Cloud Technology Security
( Pp. 124-132)

More about authors
Bespalova Natalia V. Cand. Sci. (Phys.-Math.); associate professor, Department of Information Technology, Faculty of Information Technology and Big Data Analysis
Financial University under the Government of the Russian Federation
Moscow, Russian Federation
Abstract:
The article is devoted to the relevance of the use of cloud technologies in the modern world; data on the size of the global market for public cloud services over the past two years is presented. The advantages of using cloud technologies are determined, the classification of cloud systems is considered. The main regulations governing the operation of cloud storage are given. Particular attention is paid to the issues of information security of cloud systems, the most dangerous attacks that are relevant in the field of cloud technologies are presented, their characteristic features and the possible consequences of their occurrence for users and organizations are described. As a solution for creating a cloud system with a high level of security, the concept of multi-level security has been defined, including encryption, multi-factor authentication, the use of the TLS protocol, protection against DDoS attacks, timely monitoring of infrastructure security risks and organizational security policy.
How to Cite:
Bespalova N.V. Cloud Technology Security. Computational Nanotechnology. 2024. Vol. 11. No. 5. Pp. 124–132. (In Rus.). DOI: 10.33693/2313-223X-2024-11-5-124-132. EDN: CBVYSL
Reference list:
Komar R., Patil A. Emerging trends in cloud computing: A comprehensive analysis of deployment models and service models for scalability, flexibility, and security enhancements. Journal of Intelligent Systems and Applied Data Science. 2023. Vol. 1. No. 1.
Toutov A. et al. Optimizing the migration of virtual machines in cloud data centers. International Journal of Embedded and Real-Time Communication Systems (IJERTCS). 2022. Vol. 13. No. 1. Pp. 1–19.
George A.S., Sagayarajan S. Securing cloud application infrastructure: understanding the penetration testing challenges of IaaS, PaaS, and SaaS environments. Partners Universal International Research Journal. 2023. Vol. 2. No. 1. Pp. 24–34.
Nanda A.K. et al. Securing Cloud Infrastructure in IaaS and PaaS Environments. In: Improving Security, Privacy, and Trust in Cloud Computing. IGI Global. 2024. Pp. 1–33.
Gantsatsuk V.V. et al. Approach to organizing information security in the cloud. In: Information security of regions of Russia (IBRR-2021). 2021. Pp. 138–139.
Bespalova N.V., Nechaev S.V. Ensuring information security of cloud storages. Security Issues. 2023. No. 2. Pp. 19–26. (In Rus.)
Tonkikh A.S., Avksentyeva E. Yu. Security threats in cloud technologies and methods for eliminating them. International Journal of Humanities and Natural Sciences. 2024. No. 1-2 (88). Pp. 232–238. (In Rus.)
Mironova A.O. et al. Application of methods for assessing threats to information security. Power Plants and Technologies. 2021. Vol. 7. No. 4. P. 71. (In Rus.)
Maslova M.A., Kuzminykh E.S. Problems of cloud services and methods of protection against risks and threats. Scientific Result Information Technology. 2022. Vol. 7. No. 3. Pp. 14–22. (In Rus.)
Akbarova M.R. Security and data protection in cloud technologies. Universum: Technical Sciences. 2022. No. 10-1 (103). Pp. 17–19. (In Rus.)
Mazneva O.A., Volobuev A.A., Efremov M.A. Information security in cloud data storage. In: Modern information technologies and information security. 2024. P. 87.
Nesterenko V.R., Maslova M.A. Modern challenges and threats to information security of public cloud solutions and ways of working with them. Scientific Result Information Technology. 2021. Vol. 6. No. 1. Pp. 48–54. (In Rus.)
Kocheshkov A.A., Senkiv D.A. Information security of public cloud services. Scientific and Technical Bulletin of the Volga Region. 2020. No. 7. Pp. 70–72. (In Rus.)
Alshamrani A. et al. A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities. IEEE Communications Surveys & Tutorials. 2019. Vol. 21. No. 2. Pp. 1851–1877.
Nikiforova A.A. Information security and cloud computing. E-Scio. 2021. No. 11 (62). Pp. 22–28. (In Rus.)
Yakovishin A.D. Application of cryptographic technologies to protect information in cloud services. International Journal of Humanities and Natural Sciences. 2024. No. 1-2 (88). Pp. 245–249. (In Rus.)
Semeko G.V. Information security in the financial sector: Cybercrime and counteraction strategy. Social Innovations and Social Sciences. 2020. No. 1. Pp. 77–96. (In Rus.)
Bamrara A. Evaluating database security and cyber-attacks: A relational approach. Journal of Internet Banking and Commerce. 2015. Vol. 20. No. 2. Pp. 1–17.
Canizo M. et al. Multi-head CNN–RNN for multi-time series anomaly detection: An industrial case study. Neurocomputing. 2019. Vol. 363. Pp. 246–260.
Ahmed M., Mahmood A.N., Hu J. A survey of network anomaly detection techniques. Journal of Network and Computer Applications. 2016. Vol. 60. Pp. 19–31.
Castillo D.P., Regidor F.M., Higuera J.B. et al. A new mail system for secure data transmission in cyber physical systems. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. 2020. Vol. 28 (2). Pp. 23–48. DOI: 10.1142/ S0218488520400127.
Keywords:
information security, cloud systems, personal data, encryption, authentication.


