Analysis of critical IT infrastructure designing problems for a ministry




Architecture, cloud services, global integration as a service, data center, critical ІТ-infrastructure


The problems of creating a critical IT infrastructure of the ministry are analyzed. The classic model of cloud services, which consists of three layers, is considered. It has been shown that the specificity of the tasks performed by the ministries (departments) puts the developer with increased requirements for reliability, safety, availability in the automation of their processes. As a result, it has been shown that the use of only these three layers to create a critical IT infrastructure of ministries (departments), even as a private cloud, is no longer sufficient. Several additional layers are proposed for the classical cloud service model, such as BaaS and XaaS. The first layer, Business as a Service (BaaS), includes automation of process management at the organizational level, including monitoring of performance indicators, analytical reports, data consolidation and centralized enterprise level integration. The second layer - everything as a service (XaaS), provides total automation of the industry level, including the introduction of industry standards, the automation of cross-integration of many enterprises. A further analysis of the developed model has been carried out and it has been determined that in order to create a single information space of the ministry (agencies) as an object of informatization with a critical IT infrastructure, it is necessary to put in its implementation a number of new possibilities. They stipulate the need to upgrade both the hardware infrastructure, both system and application software. Therefore, the creation of critical IT infrastructure with these capabilities requires the implementation of new specialized means of data transmission and storage of information. These tools are characterized by a number of key characteristics such as interactivity, multi-tieredness, heterogeneity, distribution, and dynamic modification of data structures during the lifecycle of critical IT infrastructure information systems in accordance with meta-models of the subject area based on metadata interpretation. All of the above points to the need to put into the model another GaaS last layer (the transition to global integration as a service). The last part of the article provides an analysis of the requirements for constructing a critical IT infrastructure.

Author Biographies

Ihor Bondarenko, Informatization Department, Ministry of Internal Affairs, Kyiv,


Yaroslav Dorohyi, National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv,

candidate of technical sciences, associate professor, associate professor in Department of Automation and Control in Technical Systems

Sergii Stirenko, National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv,

doctor of technical sciences, professor, chief of Computing Engineering Department

Tymur Shemsedynov, National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv,

senior teacher in computing engineering academic department


M. Gorin, “Corporate Data Center: Beyond Technology”, Connect! World of Communication, no. 8, pp. 19-20, 2007.

I. Kirill, “Commercial data centers in Ukraine: a new stage of development”, Networks and business, no. 3 (52), 2010 [Online]. Available: 2010_3/statia_3_1_2010/ statia_3_1_2010.htm.

D. S. Biriukov, and S. I. Kondratov, Critical Infrastructure Protection: Problems and Prospects for Implementation in Ukraine. Kyiv, Ukraine: NISS, 2012.

D. S. Biriukov, and S. I. Kondratov, The concept of critical infrastructure protection: the state, problems and prospects of its implementation in Ukraine, in Proc. International scientific and practical conference, Kyiv, 2014.

P. D. Rohov, B. O. Vorovych, and T. O. Vorona, “War in cyberspace”, Defensive Herald, no. 1, pp. 16-21, 2017.

S. O. Hnatiuk, V. M. Sydorenko, and O. P. Duksenko, “Modern approaches to critical infrastructure objects detection and identification”, Bezpeka ìnformacìì, vol. 21, no. 3, pp. 269-275, 2015.

S. O. Hnatiuk, R. S. Odarchenko, and V. M. Sydorenko, “Analysis of the methods of calculating the criticality of information systems”, in Proc. 9th International Scientific and Practical Conference "Integrated Intelligent Robot Engineering Complexes”, Kyiv, 2016, pp. 279-281.

L. Badger, T. Grance, R. Patt-Corner, and J. Voas, Cloud Computing Synopsis and Recommendations. Recommendations of the National Institute of Standards and Technology (Special Publication 800-146, NIST), 2012.

Y. Duan, G. Fu, N. Zhou, X. Sun, N. Narendra, and B. Hu, “Everything as a Service (XaaS) on the Cloud: Origins, Current and Future Trends”, in Proc. IEEE 8th International Conference on Cloud Computing, New York, 2015, pp. 621-628. doi: 10.1109/CLOUD.2015.88.

B. Viswanathan, “Understanding The Different Levels of Help Desk Support” [Online]. Available:



How to Cite

Bondarenko, I., Dorohyi, Y., Stirenko, S., & Shemsedynov, T. (2018). Analysis of critical IT infrastructure designing problems for a ministry. Information Technology and Security, 6(1), 96–107.