<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Research and analysis of issues and challenges in ensuring cyber security in cloud computing ⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Olha Mykhaylova</string-name>
          <email>olha.o.mykhailova@lpnu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marta Korol</string-name>
          <email>marta.korol.kb.2022@lpnu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Roman Kyrychok</string-name>
          <email>r.kyrychok@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv Metropolitan University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., 04053 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>CPITS-II 2024: Workshop on Cybersecurity Providing in Information and Telecommunication Systems II</institution>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>12 Stepana Bandery str., 79013 Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>30</fpage>
      <lpage>39</lpage>
      <abstract>
        <p>Cloud services provide information tools in a virtual environment with the opportunity to expand the software and hardware resources of the user's computer device. Information is permanently stored on servers on the Internet and temporarily cached on client devices, such as personal computers, game consoles, laptops, smartphones, etc. To gain constant access to remote Internet resources, users use cloud services. They are a key element of rapidly evolving modern technologies, and cloud services are a strategic issue for many companies. Although the innovative capabilities of cloud services attract users, they can also create new threats to their information security. This is why research into cloud computing is important to understand its potential and effectiveness. This study will look at the security aspect of cloud services and compare several different platforms because the lack of sufficient protection can lead to the theft of personal data and other confidential information. The study will also look at the most common threats faced by cloud services, such as DDoS attacks, data leaks, data abuse, etc. In particular, the security measures provided by leading cloud platforms such as AWS, GCP, and Azure will be analyzed to determine their effectiveness and reliability. Our analysis will be useful for companies considering moving to the cloud and everyday users trying to keep their data safe online. The results of the study will provide a clear understanding of the benefits and limitations of using various cloud platforms from a security perspective.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;cloud computing security</kwd>
        <kwd>cybersecurity in cloud services</kwd>
        <kwd>cloud platform comparison</kwd>
        <kwd>data protection</kwd>
        <kwd>threats to cloud services</kwd>
        <kwd>DDoS attack</kwd>
        <kwd>data leakage prevention</kwd>
        <kwd>security measures in AWS</kwd>
        <kwd>GCP</kwd>
        <kwd>Azure</kwd>
        <kwd>cloud migration considerations 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In today’s digital world, large amounts of data are stored
and processed in cloud services. Cloud services are known
to provide many benefits, including increased availability,
flexibility, and cost-effectiveness. However, with these
benefits come several challenges, such as increased security
threats, potential vulnerabilities, and potential risks to data
privacy [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>In the modern world, the cloud computing market is
experiencing increased competition among cloud service
providers. In recent years, there has been a constant
increase in the number of companies offering cloud services.
The most popular of them are:</p>
      <p>
        Microsoft Azure (created February 1, 2010) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] is a
Microsoft Corporation infrastructure that provides
a cloud platform for application developers to
facilitate the process of creating programs.
      </p>
      <p>Microsoft Azure allows you to deploy applications
not only using Microsoft .NET and Visual Studio but
also using various tools.</p>
      <p>
        Google Cloud Platform (founded April 7, 2008) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]—
a set of cloud services developed by Google, running
on the same infrastructure that Google uses for its
end-user products. The service provides a range of
modular cloud services such as computing, data
storage, data analytics, and machine learning.
      </p>
      <p>
        With increasing popularity, developers are forced to
constantly improve their platforms, including improving
automatic threat detection and response mechanisms,
expanding data encryption capabilities, improving user
identification and authentication, and improving
monitoring and vulnerability analysis tools [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Collaborate
with information security experts, conduct independent
security audits, and improve incident response processes.
      </p>
      <p>
        The topic of cloud computing has attracted the attention
of various researchers. Many scholars and experts are
actively engaged in research and analysis of the problems
and challenges associated with cybersecurity in cloud
computing. Using an example, work [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] examines security
in the AWS computing service; it demonstrates the
importance and relevance of research in the field of
cybersecurity, in particular in the context of the use of AWS
cloud services. Also, in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], the authors compared AWS and
Azure Cloud Platforms services for 2021, where they
recognize the differences between AWS and Azure in
database management systems, architectures, resource
management patterns, and complexity, which can affect
scalability, performance, and pricing.
      </p>
      <p>The method of this research is to analyze and identify
the key issues and challenges that are used in cybersecurity
inactivity processes in external computing to further align
Amazon Web Services, Microsoft Azure, and Google Cloud
Platform. To do this you will also need to use:</p>
    </sec>
    <sec id="sec-2">
      <title>2. Analysis of threats and security risks of cloud services</title>
      <p>Small and medium-sized enterprises, like global companies,
are increasingly relying on cloud computing security
services to support day-to-day business functions and
software development, and even to provide the technology
infrastructure needed to operate. In this regard, cloud
services often face many cyber-attacks.</p>
      <p>
        A cloud attack [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] is a cyber-attack that targets cloud
service platforms, such as computing services, storage
services, or hosted applications in a platform as a service
(PaaS) or software as a service (SaaS) model.
      </p>
      <p>
        According to [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], in recent years the number of attacks
on cloud services has increased rapidly. Cloud cyberattacks
accounted for 20% of all cyberattacks in 2020, making cloud
computing platforms the third most targeted cyber
environment. Therefore, we will look at the different types
of attacks and their characteristics, as well as the possible
consequences of these attacks for users and organizations
using cloud technologies. Below is an overview of types of
cloud computing attacks to help you better understand
these threats and take steps to prevent them.
