠΎΠ΄Ρƒ ΠΏΡ€ΠΎΠ΄ΡƒΠΊΡ‚Ρ–Π² Π½Π° Ρ€ΠΈΠ½ΠΎΠΊ (Π²Ρ–Π΄ Π°Π½Π³Π». time to market). Π’ Ρ…ΠΎΠ΄Ρ– дослідТСння використовувалися ΠΊΡ–Π»ΡŒΠΊΡ–ΡΠ½Ρ– Ρ‚Π° якісні ΠΏΠΎΠΊΠ°Π·Π½ΠΈΠΊΠΈ функціонування Π±Π°Π½ΠΊΡ–Π²ΡΡŒΠΊΠΈΡ… Π†Π‘.ΠŸΡ€ΠΎΠ²Π΅Π΄Π΅Π½ΠΎ Π°Π½Π°Π»Ρ–Π· сучасних ΠΏΡ–Π΄Ρ…ΠΎΠ΄Ρ–Π² Π΄ΠΎ ΠΏΠΎΠ±ΡƒΠ΄ΠΎΠ²ΠΈ сСрвісно-ΠΎΡ€Ρ–Ρ”Π½Ρ‚ΠΎΠ²Π°Π½ΠΎΡ— Π°Ρ€Ρ…Ρ–Ρ‚Π΅ΠΊΡ‚ΡƒΡ€ΠΈ Π±Π°Π½ΠΊΡ–Π²ΡΡŒΠΊΠΈΡ… Π†Π‘ Π½Π° основі Ρ…ΠΌΠ°Ρ€Π½ΠΈΡ… Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³Ρ–ΠΉ. ΠŸΡ€ΠΈΠ²Π΅Π΄Π΅Π½ΠΎ опис Π°Ρ€Ρ…Ρ–Ρ‚Π΅ΠΊΡ‚ΡƒΡ€Π½ΠΎΠ³ΠΎ Ρ€Ρ–ΡˆΠ΅Π½Π½Ρ Π†Π’ Π· впровадТСння Π°Π²Ρ‚ΠΎΠΌΠ°Ρ‚ΠΈΠ·ΠΎΠ²Π°Π½ΠΈΡ… Π±Π°Π½ΠΊΡ–Π²ΡΡŒΠΊΠΈΡ… Π†Π‘ Π· урахуванням Π²ΠΈΠΌΠΎΠ³ ΠΠ°Ρ†Ρ–ΠΎΠ½Π°Π»ΡŒΠ½ΠΎΠ³ΠΎ Π‘Π°Π½ΠΊΡƒ Π£ΠΊΡ€Π°Ρ—Π½ΠΈ Ρ‚Π° Π„Π²Ρ€ΠΎΠΏΠ΅ΠΉΡΡŒΠΊΠΈΡ… рСгуляторів. ΠŸΡ€ΠΎΠ°Π½Π°Π»Ρ–Π·ΠΎΠ²Π°Π½ΠΎ основні Π±Π°Π½ΠΊΡ–Π²ΡΡŒΠΊΡ– Π†Π‘ Ρ‚Π° Π΄ΠΎΡ†Ρ–Π»ΡŒΠ½Ρ–ΡΡ‚ΡŒ застосування Π΄ΠΎ Π½ΠΈΡ… Ρ€Ρ–Π·Π½ΠΈΡ… ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ розгортання Ρ…ΠΌΠ°Ρ€Π½ΠΈΡ… Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΠ³Ρ–ΠΉ.