Bohdan Strykhalyuk, Natalija Hots, A. Szelmanowski, G. Kowalczyk, A. Pazur, Maciej Deliś
{"title":"Architectural transformations in distributed telecommunications service systems and problems of ensuring information security","authors":"Bohdan Strykhalyuk, Natalija Hots, A. Szelmanowski, G. Kowalczyk, A. Pazur, Maciej Deliś","doi":"10.5604/01.3001.0054.1756","DOIUrl":null,"url":null,"abstract":"The article discusses the architectural transformations of distributed tele-communications service systems and methods of optimizing their reliability and efficiency. Modern distributed service-oriented networks are presented as complex heterogeneous systems, most of which are currently based on so-called cloud technologies. Cloud service systems were analyzed as an alternative to business customers purchasing their own powerful computing systems, software, and storage technologies. The principle of sharing these resources based on their virtualization was proposed. The main problems and ways of ensuring safety of information in these systems are provided.","PeriodicalId":342247,"journal":{"name":"Journal of KONBiN","volume":"138 9‐10","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of KONBiN","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5604/01.3001.0054.1756","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The article discusses the architectural transformations of distributed tele-communications service systems and methods of optimizing their reliability and efficiency. Modern distributed service-oriented networks are presented as complex heterogeneous systems, most of which are currently based on so-called cloud technologies. Cloud service systems were analyzed as an alternative to business customers purchasing their own powerful computing systems, software, and storage technologies. The principle of sharing these resources based on their virtualization was proposed. The main problems and ways of ensuring safety of information in these systems are provided.