Методологія підтримки технологічних процесів у критичній інфраструктурі з забезпеченням безпеки інформації на основі хмарних технологій

Автор(и)

  • Тетяна Віталіївна СМІРНОВА Центральноукраїнський національний технічний університет https://orcid.org/0000-0001-6896-0612
  • Павло Сергійович УСІК Центральноукраїнський національний технічний університет https://orcid.org/0000-0002-3268-342X
  • Ірина Анатоліївна ЛИСЕНКО Центральноукраїнський національний технічний університет https://orcid.org/0000-0003-4394-4960
  • Костянтин Олегович БУРАВЧЕНКО Центральноукраїнський національний технічний університет https://orcid.org/0000-0001-6195-7533
  • Олексій Анатолійович СМІРНОВ Центральноукраїнський національний технічний університет https://orcid.org/0000-0001-9543-874X

DOI:

https://doi.org/10.18372/2225-5036.31.20638

Анотація

This article proposes a methodology for supporting technological processes in critical infrastructure based on cloud technologies. The critical infrastructure of the state requires new approaches to ensure reliability, adaptability and information security of technological processes. At the same time, cloud technologies open up new opportunities for scalable monitoring, analysis and management of critical infrastructure in conditions of hybrid threats. Thus, the proposed methodology is aimed at forming an integrated digital platform based on the use of cloud technologies for monitoring, analysis and automated management of technological processes in conditions of high risks. The purpose of the developed methodology is to ensure continuous, safe and stable operation of technological processes of critical infrastructure facilities of the state through the implementation of cloud technologies for monitoring, analysis and automated management in conditions of high risks. The main task of this methodology is to develop a comprehensive architecture for supporting technological processes of critical infrastructure based on cloud solutions, increasing the level of technological readiness of critical infrastructure facilities for functioning in an unstable environment by implementing adaptive, scalable and secure solutions. The methodology proposed in this work is focused on functioning in conditions of increased threats, both man-made and cyber, taking into account the requirements for information security, communication reliability, redundancy of critical components and flexibility of the system architecture. This approach contributes to increasing the level of technological readiness of critical infrastructure objects to operate in an unstable environment, reduces the likelihood of failures and ensures resistance to external influences.

Посилання

Saaty T.L. Decision Making with the Analytic Hierarchy Process. Int. J. Services Sciences, 2008.

Turban, E., Sharda, R., & Delen, D. (2011). Decision Support and Business Intelligence Systems (9th ed.). Pearson Education.

Bellman, R.E., Zadeh, L.A. Decision-Making in a Fuzzy Environment. Management Science, 1970.

Bazaraa M. S., Jarvis J. J., Sherali H. D. Linear Programming and Network Flows, Wiley, 2010.

Giarratano J., Riley G. Expert Systems: Principles and Programming. Cengage Learning, 2004.

Russell S., Norvig P. Artificial Intelligence: A Modern Approach, 3rd ed.

Hevner A.R., March S.T., Park J., Ram S. Design Science in Information Systems Research, MISQ, 2004.

Kaplan R. S., Norton D. P. The Balanced Scorecard – Measures then drive Performance // Harvard Business Review,- 1992

Інтелектуальна система керування мережею для вирішення проблеми автономного моніторингу 5G-технологій / Колектив авторів. Київ: ДУТ, 2021. 6 с. Режим доступу: https://con.dut.edu.ua/index.php/communication /article/download/2515/2418

Gnatyuk S., Yudin O., Sydorenko V., Smirnova T., Polozhentsev A., The Model for Calculating the Quantitative Criteria for Assessing the Security Level of Information and Telecommunication Systems, CEUR Workshop Proceedings, 2022, vol. 3156, pp. 390-399.

Gnatyuk S., Berdibayev R., Smirnova T., Avkurova Z., Iavich M. Cloud-Based Cyber Incidents Response System and Software Tools, Communications in Computer and Information Science, Vol. 1486, pp. 169-184, 2021.

Kuznetsov, O., Atzeni, G., Arnesano, M., Randieri, C., Smirnov, O. «Secure IoT-based smart wheelchair system: From implementation to security enhancement strategy». Security and Privacy of Cyber Physical Systems Emerging Trends Technologies and Applications, 2025, pp. 225–257.

Kuznetsov, O., Smirnov, O., Kuznetsova, T., Shaikhanova, A., Svatowsky, I. «Privacy-utility trade-offs in IoT networks: A comparative analysis of differential privacy mechanisms for sensor data aggregation». Security and Privacy of Cyber Physical Systems Emerging Trends Technologies and Applications, 2025, pp. 589–622

Kuznetsov, O., Smirnov, O., Akhmetov, B., Alimseitova, Z., Imoize, A.L. «Deep Learning Frontiers in Copy-Move Forgery Detection: Advances, Challenges, and Future Directions». Advancements in Cybersecurity Next Generation Systems and Applications, 2025. 202-229

Kuznetsov O., Frontoni E., Kuznetsova Y., Smirnov O., Moskovchenko I. «Trust-Based Security Architecture for Edge Computing: A Simulation Study of Dynamic Trust Evolution and Attack Detection». CEUR Workshop Proceedings, 2024, 3909, pp. 227–241.

Al-Mudhafar Aqeel, A.M., Smirnova, T., Buravchenko, K., Smirnov, O. «The method of assessing and improving the user experience of subscribers in software-configured networks based on the use of machine learning». Advanced Information Systems, 2023, 7(2), рр. 49-56

Smirnov, O., Sydorenko, V., Aleksander, M., Zhyharevych, O., Yenchev, S. «Simulation of the cloud IoT-based monitoring system for critical infrastructures». CEUR Workshop Proceedings, Volume 3530, 2023, pp. 256-265

##submission.downloads##

Опубліковано

2025-04-22

Номер

Розділ

Кібербезпека та захист критичної інформаційної інфраструктури