108 research outputs found
ΠΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Π½Ρ ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ ΡΠΎΠ·Π³ΠΎΡΡΠ°Π½Π½Ρ Ρ ΠΌΠ°ΡΠ½ΠΈΡ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΡΠΉ Π΄Π»Ρ Π±Π°Π½ΠΊΡΠ²ΡΡΠΊΠΈΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ ΡΠΈΡΡΠ΅ΠΌ
The object of research is banking information technology (IT). One of the most problematic issues is the low efficiency of using hardware resources and, as a result, high costs and time spent on maintaining and developing banking information systems (IS). The use of cloud technologies, especially with the use of the public cloud deployment model, can greatly enhance the economic efficiency of banking IT. In addition, there is an increase in the availability, flexibility and scalability of banking IT, as well as the time to market, (TTM). In the course of the study, quantitative and qualitative indicators of the functioning of banking IS were used.An analysis of modern approaches to building a service-oriented architecture of banking IS based on cloud technologies was conducted in scope of the research. The article describes the architectural solution of information technologies for the introduction of automated banking IS taking into account the requirements of the National Bank of Ukraine and European regulators. The analysis of the main banking systems and the expediency of using different models of cloud technologies deployment are analyzed.The result obtained in quantitative parameters of the system load allows to find additional reserves for optimization of time processing of information and increase economic efficiency using the Public cloud. The greatest effect can be achieved by applying this model to the Core Banking System (CBS). In order to comply with the requirements and to take into account restrictions on the placement of client data, the article proposes a mechanism for depersonalization.This ensures the possibility of obtaining the most optimal values of indicators. Compared to similar well-known services, such as virtualization, it benefits because there is no need to purchase, or lease hardware, and the computing power can be scaled in a much wider range.ΠΠ±ΡΠ΅ΠΊΡΠΎΠΌ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΡ ΡΠ²Π»ΡΡΡΡΡ Π±Π°Π½ΠΊΠΎΠ²ΡΠΊΠΈΠ΅ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΡΠ΅ ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈ (Π΄Π°Π»Π΅Π΅ ΠΠ’). ΠΠ΄Π½ΠΈΠΌ ΠΈΠ· ΡΠ°ΠΌΡΡ
ΠΏΡΠΎΠ±Π»Π΅ΠΌΠ½ΡΡ
ΠΌΠ΅ΡΡ ΡΠ²Π»ΡΠ΅ΡΡΡ Π½ΠΈΠ·ΠΊΠ°Ρ ΡΡΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΡ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΡ Π°ΠΏΠΏΠ°ΡΠ°ΡΠ½ΡΡ