Related Articles

Multiscale Modeling for Information Control and Processing Pages: 11-20 DOI: 10.33693/2313-223X-2022-9-1-11-20 Issue №20643
A Refined Method for Analytical Modeling of the Processes of Spreading Virus Software to Assess the Security of Informatization Objects
virus software Information system Information Security security threat modeling information security risk assessment
Show more
7. Criminal law, Criminal enforcement law, Criminology Pages: 159-162 Issue №4088
THE USE OF TECHNICAL DEVICES AND INFORMATION TECHNOLOGIES FOR CRIMINAL PURPOSES AS A CIRCUMSTANCE AGGRAVATING THE CRIMINAL LIABILITY
information security crimes cynicism social danger computer
Show more
5. CIVIL LAW, BUSINESS LAW, FAMILY LAW; PRIVATE INTERNATIONAL LAW 12.00.03 Pages: 165-171 Issue №17852
Features and prospects of the reform of the Russian legislation in the sphere of digitalization
digitalization information and analytical systems legal regulation personal data protection information security
Show more
6. PUBLIC LAW (STATE LAW) (5.1.2.) Pages: 139-144 Issue №20974
The Concept of Monitoring Threats to Information Security in Organizations of the Fuel and Energy Complex
fuel and energy complex Ministry of Energy of Russia protected information possible channels of information leakage threat monitoring system
Show more
GENERAL THEORETICAL, CRIMINAL-LEGAL AND OTHER PROBLEMS OF COUNTERING EXTREMISM AND TERRORISM. PROBLEMS OF PREVENTING EXTREMISM AND TERRORISM Pages: 156-160 Issue №23752
Ensuring the Security of the Digital Space from Cyberterrorist Threats
cybercrime cyberterrorism malicious computer programs telecommunication technologies information security
Show more
9. Administrative law; Administrative process, Information Law Pages: 116-120 Issue №5518
THE MODEL OF LEGAL REGULATION OF THE ACTIVITY OF MASS MEDIA IN THE СONTEXT OF INFORMATIONAL SECURITY
Legal model the mechanism of legal regulation subsystem system communication Media
Show more
4. CRIMINAL - LEGAL, CRIMINOLOGICAL, ADMINISTRATIVE AND OTHER MEASURES FOR COUNTERING CRIME IN CONTEMPORARY CONDITIONS Pages: 166-170 Issue №19590
Information Support of Services and Units of the MIA of Russia as an Aspect of Effectiveness of Countering Crime
information resource data banks crime prevention operational environment categorized machine-readable medium
Show more
2. SCIENTIFIC SCHOOL OF DOCTOR OF SCIENCE, PROFESSOR ShHAGAPSOEV Z.L. Pages: 139-141 Issue №7907
INFORMATIONAL TERRORISM AS THE RUSSIAN FEDERATION NATIONAL SECURITY THREAT
information terrorism the threat of information national security information security the global information space
Show more
8. CIVIL LAW BUSINESS LAW FAMILY LAW; PRIVATE INTERNATIONAL LAW 12.00.03 Pages: 207-211 Issue №17564
Legal regulation of personal data processing in Russia
personal data information storage operator employee protection of rights
Show more
12. CRIME IN THE FIELD OF INFORMATION TECHNOLOGY AND CYBER CRIME Pages: 146-148 Issue №10327
ABOUT SOME METHODS OF INFORMATION SECURITY IN THE WORLD WIDE WEB
information security the threat of information national security the global information space the Internet
Show more