ΠžΡ‚Ρ€ΠΈΠΌΠ°Π½ΠΈΠΉ Ρ€Π΅Π·ΡƒΠ»ΡŒΡ‚Π°Ρ‚ Π² ΠΊΡ–Π»ΡŒΠΊΡ–ΡΠ½ΠΎΠΌΡƒ Π²ΠΈΡ€Π°ΠΆΠ΅Π½Π½Ρ– ΠΏΠΎΠΊΠ°Π·Π½ΠΈΠΊΡ–Π² навантаТСння Π½Π° систСму дозволяє Π·Π½Π°ΠΉΡ‚ΠΈ Π΄ΠΎΠ΄Π°Ρ‚ΠΊΠΎΠ²Ρ– Ρ€Π΅Π·Π΅Ρ€Π²ΠΈ для ΠΎΠΏΡ‚ΠΈΠΌΡ–Π·Π°Ρ†Ρ–Ρ— часу ΠΎΠ±Ρ€ΠΎΠ±ΠΊΠΈ Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–Ρ— Ρ– підвищСння Π΅ΠΊΠΎΠ½ΠΎΠΌΡ–Ρ‡Π½ΠΎΡ— СфСктивності Π·Π° Ρ€Π°Ρ…ΡƒΠ½ΠΎΠΊ застосування Public Cloud. ΠΠ°ΠΉΠ±Ρ–Π»ΡŒΡˆΠΎΠ³ΠΎ Π΅Ρ„Π΅ΠΊΡ‚Ρƒ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎ досягти, Π·Π°ΡΡ‚ΠΎΡΡƒΠ²Π°Π²ΡˆΠΈ Ρ†ΡŽ модСль Π΄ΠΎ Π°Π²Ρ‚ΠΎΠΌΠ°Ρ‚ΠΈΠ·ΠΎΠ²Π°Π½ΠΎΠ³ΠΎ ΠΎΠΏΠ΅Ρ€Π°Ρ†Ρ–ΠΉΠ½ΠΎΠ³ΠΎ дня Π±Π°Π½ΠΊΡƒ (Π²Ρ–Π΄ Π°Π½Π³Π». Core Banking System). Для дотримання Π²ΠΈΠΌΠΎΠ³ Ρ‚Π° урахування обмСТСнь Ρ‰ΠΎΠ΄ΠΎ розміщСння ΠΊΠ»Ρ–Ρ”Π½Ρ‚ΡΡŒΠΊΠΈΡ… Π΄Π°Π½ΠΈΡ… Π² Ρ€ΠΎΠ±ΠΎΡ‚Ρ– Π·Π°ΠΏΡ€ΠΎΠΏΠΎΠ½ΠΎΠ²Π°Π½ΠΈΠΉ ΠΌΠ΅Ρ…Π°Π½Ρ–Π·ΠΌ дСпСрсоналізації.Завдяки Ρ†ΡŒΠΎΠΌΡƒ Π·Π°Π±Π΅Π·ΠΏΠ΅Ρ‡ΡƒΡ”Ρ‚ΡŒΡΡ ΠΌΠΎΠΆΠ»ΠΈΠ²Ρ–ΡΡ‚ΡŒ отримання Π½Π°ΠΉΠ±Ρ–Π»ΡŒΡˆ ΠΎΠΏΡ‚ΠΈΠΌΠ°Π»ΡŒΠ½ΠΈΡ… Π·Π½Π°Ρ‡Π΅Π½ΡŒ ΠΏΠΎΠΊΠ°Π·Π½ΠΈΠΊΡ–Π². Π£ порівнянні Π· Π°Π½Π°Π»ΠΎΠ³Ρ–Ρ‡Π½ΠΈΠΌΠΈ Π²Ρ–Π΄ΠΎΠΌΠΈΠΌΠΈ сСрвісами, Ρ‚Π°ΠΊΠΈΠΌΠΈ як віртуалізація, Ρ†Π΅ Π·Π°Π±Π΅Π·ΠΏΠ΅Ρ‡ΡƒΡ” ΠΏΠ΅Ρ€Π΅Π²Π°Π³Ρƒ, Π°Π΄ΠΆΠ΅ Π½Π΅ΠΌΠ°Ρ” нСобхідності придбання Ρ‡ΠΈ ΠΎΡ€Π΅Π½Π΄ΠΈ обладнання, Π° ΠΎΠ±Ρ‡ΠΈΡΠ»ΡŽΠ²Π°Π½Π° ΠΏΠΎΡ‚ΡƒΠΆΠ½Ρ–ΡΡ‚ΡŒ ΠΌΠΎΠΆΠ΅ ΠΌΠ°ΡΡˆΡ‚Π°Π±ΡƒΠ²Π°Ρ‚ΠΈΡΡ Π² Π·Π½Π°Ρ‡Π½ΠΎ ΡˆΠΈΡ€ΡˆΠΎΠΌΡƒ Π΄Ρ–Π°ΠΏΠ°Π·ΠΎΠ½Ρ–