ΡΠ΅ΡΡΡΡΠΎΠ² ΠΈ ΠΊΠ°ΠΊ ΡΠ»Π΅Π΄ΡΡΠ²ΠΈΠ΅ Π²ΡΡΠΎΠΊΠΈΠ΅ Π·Π°ΡΡΠ°ΡΡ Π²ΡΠ΅ΠΌΠ΅Π½ΠΈ ΠΈ Π±ΡΠ΄ΠΆΠ΅ΡΠ° Π½Π° ΠΏΠΎΠ΄Π΄Π΅ΡΠΆΠΊΡ ΠΈ ΡΠ°Π·Π²ΠΈΡΠΈΠ΅ Π±Π°Π½ΠΊΠΎΠ²ΡΠΊΠΈΡ
ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΡΡ
ΡΠΈΡΡΠ΅ΠΌ (Π΄Π°Π»Π΅Π΅ ΠΠ‘). ΠΡΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ ΠΎΠ±Π»Π°ΡΠ½ΡΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΠΉ, ΠΎΡΠΎΠ±Π΅Π½Π½ΠΎ ΠΏΡΠΈ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΠΈ ΠΌΠΎΠ΄Π΅Π»ΠΈ ΡΠ°Π·Π²Π΅ΡΡΡΠ²Π°Π½ΠΈΡ Public Cloud, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΠ΅Ρ Π·Π½Π°ΡΠΈΡΠ΅Π»ΡΠ½ΠΎ ΠΏΠΎΠ²ΡΡΠΈΡΡ ΡΠΊΠΎΠ½ΠΎΠΌΠΈΡΠ΅ΡΠΊΡΡ ΡΡΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΡ Π±Π°Π½ΠΊΠΎΠ²ΡΠΊΠΈΡ
ΠΠ’. ΠΡΠΎΠΌΠ΅ ΡΡΠΎΠ³ΠΎ, ΠΏΠΎΠ²ΡΡΠ°Π΅ΡΡΡ ΠΎΡΠΊΠ°Π·ΠΎΡΡΡΠΎΠΉΡΠΈΠ²ΠΎΡΡΡ, Π³ΠΈΠ±ΠΊΠΎΡΡΡ ΠΈ ΠΌΠ°ΡΡΡΠ°Π±ΠΈΡΡΠ΅ΠΌΠΎΡΡΡ Π±Π°Π½ΠΊΠΎΠ²ΡΠΊΠΈΡ
ΠΠ’, Π° ΡΠ°ΠΊΠΆΠ΅ ΠΏΠΎΠΊΠ°Π·Π°ΡΠ΅Π»Ρ ΡΠΊΠΎΡΠΎΡΡΠΈ Π²ΡΠ²ΠΎΠ΄Π° ΠΏΡΠΎΠ΄ΡΠΊΡΠΎΠ² Π½Π° ΡΡΠ½ΠΎΠΊ (ΠΎΡ Π°Π½Π³Π». time to market). Π Ρ
ΠΎΠ΄Π΅ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΡ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π»ΠΈΡΡ ΠΊΠΎΠ»ΠΈΡΠ΅ΡΡΠ²Π΅Π½Π½ΡΠ΅ ΠΈ ΠΊΠ°ΡΠ΅ΡΡΠ²Π΅Π½Π½ΡΠ΅ ΠΏΠΎΠΊΠ°Π·Π°ΡΠ΅Π»ΠΈ ΡΡΠ½ΠΊΡΠΈΠΎΠ½ΠΈΡΠΎΠ²Π°Π½ΠΈΡ Π±Π°Π½ΠΊΠΎΠ²ΡΠΊΠΈΡ
ΠΠ‘.ΠΡΠΎΠ²Π΅Π΄Π΅Π½ Π°Π½Π°Π»ΠΈΠ· ΡΠΎΠ²ΡΠ΅ΠΌΠ΅Π½Π½ΡΡ
ΠΏΠΎΠ΄Ρ
ΠΎΠ΄ΠΎΠ² ΠΊ ΠΏΠΎΡΡΡΠΎΠ΅Π½ΠΈΡ ΡΠ΅ΡΠ²ΠΈΡΠ½ΠΎ-ΠΎΡΠΈΠ΅Π½ΡΠΈΡΠΎΠ²Π°Π½Π½ΠΎΠΉ Π°ΡΡ
ΠΈΡΠ΅ΠΊΡΡΡΡ Π±Π°Π½ΠΊΠΎΠ²ΡΠΊΠΈΡ
ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΡΡ
ΡΠΈΡΡΠ΅ΠΌ Π½Π° ΠΎΡΠ½ΠΎΠ²Π΅ ΠΎΠ±Π»Π°ΡΠ½ΡΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΠΉ. ΠΡΠΈΠ²Π΅Π΄Π΅Π½ΠΎ ΠΎΠΏΠΈΡΠ°Π½ΠΈΠ΅ Π°ΡΡ
ΠΈΡΠ΅ΠΊΡΡΡΠ½ΠΎΠ³ΠΎ ΡΠ΅ΡΠ΅Π½ΠΈΡ ΠΠ’ ΠΏΠΎ Π²Π½Π΅Π΄ΡΠ΅Π½ΠΈΡ Π°Π²ΡΠΎΠΌΠ°ΡΠΈΠ·ΠΈΡΠΎΠ²Π°Π½Π½ΡΡ
Π±Π°Π½ΠΊΠΎΠ²ΡΠΊΠΈΡ
ΠΠ‘ Ρ ΡΡΠ΅ΡΠΎΠΌ ΡΡΠ΅Π±ΠΎΠ²Π°Π½ΠΈΠΉ ΠΠ°ΡΠΈΠΎΠ½Π°Π»ΡΠ½ΠΎΠ³ΠΎ ΠΠ°Π½ΠΊΠ° Π£ΠΊΡΠ°ΠΈΠ½Ρ ΠΈ ΠΠ²ΡΠΎΠΏΠ΅ΠΉΡΠΊΠΈΡ
ΡΠ΅Π³ΡΠ»ΡΡΠΎΡΠΎΠ². ΠΡΠΎΠ°Π½Π°Π»ΠΈΠ·ΠΈΡΠΎΠ²Π°Π½Ρ ΠΎΡΠ½ΠΎΠ²Π½ΡΠ΅ Π±Π°Π½ΠΊΠΎΠ²ΡΠΊΠΈΠ΅ ΠΠ‘ ΠΈ ΡΠ΅Π»Π΅ΡΠΎΠΎΠ±ΡΠ°Π·Π½ΠΎΡΡΡ ΠΏΡΠΈΠΌΠ΅Π½Π΅Π½ΠΈΡ ΠΊ Π½ΠΈΠΌ ΡΠ°Π·Π»ΠΈΡΠ½ΡΡ
ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ ΡΠ°Π·Π²Π΅ΡΡΡΠ²Π°Π½ΠΈΡ ΠΎΠ±Π»Π°ΡΠ½ΡΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΠΉ.ΠΠΎΠ»ΡΡΠ΅Π½Π½ΡΠΉ ΡΠ΅Π·ΡΠ»ΡΡΠ°Ρ Π² ΠΊΠΎΠ»ΠΈΡΠ΅ΡΡΠ²Π΅Π½Π½ΠΎΠΌ Π²ΡΡΠ°ΠΆΠ΅Π½ΠΈΠΈ ΠΏΠΎΠΊΠ°Π·Π°ΡΠ΅Π»Π΅ΠΉ Π½Π°Π³ΡΡΠ·ΠΊΠΈ Π½Π° ΡΠΈΡΡΠ΅ΠΌΡ ΠΏΠΎΠ·Π²ΠΎΠ»ΡΠ΅Ρ Π½Π°ΠΉΡΠΈ Π΄ΠΎΠΏΠΎΠ»Π½ΠΈΡΠ΅Π»ΡΠ½ΡΠ΅ ΡΠ΅Π·Π΅ΡΠ²Ρ Π΄Π»Ρ ΠΎΠΏΡΠΈΠΌΠΈΠ·Π°ΡΠΈΠΈ Π²ΡΠ΅ΠΌΠ΅Π½ΠΈ ΠΎΠ±ΡΠ°Π±ΠΎΡΠΊΠΈ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ ΠΈ ΠΏΠΎΠ²ΡΡΠ΅Π½ΠΈΡ ΡΠΊΠΎΠ½ΠΎΠΌΠΈΡΠ΅ΡΠΊΠΎΠΉ ΡΡΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΠΈ Π·Π° ΡΡΠ΅Ρ ΠΏΡΠΈΠΌΠ΅Π½Π΅Π½ΠΈΡ Public Cloud. ΠΠ°ΠΈΠ±ΠΎΠ»ΡΡΠ΅Π³ΠΎ ΡΡΡΠ΅ΠΊΡΠ° ΠΌΠΎΠΆΠ½ΠΎ Π΄ΠΎΡΡΠΈΡΡ, ΠΏΡΠΈΠΌΠ΅Π½ΠΈΠ² ΡΡΡ ΠΌΠΎΠ΄Π΅Π»Ρ ΠΊ Π°Π²ΡΠΎΠΌΠ°ΡΠΈΠ·ΠΈΡΠΎΠ²Π°Π½Π½ΠΎΠΌΡ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΌΡ Π΄Π½Ρ Π±Π°Π½ΠΊΠ° (ΠΎΡ Π°Π½Π³Π». Core Banking System). ΠΠ»Ρ ΡΠΎΠ±Π»ΡΠ΄Π΅Π½ΠΈΡ ΡΡΠ΅Π±ΠΎΠ²Π°Π½ΠΈΠΉ ΠΈ ΡΡΠ΅ΡΠ° ΠΎΠ³ΡΠ°Π½ΠΈΡΠ΅Π½ΠΈΠΉ ΠΏΠΎ ΡΠ°Π·ΠΌΠ΅ΡΠ΅Π½ΠΈΡ ΠΊΠ»ΠΈΠ΅Π½ΡΡΠΊΠΈΡ