      </p>
      <p>These threats pose serious risks to cloud computing
security. Denial-of-service attacks can disrupt access to
cloud services, misconfiguration of security can open the
door to attackers, and cloud malware attacks threaten data
privacy and integrity. This may allow an attacker to use the
associated resources for their purposes or to steal or
manipulate data stored in the cloud. All these threats require
important monitoring and the provision of appropriate
security measures to protect cloud services and user data.</p>
      <sec id="sec-2-1">
        <title>2.1. Denial of service in cloud computing</title>
        <p>DoS attacks attempt to make a service unavailable to its
users. The attack consumes a large amount of system
resources such as computing power, memory, and
bandwidth. This consumption will make the service
unavailable to users or unbearably slow.</p>
        <p>
          DoS attacks and their variant distributed denial of
service (DDoS) attract a lot of media attention mainly
because of their magnitude. In 1988, reports show only six
DDoS attacks. DDoS attacks targeted major websites such
as CNN, Yahoo, and Amazon in 2000 with an attack rate of
approximately 1 GB/s. DDoS attacks achieved a speed of 70
GB/s in 2007. In 2013, there was a large-scale attack on a
service. Over the past decade, DDoS attacks on cloud
services have become increasingly sophisticated and
dangerous, affecting various industries and operations
related to cloud resources [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
        <p>The attack on Spamhaus in 2013 stands out for its scale,
using a traffic volume of 300 Gbps, which led to disruptions
not only to Spamhaus itself but also to global Internet traffic.</p>
        <p>A politically motivated attack on GitHub in 2015
showed the use of compromised devices to flood the website
with traffic and disrupt its operations.</p>
        <p>A 2016 Dyn attack that used compromised IoT devices
to create a botnet overwhelmed Dyn’s infrastructure,
causing major sites like Netflix and PayPal to become
unavailable.</p>
        <p>
          Attacks on Google and AWS in 2020, using
amplification techniques, resulted in extremely high traffic
speeds (2.5 Tbsp. for Google and 2.3 Tbsp. for AWS), which
posed a major threat to their infrastructure [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
        </p>
        <p>In 2022, Microsoft discovered protection against
extremely high-throughput attacks, registering the largest
attack at the time at 3.47 Tbit/s. Also noted is the shift to
multi-vector attack strategies, where attackers combine
different methods to maximize disruption.</p>
        <p>Look closer at DoS attacks, which occur when security
is compromised. This prevents legitimate clients from
accessing its target cloud systems, devices, or other cloud
resources.</p>
        <p>
          A network of zombies controlled remotely by
wellstructured and widely distributed nodes perform DDoS
attacks. The attacker initiates the attack with the help of
zombies called secondary victims. DDoS attacks are divided
into 3 categories [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
        </p>
        <p>Volume/Bandwidth-Based Attacks: This attack
tries to overwhelm the user with a lot of garbage</p>
        <p>data, using network bandwidth and resources in
the process.</p>
        <p>Protocol attacks: The attack tries to overload the
target’s resources using the disadvantage
associated with several network protocols.</p>
        <p>Application Layer Attacks: These attacks target
specific online applications and send HTTP
requests that exceed program capacity.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Account Hijacking</title>
        <p>In this type of security breach, hackers attempt to hijack an
account by stealing security credentials and then
eavesdropping on user actions and transactions.</p>
        <p>Hackers can also manipulate data, insert false
information, and redirect customers to illegitimate sites.
This type of vulnerability is particularly scary because
hackers know how to use the reputation and trust of users
to manipulate customers.</p>
        <p>
          In 2010, Amazon faced an attack [
          <xref ref-type="bibr" rid="ref12 ref13 ref14">12–14</xref>
          ] that allowed
hackers to steal the session IDs that give users access to
their accounts after entering passwords. This left the
customer’s credentials open to hackers. The bug was
removed 12 hours after it was discovered, but many Amazon
users were unwittingly exposed to the attack during that
time [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
        </p>
        <p>Account hijacking is done using the stolen credentials
of the real user. By using credentials a hacker can access
sensitive data and manipulate the data to suit his likeness.
The traffic hijacking service involves hacker eavesdropping,
data manipulation, data access, and return of falsified
information. There are three states in which a security
breach can occur.</p>
        <sec id="sec-2-2-1">
          <title>Transfer of confidential data to a cloud server.</title>
          <p>Transfer of confidential data from the cloud server
to the client’s computer.</p>
          <p>
            Storage of confidential client data in the cloud
servers that are remote and not owned by the
client [
            <xref ref-type="bibr" rid="ref16">16</xref>
            ].
          </p>
          <p>
            In account hijacking, a hacker uses a compromised
email account to impersonate the account owner. Typically,
account hijacking is done through phishing [
            <xref ref-type="bibr" rid="ref17">17</xref>
            ], sending
fake emails to the user, picking a password, or several other
hacking tactics. In many cases, a user’s email account is
linked to various online services, such as social networks
and financial accounts.
          </p>
          <p>A hacker can use an account to obtain a person’s
account personal information, conduct financial
transactions, create new accounts, and request the account
owner’s contacts for money or assistance in illegitimate
activities. Cloud account hijacking is a common tactic for
identity theft schemes. The attacker uses the stolen account
information for malicious or unauthorized activity. When a
cloud account is hijacked, the attacker usually uses a
compromised email account or other credentials to
impersonate the account owner.</p>
          <p>
            Hijacking an enterprise-level cloud account can be
particularly devastating, depending on what the attackers
do with the information. A company’s integrity and
reputation can be destroyed, and confidential data can be
destroyed by leakage or falsification, causing significant
costs for businesses. There are also possible legal
consequences for companies and organizations with strict
regulation industries, such as healthcare, if sensitive
customer or patient data is exposed when a cloud account is
compromised [
            <xref ref-type="bibr" rid="ref14">14</xref>
            ].
