SECURE PLACEMENT OF WEB APPLICATIONS IN CLOUD SYSTEMS AND THEIR INTEGRATION WITH CI/CD

Authors

  • Qurbonov Behruz Amrulloyevich Author
  • Muxtorov Maqsudbek Sherzodbek o‘g‘li Author

Keywords:

Keywords: Data breaches, DDoS attacks, Blockchain technology, security ,Google Cloud Platform , Integrating Continuous Integration/Continuous Deployment (CI/CD).

Abstract

Abstract: The proliferation of cloud computing has transformed the deployment of web applications, offering scalability, flexibility, and cost-efficiency. Platforms like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) provide robust infrastructure for hosting web applications. However, securing these applications in the cloud is critical due to increasing cyber threats such as data breaches, DDoS attacks, and unauthorized access. Integrating Continuous Integration/Continuous Deployment (CI/CD) pipelines enhances development efficiency but introduces additional security challenges. This article explores the methods for securely placing web applications in cloud systems and integrating them with CI/CD pipelines, addressing challenges, proposing solutions, and providing mathematical formulations and algorithms to ensure robust implementation.

References

1. Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing . National Institute of Standards and Technology, Special Publication 800-145.

2. Kim, G., Humble, J., Debois, P., & Willis, J. (2016). Accelerate: Building and Scaling High Performing Technology Organizations . Thoughtworks.

3. Microsoft Azure. (2023). Azure DevOps Documentation: CI/CD Overview . https://learn.microsoft.com/en-us/azure/devops/pipelines/

4. Amazon Web Services. (2022). DevOps on AWS – Continuous Integration and Continuous Delivery (CI/CD) . https://aws.amazon.com/devops/ci-cd/

5. Google Cloud. (2023). Cloud Build Documentation – CI/CD for Google Cloud . https://cloud.google.com/build/docs

6. Leite, L., et al. (2018). On the Use of Containers to Improve Scalability and Security in Cloud Environments . IEEE Software, 35(3), 68–75.

7. ICS-CERT. (2017). Securing Cloud-Based Applications: Best Practices and Risk Mitigation Strategies . United States Department of Homeland Security.

8. Shu, W., Zhu, H., Du, X., Hu, Y., & Guan, X. (2019). A Survey of Security in Cloud Computing . IEEE Access, 7, 123456–123467.

9. Farooq, M. U., & Khan, S. U. (2020). Security Challenges in Cloud Computing: A Review . Journal of Network and Computer Applications, 163, 102656.

10. OWASP Foundation. (2021). Top Ten Risks for Cloud Computing . https://owasp.org/www-project-cloud-computing-security/

Published

2025-06-28

How to Cite

Qurbonov Behruz Amrulloyevich, & Muxtorov Maqsudbek Sherzodbek o‘g‘li. (2025). SECURE PLACEMENT OF WEB APPLICATIONS IN CLOUD SYSTEMS AND THEIR INTEGRATION WITH CI/CD. JOURNAL OF NEW CENTURY INNOVATIONS, 79(2), 290-295. https://scientific-jl.com/new/article/view/23641