Π΄Π°Π½Π½ΡΡ
Π² ΡΠ°Π±ΠΎΡΠ΅ ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½ ΠΌΠ΅Ρ
Π°Π½ΠΈΠ·ΠΌ Π΄Π΅ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΠΈΠ·Π°ΡΠΈΠΈ.ΠΠ»Π°Π³ΠΎΠ΄Π°ΡΡ ΡΡΠΎΠΌΡ ΠΎΠ±Π΅ΡΠΏΠ΅ΡΠΈΠ²Π°Π΅ΡΡΡ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎΡΡΡ ΠΏΠΎΠ»ΡΡΠ΅Π½ΠΈΡ Π½Π°ΠΈΠ±ΠΎΠ»Π΅Π΅ ΠΎΠΏΡΠΈΠΌΠ°Π»ΡΠ½ΡΡ
Π·Π½Π°ΡΠ΅Π½ΠΈΠΉ ΠΏΠΎΠΊΠ°Π·Π°ΡΠ΅Π»Π΅ΠΉ. ΠΠΎ ΡΡΠ°Π²Π½Π΅Π½ΠΈΡ Ρ Π°Π½Π°Π»ΠΎΠ³ΠΈΡΠ½ΡΠΌΠΈ ΠΈΠ·Π²Π΅ΡΡΠ½ΡΠΌΠΈ ΡΠ΅ΡΠ²ΠΈΡΠ°ΠΌΠΈ, ΡΠ°ΠΊΠΈΠΌΠΈ ΠΊΠ°ΠΊ Π²ΠΈΡΡΡΠ°Π»ΠΈΠ·Π°ΡΠΈΡ, ΡΡΠΎ ΠΎΠ±Π΅ΡΠΏΠ΅ΡΠΈΠ²Π°Π΅Ρ ΠΏΡΠ΅ΠΈΠΌΡΡΠ΅ΡΡΠ²ΠΎ, Π²Π΅Π΄Ρ Π½Π΅Ρ Π½Π΅ΠΎΠ±Ρ
ΠΎΠ΄ΠΈΠΌΠΎΡΡΠΈ ΠΏΡΠΈΠΎΠ±ΡΠ΅ΡΠ΅Π½ΠΈΡ ΠΈΠ»ΠΈ Π°ΡΠ΅Π½Π΄Ρ ΠΎΠ±ΠΎΡΡΠ΄ΠΎΠ²Π°Π½ΠΈΡ, Π° Π²ΡΡΠΈΡΠ»ΠΈΡΠ΅Π»ΡΠ½Π°Ρ ΠΌΠΎΡΠ½ΠΎΡΡΡ ΠΌΠΎΠΆΠ΅Ρ ΠΌΠ°ΡΡΡΠ°Π±ΠΈΡΠΎΠ²Π°ΡΡΡΡ Π² Π·Π½Π°ΡΠΈΡΠ΅Π»ΡΠ½ΠΎ Π±ΠΎΠ»Π΅Π΅ ΡΠΈΡΠΎΠΊΠΎΠΌ Π΄ΠΈΠ°ΠΏΠ°Π·ΠΎΠ½Π΅.ΠΠ±'ΡΠΊΡΠΎΠΌ Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Π½Ρ Ρ Π±Π°Π½ΠΊΡΠ²ΡΡΠΊΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½Ρ ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΡΡ (Π½Π°Π΄Π°Π»Ρ ΠΠ’). ΠΠ΄Π½ΠΈΠΌ Π· Π½Π°ΠΉΠ±ΡΠ»ΡΡ ΠΏΡΠΎΠ±Π»Π΅ΠΌΠ½ΠΈΡ
ΠΌΡΡΡΡ Ρ Π½ΠΈΠ·ΡΠΊΠ° Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΡΡΡΡ Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°Π½Π½Ρ Π°ΠΏΠ°ΡΠ°ΡΠ½ΠΈΡ
ΡΠ΅ΡΡΡΡΡΠ² ΡΠ° ΡΠΊ Π½Π°ΡΠ»ΡΠ΄ΠΎΠΊ Π²ΠΈΡΠΎΠΊΡ Π²ΠΈΡΡΠ°ΡΠΈ ΡΠ°ΡΡ ΡΠ° Π±ΡΠ΄ΠΆΠ΅ΡΡ Π½Π° ΠΏΡΠ΄ΡΡΠΈΠΌΠΊΡ ΡΠ° ΡΠΎΠ·Π²ΠΈΡΠΎΠΊ Π±Π°Π½ΠΊΡΠ²ΡΡΠΊΠΈΡ
ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΈΡ
ΡΠΈΡΡΠ΅ΠΌ (Π½Π°Π΄Π°Π»Ρ ΠΠ‘). ΠΠ°ΡΡΠΎΡΡΠ²Π°Π½Π½Ρ Ρ
ΠΌΠ°ΡΠ½ΠΈΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΡΠΉ, ΠΎΡΠΎΠ±Π»ΠΈΠ²ΠΎ Π·Π° ΡΠΌΠΎΠ²ΠΈ Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°Π½Π½Ρ ΠΌΠΎΠ΄Π΅Π»Ρ ΡΠΎΠ·Π³ΠΎΡΡΠ°Π½Π½Ρ Public Cloud, Π΄ΠΎΠ·Π²ΠΎΠ»ΡΡ Π·Π½Π°ΡΠ½ΠΎ ΠΏΡΠ΄Π²ΠΈΡΠΈΡΠΈ Π΅ΠΊΠΎΠ½ΠΎΠΌΡΡΠ½Ρ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΡΡΡΡ Π±Π°Π½ΠΊΡΠ²ΡΡΠΊΠΈΡ
ΠΠ’. ΠΡΡΠΌ ΡΡΠΎΠ³ΠΎ, ΠΏΡΠ΄Π²ΠΈΡΡΡΡΡΡΡ Π²ΡΠ΄ΠΌΠΎΠ²ΠΎΡΡΡΠΉΠΊΡΡΡΡ, Π³Π½ΡΡΠΊΡΡΡΡ ΡΠ° ΠΌΠ°ΡΡΡΠ°Π±ΠΎΠ²Π°Π½ΡΡΡΡ Π±Π°Π½ΠΊΡΠ²ΡΡΠΊΠΈΡ
ΠΠ’, Π° ΡΠ°ΠΊΠΎΠΆ ΠΏΠΎΠΊΠ°Π·Π½ΠΈΠΊ ΡΠ²ΠΈΠ΄ΠΊΠΎΡΡΡ Π²ΠΈΠ²ΠΎΠ΄Ρ ΠΏΡΠΎΠ΄ΡΠΊΡΡΠ² Π½Π° ΡΠΈΠ½ΠΎΠΊ (Π²ΡΠ΄ Π°Π½Π³Π». time to market). Π Ρ
ΠΎΠ΄Ρ Π΄ΠΎΡΠ»ΡΠ΄ΠΆΠ΅Π½Π½Ρ Π²ΠΈΠΊΠΎΡΠΈΡΡΠΎΠ²ΡΠ²Π°Π»ΠΈΡΡ ΠΊΡΠ»ΡΠΊΡΡΠ½Ρ ΡΠ° ΡΠΊΡΡΠ½Ρ ΠΏΠΎΠΊΠ°Π·Π½ΠΈΠΊΠΈ ΡΡΠ½ΠΊΡΡΠΎΠ½ΡΠ²Π°Π½Π½Ρ Π±Π°Π½ΠΊΡΠ²ΡΡΠΊΠΈΡ
ΠΠ‘.ΠΡΠΎΠ²Π΅Π΄Π΅Π½ΠΎ Π°Π½Π°Π»ΡΠ· ΡΡΡΠ°ΡΠ½ΠΈΡ
ΠΏΡΠ΄Ρ
ΠΎΠ΄ΡΠ² Π΄ΠΎ ΠΏΠΎΠ±ΡΠ΄ΠΎΠ²ΠΈ ΡΠ΅ΡΠ²ΡΡΠ½ΠΎ-ΠΎΡΡΡΠ½ΡΠΎΠ²Π°Π½ΠΎΡ Π°ΡΡ
ΡΡΠ΅ΠΊΡΡΡΠΈ Π±Π°Π½ΠΊΡΠ²ΡΡΠΊΠΈΡ
ΠΠ‘ Π½Π° ΠΎΡΠ½ΠΎΠ²Ρ Ρ
ΠΌΠ°ΡΠ½ΠΈΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΡΠΉ. ΠΡΠΈΠ²Π΅Π΄Π΅Π½ΠΎ ΠΎΠΏΠΈΡ Π°ΡΡ
ΡΡΠ΅ΠΊΡΡΡΠ½ΠΎΠ³ΠΎ ΡΡΡΠ΅Π½Π½Ρ ΠΠ’ Π· Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ Π°Π²ΡΠΎΠΌΠ°ΡΠΈΠ·ΠΎΠ²Π°Π½ΠΈΡ
Π±Π°Π½ΠΊΡΠ²ΡΡΠΊΠΈΡ
ΠΠ‘ Π· ΡΡΠ°Ρ