    EMPOWERING, a smart Big Data framework for sustainable electricity suppliers

    Get PDF
    This paper presents the EMPOWERING project, a Big Data environment aimed at helping domestic customers to save electricity by managing their consumption positively. This is achieved by improving the information received about energy bills and offering online tools. The main contributions of EMPOWERING are the creation of a novel workflow in the electricity utility sector regarding the implementation of data analytics for their customers and the fast implementation of data-mining techniques in massive datasets within a Big Data platform to achieve scalability. The results obtained show that EMPOWERING can be of use for customers of electrical suppliers by changing their energy habits to decrease consumption and so increase environmental sustainability

    Data Spaces

    Get PDF
    This open access book aims to educate data space designers to understand what is required to create a successful data space. It explores cutting-edge theory, technologies, methodologies, and best practices for data spaces for both industrial and personal data and provides the reader with a basis for understanding the design, deployment, and future directions of data spaces. The book captures the early lessons and experience in creating data spaces. It arranges these contributions into three parts covering design, deployment, and future directions respectively. The first part explores the design space of data spaces. The single chapters detail the organisational design for data spaces, data platforms, data governance federated learning, personal data sharing, data marketplaces, and hybrid artificial intelligence for data spaces. The second part describes the use of data spaces within real-world deployments. Its chapters are co-authored with industry experts and include case studies of data spaces in sectors including industry 4.0, food safety, FinTech, health care, and energy. The third and final part details future directions for data spaces, including challenges and opportunities for common European data spaces and privacy-preserving techniques for trustworthy data sharing. The book is of interest to two primary audiences: first, researchers interested in data management and data sharing, and second, practitioners and industry experts engaged in data-driven systems where the sharing and exchange of data within an ecosystem are critical

    A Study On API Security Pentesting

    Get PDF
    Application Programming Interfaces (APIs) are essential in the digital realm as the bridge enabling seamless communication and collaboration between diverse software applications. Their significance lies in simplifying the integration of different systems, allowing them to work together effortlessly and share data. APIs are used in various applications, for example, healthcare, banks, authentication, etc. Ensuring the security of APIs is critical to ensure data security, privacy, and more. Therefore, the security of APIs is not only urgent but mandatory for pentesting APIs at every stage of development and to catch vulnerabilities early. The primary purpose of this research is to provide guidelines to help apply existing tools for reconnaissance and authentication pentesting. To achieve this goal, we first introduce the basics of API and OWASP\u27s Top 10 API security vulnerabilities. Secondly, we propose deployable scripts developed for Ubuntu Debian Systems to install pentesting tools automatically. These scripts allow future students to participate in API security courses and conduct API security pentesting. API security pentesting, regarding reconnaissance and authentication, is discussed based on the configured system. For reconnaissance, passive and active approaches are introduced with different tools for authentication, including password-based authentication brute-forcing, one-time password (OTP) brute-forcing, and JSON web token brute force

    Data Spaces

    Get PDF
    This open access book aims to educate data space designers to understand what is required to create a successful data space. It explores cutting-edge theory, technologies, methodologies, and best practices for data spaces for both industrial and personal data and provides the reader with a basis for understanding the design, deployment, and future directions of data spaces. The book captures the early lessons and experience in creating data spaces. It arranges these contributions into three parts covering design, deployment, and future directions respectively. The first part explores the design space of data spaces. The single chapters detail the organisational design for data spaces, data platforms, data governance federated learning, personal data sharing, data marketplaces, and hybrid artificial intelligence for data spaces. The second part describes the use of data spaces within real-world deployments. Its chapters are co-authored with industry experts and include case studies of data spaces in sectors including industry 4.0, food safety, FinTech, health care, and energy. The third and final part details future directions for data spaces, including challenges and opportunities for common European data spaces and privacy-preserving techniques for trustworthy data sharing. The book is of interest to two primary audiences: first, researchers interested in data management and data sharing, and second, practitioners and industry experts engaged in data-driven systems where the sharing and exchange of data within an ecosystem are critical

    Towards Secure and Intelligent Diagnosis: Deep Learning and Blockchain Technology for Computer-Aided Diagnosis Systems