          </p>
        </sec>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Malware injection in cloud computing</title>
        <p>
          Malware injection in cloud computing is when an attacker
tries to step in and inject malicious code or a fake service
that masquerades as an existing service running in the
cloud. This type of attack is also known as a download or
metadata spoofing attack. Attacks of this type allow
attackers to steal information from the Internet by causing
automatic downloads of malicious software without prior
consent from users. This undermines the reliability of the
service and may lead to unwanted behavior. This may be the
first serious attack attempt to introduce a malicious service
or virtual machine in a cloud environment [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
        <p>
          The goal of a cloud-based malware attack is to harm
anything of interest, which may include data modification,
functionality/behavior modification, or blocking. In such an
attack, an attacker creates his implementation of a malicious
service or module (for example, SaaS or PaaS) or a virtual
machine instance (for example, IaaS) and adds it to a cloud
system. The attacker then pretends to the cloud system that
it is a new service or implementation instance among the
valid instances for the service being attacked. If this action
is successful, the cloud automatically redirects the valid
user’s requests to the implementation of the malicious
service and the malicious code is executed. The basic cloud
ware Injection attack scenario is that an attacker transfers a
manipulated/incorrect copy of a service instance to the
victim so that the malicious instance can access the victim’s
service requests. To achieve this goal, the attacker must gain
control over the victim’s data in the cloud [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
        <p>An SQL injection attack is aimed at a database that is
outside the client’s input fields in the application. A
malicious SQL command is inserted as part of an
information field, which, when changed to a query, turns it
into a meaningful, but unsafe, query.</p>
        <p>A Cross-Site Scripting (XSS) attack is where an attacker
gains access to sensitive information on the server by
injecting code into the context of the document data used
on the client-side HTML. This method allows the attacker
to execute his script in the victim’s web browser. XSS
attacks are classified as stored and displayed according to
OWASP. According to WHID (2011), about 12.6% of all
attacks on the Internet are related to XSS. There is virtually
no limit to the various XSS-based attacks.</p>
        <p>
          A command injection attack is a form of command
injection in which commands entered by vulnerable
programs are executed. These entered commands can be
executed at the root level or in a separate runtime
environment, depending on the conditions. The commands
entered, such as ls, ps, cat, etc., are executed in the context
of the running environment with similar privileges as the
application being used. One of the most important
consequences of this attack is increased latency for alternate
clients using applications running on the same virtual
machine as the vulnerable application [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-4">
        <title>2.4. Insecure APIs</title>
        <p>
          The API plays a crucial role in the communication of the
cloud computing infrastructure because it allows different
users and cloud components to interact and share data.
Thus, an attacker can exploit weaknesses in cloud
management software such as Open Stack and its API
implementation for malicious intent [
          <xref ref-type="bibr" rid="ref18 ref19">18, 19</xref>
          ].
        </p>
        <p>The first type of attack is an attack on API
authentication services. This type of attack can be initiated
by exploiting weaknesses in the cloud API that provides
authentication services in the cloud infrastructure. Cloud
management software such as OpenStack or CloudStack has
provided an API to interact with authentication services.
The relationship between hosts and authentication is
sensitive because credentials such as passwords and session
tokens are usually exchanged during the session.</p>
        <p>
          Most APIs in cloud management software are based on
REST or SOAP, which are web standards [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ]. Thus, it is
vulnerable to Internet-based attacks such as eavesdropping,
session hijacking, malicious code execution, XSS, and
denial-of-service attacks [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ]. One important OpenStack
service is the API that handles authentication, a module
known as Keystone. Work [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ] revealed that the Keystone
API is also susceptible to eavesdropping attacks because,
during the authentication procedure, credential data is
transmitted to users in clear text. Additionally, Keystone’s
token exchange-based authentication mechanism is also
flawed. This is because hackers will be able to gain user
privileges and access the services of other cloud
components if they can get the password contained in the
authentication token [
          <xref ref-type="bibr" rid="ref18 ref19">18, 19</xref>
          ].
        </p>
        <p>
          The second type of attack is the API Exhaustion Attack.
This is a type of DOS attack on cloud API services. A denial
of service (DOS) occurs when an attacker disrupts services
by intentionally sending a large volume of traffic to
overload the system. This prevents the system from
processing the request of legitimate users and thus denying
them access to the service. In the context of cloud
computing, a DOS attack can target applications running in
the cloud or the infrastructure of the cloud platform [
          <xref ref-type="bibr" rid="ref22 ref23">22, 23</xref>
          ].
        </p>
        <p>
          When a DOS attack targets a cloud platform API, it can
cause an API exhaustion attack. Most cloud management
software offers a web API for interoperability and
simplicity. For example, CloudStack and OpenStack APIs
are built on REST, and during a communication session,
data is formatted as JSON [
          <xref ref-type="bibr" rid="ref24 ref25">24, 25</xref>
          ]. Work [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ] found that the
OpenStack Keystone API, which uses web protocols to
provide identity and authentication services, is vulnerable
to information disclosure, DOS, and replay attacks.
        </p>
        <p>
          An API exhaustion attack is when attackers maliciously
exploit a cloud platform’s API by sending many malicious
API requests to overload the system. Cloud components will
not be able to respond to legitimate API requests from other
components and users while it is full. This is because web
protocols (HTTP) use TCP as the transport protocol, thus,
when the server receives API requests using HTTP; it will
allocate additional resources for a new TCP session. The
physical hosts of the cloud management system
components will eventually wear out if this continues for a
long period. Therefore, it cannot handle a legitimate API
request, resulting in a DOS attack and violation of its
availability. Cloud management software is vulnerable to
this type of attack because it uses web technology in API
services and many cloud administrators have drawn
attention to this problem bug tracking portal and
vulnerability database [
          <xref ref-type="bibr" rid="ref15 ref20">15, 20</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-5">
        <title>2.5. Security misconfiguration</title>
        <p>
          The latest report highlights that 75% of medium and large
companies have switched to cloud computing. However,
misconfiguration errors remain a major security concern in
cloud computing. These errors are often the result of human
errors that can occur when configuring cloud instances such
as compute resources and storage, which can increase the
system’s vulnerability to data security breaches [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ].