ΡΠ²Π°Π½Π½ΡΠΌ Π²ΠΈΠΌΠΎΠ³ ΠΠ°ΡΡΠΎΠ½Π°Π»ΡΠ½ΠΎΠ³ΠΎ ΠΠ°Π½ΠΊΡ Π£ΠΊΡΠ°ΡΠ½ΠΈ ΡΠ° ΠΠ²ΡΠΎΠΏΠ΅ΠΉΡΡΠΊΠΈΡ
ΡΠ΅Π³ΡΠ»ΡΡΠΎΡΡΠ². ΠΡΠΎΠ°Π½Π°Π»ΡΠ·ΠΎΠ²Π°Π½ΠΎ ΠΎΡΠ½ΠΎΠ²Π½Ρ Π±Π°Π½ΠΊΡΠ²ΡΡΠΊΡ ΠΠ‘ ΡΠ° Π΄ΠΎΡΡΠ»ΡΠ½ΡΡΡΡ Π·Π°ΡΡΠΎΡΡΠ²Π°Π½Π½Ρ Π΄ΠΎ Π½ΠΈΡ
ΡΡΠ·Π½ΠΈΡ
ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ ΡΠΎΠ·Π³ΠΎΡΡΠ°Π½Π½Ρ Ρ
ΠΌΠ°ΡΠ½ΠΈΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΡΠΉ.ΠΡΡΠΈΠΌΠ°Π½ΠΈΠΉ ΡΠ΅Π·ΡΠ»ΡΡΠ°Ρ Π² ΠΊΡΠ»ΡΠΊΡΡΠ½ΠΎΠΌΡ Π²ΠΈΡΠ°ΠΆΠ΅Π½Π½Ρ ΠΏΠΎΠΊΠ°Π·Π½ΠΈΠΊΡΠ² Π½Π°Π²Π°Π½ΡΠ°ΠΆΠ΅Π½Π½Ρ Π½Π° ΡΠΈΡΡΠ΅ΠΌΡ Π΄ΠΎΠ·Π²ΠΎΠ»ΡΡ Π·Π½Π°ΠΉΡΠΈ Π΄ΠΎΠ΄Π°ΡΠΊΠΎΠ²Ρ ΡΠ΅Π·Π΅ΡΠ²ΠΈ Π΄Π»Ρ ΠΎΠΏΡΠΈΠΌΡΠ·Π°ΡΡΡ ΡΠ°ΡΡ ΠΎΠ±ΡΠΎΠ±ΠΊΠΈ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΡ Ρ ΠΏΡΠ΄Π²ΠΈΡΠ΅Π½Π½Ρ Π΅ΠΊΠΎΠ½ΠΎΠΌΡΡΠ½ΠΎΡ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΡ Π·Π° ΡΠ°Ρ
ΡΠ½ΠΎΠΊ Π·Π°ΡΡΠΎΡΡΠ²Π°Π½Π½Ρ Public Cloud. ΠΠ°ΠΉΠ±ΡΠ»ΡΡΠΎΠ³ΠΎ Π΅ΡΠ΅ΠΊΡΡ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎ Π΄ΠΎΡΡΠ³ΡΠΈ, Π·Π°ΡΡΠΎΡΡΠ²Π°Π²ΡΠΈ ΡΡ ΠΌΠΎΠ΄Π΅Π»Ρ Π΄ΠΎ Π°Π²ΡΠΎΠΌΠ°ΡΠΈΠ·ΠΎΠ²Π°Π½ΠΎΠ³ΠΎ ΠΎΠΏΠ΅ΡΠ°ΡΡΠΉΠ½ΠΎΠ³ΠΎ Π΄Π½Ρ Π±Π°Π½ΠΊΡ (Π²ΡΠ΄ Π°Π½Π³Π». Core Banking System). ΠΠ»Ρ Π΄ΠΎΡΡΠΈΠΌΠ°Π½Π½Ρ Π²ΠΈΠΌΠΎΠ³ ΡΠ° ΡΡΠ°Ρ
ΡΠ²Π°Π½Π½Ρ ΠΎΠ±ΠΌΠ΅ΠΆΠ΅Π½Ρ ΡΠΎΠ΄ΠΎ ΡΠΎΠ·ΠΌΡΡΠ΅Π½Π½Ρ ΠΊΠ»ΡΡΠ½ΡΡΡΠΊΠΈΡ
Π΄Π°Π½ΠΈΡ
Π² ΡΠΎΠ±ΠΎΡΡ Π·Π°ΠΏΡΠΎΠΏΠΎΠ½ΠΎΠ²Π°Π½ΠΈΠΉ ΠΌΠ΅Ρ
Π°Π½ΡΠ·ΠΌ Π΄Π΅ΠΏΠ΅ΡΡΠΎΠ½Π°Π»ΡΠ·Π°ΡΡΡ.ΠΠ°Π²Π΄ΡΠΊΠΈ ΡΡΠΎΠΌΡ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΡΡΡΡΡΡ ΠΌΠΎΠΆΠ»ΠΈΠ²ΡΡΡΡ ΠΎΡΡΠΈΠΌΠ°Π½Π½Ρ Π½Π°ΠΉΠ±ΡΠ»ΡΡ ΠΎΠΏΡΠΈΠΌΠ°Π»ΡΠ½ΠΈΡ
Π·Π½Π°ΡΠ΅Π½Ρ ΠΏΠΎΠΊΠ°Π·Π½ΠΈΠΊΡΠ². Π£ ΠΏΠΎΡΡΠ²Π½ΡΠ½Π½Ρ Π· Π°Π½Π°Π»ΠΎΠ³ΡΡΠ½ΠΈΠΌΠΈ Π²ΡΠ΄ΠΎΠΌΠΈΠΌΠΈ ΡΠ΅ΡΠ²ΡΡΠ°ΠΌΠΈ, ΡΠ°ΠΊΠΈΠΌΠΈ ΡΠΊ Π²ΡΡΡΡΠ°Π»ΡΠ·Π°ΡΡΡ, ΡΠ΅ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΡΡ ΠΏΠ΅ΡΠ΅Π²Π°Π³Ρ, Π°Π΄ΠΆΠ΅ Π½Π΅ΠΌΠ°Ρ Π½Π΅ΠΎΠ±Ρ
ΡΠ΄Π½ΠΎΡΡΡ ΠΏΡΠΈΠ΄Π±Π°Π½Π½Ρ ΡΠΈ ΠΎΡΠ΅Π½Π΄ΠΈ ΠΎΠ±Π»Π°Π΄Π½Π°Π½Π½Ρ, Π° ΠΎΠ±ΡΠΈΡΠ»ΡΠ²Π°Π½Π° ΠΏΠΎΡΡΠΆΠ½ΡΡΡΡ ΠΌΠΎΠΆΠ΅ ΠΌΠ°ΡΡΡΠ°Π±ΡΠ²Π°ΡΠΈΡΡ Π² Π·Π½Π°ΡΠ½ΠΎ ΡΠΈΡΡΠΎΠΌΡ Π΄ΡΠ°ΠΏΠ°Π·ΠΎΠ½Ρ
EMPOWERING, a smart Big Data framework for sustainable electricity suppliers
This paper presents the EMPOWERING project, a Big Data environment aimed at helping domestic customers to save electricity by managing their consumption positively. This is achieved by improving the information received about energy bills and offering online tools. The main contributions of EMPOWERING are the creation of a novel workflow in the electricity utility sector regarding the implementation of data analytics for their customers and the fast implementation of data-mining techniques in massive datasets within a Big Data platform to achieve scalability. The results obtained show that EMPOWERING can be of use for customers of electrical suppliers by changing their energy habits to decrease consumption and so increase environmental sustainability
Data Spaces