    Get PDF
    Cancer is the second leading cause of death across the world after cardiovascular disease. The survival rate of patients with cancerous tissue can significantly decrease due to late-stage diagnosis. Nowadays, advancements of whole slide imaging scanners have resulted in a dramatic increase of patient data in the domain of digital pathology. Large-scale histopathology images need to be analyzed promptly for early cancer detection which is critical for improving patient's survival rate and treatment planning. Advances of medical image processing and deep learning methods have facilitated the extraction and analysis of high-level features from histopathological data that could assist in life-critical diagnosis and reduce the considerable healthcare cost associated with cancer. In clinical trials, due to the complexity and large variance of collected image data, developing computer-aided diagnosis systems to support quantitative medical image analysis is an area of active research. The first goal of this research is to automate the classification and segmentation process of cancerous regions in histopathology images of different cancer tissues by developing models using deep learning-based architectures. In this research, a framework with different modules is proposed, including (1) data pre-processing, (2) data augmentation, (3) feature extraction, and (4) deep learning architectures. Four validation studies were designed to conduct this research. (1) differentiating benign and malignant lesions in breast cancer (2) differentiating between immature leukemic blasts and normal cells in leukemia cancer (3) differentiating benign and malignant regions in lung cancer, and (4) differentiating benign and malignant regions in colorectal cancer. Training machine learning models, disease diagnosis, and treatment often requires collecting patients' medical data. Privacy and trusted authenticity concerns make data owners reluctant to share their personal and medical data. Motivated by the advantages of Blockchain technology in healthcare data sharing frameworks, the focus of the second part of this research is to integrate Blockchain technology in computer-aided diagnosis systems to address the problems of managing access control, authentication, provenance, and confidentiality of sensitive medical data. To do so, a hierarchical identity and attribute-based access control mechanism using smart contract and Ethereum Blockchain is proposed to securely process healthcare data without revealing sensitive information to an unauthorized party leveraging the trustworthiness of transactions in a collaborative healthcare environment. The proposed access control mechanism provides a solution to the challenges associated with centralized access control systems and ensures data transparency and traceability for secure data sharing, and data ownership

    Cyber-Physical Threat Intelligence for Critical Infrastructures Security

    Get PDF
    Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies

    Selected Computing Research Papers Volume 5 June 2016

    Get PDF
    An Analysis of Current Computer Assisted Learning Techniques Aimed at Boosting Pass Rate Level and Interactivity of Students (Gilbert Bosilong) ........................................ 1 Evaluating the Ability of Anti-Malware to Overcome Code Obfuscation (Matthew Carson) .................................................................................................................................. 9 Evaluation of Current Research in Machine Learning Techniques Used in Anomaly-Based Network Intrusion Detection (Masego Chibaya) ..................................................... 15 A Critical Evaluation of Current Research on Techniques Aimed at Improving Search Efficiency over Encrypted Cloud Data (Kgosi Dickson) ........................................ 21 A Critical Analysis and Evaluation of Current Research on Credit Card Fraud Detection Methods (Lebogang Otto Gaboitaolelwe) .......................................................... 29 Evaluation of Research in Automatic Detection of Emotion from Facial Expressions (Olorato D. Gaonewe) ......................................................................................................... 35 A Critical Evaluation on Methods of Increasing the Detection Rate of Anti-Malware Software (Thomas Gordon) ................................................................................................ 43 An Evaluation of the Effectiveness of the Advanced Intrusion Detection Systems Utilizing Optimization on System Security Technologies (Carlos Lee) ............................ 49 An Evaluation of Current Research on Data Mining Techniques in Decision Support (Keamogetse Mojapelo) ...................................................................................................... 57 A Critical Investigation of the Cognitive Appeal and Impact of Video Games on Players (Kealeboga Charlie Mokgalo) ................................................................................ 65 Evaluation of Computing Research Aimed at Improving Virtualization Implementation in the Cloud (Keletso King Mooketsane) ................................................. 73 A Critical Evaluation of the Technology Used In Robotic Assisted Surgeries (Botshelo Keletso Mosekiemang) ....................................................................................... 79 An Evaluation of Current Bio-Metric Fingerprint Liveness Detection (George Phillipson) ........................................................................................................................... 85 A Critical Evaluation of Current Research into Malware Detection Using Neural-Network Classification (Tebogo Duduetsang Ramatebele) ................................................ 91 Evaluating Indirect Detection of Obfuscated Malware (Benjamin Stuart Roberts) ......... 101 Evaluation of Current Security Techniques for Online Banking Transactions (Annah Vickerman) ....................................................................................................................... 10
    • …
    corecore