        </p>
        <p>
          For example, improper configuration of an Amazon S3
instance can lead to improper access to protected
documents via a web browser. This problem extends to
insecure data stores on the Internet without any form of
authentication, allowing all users of the platform to access
the data. These errors impact the ability of cloud
administrators to adequately control and secure complex
hybrid and multi-cloud deployments [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ].
        </p>
        <p>
          Various factors can lead to misconfiguration errors. For
example, a lack of understanding of cloud security policies,
congestion, and misuse of APIs can complicate this
situation. Ensuring that software components have proper
default security settings is also an important reason, which
facilitates the attempts of attackers to gain access to data.
All this shows that misconfiguration errors can have serious
consequences for data security in cloud environments [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Cybersecurity assessment criteria in cloud computing</title>
      <p>Given that cyberattacks are becoming more sophisticated
and cybersecurity threats are constantly growing, the
importance of developing a comprehensive security
strategy for cloud services becomes imperative. For effective
protection against cyberattacks in cloud services, it is
recommended to use a variety of measures and protection
methods that allow to guarantee a higher level of security
for users.</p>
      <sec id="sec-3-1">
        <title>3.1. Security misconfiguration</title>
        <p>While AWS, Azure, and Google Cloud are the leading cloud
service providers, they each have specific mechanisms in
place to ensure cybersecurity.</p>
        <p>One of the key mechanisms is access demarcation and
security management in the cloud computing environment.</p>
        <p>Identity and Access Management (IAM) allows you to
create and manage permissions for resources. IAM
combines access control to services into a single system and
is a consistent set of operations. IAM policies contain a role,
user, or user group. Each role contains a list of permissions.</p>
        <p>Identity and access management is based on such
principles as:
</p>
        <p>Multi-factor authentication adds an extra layer of
security. This means that a user will need to verify
their identity using two or more authentication



methods, such as a password and an SMS code, to
access your account.</p>
        <p>Centralized management, with which users can
create and manage access policies for users, groups,
and roles from one place, which simplifies the
administration process.</p>
        <p>Role-based Access Control (RBAC) allows you to
define access rights for users based on their
responsibilities and needs. This allows you to
finetune access to resources based on the specific needs
of your organization.</p>
        <p>IAM provides auditing and reporting capabilities that
allow you to log access events, analyze resource
usage, and track changes to access policies to meet
regulatory requirements. This allows you to maintain
control over your data and ensure compliance with
security standards.</p>
        <sec id="sec-3-1-1">
          <title>The main conclusions of our research include:</title>
          <p>Algorithm Development: A new algorithm based on
the Taylor series has been proposed that provides the
generation of pseudorandom sequences. This approach is
based on the numerical properties of the natural logarithm
of number 2 (ln2), which is mathematically stable and
accurate. Using ln2 to initialize the generator allows
achieving a high degree of randomness in the created
sequences.</p>
          <p>Algorithm Analysis: A detailed analysis of the
developed algorithm was conducted, which includes
checking its statistical characteristics and testing for
compliance with NIST requirements. Testing showed that
the algorithm could not initially provide a uniform
distribution of pseudorandom numbers, leading to its
improvement.</p>
          <p>Algorithm Improvement: The basic algorithm has
been improved, which provides better performance and
improved statistical characteristics of the generated
sequences. Optimization of the algorithm allows for
significantly reducing the computational complexity,
making it effective for use in real-world applications where
computation time is a critical parameter.</p>
          <p>The results of this research are an important step
towards improving the reliability and quality of
pseudorandom number generators. The proposed approach
may find wide application in various fields such as
cryptography, numerical modeling, simulations, and other
numerical methods that require high-quality randomness
and computational efficiency.</p>
          <p>Furthermore, the improved algorithm proposed in this
paper can be used to create new generators or to enhance
existing solutions, for example through optimization of
calculations or application of new generation methods.
Future research may focus on expanding the algorithm to
other mathematical constants, which may further improve
the quality of pseudorandom numbers. It is also possible to
create an algorithm based on formula (5) using intervals (for
example, as in Hamming matrices) or using other Taylor
series for generating new pseudorandom sequences. Using
such methods opens new horizons for the development of
number theory and computational mathematics, providing
powerful tools for solving a wide range of tasks in various









fields of science and technology, especially for information
protection.</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Protection against DDoS attacks and other network threats</title>
        <p>
          One of the most common and most threatening forms is a
DDoS (Distributed Denial of Service) attack, which can
cause significant disruption to work networks, lead to the
loss of availability of services and important data, and even
cause significant financial losses. Protection against a DDoS
attack is based on the following points [
          <xref ref-type="bibr" rid="ref26 ref27 ref28">26–28</xref>
          ]:
        </p>
        <sec id="sec-3-2-1">
          <title>Scalability and elasticity of the infrastructure Distribution Network filters Traffic optimization</title>
          <p>Monitoring and analytics services.</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Measures to prevent unauthorized data changes</title>
        <p>In the world of cloud services, where data security is
important, preventing unauthorized changes to information
becomes an important task. Ensuring data privacy requires
the implementation of effective security measures. In this
context, it is important to note the measures to prevent data
changes without permission, which becomes the main
component of information reliability and security.</p>
        <p>In cloud services, several functions and mechanisms
help avoid data changes without permission:</p>
        <p>Auditing and monitoring: Auditing and monitoring
systems provided by cloud providers can track all
activities with data and resources. Some threats and
unusual activity are detected in time.</p>
        <p>Data encryption: Data encryption features such as
AWS Key Management Service, Google Cloud Key
Management Service, and Azure Key Vault can
protect data from unauthorized access even if
attackers gain access to it.</p>
        <p>Tracking changes: Some cloud services provide the
ability to track changes in data using audit logs. This
allows you to identify who, when, and what changes
were made to the data.</p>
        <p>Backup: Backup features offered by regular cloud
providers can back up data and restore it in case of
unauthorized changes or loss.
The shared responsibility model is a concept that defines the
level of responsibility for security and data protection
between a cloud service and its customers. This model
chooses who is responsible for various aspects of
infrastructure and data in a cloud environment.</p>
        <p>Also, choose 1 of 3 types of platform services:
infrastructure as a service (IaaS), platform as a service
(PaaS), and software as a service (SaaS).</p>
        <p>
          SaaS [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ] is a model that puts the most responsibility on
the cloud service provider and the least on the user. In a
SaaS environment, you are responsible for the data you add
to the systems, the devices you allow to connect to the
systems, and the users who have access. Almost everything
else belongs to the cloud provider. The cloud provider is
responsible for the physical security of the data centers,
power, network connectivity, and application development
and updates [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ].
        </p>
        <p>
          PaaS [
          <xref ref-type="bibr" rid="ref31">31</xref>
          ] divides the responsibility between you and the
cloud provider. The cloud provider is responsible for
maintaining the physical infrastructure and its access to the
Internet, just like in IaaS. In the PaaS model, the cloud
provider also supports operating systems, databases, and
development tools. Think of PaaS as using a domain-joined
computer: IT staff maintain the device with regular updates,
patches, and upgrades.
        </p>
        <p>IaaS places the greatest responsibility on the user. The
cloud provider is responsible for maintaining the physical
infrastructure and its access to the Internet. You are
responsible for installation and configuration, patches and
updates, and security.</p>
      </sec>
      <sec id="sec-3-4">
        <title>3.5. The shared responsibility model</title>
        <p>The availability and effectiveness of security policies is one
of the most critical aspects. Well-designed security policies
can protect against a wide range of threats, from cyber
attacks to unauthorized access and data loss. They define
the rules, procedures, and controls that govern access to
information and resources, and establish security standards
that must be followed by all users and system
administrators. In this context, it is important to investigate
both the presence and effectiveness of security policies in
Evaluating access separation for each of the platforms
(Azure, AWS, GCP) on a scale from 1 to 10, where 10 is the
best, you can make the following rating:</p>
        <p>Azure (Microsoft Azure): 8. The service has a
powerful and easy-to-use access control
mechanism through Azure Active Directory
(AAD). It provides the ability to manage many
built-in roles, but some functionality can be
difficult to configure with other platforms.</p>
        <p>AWS (Amazon Web Services): 9. IAM in AWS is a
powerful and flexible tool for delimiting access. It




</p>
        <p>Audit and
Reporting</p>
        <p>Yes, provides capabilities for
logging events and resource
usage analysis
Yes, provides audit and reporting
capabilities through Azure
Monitor and other tools
Yes, provides capabilities for logging
events and analyzing resource access
cloud services to ensure a high level of data and
infrastructure protection.</p>
        <p>Criteria for determining its effectiveness and
adaptability to security requirements include:</p>
        <p>The assessment of the security policy in cloud services
includes several criteria that allow for determining its
effectiveness and adaptability to security requirements.
Some of the key evaluation criteria include:</p>
        <sec id="sec-3-4-1">
          <title>Certainty and consistency.</title>
          <p>Compliance The security policy must meet the
requirements of legislation, standards, and regulatory
requirements that apply to a specific industry or
region.</p>
          <p>Monitoring and analysis.</p>
          <p>Sustainability and renewal.</p>
          <p>Support and involvement of employees.</p>
          <p>Evaluating a security policy against these criteria helps
ensure that it meets the needs and requirements of security
in cloud services.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conducting testing of each platform according to defined criteria</title>
      <p>Taking into account the criteria of the Criteria for
evaluating cyber security in cloud computing, which were
compiled in the previous points, we will compare 3 cloud
services: AZURE, AWS, and GCP.</p>
      <p>provides extensive configuration options for roles,
policies, and API access. Many built-in roles and
categories refused to fine-tune access to resources.