This open access book aims to educate data space designers to understand what is required to create a successful data space. It explores cutting-edge theory, technologies, methodologies, and best practices for data spaces for both industrial and personal data and provides the reader with a basis for understanding the design, deployment, and future directions of data spaces. The book captures the early lessons and experience in creating data spaces. It arranges these contributions into three parts covering design, deployment, and future directions respectively. The first part explores the design space of data spaces. The single chapters detail the organisational design for data spaces, data platforms, data governance federated learning, personal data sharing, data marketplaces, and hybrid artificial intelligence for data spaces. The second part describes the use of data spaces within real-world deployments. Its chapters are co-authored with industry experts and include case studies of data spaces in sectors including industry 4.0, food safety, FinTech, health care, and energy. The third and final part details future directions for data spaces, including challenges and opportunities for common European data spaces and privacy-preserving techniques for trustworthy data sharing. The book is of interest to two primary audiences: first, researchers interested in data management and data sharing, and second, practitioners and industry experts engaged in data-driven systems where the sharing and exchange of data within an ecosystem are critical
A Study On API Security Pentesting
Application Programming Interfaces (APIs) are essential in the digital realm as the bridge enabling seamless communication and collaboration between diverse software applications. Their significance lies in simplifying the integration of different systems, allowing them to work together effortlessly and share data. APIs are used in various applications, for example, healthcare, banks, authentication, etc. Ensuring the security of APIs is critical to ensure data security, privacy, and more. Therefore, the security of APIs is not only urgent but mandatory for pentesting APIs at every stage of development and to catch vulnerabilities early. The primary purpose of this research is to provide guidelines to help apply existing tools for reconnaissance and authentication pentesting. To achieve this goal, we first introduce the basics of API and OWASP\u27s Top 10 API security vulnerabilities. Secondly, we propose deployable scripts developed for Ubuntu Debian Systems to install pentesting tools automatically. These scripts allow future students to participate in API security courses and conduct API security pentesting. API security pentesting, regarding reconnaissance and authentication, is discussed based on the configured system. For reconnaissance, passive and active approaches are introduced with different tools for authentication, including password-based authentication brute-forcing, one-time password (OTP) brute-forcing, and JSON web token brute force
