Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Вестник Дагестанског...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
versions View all 2 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Algorithm for determining the degree of vulnerability of cloud computing areas based on the electre i method

Authors: S. V. Razumnikov;

Algorithm for determining the degree of vulnerability of cloud computing areas based on the electre i method

Abstract

Objective. In decision making when comparing alternatives, it is often necessary to work with different values or estimates that are still important. One of the multicriteria analysis methods that can be applied in the model for determining the vulnerability of cloud computing areas is the ELECTRE I method. This paper presents an algorithm for determining the degree of vulnerability of cloud computing areas using the Electre I method. Method. The Electre I method allows one to evaluate the relative advantages and disadvantages of different cloud computing areas based on a set of criteria. Result. The algorithm presented in the paper includes steps for determining the weights of criteria, evaluating alternatives according to these criteria, and calculating the degree of vulnerability. This model will allow one to determine the area or areas that are most susceptible to the danger of breakdown or failure, and to remove dominated alternatives that do not pose a serious danger. Based on the identified preferences, one can make a decision on troubleshooting the selected areas of the cloud service. An experimental study was conducted on the basis of real data on the cloud computing system. Conclusion. The obtained results confirm the effectiveness of the proposed method and its ability to accurately determine the vulnerabilities of cloud computing areas. The results of this work may be useful for cloud system administrators and security professionals who are concerned about maintaining security and reliability in the cloud environment.

Keywords

Technology, vulnerabilities, multicriteria optimization problem, T, set of non-dominated alternatives, electre i method, cloud services

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
gold