Ensuring information security of cloud storages
The subject of the study is cloud storage. The object of the study is the information security of cloud systems. In the course of the work, the regulatory framework was determined, which allows regulating work with cloud technologies at the legislative level. The Russian and foreign statistical data...
Saved in:
| Published in | Вопросы безопасности no. 2; pp. 19 - 26 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
01.02.2023
|
| Online Access | Get full text |
| ISSN | 2409-7543 2409-7543 |
| DOI | 10.25136/2409-7543.2023.2.40770 |
Cover
| Abstract | The subject of the study is cloud storage. The object of the study is the information security of cloud systems. In the course of the work, the regulatory framework was determined, which allows regulating work with cloud technologies at the legislative level. The Russian and foreign statistical data on the use of cloud technologies by corporate clients and individuals were analyzed, the main specific security problems of cloud solutions were identified, such as data storage, the use of modular infrastructure in the cloud, the vulnerability of virtual machines to malware infection, connection instability, access rights differentiation, unbalanced actions of the client and the cloud service provider. In the course of the work, the concept of building multi-level security of cloud systems was formulated. This approach will not only increase the time spent, but also the complexity of the process of infiltration of an attacker into the system, which will increase the chances of timely recognition and prevention of various types of attacks. A solution for building a security system was proposed, which includes the following steps: choosing reliable encryption and authentication methods, using a firewall to filter traffic and prevent intrusions, ensuring data transmission over the Internet in a secure execution, using an intrusion detection and prevention system. |
|---|---|
| AbstractList | The subject of the study is cloud storage. The object of the study is the information security of cloud systems. In the course of the work, the regulatory framework was determined, which allows regulating work with cloud technologies at the legislative level. The Russian and foreign statistical data on the use of cloud technologies by corporate clients and individuals were analyzed, the main specific security problems of cloud solutions were identified, such as data storage, the use of modular infrastructure in the cloud, the vulnerability of virtual machines to malware infection, connection instability, access rights differentiation, unbalanced actions of the client and the cloud service provider. In the course of the work, the concept of building multi-level security of cloud systems was formulated. This approach will not only increase the time spent, but also the complexity of the process of infiltration of an attacker into the system, which will increase the chances of timely recognition and prevention of various types of attacks. A solution for building a security system was proposed, which includes the following steps: choosing reliable encryption and authentication methods, using a firewall to filter traffic and prevent intrusions, ensuring data transmission over the Internet in a secure execution, using an intrusion detection and prevention system. |
| Author | Bespalova, Natalya Viktorovna Nechaev, Sergei Vasilevich |
| Author_xml | – sequence: 1 givenname: Natalya Viktorovna surname: Bespalova fullname: Bespalova, Natalya Viktorovna – sequence: 2 givenname: Sergei Vasilevich surname: Nechaev fullname: Nechaev, Sergei Vasilevich |
| BookMark | eNqNj8tqwzAQRUVJoWmab6h_wM5IsjP2soT0AYFusheSPA4GRwqSTfHf105K6bKbucMM58J5ZAvnHTH2zCETBZfbjcihSrHIZSZATCPLARHu2PL3sfizP7B1jK0BKThiLviSbfYuDqF1p6R1jQ9n3bfeJZHsdOzHxDeJ7fxQJ7H3QZ8oPrH7RneR1j-5YsfX_XH3nh4-3z52L4fUVghpjYBaa7AExCu5rQHrkqQ1BVLJ67LKIbcoUZSSyHLLazIGyDRSaORGyxUrb7WDu-jxS3eduoT2rMOoOKirupqt1GylZnUl1FV9QvGG2uBjDNT8m_wGey9fOA |
| Cites_doi | 10.1016/j.neucom.2019.07.034 10.1109/COMST.2019.2891891 10.1016/j.jnca.2015.11.016 10.4018/IJERTCS.289200 |