Data Spaces
This open access book aims to educate data space designers to understand what is required to create a successful data space. It explores cutting-edge theory, technologies, methodologies, and best practices for data spaces for both industrial and personal data and provides the reader with a basis for understanding the design, deployment, and future directions of data spaces. The book captures the early lessons and experience in creating data spaces. It arranges these contributions into three parts covering design, deployment, and future directions respectively. The first part explores the design space of data spaces. The single chapters detail the organisational design for data spaces, data platforms, data governance federated learning, personal data sharing, data marketplaces, and hybrid artificial intelligence for data spaces. The second part describes the use of data spaces within real-world deployments. Its chapters are co-authored with industry experts and include case studies of data spaces in sectors including industry 4.0, food safety, FinTech, health care, and energy. The third and final part details future directions for data spaces, including challenges and opportunities for common European data spaces and privacy-preserving techniques for trustworthy data sharing. The book is of interest to two primary audiences: first, researchers interested in data management and data sharing, and second, practitioners and industry experts engaged in data-driven systems where the sharing and exchange of data within an ecosystem are critical
Towards Secure and Intelligent Diagnosis: Deep Learning and Blockchain Technology for Computer-Aided Diagnosis Systems
Cancer is the second leading cause of death across the world after cardiovascular disease. The survival rate of patients with cancerous tissue can significantly decrease due to late-stage diagnosis. Nowadays, advancements of whole slide imaging scanners have resulted in a dramatic increase of patient data in the domain of digital pathology. Large-scale histopathology images need to be analyzed promptly for early cancer detection which is critical for improving patient's survival rate and treatment planning. Advances of medical image processing and deep learning methods have facilitated the extraction and analysis of high-level features from histopathological data that could assist in life-critical diagnosis and reduce the considerable healthcare cost associated with cancer. In clinical trials, due to the complexity and large variance of collected image data, developing computer-aided diagnosis systems to support quantitative medical image analysis is an area of active research. The first goal of this research is to automate the classification and segmentation process of cancerous regions in histopathology images of different cancer tissues by developing models using deep learning-based architectures. In this research, a framework with different modules is proposed, including (1) data pre-processing, (2) data augmentation, (3) feature extraction, and (4) deep learning architectures. Four validation studies were designed to conduct this research. (1) differentiating benign and malignant lesions in breast cancer (2) differentiating between immature leukemic blasts and normal cells in leukemia cancer (3) differentiating benign and malignant regions in lung cancer, and (4) differentiating benign and malignant regions in colorectal cancer.
Training machine learning models, disease diagnosis, and treatment often requires collecting patients' medical data. Privacy and trusted authenticity concerns make data owners reluctant to share their personal and medical data. Motivated by the advantages of Blockchain technology in healthcare data sharing frameworks, the focus of the second part of this research is to integrate Blockchain technology in computer-aided diagnosis systems to address the problems of managing access control, authentication, provenance, and confidentiality of sensitive medical data. To do so, a hierarchical identity and attribute-based access control mechanism using smart contract and Ethereum Blockchain is proposed to securely process healthcare data without revealing sensitive information to an unauthorized party leveraging the trustworthiness of transactions in a collaborative healthcare environment. The proposed access control mechanism provides a solution to the challenges associated with centralized access control systems and ensures data transparency and traceability for secure data sharing, and data ownership
Cyber-Physical Threat Intelligence for Critical Infrastructures Security
Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies
Selected Computing Research Papers Volume 5 June 2016
An Analysis of Current Computer Assisted Learning Techniques Aimed at Boosting Pass Rate Level and Interactivity of Students (Gilbert Bosilong) ........................................ 1
Evaluating the Ability of Anti-Malware to Overcome Code Obfuscation (Matthew Carson) .................................................................................................................................. 9
