Видання НТУ "ХПІ"
Постійне посилання на розділhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/62886
Переглянути
2 результатів
Результати пошуку
Документ Adaptive resource allocation method for data processing and security in cloud environment(Національний технічний університет "Харківський політехнічний інститут", 2023) Petrovska, Inna; Kuchuk, HeorhiiSubject of research: methods of resource allocation of the cloud environment. The purpose of the research: to develop a method of resource allocation that will improve the security of the cloud environment. At the same time, effective data processing should be achieved. Method characteristics. The article discusses the method of adaptive resource allocation in cloud environments, focusing on its significance for data processing and enhanced security. A notable feature of the method is the consideration of external influences when calculating the characteristics of cloud resource requests and predicting resource requests based on a time series test. The main idea of this approach lies in the ability to intelligently distribute resources while considering real needs, which has the potential to optimize both productivity and confidentiality protection simultaneously. Integrating adaptive resource allocation methods not only improves data processing efficiency in cloud environments but also strengthens mechanisms against potential cyber threats. Research results. To ensure timely resource allocation, the NSGA-II algorithm has been enhanced. This allowed reducing the resolution time of multi-objective optimization tasks by 5%. Additionally, research results demonstrate that effective utilization of various types of resources on a physical machine reduces resource losses by 1.2 times compared to SPEA2 and NSGA-II methods.Документ Mechanisms for ensuring the security of channels of a prospective management system(Національний технічний університет "Харківський політехнічний інститут", 2022) Tomashevsky, Bogdan; Yevseiev, S. P.; Pohasii, Serhii; Milevskyi, StanislavThe development of military (state) control systems in modern conditions of hybrid warfare requires the possibility of rapid expansion of both functionality and scaling of the physical and logical basis of management, increasing the range of digitization and use of both military and civilian communication channels to manage troops and weapons. Not only the computing power of the enemy, the means of suppressing and / or blocking the communication channels of the control system, but also the development of quantum technologies that place new and more stringent requirements on security mechanisms based on symmetric and asymmetric cryptography algorithms. According to NIST, a full-scale quantum computer breaks both symmetric and asymmetric cryptosystems in polynomial time, significantly reducing their resilience. The paper proposes mechanisms of post-quantum cryptography, which allow to ensure the stability of not only communication channels, but also elements of the structure of the control system. The basis of post-quantum encryption algorithms is the combination of algorithms (schemes) of crypto-code structures with cryptosystems on unprofitable codes (multi-channel cryptography), as well as the possibility of combining them with digital steganography methods. This approach provides the ability to hide elements of management commands, and the use of different channels provides the ability to hide individual elements of cryptograms.