The mathematical method for assessing the cybersecurity state of cloud services
Article Sidebar
Open full text
Issue Vol. 15 No. 4 (2025)
-
Control of the magnetic levitation using a PID controller with adaptation based on linear interpolation logic and genetic algorithm
Dominik Fila, Andrzej Neumann, Bartosz Olesik, Jakub Pawelec, Kamil Przybylak, Mateusz Ungier, Dawid Wajnert5-9
-
Development of a system for predicting failures of bagging machines
Nataliia Huliieva, Nataliia Lishchyna, Viktoriya Pasternak, Zemfira Huliieva10-13
-
Development and verification of a modular object-oriented fuzzy logic controller architecture for customizable and embedded applications
Rahim Mammadzada14-24
-
Mechanical fracture energy and structural-mechanical properties of meat snacks with beekeeping additives
Artem Antoniv, Igor Palamarchuk, Leonora Adamchuk, Marija Zheplinska25-31
-
Modelling of dynamic processes in a nonholonomic system in the form of Gibbs-Appell equations on the example of a ball mill
Volodymyr Shatokhin, Yaroslav Ivanchuk, Vitaly Liman, Sergii Komar, Oleksii Kozlovskyi32-38
-
Real-time Covid-19 diagnosis on embedded IoT platforms
Elmehdi Benmalek, Wajih Rhalem, Atman Jbari, Abdelilah Jilbab, Jamal Elmhamdi39-45
-
Hybrid models for handwriting-based diagnosis of Parkinson's disease
Asma Ouabd, Achraf Benba, Abdelilah Jilbab, Ahmed Hammouch46-50
-
Computer system for diagnostic and treatment of unilateral neglect syndrome
Krzysztof Strzecha, Agata Bukalska-Strzecha, Krzysztof Kurzdym, Dominik Sankowski51-55
-
Informatics and measurement in healthcare: deep learning for diabetic patient readmission prediction
Shiva Saffari, Mahdi Bahaghighat56-64
-
Optimization of non-invasive glucose monitoring accuracy using an optical sensor
Nurzhigit Smailov, Aliya Zilgarayeva, Sergii Pavlov, Balzhan Turusbekova, Akezhan Sabibolda65-70
-
Stochastic multi-objective minimax optimization of combined electromagnetic shield based on three-dimensional modeling of overhead power lines magnetic field
Borys Kuznetsov, Tatyana Nikitina, Alexander Kutsenko, Ihor Bovdui, Kostiantyn Czunikhin, Olena Voloshko, Roman Voliansky, Viktoriia Ivannikova71-75
-
Advanced energy management strategies for AC/DC microgrids
Zouhir Boumous, Samira Boumous, Tawfik Thelaidjia76-82
-
Experimental study of a multi-stage converter circuit
Kyrmyzy Taissariyeva, Kuanysh Muslimov, Yerlan Tashtay, Gulim Jobalayeva, Lyazzat Ilipbayeva, Ingkar Issakozhayeva, Akezhan Sabibolda83-86
-
Deep learning-based prediction of structural parameters in FDTD-simulated plasmonic nanostructures
Shahed Jahidul Haque, Arman Mohammad Nakib87-94
-
Development of an algorithm for calculating ion exchange processes using the Python ecosystem
Iryna Chub, Oleksii Proskurnia, Kateryna Demchenko, Oleksandr Miroshnyk, Taras Shchur, Serhii Halko95-99
-
Intelligent model for reliability control and safety in urban transport systems
Anastasiia Kashkanova, Alexander Rotshtein, Andrii Kashkanov, Denis Katelnikov100-107
-
Analysis of the interaction of components of a modular parcel storage system using UML diagrams
Lyudmila Samchuk, Yuliia Povstiana, Anastasia Hryshchuk108-116
-
Evaluating modified pairing insertion heuristics for efficient dial-a-ride problem solutions in healthcare logistics
Rodolfo Eleazar Pérez Loaiza, Aaron Guerrero-Campanur, Edmundo Bonilla Huerta117-123
-
Analysis of modern tools, methods of audit and monitoring of database security
Kateryna Mykhailyshyn, Oleh Harasymchuk, Oleh Deineka, Yurii Dreis, Volodymyr Shulha, Yuriy Pepa124-129
-
Improving underwater visuals by fusion of Deep-Retinex and GAN for enhanced image quality in subaquatic environments
Anuradha Chinta, Bharath Kumar Surla, Chaitanya Kodali130-136
-
The mathematical method for assessing the cybersecurity state of cloud services
Yevheniia Ivanchenko, Volodymyr Shulha, Ihor Ivanchenko, Yevhenii Pedchenko, Mari Petrovska137-141
-
