OPTIMIZING PARAMETERS OF UNIVERSITY CLOUD SYSTEMS TO ENSURE RELIABILITY AND SECURITY IN IDENTITY DECENTRALIZATION

Authors

DOI:

https://doi.org/10.28925/2663-4023.2024.24.376387

Keywords:

cloud computing; cloud services; microservice architecture; decentralized identity management.

Abstract

It is shown that microservice architecture (MSA) of cloud services (CS) of a private university cloud is an approach to software development (SW), according to which an application is built from small ones independent services that interact with each other through an APIs, with each service responsible for execution specific functionality and can be deployed and scaled separately, thereby enabling the creation of flexible and scalable applications that can quickly adapt to changing conditions and workloads for each task of using microservice architecture. A review and analysis of previous studies devoted to the use of MCA in cloud computing (CC) and CS was conducted, which showed that CMA is widely used in CC and CS due to its flexibility, scalability and high availability. It is shown that the decentralization of identity will make it possible to increase the security and privacy of user data, because each service in the MSA CS can have its own access and identity management system, which, on the one hand, leads to a number of advantages, such as scalability, flexibility and resistance to failures, but on the other hand, the decentralized nature of the MSA also creates problems with identity management. The model for simulating the system load factor during the MSA was further developed. The solution proposed in the work, unlike existing solutions, takes into account the limitations of decentralized identity management (i.e., DID). A software solution using the Python algorithmic language for the implementation of a mathematical model for the simulation of CS parameters is described. The model, among other things, takes into account the weights (importance) of applications entering the decentralized identity management system.

Downloads

Download data is not yet available.

References

Campeanu, G. (2018). A mapping study on microservice architectures of Internet of Things and cloud computing solutions. In 7th Mediterranean conference on embedded computing (MECO), 1–4.

Singh, V., & Peddoju, S. K. (2017). Container-based microservice architecture for cloud applications. In International Conference on Computing, Communication and Automation (ICCCA), 847–852.

Gopalakrishnan, A. (2009). Cloud computing identity management. SETLabs briefings, 7(7), 45–55.

Yang, Y., Chen, X., Chen, H., & Du, X. (2018). Improving privacy and security in decentralizing multi-authority attribute-based encryption in cloud computing. IEEE Access, 6, 18009–18021.

Safaryan, O., Pinevich, E., Roshchina, E., Cherckesova, L., & Kolennikova, N. (2020). Information system development for restricting access to software tool built on microservice architecture. E3S Web Conf., 224. https://doi.org/10.1051/e3sconf/202022401041

Indrasiri, K., Siriwardena, P., Indrasiri, K., & Siriwardena, P. (2018). Microservices security fundamentals. Microservices for the Enterprise: Designing, Developing, and Deploying, 313–345.

Mostafa, A. M., Rushdy, E., Medhat, R., & Hanafy, A. (2023). An identity management scheme for cloud computing: Review, challenges, and future directions. Journal of Intelligent & Fuzzy Systems, 1–23.

Gopalakrishnan, A. (2009). Cloud computing identity management. SETLabs briefings, 7(7), 45–55.

Chen, J., Wu, X., Zhang, S., Zhang, W., & Niu, Y. (2012). A decentralized approach for implementing identity management in cloud computing. In Second International Conference on Cloud and Green Computing, 770–776.

Saini, S., & Mann, D. (2014). Identity management issues in cloud computing. arXiv preprint arXiv:1406.1033.

Palson Kennedy, R., & Gopal, T. V. (2010). Assessing the risks and opportunities of cloud computing—defining identity management systems and maturity models. In Trendz in Information Sciences & Computing (TISC2010), 138–142.

Samir, E., Wu, H., Azab, M., Xin, C., & Zhang, Q. (2021). DT-SSIM: A decentralized trustworthy self-sovereign identity management framework. IEEE Internet of Things Journal, 9(11), 7972–7988.

Takaoğlu, M., Dursun, T., Doğan, A., Er, H., Bozkurt Günay, B., Emeç, C., & Özcandan, N. (2023). The Impact of Self-Sovereign Identities on CyberSecurity. IST-186-RSM, Specialist Meeting, Blockchain Technology for Coalition Operations.

Čučko, Š., & Turkanović, M. (2021). Decentralized and self-sovereign identity: Systematic mapping study. IEEE Access, 9, 139009–139027.

Xi, N., Liu, J., Li, Y., & Qin, B. (2023). Decentralized access control for secure microservices cooperation with blockchain. ISA transactions, 141, 44–51.

Ramezani, F., Lu, J., Taheri, J., & Zomaya, A. Y. (2017). A multi-objective load balancing system for cloud environments. The Computer Journal, 60(9), 1316–1337.

Al-Yarimi, F. A. M., Althahabi, S., & Eltayeb, M. M. (2022). Optimal Load Balancing in Cloud Environment of Virtual Machines. Comput. Syst. Sci. Eng., 41(3), 919–932.

Adhikari, J., & Patil, S. (2012). Load balancing the essential factor in cloud computing. International Journal of Engineering Research & Technology (IJERT), 1(10), 1–5.

Documentation, T. P. S., & logical, C. (2005). Information technology–Security techniques–Information security management systems–Requirements.

Downloads


Abstract views: 115

Published

2024-06-26

How to Cite

Lakhno, V., & Moskalenko, V. (2024). OPTIMIZING PARAMETERS OF UNIVERSITY CLOUD SYSTEMS TO ENSURE RELIABILITY AND SECURITY IN IDENTITY DECENTRALIZATION. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(24), 376–387. https://doi.org/10.28925/2663-4023.2024.24.376387

Most read articles by the same author(s)