GCP (Google Cloud Platform): 7. IAM in GCP is
also a powerful access management tool, but it can
be less flexible in some aspects together with AWS
and Azure. However, it provides advanced
functionality for managing projects and resources.</p>
      <p>Then we compare platforms with points of protection
against DDoS attacks and other network threats:
Criterion/Platform</p>
      <p>Multi-factor
Authentication</p>
      <p>AWS
Yes, supported through IAM
and other services
AZURE
Yes, including Azure AD and
other mechanisms
GCP
Yes, available to users and services
through the Identity Platform
Centralized
Management</p>
      <p>Yes, through Identity and
Access Management (IAM)
Yes, via Azure Active Directory
(AAD) and other tools
Yes, with Cloud Identity and Access
Management (IAM)
Role-based Access</p>
      <p>Control</p>
      <p>Yes, roles and access rights can
be defined through IAM
Yes, through Azure RBAC and
other mechanisms
Yes, available for configuring access
rights for users and services
Having familiarized ourselves with the platforms in terms
of protection against DDoS attacks and other network
threats, we can give them the following ratings:
AWS (Amazon Web Services): 9. AWS provides a
high level of protection against DDoS attacks and
other network threats, including services such as
AWS Shield, AWS WAF, AWS Firewall Manager,
Amazon GuardDuty, and others. These services
provide different levels of protection, both basic
and advanced, allowing you to adapt protection
measures to the needs of users. Multi-factor
authentication, protection of network resources,
and tracking of unusual activity are also
components of AWS security systems.</p>
      <p>Azure (Microsoft Azure): 8. Microsoft Azure also
offers a wide range of tools to protect against
DDoS attacks and other network threats, including
services such as Azure DDoS Protection, Azure
Firewall, Azure Application Gateway, Azure
3.</p>
      <p>Security Center, and many others. Azure has a
well-developed threat monitoring and detection
system that allows you to quickly respond to any
attacks.</p>
      <p>GCP (Google Cloud Platform): 7. Google Cloud
Platform provides a significant level of protection
against DDoS attacks and other network threats
with services such as Google Cloud Armor, Google
Cloud DDoS Protection, VPC Service Controls, and
others. However, according to some experts,
GCP’s security tools may be less integrated and
less easy to use with AWS and Azure, which may
pose some risk to users with less expertise in
network security.</p>
      <p>Below is a table that compares measures to prevent
unauthorized data changes across AWS, Azure, and GCP
based on criteria such as auditing and monitoring, data
encryption, change tracking, and backup:
AWS (Amazon Web Services): Score 9. AWS has
several powerful tools such as IAM for access
management, AWS KMS for data encryption,
CloudTrail for auditing and monitoring, and
Amazon S3 for backup. These tools provide
extensive opportunities for data protection and a
high level of security.</p>
      <p>Azure (Microsoft Azure): Score 8. Azure also has a
similar set of data protection tools, such as Azure
Active Directory, Azure Key Vault, Azure Audit
Logs, and Azure Backup. However, some users</p>
      <p>Azure (Microsoft Azure): 9. Azure provides a
welldefined shared responsibility model that chooses
which parts of the infrastructure are the
responsibility of the cloud provider and which are
the responsibility of the user. This will avoid
confusion and understand the responsibilities of
all parties for data and infrastructure security.
2.
3.</p>
      <p>GCP (Google Cloud Platform) 8. GCP also provides
a shared responsibility reporting model, but some
users feel that some aspects may be less obvious or
difficult to understand with Azure or AWS.</p>
      <p>AWS (Amazon Web Services): 9. AWS has a
welldefined and reported shared responsibility model
that allows users to clearly understand their
responsibility for the security and protection of
data in the cloud environment.
The evaluation of the effectiveness of security policies in
different cloud platforms can be as follows:
1. Azure (Microsoft Azure) 9. Azure provides
extensive capabilities for creating and configuring
security policies through Azure Security Center
and Azure Policy. Thanks to these services,
administrators can effectively control and monitor
the state of security of resources in the Azure
cloud environment. Azure also provides
opportunities for integration with other security
monitoring and management systems, which
increases its effectiveness.
2. GCP (Google Cloud Platform) 8. GCP also has an
extensive set of tools for configuring security
policies, including Cloud Security Command
Center and Google Cloud IAM. However, some
users may find GCP’s user interface and
documentation to be less intuitive compared to
Azure or AWS, which can make it difficult to set
up and debug security policies.
3. AWS (Amazon Web Services): 9. AWS offers a
wide range of tools for creating and managing
security policies, including AWS Identity and
Access Management (IAM), AWS Config, AWS
CloudTrail, and many others. These services allow
administrators to effectively control and monitor
the security of resources in the AWS cloud
environment.
From the ratings provided, it can be noted that Amazon Web
Services (AWS) received the highest overall rating, which is
45 points. This is a subjective opinion that was built on the
fact that AWS stands out in terms of technical aspects with
its broad set of services, deep level of customization, and
high geographical spread. The biggest advantage of AWS is
a powerful and selective toolkit for delimiting access, as well
as a wide range of tools to protect against DDoS attacks and
other network threats. Considering this, it can be concluded
that AWS is the best choice for organizations that want
optimal security in cloud computing.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>Based on the research and analysis of the issues and
challenges associated with ensuring cyber security in cloud
computing, several key conclusions can be drawn.</p>
      <p>First of all, it is determined that protection against cyber
threats in cloud computing requires a comprehensive and
in-depth approach, the latter areas provide a wide range of
services and capabilities that require constant monitoring
and management. Key challenges in this context include
ensuring data security and protection, detecting and
responding to cyber threats, and managing access and user
identity.</p>
      <p>Another aspect of security is the continuous updating
and improvement of security measures since cyber threats
are constantly evolving and remain increasingly complex.
This means that cloud computing providers such as AWS,
Azure, and GCP must constantly improve their tools and
services to ensure the highest level of security for their
customers.</p>
      <p>In addition, it is found that the choice of cloud
computing platform can affect the level of cyber security,
the second provider has its unique features and capabilities.
The decisive factor when choosing a platform should be its
ability to provide reliable and effective protection against
cyber threats to the needs and requirements of a specific
organization.</p>
      <p>Therefore, based on these findings, it can be argued that
ensuring cyber security in cloud computing is a challenging
task, but at the same time, there are ample opportunities for
innovation and development. With an understanding and
timely response to the problems and challenges in this area,
organizations can maximize the security of their data.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>B.</given-names>
            <surname>Bebeshko</surname>
          </string-name>
          , et al.,
          <source>Application of Game Theory, Fuzzy Logic and Neural Networks for Assessing Risks and Forecasting Rates of Digital Currency, J. Theor. Appl. Inf. Technol</source>
          .