Evaluation of Current Research in Machine Learning Techniques Used in Anomaly-Based Network Intrusion Detection (Masego Chibaya) ..................................................... 15
A Critical Evaluation of Current Research on Techniques Aimed at Improving Search Efficiency over Encrypted Cloud Data (Kgosi Dickson) ........................................ 21
A Critical Analysis and Evaluation of Current Research on Credit Card Fraud Detection Methods (Lebogang Otto Gaboitaolelwe) .......................................................... 29
Evaluation of Research in Automatic Detection of Emotion from Facial Expressions (Olorato D. Gaonewe) ......................................................................................................... 35
A Critical Evaluation on Methods of Increasing the Detection Rate of Anti-Malware Software (Thomas Gordon) ................................................................................................ 43
An Evaluation of the Effectiveness of the Advanced Intrusion Detection Systems Utilizing Optimization on System Security Technologies (Carlos Lee) ............................ 49
An Evaluation of Current Research on Data Mining Techniques in Decision Support (Keamogetse Mojapelo) ...................................................................................................... 57
A Critical Investigation of the Cognitive Appeal and Impact of Video Games on Players (Kealeboga Charlie Mokgalo) ................................................................................ 65
Evaluation of Computing Research Aimed at Improving Virtualization
Implementation in the Cloud (Keletso King Mooketsane) ................................................. 73
A Critical Evaluation of the Technology Used In Robotic Assisted Surgeries (Botshelo Keletso Mosekiemang) ....................................................................................... 79
An Evaluation of Current Bio-Metric Fingerprint Liveness Detection (George Phillipson) ........................................................................................................................... 85
A Critical Evaluation of Current Research into Malware Detection Using Neural-Network Classification (Tebogo Duduetsang Ramatebele) ................................................ 91
Evaluating Indirect Detection of Obfuscated Malware (Benjamin Stuart Roberts) ......... 101
Evaluation of Current Security Techniques for Online Banking Transactions (Annah Vickerman) ....................................................................................................................... 10
- β¦