Security of Web Applications Using AWS Cloud Provider

Authors

  • Vladyslav Lysakov Kharkiv National University of Radio Electronics, Ukraine
  • Oleksandr Sievierinov Kharkiv National University of Radio Electronics, Ukraine
  • Igor Taran Kharkiv National University of Radio Electronics, Ukraine

DOI:

https://doi.org/10.30837/csitic52021232170

Keywords:

web application, authentication, cloud provider, AWS, Cognito, User pool, Identity pool

Abstract

The services of the AWS cloud provider on information security are analyzed. The paper deals with a method of authentication of web application users using the AWS Cognito service. There is described the process of verifying access to a web resource.

References

AWS Documentation, Available at: https://docs.aws.amazon.com/ (accessed 02 April 2021)

Amazon, Inc website, Available at: https://aws.amazon.com/ (accessed 05 April 2021)

Kanikathottu H. Serverless Programming Cookbook, 2019. -C 482. ISBN 978-1-78862-379-7

Власов, А.В., О.В. Сєвєрінов, and О.В. Слиш. Впровадження децентралізованої системи ідентифікації. НТУ «ХПІ», 2020.

Published

2021-05-30

Issue

Section

RELIABILITY AND SAFETY ASSURANCE TECHNOLOGIES FOR COMPUTER AND INFORMATIONAL SYSTEMS