          <volume>100</volume>
          (
          <issue>24</issue>
          ) (
          <year>2022</year>
          )
          <fpage>7390</fpage>
          -
          <lpage>7404</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Sabahi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Movaghar</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2023</year>
          ).
          <article-title>A Survey on Cloud Computing Security: Challenges and Opportunities</article-title>
          .
          <source>IEEE Access</source>
          ,
          <volume>11</volume>
          ,
          <fpage>34501</fpage>
          -
          <lpage>34519</lpage>
          . doi:
          <volume>10</volume>
          .1109/ ACCESS.
          <year>2023</year>
          .3258591
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Rathore</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2023</year>
          ).
          <article-title>Cloud Computing Services and Platforms: A Detailed Review</article-title>
          and
          <string-name>
            <given-names>Future</given-names>
            <surname>Perspectives</surname>
          </string-name>
          .
          <source>Future Generation Computer Systems</source>
          ,
          <volume>143</volume>
          ,
          <fpage>1023</fpage>
          -
          <lpage>1038</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.future.
          <year>2023</year>
          .
          <volume>07</volume>
          .003
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Shah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <source>Cloud Computing: Principles, Systems and Applications</source>
          . Springer (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -25711-2
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>F.</given-names>
            <surname>Richter</surname>
          </string-name>
          ,
          <source>Worldwide Market Share of Leading Cloud Infrastructure Service Providers</source>
          (
          <year>2024</year>
          ). URL: https://www.statista.com/chart/18819/worldwidemarket-share
          <article-title>-of-leading-cloud-infrastructureservice-providers/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>[6] Practical Aspects of Using Fully Homomorphic Encryption Systems to Protect Cloud Computing</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V. M.</given-names>
            <surname>Mazur</surname>
          </string-name>
          ,
          <article-title>Assessment of the Security of the Use of Cloud Technologies and the Development of Methods of Protection Against Cyber Attacks on Cloud Services, Ternopil: TNTU (</article-title>
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S.</given-names>
            <surname>Galiveeti</surname>
          </string-name>
          , et al.,
          <article-title>Cybersecurity Analysis: Investigating the Data Integrity and Privacy in AWS and Azure Cloud Platforms, Artificial Intelligence and Blockchain for Future Cybersecurity Applications</article-title>
          .
          <source>Studies in Big Data</source>
          ,
          <volume>90</volume>
          (
          <year>2021</year>
          ) doi: 10.1007/978-3-
          <fpage>030</fpage>
          - 74575-2_
          <fpage>17</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Sheps</surname>
          </string-name>
          , Top 10
          <string-name>
            <given-names>Cloud</given-names>
            <surname>Attacks and What You Can Do About Them</surname>
          </string-name>
          (
          <year>2023</year>
          ). URL: https://www.aquasec.com/cloud-nativeacademy/cloud-attacks/cloud-attacks/
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Triskele</surname>
            <given-names>Labs</given-names>
          </string-name>
          , Cloud Cyber Attacks:
          <article-title>The Latest Cloud Computing Security Issues</article-title>
          . URL: https://www.triskelelabs.com/blog/cloud
          <article-title>-cyberattacks-the-latest-cloud-computing-security-issues</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>P.</given-names>
            <surname>Kumar</surname>
          </string-name>
          , Cloud Computing: Threats, Attacks and Solutions,
          <source>Int. J. Emerging Technol. Eng. Res. (IJETER)</source>
          ,
          <volume>4</volume>
          (
          <issue>8</issue>
          ) (
          <year>2016</year>
          )
          <fpage>24</fpage>
          -
          <lpage>28</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Songa</surname>
          </string-name>
          ,
          <article-title>A Review of DDoS Attacks and its Countermeasures in Cloud Computing</article-title>
          ,
          <source>in International Conference on Information Systems and Computer Networks</source>
          (
          <year>2022</year>
          ).
          <source>doi: 10.1109/ISCON52037</source>
          .
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Christina</surname>
          </string-name>
          ,
          <source>Proactive Measures on Account Hijacking in Cloud Computing Network, Asian J. Comput. Sci. Technol</source>
          .
          <volume>4</volume>
          (
          <issue>2</issue>
          ) (
          <year>2015</year>
          )
          <fpage>31</fpage>
          -
          <lpage>34</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>I. Ranjan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Bhushan</surname>
          </string-name>
          ,
          <article-title>Ambiguity in Cloud Security with Malware-Injection Attack</article-title>
          , in: 3rd International Conference on Electronics,
          <source>Communication and Aerospace Technology (ICECA)</source>
          (
          <year>2019</year>
          )
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICECA.
          <year>2019</year>
          .8821844.CClo.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>D.</given-names>
            <surname>Shevchuk</surname>
          </string-name>
          , et al.,
          <source>Designing Secured Services for Authentication</source>
          , Authorization, and
          <article-title>Accounting of Users, in: Cybersecurity Providing in Information and Telecommunication Systems II</article-title>
          , vol.