| ContentType | Journal Article |
| DBID | AAYXX CITATION ADTOC UNPAY |
| DOI | 10.25136/2409-7543.2023.2.40770 |
| DatabaseName | CrossRef Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| EISSN | 2409-7543 |
| EndPage | 26 |
| ExternalDocumentID | 10.25136/2409-7543.2023.2.40770 10_25136_2409_7543_2023_2_40770 |
| GroupedDBID | AAYXX ADBBV ALMA_UNASSIGNED_HOLDINGS BCNDV CITATION ADTOC UNPAY |
| ID | FETCH-LOGICAL-c970-d707aaa0ce0e1936d07d8e3cb57e81d89404c737283eec1c1debb0ebf32a71ba3 |
| IEDL.DBID | UNPAY |
| ISSN | 2409-7543 |
| IngestDate | Tue Aug 19 17:57:44 EDT 2025 Tue Jul 01 02:39:31 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 2 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c970-d707aaa0ce0e1936d07d8e3cb57e81d89404c737283eec1c1debb0ebf32a71ba3 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://doi.org/10.25136/2409-7543.2023.2.40770 |
| PageCount | 8 |
| ParticipantIDs | unpaywall_primary_10_25136_2409_7543_2023_2_40770 crossref_primary_10_25136_2409_7543_2023_2_40770 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2023-2-00 |
| PublicationDateYYYYMMDD | 2023-02-01 |
| PublicationDate_xml | – month: 02 year: 2023 text: 2023-2-00 |
| PublicationDecade | 2020 |
| PublicationTitle | Вопросы безопасности |
| PublicationYear | 2023 |
| References | ref8 ref7 ref4 ref3 ref6 ref5 ref2 ref1 |
| References_xml | – ident: ref1 – ident: ref4 – ident: ref3 – ident: ref7 doi: 10.1016/j.neucom.2019.07.034 – ident: ref5 – ident: ref6 doi: 10.1109/COMST.2019.2891891 – ident: ref8 doi: 10.1016/j.jnca.2015.11.016 – ident: ref2 doi: 10.4018/IJERTCS.289200 |
| SSID | ssib032177421 ssib038073197 |
| Score | 2.2112992 |
| Snippet | The subject of the study is cloud storage. The object of the study is the information security of cloud systems. In the course of the work, the regulatory... |
| SourceID | unpaywall crossref |
| SourceType | Open Access Repository Index Database |
| StartPage | 19 |
| Title | Ensuring information security of cloud storages |
| URI | https://doi.org/10.25136/2409-7543.2023.2.40770 |
| UnpaywallVersion | publishedVersion |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources (selected full-text only) customDbUrl: eissn: 2409-7543 dateEnd: 99991231 omitProxy: true ssIdentifier: ssib032177421 issn: 2409-7543 databaseCode: M~E dateStart: 20140101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NSwMxEB1qe_DkBypWVPbgNdvsJrvZHIu0FKGlhxbqacnnxbIttovowd9u0t2V6kHUewbyJiHzhszMA7izVAituEGGS4kotRYJbBiKBVeCRzZLhG9OHk_S0Zw-LJJFC3pNL8ze_72LvCTtuYjDEUsoCb3QdxiHLgNhLkfvpIkj323ozCfT_qOXkGsWVlVcP1l_iUGHZbEWry9iudwLLMNjmDZbqupJnsJyK0P19m1a4x_2fAJHNckM-tWtOIWWKc6gNyg2u57EoB6W6o8k2NT6dcHKBmq5KnXgyyXdI7M5h9lwMLsfoVouASnOMNIMMyEEVgYbx8pSjZnODFEyYcaR0oxTTJUXpcmIMSpSkTZSYiMtiQWLpCAX0C5WhbmEIMOWZInyo_U1ZVZzLKlVcSKYUlKnsgu48V--roZi5C6Z2IHPPfjcg889-DzOd-C7EH36-bc2V_-wuYb29rk0N44pbOUtHIzfB7f1HfkASWO0tA |
| linkProvider | Unpaywall |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NSwMxEA2lPXjyAxUVlRy8ZpvdJJvNsUhLESw9tFBPIZ8Xy7bYLqK_3qS7K9WDqPcM5E1C5g2ZmQfAnadKWSMcckJrRKn3SGHHUaaEUSL1BVOxOflxko_n9GHBFh3Qb3th9v7vQ-QleT9EHIE4oySJQt9JloQMhIccvZezQL67oDefTAdPUUKuXVhXcf1k_SUGHVTlWr29quVyL7CMjsC03VJdT_KcVFudmPdv0xr_sOdjcNiQTDiob8UJ6LjyFPSH5WbXkwibYanxSOCm0a-DKw_NclVZGMslwyOzOQOz0XB2P0aNXAIygmNkOeZKKWwcdoGV5RZzWzhiNOMukNJCUExNFKUpiHMmNal1WmOnPckUT7Ui56Bbrkp3AWCBPSmYiaP1LeXeCqypNxlT3Bhtc30JcOs_ua6HYsiQTOzAywheRvAygpeZ3IG_BOmnn39rc_UPm2vQ3b5U7iYwha2-bW7HBxHFs4M |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Ensuring+information+security+of+cloud+storages&rft.jtitle=%D0%92%D0%BE%D0%BF%D1%80%D0%BE%D1%81%D1%8B+%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D0%B8&rft.au=Bespalova%2C+Natalya+Viktorovna&rft.au=Nechaev%2C+Sergei+Vasilevich&rft.date=2023-02-01&rft.issn=2409-7543&rft.eissn=2409-7543&rft.issue=2&rft.spage=19&rft.epage=26&rft_id=info:doi/10.25136%2F2409-7543.2023.2.40770&rft.externalDBID=n%2Fa&rft.externalDocID=10_25136_2409_7543_2023_2_40770 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2409-7543&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2409-7543&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2409-7543&client=summon |