Evaluation of the performance of LLMs deployments in selected cloud-based container services
Mateusz Stęgierski, Piotr Szpak, Sławomir Przyłucki142-150
-
Implementing traits in C# using Roslyn Source Generators
Mykhailo Pozur, Viktoria Voitko, Svitlana Bevz, Serhii Burbelo, Olena Kosaruk151-157
-
Impact of customizable orchestrator scheduling on machine learning efficiency in edge environments
Konrad Cłapa, Krzysztof Grudzień, Artur Sierszeń158-163
-
Reconfigured CoARX architecture for implementing ARX hashing in microcontrollers of IoT systems with limited resources
Serhii Zabolotnii, Inna Rozlomii, Andrii Yarmilko, Serhii Naumenko164-169
-
Integral assessment of the spring water quality with the use of fuzzy logic toolkit
Vyacheslav Repeta, Oleksandra Krykhovets, Yurii Kukura170-176
-
Selected issues concerning fibre-optic bending sensors
Les Hotra, Jacek Klimek, Ihor Helzhynskyy, Oksana Boyko, Svitlana Kovtun177-181
Archives
-
Vol. 15 No. 4
2025-12-20 27
-
Vol. 15 No. 3
2025-09-30 24
-
Vol. 15 No. 2
2025-06-27 24
-
Vol. 15 No. 1
2025-03-31 26
-
Vol. 14 No. 4
2024-12-21 25
-
Vol. 14 No. 3
2024-09-30 24
-
Vol. 14 No. 2
2024-06-30 24
-
Vol. 14 No. 1
2024-03-31 23
-
Vol. 13 No. 4
2023-12-20 24
-
Vol. 13 No. 3
2023-09-30 25
-
Vol. 13 No. 2
2023-06-30 14
-
Vol. 13 No. 1
2023-03-31 12
-
Vol. 12 No. 4
2022-12-30 16
-
Vol. 12 No. 3
2022-09-30 15
-
Vol. 12 No. 2
2022-06-30 16
-
Vol. 12 No. 1
2022-03-31 9
-
Vol. 11 No. 4
2021-12-20 15
-
Vol. 11 No. 3
2021-09-30 10
-
Vol. 11 No. 2
2021-06-30 11
-
Vol. 11 No. 1
2021-03-31 14
Main Article Content
DOI
Authors
Abstract
This study presents the developed mathematical method for assessing the cybersecurity state of cloud services of information infrastructure facilities. The developed assessment method consists of 11 assessment stages, which provide a comprehensive assessment of 5 types of cloud services. The developed approach to assessing the cybersecurity state of cloud services can become the basis for further research in the field of cybersecurity by expanding tools for analyzing risks in the cloud environment and will help increase confidence in the use of cloud services in the face of modern information challenges.
Keywords:
References
[1] Baker K.: What is Cyber Espionage? Crowdstrike, 2025 [https://www.crowdstrike.com/en-us/cybersecurity-101/threat-intelligence/cyber-espionage/].
[2] Cloud Security, Proofpoint, 2019 [https://www.proofpoint.com/us/threat-reference/cloud-security].
[3] GDPR. GDPR.EU. 2022 [https://gdpr.eu/].
[4] Health Information Privacy. U.S. Department of Health and Human Services, 2024 [https://www.hhs.gov/hipaa/index.html].
[5] ISO/IEC 27001:2022. ISO. 2022 [https://www.iso.org/standard/27001].
[6] Ivanchenko I., Pedchenko Y.: Secure web application model for cybersecurity assessment of cloud service providers. Scientific Notes of the State University of Information and Communication Technology 2, 2024, 116–134 [https://doi.org/10.31673/2518-7678.2024.025842].
[7] NIST SP 800–145. NIST: Computer Security Resource Center. 2011 [https://csrc.nist.gov/pubs/sp/800/145/final].
[8] PCI Data Security Standard (PCI DSS). PCI Security Standards Council, 2024 [https://www.pcisecuritystandards.org/standards/pci-dss/].
[9] Pedchenko Y. et al.: Mathematical model of security cloud services assessment, Problems of scientific, technical and legal support for cybersecurity in the modern world, 2024, 13–21 [https://doi.org/10.24917/9788668020861].
[10] Roger S.: IaaS vs. CaaS vs. PaaS vs. FaaS vs. SaaS –What’s the difference?, Medium 2021 [https://stample.com/link/stamples/5ff3d43b60b2acfb9eb5ceb6/iaas-vs-caas-vs-paas-vs-faas-vs-saas-whats-the-difference].
[11] SOC2. SOC: System and Organization Controls. 2024 [https://soc2.co.uk/].
[12] Top 15 Cloud Security Issues, Threats and Concerns, Check Point, 2024 [https://www.checkpoint.com/cyber-hub/cloud-security/what-is-cloud-security/top-cloud-security-issues-threats-and-concerns/].
Article Details
Abstract views: 1

