Concept and model for cloud infrastructure protection by using containers

dc.citation.conferenceLitteris et Artibus
dc.contributor.affiliationLviv Polytechnic National Universityuk_UA
dc.contributor.authorStefinko, Yaroslav
dc.contributor.authorPiskozub, Andrian
dc.contributor.authorBanakh, Roman
dc.coverage.countryUAuk_UA
dc.coverage.placenameLvivuk_UA
dc.date.accessioned2018-04-11T12:54:49Z
dc.date.available2018-04-11T12:54:49Z
dc.date.issued2016
dc.description.abstractAccording to current best practices in using containers we suggest an overview on using it in cloud and potential for using in security field. Interaction and attacks vectors used in virtual cloud systems are described. Built and analyzed conceptual scheme for penetration testing. Patterns of security improvements in cloud computing infrastructure are presented in following article.uk_UA
dc.format.pages81-82
dc.identifier.citationStefinko Ya. Concept and model for cloud infrastructure protection by using containers / Yaroslav Stefinko, Andrian Piskozub, Roman Banakh // Litteris et Artibus : proceedings of the 6th International youth science forum, November 24–26, 2016, Lviv, Ukraine / Lviv Polytechnic National University. – Lviv : Lviv Polytechnic Publishing House, 2016. – P. 81–82. – Bibliography: 6 titles.uk_UA
dc.identifier.urihttps://ena.lpnu.ua/handle/ntb/40257
dc.language.isoenuk_UA
dc.publisherLviv Polytechnic Publishing Houseuk_UA
dc.relation.referencesen[1] Fernandes, D.A.B., Soares, L.F.B., Gomes, J.V. et al. Security Issues in Cloud Environments - A Survey: Int. J. Inf. Secur. (2014), Issue 2, pp 113–170. doi:10.1007/s10207-013-0208-7 [2] Y. Stefinko, A. Piskozub and R. Banakh, "Manual and automated penetration testing. Benefits and drawbacks. Modern tendency," 2016 13th Int. Conf. on Mod. Probl. of Radio Eng., Telecom. and Comp. Sc. (TCSET), Lviv, Ukraine, 2016, pp. 488-491. doi: 10.1109/TCSET.2016.7452095 [3] R. Banakh, A. Piskozub and Y. Stefinko, "External elements of honeypot for wireless network," 2016 13th Int. Conf. on Mod. Probl. of Radio Eng., Telecom. and Comp. Sc. (TCSET), Lviv, Ukraine, 2016, pp. 480-482. doi: 10.1109/TCSET.2016.7452093 [4] Pearson, S.: Privacy, Security and Trust in Cloud Computing. In: S. Pearson, G. Yee (eds.) Privacy and Security for Cloud Computing, pp. 3-42. Springer London (2013). DOI 10.1007/978-1-4471-4189-1_1 [5] NIST: The NIST Definition of Cloud Computing (2011).http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf Accessed Oct. 2016 [6] Internet Security Threat Report 2016- https:// www.symantec.com/security-center/threat-report Accessed Oct. 2016.uk_UA
dc.subjectsecurityuk_UA
dc.subjectcloud computinguk_UA
dc.subjectschemeuk_UA
dc.subjectcontainersuk_UA
dc.subjectattacksuk_UA
dc.subjectinfrastructureuk_UA
dc.subjectvirtualizationuk_UA
dc.subjectdockeruk_UA
dc.subjectpenetration testuk_UA
dc.titleConcept and model for cloud infrastructure protection by using containersuk_UA
dc.typeConference Abstractuk_UA

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
LEA-2016-81-82.pdf
Size:
492.47 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.99 KB
Format:
Item-specific license agreed upon to submission
Description: