<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>B. Akhmetov);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Optimization of virtual machine placement in a university cloud considering information security requirements⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Bakhytzhan Akhmetov</string-name>
          <email>bakhytzhan.akhmetov.54@mail.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Valerii Lakhno</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nurzhamal Oshanova</string-name>
          <email>nurzhamal_o_t@mail.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gulistan Yelubay</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Abai Kazakh National Pedagogical University</institution>
          ,
          <addr-line>13 Dostyk, 050026 Almaty</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National University of Life and Environmental Sciences of Ukraine</institution>
          ,
          <addr-line>15 Heroes Of Defense, 03041 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>A mathematical model is presented for determining the optimal number of computing nodes in a private cloud within a university infrastructure based on virtual desktop infrastructure (VDI) technology, talking into account the specific information security requirements of a cloud-oriented educational environment (COEE). Unlike existing models that mainly focus on analyzing resource availability-particularly CPU load and RAM capacity-the approach proposed in this work incorporates quantitative characteristics of the security level both from the side of computing nodes and virtual machines deployed in the university cloud. The proposed solution formulates the virtual machine placement problem as a multi-criteria optimization task that balances efficient resource utilization with adherence to the defined information security policies of the university's COEE. A distinctive feature of the model is its ability to account for dynamic changes in security requirements and resource loads over time. This development makes the model applicable to university cloud infrastructures, which are characterized by a high degree of variability, such as during academic and examination periods. To verify the model, a simulation was implemented that reflects realistic parameters of IT infrastructures of universities in the Republic of Kazakhstan, using Abai Kazakh National Pedagogical University as a case study. The results of the numerical experiment demonstrated the method's resilience to increasing demands and confirmed its applicability in designing and adaptively scaling secure private cloud solutions for educational institutions.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;university cloud</kwd>
        <kwd>virtualization</kwd>
        <kwd>cloud-oriented educational environment</kwd>
        <kwd>information security</kwd>
        <kwd>mathematical model</kwd>
        <kwd>multi-criteria resource optimization</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The implementation of Virtual Desktop Infrastructure (VDI) based on private clouds in universities
and other educational institutions (such as schools, colleges, etc.) enables more efficient use of
shared computing resources. For universities in Kazakhstan (RK), this also provides the benefit of
flexible scaling according to current user needs and the load on the university cloud infrastructure.
It should be noted that the approach presented in this paper is relevant for universities in RK and
research and educational institutions where the IT environment is characterized by dynamic
workloads during examination periods, while the requirements for information security within the
cloud infrastructure remain consistently high.</p>
      <p>
        Given the variability of workloads on a university’s cloud infrastructure (or, as referred to in [
        <xref ref-type="bibr" rid="ref1 ref2">1,
2</xref>
        ], the cloud-oriented educational environment—COEE) and the heterogeneous requirements of
users, a key challenge is to estimate the required number of computing nodes (servers) to ensure
stable and secure operation of the cloud platform. Previously proposed mathematical models for
estimating the number of cluster nodes in VDI-based clouds [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ] are generally based on analyzing
resource loads [
        <xref ref-type="bibr" rid="ref5 ref6 ref7">5–7</xref>
        ], assuming that the main efficiency criterion is the minimization of the number
of physical servers given specific resource consumption parameters of virtual machines.
However, we argue that such approaches overlook a fundamental aspect of the COEE—information
security (IS) of the deployed computations, including trust in physical nodes, requirements for
isolation, access control policies, and resilience against internal and external threats to the
university IT environment [
        <xref ref-type="bibr" rid="ref10 ref11 ref8 ref9">8–11</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Problem statement</title>
      <p>Under conditions of high load variability, seasonal activity (during examination periods and
university admissions in Kazakhstan), and continuous changes in the composition and behavior of
users, the rational scaling of cloud infrastructure becomes a key issue for the cloud-oriented
educational environments (COEEs) of Kazakhstani universities. Specifically, it involves
determining the required number of computing nodes that ensure the stable operation of the
COEE.</p>
      <p>
        Existing approaches [
        <xref ref-type="bibr" rid="ref1 ref2 ref4 ref6 ref7">1, 2, 4, 6, 7</xref>
        ] for estimating the necessary capacity of a VDI cluster typically
rely solely on analyzing resource characteristics—such as CPU and RAM consumption during
virtual machine (VM) deployment in a COEE—and are usually reduced to optimization problems
focused on minimizing the number of servers under a fixed workload.
      </p>
      <p>
        However, in a university environment where personal, scientific, and administrative data are
processed, information security (IS) cannot be treated as an external or supplementary criterion.
On the contrary, it must be integrated into the very logic of evaluating the architectural parameters
of a university’s COEE. Neglecting the requirements for the security level of computing nodes or
failing to consider the need for isolation between different user groups will inevitably lead to
information security incidents—such as data leaks, inter-faculty interference, and unauthorized
access. Similar challenges have been noted in research on cybercrime detection in cloud
environments using honeypots [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], where ensuring reliable isolation and trust in cloud nodes
proved critical for preventing attacks. Furthermore, recent studies on Shadow IT risks [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ],
centralized secret data management in public cloud provisioning [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], and secure configuration
repository efficiency [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] highlight that security-oriented resource allocation directly influences the
resilience and scalability of cloud infrastructures.
      </p>
      <p>Therefore, there is a need to develop a multi-criteria model in which the task of estimating the
number of virtualization nodes and placing virtual machines (VMs) takes into account not only
technical resources but also indicators of trust and security—both from the side of physical servers
and the VMs hosted on them. Moreover, the model must be adaptable to changing operational
conditions over time, support scaling scenarios, and enable predictive assessment of cluster
behavior under peak loads and heightened information security requirements.</p>
      <p>The objective of this study is to determine the minimum required number of computing nodes
that ensures, for a university’s Cloud-Oriented Educational Environment (COEE):



correct placement of virtual machines (VMs) based on available resources (CPU, RAM, etc.);
compliance with information security requirements (such as isolation and trust in nodes);
adaptability to dynamic workloads and scalability of the private cloud (using a Kazakhstani
university as a case study).</p>
    </sec>
    <sec id="sec-3">
      <title>3. Methods and models</title>
      <p>
        We introduce the following notation. For the university’s OSS servers, respectively: M is the total
number of available physical servers (nodes) of the university’s public information system; R is a
total number of resource types (for example, CPU, RAM, etc.); Cjk is the container; k a resource on
the server j ∈ {1, …, M}, k ∈ {1, …, R}; Sj ∈ [
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] is the security level (trust) of the server j. That is, the
higher, Sj. The safer the whole OOUS is.
      </p>
      <p>
        And similarly for VM parameters, respectively: N is a number of virtual machines (VMs), which
must be placed in the SAUCE of the university; active(t) ⊆ {1, …, N} multiple active VMs at a given
time; rjk is the minimum required type resources for an INSTANCE at a given t; aj(t) is the current
consumption CPU ВМ i at a moment in time t; Hi ∈ [
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] is the required security level for ВМ i at a
moment in time t.
      </p>
      <p>
        And additionally we use the following variables: xij(t) ∈ {0,1} is a binary variable that takes the
value 1 if the VM is hosted on the server at the time, 0 otherwise; yi(t) ∈ {0,1} is the server in use j at
a moment in time t; α ∈ [
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] is the redundancy level in case of security (aggressiveness coefficient
in assessing the security of educational institutions from the university); λ &gt; 0 is the penalty
coefficient for non-compliance with the security of the environmental management system.
      </p>
      <p>We use the following restrictions.</p>
      <p>Each VM is hosted on the same server, i. e.</p>
      <p>
        Then, unlike the works of [
        <xref ref-type="bibr" rid="ref3 ref7">3, 7</xref>
        ], we will introduce restrictions on the safety of the university’s
environmental management system (hard or soft approach).
      </p>
      <p>A tough approach
Resource Constraints on Each Server in the COEE
For each resource</p>
      <sec id="sec-3-1">
        <title>Then, for the CPU, we obtain</title>
      </sec>
      <sec id="sec-3-2">
        <title>And a soft approach with the admission of a fine</title>
        <p>Additionally, the minimum allowable node security can be set for the university’s</p>
        <p>OUS
Then let’s consider two variants of the objective function.</p>
        <p>Option 1—two-criteria task (safety and cost savings for the University’s information security
system)</p>
        <p>where the first term is the number of servers involved (resource efficiency) in the university’s
COEE;</p>
        <p>The second is the amount of fines for violating security requirements.</p>
        <p>Option 2—Weighted criterion transformation
(7)
where the degree of importance of the effectiveness of the environmental management
system in comparison with safety.</p>
        <p>Then we will calculate the lower estimate .</p>
        <p>
          As in [
          <xref ref-type="bibr" rid="ref3 ref7">3, 7</xref>
          ], we will use the expansion of the Martello-Tossa estimate to take into account new
subsets responsible for the university’s information security and its scaling:
(8)
(9)
(10)
(11)
(12)
(13)
(14)
Then, to estimate the lower bound, we use the following dependence:
Or
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>Then the final assessment</title>
        <p>We also take into account the dynamic scaling of the university’s COEE. Accordingly, the
ability to evaluate the system during peak loads can be expressed as follows:</p>
        <p>As part of the research conducted under project IRN AP19678846, “Enhancing the Efficiency of
Hybrid and Distance Learning Formats Through the Development of University Infrastructure in
the Context of Digital Transformation,” a mathematical model was developed and formalized to
estimate the optimal number of computing nodes in a private virtualization cluster, aimed at
implementing virtual desktop infrastructure (VDI) in the university environment.</p>
        <p>
          Unlike existing approaches described in [
          <xref ref-type="bibr" rid="ref3 ref7">3, 7</xref>
          ], the novelty of the proposed model lies in the
following: For the first time, new parameters have been introduced that take into account the
information security of the university’s Cloud-Oriented Educational Environment (COEE).
Furthermore, the model introduces quantitative characteristics for both the security level of
computing nodes and the security requirements of the virtual machines. This enables the model to
account for both administrative and technical aspects of information security when planning the
cloud architecture of a specific university.
        </p>
        <p>Additionally, the model incorporates temporal dynamics of workload and security
requirements. That is, it considers the time-varying structure of VM resource requests within the
COEE, as well as the possibility of dynamically changing information security requirements. Lower
and upper bounds for the required number of cluster nodes have been extended, and new
estimation formulas have been developed based on an adaptation of the Martello-Toth method,
allowing consideration of both the resource intensity of VMs and constraints related to the security
level of physical nodes.</p>
        <p>The multi—criteria optimization problem of VM placement in the university COEE has been
further developed, and a quality function has been proposed. This function simultaneously includes
the criterion of minimizing the number of physical nodes involved and a penalty for mismatch in
security levels, thereby allowing a flexible balance between infrastructure efficiency and
information security within the university’s COEE.</p>
        <p>Overall, the presented model provides more acceptable accuracy and relevance in solving the
problem of scaling a private university cloud under conditions of heightened information security
(IS) requirements. It is also suitable as a foundational framework for the synthesis of intelligent
resource management systems within secure cloud environments of universities in the Republic of
Kazakhstan.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. The results obtained</title>
      <p>To validate the developed mathematical model, a simulation of virtual machine (VM) placement in
a university’s private cloud was carried out, taking into account both resource requirements and
information security (IS) constraints. The model was implemented in the Python environment and
made it possible to analyze workload distribution and compliance with IS requirements under
conditions of a limited number of servers in the university’s Cloud-Oriented Educational
Environment (COEE). The results are shown in Figure 1.</p>
      <p>The simulation considered a cloud infrastructure consisting of 10 physical servers, each with a
fixed CPU capacity (100 arbitrary units) and an assigned security levelSj ∈ [0.6,1.0]. Number of VMs
accepted—50 (N = 50 with different base resource consumption CPU (in the range from 5 to 20
conventional units) and individual requirements for the security level of the hosting platform
Hj ∈ [0.4,0.9]. A total of T = 20 discrete time steps were used to emulate the dynamic workload of
the COEE servers.</p>
      <p>
        At each time step, an attempt is made to place all VMs on the servers. The condition for
successful placement is simultaneous compliance with the conditions: sufficiency of available CPU
resources on the server; server security level compliance with VM requirements Sj ≥ Ri.
The simulation results are presented in Figure 1 as a graph showing CPU load per server over time.
The analysis revealed a balanced distribution of workload across servers during periods of
moderate activity. However, periodic load spikes indicate the difficulty of satisfying all
requirements under a static COEE infrastructure. Significant differences in server load levels were
observed, primarily due to filtering based on the security level criterion. During the simulation, the
system was unable to place some VMs due to the simultaneous shortage of resources and
insufficient trust levels in the available servers. Specifically, around 40 VM placement failures were
recorded, mainly during time steps where certain VMs—particularly those with high security
requirements—could not be allocated at any point throughout the simulation [
        <xref ref-type="bibr" rid="ref16 ref17 ref18">16–18</xref>
        ].
      </p>
      <p>The graph in Figure 2 illustrates the trade-off between efficiency and security of virtual
machines in the COEE at different values of the weight coefficient β, highlighting the prioritization
of resource usage (efficiency) versus compliance with the COEE’s information security
requirements [19]. So when β = 0 model (1)–(14) it is exclusively focused on COEE information
security, and accordingly, minimizes penalties for placing VMs on insufficiently protected servers,
regardless of the number of active nodes. For β = 1 the model minimizes the number of servers
involved, ignoring information security requirements. Values between 0 and 1 show varying
degrees of compromise. That is, as β increases, the cost of resource efficiency decreases, but the risk
of violating information security requirements increases. The obtained results were used to justify
the selection of the optimal value of β based on the policy of Abai Kazakh National Pedagogical
University (strict COEE information security policy of Abai KazNPU) β ≈ 0.3; saving resources
β ≈ 0.7.</p>
      <p>As a result, the conducted simulation confirms the necessity of considering information security
when designing the architecture of a private university cloud. The model presented in the paper
demonstrates that ignoring security requirements when estimating the number of required nodes
leads to the risk of partial unavailability of computing resources, even when the total CPU capacity
of the COEE servers is formally sufficient.</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>As part of the grant project IRN AP19678846 “Enhancing the Efficiency of Hybrid and Distance
Learning Formats Through the Development of University Infrastructure in the Context of Digital
Transformation”, a mathematical model was developed to estimate the optimal number of
computing nodes in a private university virtualization cloud, taking into account both technical
constraints and information security requirements of the university’s Cloud-Oriented Educational
Environment (COEE).</p>
      <p>Unlike existing approaches, the proposed model incorporates the trust level of COEE servers
and the security requirements of virtual machines, enabling the formalization of information
security (IS) risks and their inclusion in the objective function. This has made it possible to
construct a multi-criteria optimization problem for VM placement, focused on achieving a balance
between resource efficiency and COEE security in universities.</p>
      <p>The simulation conducted in the Python programming environment demonstrated that ignoring
IS factors leads to the failure to place certain VMs, even when the cluster’s total computational
capacity appears sufficient. The results confirm the relevance of integrating IS policies into
planning and scaling models for university cloud infrastructure.</p>
      <p>We believe the developed model is well-suited to serve as a foundation for designing intelligent
cloud management systems in the educational environment, aimed at adaptive load balancing with
consideration of information security requirements.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgements</title>
      <p>This work was carried out within the framework of the grant research project IRN AP19678846:
“Enhancing the Efficiency of Hybrid and Distance Learning Formats Through the Development of
University Infrastructure in the Context of Digital Transformation”.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.
[19] Q. Yao, Y. Wu, J. Gao, Research on Application of Cloud Desktop Virtualization for Computer
Laboratories in Universities, in: IOP Conference Series: Materials Science and Engineering,
563(5), 2019, 052028.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Bykov</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
           
          <article-title>Shyshkina, The Conceptual Basis of the University Cloud-based Learning and Research Environment Formation and Development in View of the Open Science Priorities, Inf</article-title>
          . Technol. Learning Tools,
          <volume>68</volume>
          (
          <issue>6</issue>
          ) (
          <year>2018</year>
          )
          <fpage>1</fpage>
          -
          <lpage>19</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>O.</given-names>
             
            <surname>Glazunova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Shyshkina</surname>
          </string-name>
          , The Concept,
          <article-title>Principles of Design and Implementation of the University Cloud-based Learning</article-title>
          and Research Environment, arXiv,
          <year>2018</year>
          . doi:
          <volume>10</volume>
          .48550/arXiv.
          <year>1807</year>
          .08560
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J. </given-names>
            <surname>Park</surname>
          </string-name>
          , H. Kim,
          <string-name>
            <surname>Y.</surname>
          </string-name>
           
          <article-title>Jeong, Efficiency Sustainability Resource Visual Simulator for Clustered Desktop Virtualization based on Cloud Infrastructure</article-title>
          , Sustainability,
          <volume>6</volume>
          (
          <issue>11</issue>
          ) (
          <year>2014</year>
          )
          <fpage>8079</fpage>
          -
          <lpage>8091</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>B.</given-names>
             
            <surname>Akhmetov</surname>
          </string-name>
          ,et al.,
          <source>Estimation of the Required Number of Nodes of a University Cloud Virtualization Cluster, Int. J. Electrical &amp; Comput. Eng. (2088-8708)</source>
          ,
          <volume>15</volume>
          (
          <issue>1</issue>
          ) (
          <year>2025</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J. </given-names>
            <surname>Zhang</surname>
          </string-name>
          , et al.,
          <article-title>A Unified Algorithm for Virtual Desktops Placement in Distributed Cloud Computing</article-title>
          , Math. Problems Eng.
          <year>2016</year>
          (
          <article-title>1) (</article-title>
          <year>2016</year>
          )
          <fpage>9084370</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Huang</surname>
          </string-name>
          , H. Xu,
          <string-name>
            <given-names>H.</given-names>
             
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <surname>X.</surname>
          </string-name>
           Ma, W. Hussain,
          <string-name>
            <surname>SSUR:</surname>
          </string-name>
          <article-title>An Approach to Optimizing Virtual Machine Allocation Strategy based on User Requirements for Cloud Data Center</article-title>
          ,
          <source>IEEE Transactions on Green Commun. Netw</source>
          .
          <volume>5</volume>
          (
          <issue>2</issue>
          ) (
          <year>2021</year>
          )
          <fpage>670</fpage>
          -
          <lpage>681</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Bichler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
             
            <surname>Speitkamp</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Mathematical</given-names>
            <surname>Programming</surname>
          </string-name>
          <article-title>Approach for Server Consolidation Problems in VirtualizedData Centers</article-title>
          ,
          <source>in: IEEE Transactions on Services Computing</source>
          ,
          <volume>3</volume>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>N.</given-names>
             
            <surname>Gephart</surname>
          </string-name>
          ,
          <string-name>
            <surname>B.</surname>
          </string-name>
           
          <article-title>Kuperman, Design of a Virtual Computer Lab Environment for Hands-on Information Security Exercises</article-title>
          ,
          <source>J. Comput. Sci. Colleges</source>
          ,
          <volume>26</volume>
          (
          <issue>1</issue>
          ) (
          <year>2010</year>
          )
          <fpage>32</fpage>
          -
          <lpage>39</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Alqahtani</surname>
          </string-name>
          , Factors Affecting Cybersecurity Awareness among University Students, Appl. Sci.
          <volume>12</volume>
          (
          <issue>5</issue>
          ) (
          <year>2022</year>
          )
          <fpage>2589</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>J. Ulven</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
           
          <article-title>Wangen, A Systematic Review of Cybersecurity Risks in Higher Education</article-title>
          , Future Internet,
          <volume>13</volume>
          (
          <issue>2</issue>
          ) (
          <year>2021</year>
          )
          <fpage>39</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Haque</surname>
          </string-name>
          , et al.,
          <source>Cybersecurity in Universities: An Evaluation Model, SN Computer Science</source>
          ,
          <volume>4</volume>
          (
          <issue>5</issue>
          ) (
          <year>2023</year>
          )
          <fpage>569</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>V.</given-names>
            <surname>Susukailo</surname>
          </string-name>
          , et al.,
          <source>Cybercrimes Investigation via Honeypots in Cloud Environments, in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          ,
          <volume>2923</volume>
          ,
          <year>2021</year>
          ,
          <fpage>91</fpage>
          -
          <lpage>96</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Martseniuk</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Shadow</surname>
            <given-names>IT</given-names>
          </string-name>
          <article-title>Risk Analysis in Public Cloud Infrastructure</article-title>
          ,
          <source>in: Cyber Security and Data Protection</source>
          ,
          <volume>3800</volume>
          ,
          <year>2024</year>
          ,
          <fpage>22</fpage>
          -
          <lpage>31</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Martseniuk</surname>
          </string-name>
          , et al.,
          <source>Universal Centralized Secret Data Management for Automated Public Cloud Provisioning, in: Cybersecurity Providing in Information and Telecommunication Systems II, 3826</source>
          ,
          <year>2024</year>
          ,
          <fpage>72</fpage>
          -
          <lpage>81</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Martseniuk</surname>
          </string-name>
          , et al.,
          <article-title>Research of the Centralized Configuration Repository Efficiency for Secure Cloud Service Infrastructure Management</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          ,
          <volume>3991</volume>
          ,
          <year>2025</year>
          ,
          <fpage>260</fpage>
          -
          <lpage>274</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>O.</given-names>
             
            <surname>Mykhaylova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Korol</surname>
          </string-name>
          ,
          <string-name>
            <surname>R.</surname>
          </string-name>
           Kyrychok,
          <article-title>Research and Analysis of Issues and Challenges in Ensuring Cyber Security in Cloud Computing, in: Cybersecurity Providing in Information and Telecommunication Systems II</article-title>
          , vol.
          <volume>3826</volume>
          ,
          <year>2024</year>
          ,
          <fpage>30</fpage>
          -
          <lpage>39</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Martseniuk</surname>
          </string-name>
          , et al.,
          <source>Automated Conformity Verification Concept for Cloud Security, in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems, CPITS</source>
          , vol.
          <volume>3654</volume>
          (
          <year>2024</year>
          )
          <fpage>25</fpage>
          -
          <lpage>37</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>V.</given-names>
            <surname>Shapoval</surname>
          </string-name>
          , et al.,
          <article-title>Automation of Data Management Processes in Cloud Storage</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems, CPITS</source>
          , vol.
          <volume>3654</volume>
          (
          <year>2024</year>
          )
          <fpage>410</fpage>
          -
          <lpage>418</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>