Ensuring information security of cloud storages
- Authors: Bespalova N.V.1, Nechaev S.V.1
-
Affiliations:
- Issue: No 2 (2023)
- Pages: 19-26
- Section: Articles
- URL: https://journals.rcsi.science/2409-7543/article/view/381014
- DOI: https://doi.org/10.25136/2409-7543.2023.2.40770
- EDN: https://elibrary.ru/INXNVX
- ID: 381014
Cite item
Full Text
Abstract
The subject of the study is cloud storage. The object of the study is the information security of cloud systems. In the course of the work, the regulatory framework was determined, which allows regulating work with cloud technologies at the legislative level. The Russian and foreign statistical data on the use of cloud technologies by corporate clients and individuals were analyzed, the main specific security problems of cloud solutions were identified, such as data storage, the use of modular infrastructure in the cloud, the vulnerability of virtual machines to malware infection, connection instability, access rights differentiation, unbalanced actions of the client and the cloud service provider. In the course of the work, the concept of building multi-level security of cloud systems was formulated. This approach will not only increase the time spent, but also the complexity of the process of infiltration of an attacker into the system, which will increase the chances of timely recognition and prevention of various types of attacks. A solution for building a security system was proposed, which includes the following steps: choosing reliable encryption and authentication methods, using a firewall to filter traffic and prevent intrusions, ensuring data transmission over the Internet in a secure execution, using an intrusion detection and prevention system.
About the authors
Natalya Viktorovna Bespalova
Email: NVBespalova@fa.ru
ORCID iD: 0000-0003-3733-3119
Sergei Vasilevich Nechaev
Email: sergey.nechaev2018@yandex.ru
ORCID iD: 0009-0009-8987-8648
References
Клементьев И. П., Устинов В. А. Введение в Облачные вычисления: ИНТУИТ, 2016. Toutov A. et al. Optimizing the Migration of Virtual Machines in Cloud Data Centers // International Journal of Embedded and Real-Time Communication Systems (IJERTCS). 2022. Vol. 13. No. 1. Pp. 1-19. Миронова А. О. и др. Применение методики оценки угроз безопасности информации // Энергетические установки и технологии. 2021. Т. 7. №. 4. С. 71. Акбарова М. Р. Безопасность и защита данных в облачных технологиях // Universum: технические науки. 2022. №. 10-1 (103). С. 17-19. Нестеренко В. Р., Маслова М. А. Современные вызовы и угрозы информационной безопасности публичных облачных решений и способы работы с ними // Научный результат. Информационные технологии. 2021. Т. 6. №. 1. С. 48-54. Alshamrani A. et al. A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities // IEEE Communications Surveys & Tutorials. 2019. Vol. 21. No. 2. Pp. 1851-1877. Canizo M. et al. Multi-head CNN–RNN for multi-time series anomaly detection: An industrial case study // Neurocomputing. 2019. Vol. 363. Pp. 246-260. Ahmed M., Mahmood A. N., Hu J. A survey of network anomaly detection techniques // Journal of Network and Computer Applications. 2016. Vol. 60. Pp. 19-31.
Supplementary files