          <volume>3550</volume>
          (
          <year>2023</year>
          )
          <fpage>217</fpage>
          -
          <lpage>225</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Martseniuk</surname>
          </string-name>
          , et al.,
          <source>Automated Conformity Verification Concept for Cloud Security, in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3654</volume>
          (
          <year>2024</year>
          )
          <fpage>25</fpage>
          -
          <lpage>37</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>O.</given-names>
            <surname>Deineka</surname>
          </string-name>
          , et al.,
          <article-title>Designing Data Classification and Secure Store Policy According to SOC 2 Type II</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3654</volume>
          (
          <year>2024</year>
          )
          <fpage>398</fpage>
          -
          <lpage>409</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>O.</given-names>
            <surname>Vakhula</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Opirskyy</surname>
          </string-name>
          ,
          <string-name>
            <surname>O. Mykhaylova,</surname>
          </string-name>
          <article-title>Research on Security Challenges in Cloud Environments and Solutions based on the security-as-Code Approach, in: Cybersecurity Providing in Information and Telecommunication Systems II</article-title>
          , vol.
          <volume>3550</volume>
          (
          <year>2023</year>
          )
          <fpage>55</fpage>
          -
          <lpage>69</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19] CWE:
          <article-title>Individual Dictionary Definition. “Improper Neutralization of Special Elements used in a command” (</article-title>
          <year>2017</year>
          )
          <fpage>209</fpage>
          -
          <lpage>217</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>F.</given-names>
            <surname>Qazi</surname>
          </string-name>
          ,
          <article-title>Application Programming Interface (API) Security in Cloud Applications</article-title>
          ,
          <source>EAI Endorsed Transactions on Cloud Systems</source>
          ,
          <volume>7</volume>
          (
          <issue>23</issue>
          ) (
          <year>2023</year>
          )
          <article-title>e1</article-title>
          . doi:
          <volume>10</volume>
          .4108/eetcs.v7i23.
          <fpage>3011</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>H.</given-names>
            <surname>Albaroodi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Manickam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <article-title>Critical Review of Openstack Security: Issues and Weaknesses</article-title>
          ,
          <source>J. Comput. Sci.</source>
          ,
          <volume>10</volume>
          (
          <issue>1</issue>
          ) (
          <year>2014</year>
          )
          <fpage>23</fpage>
          -
          <lpage>33</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ali</surname>
          </string-name>
          , et al.,
          <article-title>Mobile Cloud Computing with SOAP and REST Web Services</article-title>
          ,
          <source>Journal of Physics: Conference Series</source>
          ,
          <volume>1018</volume>
          (
          <year>2018</year>
          )
          <article-title>012005</article-title>
          . doi:
          <volume>10</volume>
          .1088/
          <fpage>1742</fpage>
          - 6596/1018/1/012005.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>J.</given-names>
            <surname>Somorovsky</surname>
          </string-name>
          , et al.,
          <source>All Your Clouds Are</source>
          Belong to Us, in: 3rd ACM workshop on Cloud computing security workshop - CCSW'
          <volume>11</volume>
          (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>B.</given-names>
            <surname>Cui</surname>
          </string-name>
          , T. Xi,
          <article-title>Security Analysis of Openstack Keystone</article-title>
          ,
          <source>in: 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing</source>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>O.</given-names>
            <surname>Mykhaylova</surname>
          </string-name>
          , et al.,
          <article-title>Mobile Application as a Critical Infrastructure Cyberattack Surface, in: Cybersecurity Providing in Information and Telecommunication Systems II</article-title>
          , vol.
          <volume>3550</volume>
          (
          <year>2023</year>
          )
          <fpage>29</fpage>
          -
          <lpage>43</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>C. N.</given-names>
            <surname>Nobles</surname>
          </string-name>
          ,
          <article-title>Investigating Cloud Computing Misconfiguration Errors using the Human Factors Analysis and Classification System</article-title>
          ,
          <source>Scientific Bulletin</source>
          <volume>27</volume>
          (
          <issue>1</issue>
          ) (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .2478/bsaft-2022-0007.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Developer</surname>
          </string-name>
          .openstack.org.
          <source>OpenStack Docs: OpenStack APIs</source>
          (
          <year>2016</year>
          ). URL: http://developer. openstack.org/api-guide/
          <article-title>quick-start/api-quickstart.html#openstack-api-quick-guide</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>S.</given-names>
            <surname>Goasguen</surname>
          </string-name>
          , Intro to CloudStack API, Slideshare.net (
          <year>2013</year>
          ). URL: http://www.slideshare.net/ sebastiengoasguen/intro-to
          <article-title>-cloudstack-api.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>A.</given-names>
            <surname>Alkahtani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Hariri</surname>
          </string-name>
          ,
          <string-name>
            <surname>A Comprehensive</surname>
          </string-name>
          <article-title>Survey on Cloud Computing Service Models</article-title>
          .
          <source>IEEE Access</source>
          ,
          <volume>11</volume>
          (
          <year>2023</year>
          )
          <fpage>34792</fpage>
          -
          <lpage>34810</lpage>
          . doi:
          <volume>10</volume>
          .1109/ ACCESS.
          <year>2023</year>
          .3262599
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>P.</given-names>
            <surname>Anakhov</surname>
          </string-name>
          , et al.,
          <article-title>Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3050</volume>
          (
          <year>2023</year>
          )
          <fpage>240</fpage>
          -
          <lpage>245</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>M.</given-names>
            <surname>Silic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Back</surname>
          </string-name>
          ,
          <article-title>A Comparative Study of PaaS and SaaS Cloud Models: Current Trends</article-title>
          and
          <string-name>
            <given-names>Future</given-names>
            <surname>Directions</surname>
          </string-name>
          .
          <source>J. Cloud Comput. Adv. Syst. Appl.</source>
          ,
          <volume>12</volume>
          (
          <issue>1</issue>
          ) (
          <year>2023</year>
          )
          <fpage>14</fpage>
          -
          <lpage>28</lpage>
          . doi:
          <volume>10</volume>
          .1186/s13677-023-00211-8
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>