Preview

Herald of Dagestan State Technical University. Technical Sciences

Advanced search

Development of information security model with application of production model

https://doi.org/10.21822/2073-6185-2021-48-3-68-72

Abstract

Objective. The purpose of the study is to find methods for solving the problem of ensuring a reliable level of security for cloud services. Production models can be considered the most common models that provide simplicity of knowledge representation and inference organization.

Method. The research is based on the application of methods of fuzzy logic and mathematical modeling.

Result. It is proposed to use fuzzy models that provide a flexible strategy for processing heterogeneous dynamic interacting processes that represent data and knowledge in an essentially fuzzy state space of objects of analysis.

Conclusion. A production model of information security management is proposed, which is used to create data processing and storage centers. The production system includes a rule base, a global database, and a rule interpreter. The effective use of large information resources operating in an uncertain environment on the basis of a production model makes it possible to model and ensure information security of systems.

About the Author

Sh. M. Jafarova
Sumgait State University
Azerbaijan

Shalala M. Jafarova, Senior Lecturer, Dr. (Eng.) Philosophy, Department of Information Technology and Programming

43 quarter, Sumgait AZ5008



References

1. Alguliyev R.M., Alekperov R.K. Cloud Computing: Modern State, Problems and Prospects // Telecommunications and Radio Engineering, 2013, vol. 72, no. 3, pp. 255-266.

2. Aliyev A.A., Samadov R.B. Developing an algorithm and a scheme for integration of multiple merchants to e- commerce solution in cloud computing/ International Journal of Computer Science and Information Security, USA. 2016; 14(11):7-11.

3. B. Furht, A. Escalante (eds.), Handbook of Cloud Computing, Springer.

4. Mell P., Grance T. The NIST definition of cloud computing, 2010, www.nist.gov/itl/ cloud / upload / cloud-def- v15.pdf

5. Klementyev I.P., Ustinov V.A. Introduction to Cloud Computing. Yekaterinburg: USU, 2009; 233. (In Russ)

6. Baranova E.K. Information security and information protection: Textbook / E.K. Baranova, A.V. Babash. - M .: Rior, 2017 . 400 p. (In Russ)

7. Karetnikov A.B. Cloud computing security. Problems and Prospects / A.B. Karetnikov, D.P. Zegzhda. Journal "Problems of information security. Computer systems". SPb .: Publishing house of Polytechnic University, 2011; 4:7-17. (In Russ)

8. Bodyansky E.V., Kucherenko E.I., Mikhalev A.I. Neuro-fuzzy Petri nets in the problems of modeling complex systems. Monograph (scientific edition). Dnepropetrovsk: System technology, 2005; 311.

9. Jafarova S.H. Development of cloud service safety modeling software / 2nd International Scientific and Practical Internet Conference, “Integration of Education, Science and Business in Modern Environment: Winter Debates” February 4-5, 2021. (Dnipro, Ukraine, 2021;1: 502 p.) 2021; 42-44.

10. Mustafaev V.A. Analysis of fuzzy production models of dynamic interacting processes. // Bulletin of computer and information technologies, Moscow, 2012; 5:25-30. (In Russ)


Review

For citations:


Jafarova Sh.M. Development of information security model with application of production model. Herald of Dagestan State Technical University. Technical Sciences. 2021;48(3):68-72. (In Russ.) https://doi.org/10.21822/2073-6185-2021-48-3-68-72

Views: 631


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2073-6185 (Print)
ISSN 2542-095X (Online)