INFORMATION SECURITY OF CLOUD COMPUTING TECHNOLOGY
ABSTRACT
Cherviakova T.I. Information security of cloud computing technology. Visnyk National Transport University. Series «Technical sciences». Scientific and Technical Collection. - Kyiv: National Transport University, 2020. - Issue 1 (46).
The article is devoted to the analysis of theoretical and practical aspects of technology of cloud computing, revealing of the main problems of providing information security of various models of cloud services and models of deployment of cloud environments, as well as the choice of methods for providing security of data processing and methods for improving the safety of cloud computing.
Object of research - information security technology cloud computing.
The purpose of the work is to analyze the theoretical and practical aspects of information security technology of cloud computing, determination of their principles and perspectives.
Methods of research - analysis, synthesis, generalization, systematization, graphic.
One of the main approaches to the implementation of cloud infrastructure is the virtualization technology - the provision of computing resources abstracted from their real hardware implementation. With the increase in the degree of cloud computing technology openness, the flexibility of its operation and the universality of access, the security of the system decreases and requires more complicated methods of ensuring its security.
The cloud computing system can be exposed to several types of security threats, including threats to the integrity, privacy and availability of its resources, data, and virtual infrastructure.
The construction of the cloud computing security system requires taking into account the model of its deployment (private, public or hybrid cloud) and the differences in the levels of control and access for user and provider in different cloud service models (IaaS, PaaS, SaaS).
The most effective and thus universal way of ensuring data protection in the cloud, as well as its confidentiality and integrity, is to use the data encryption at the file level when transmitting over information networks and when storing inside the cloud.
IT-administrators and users can partially regain control over the security of their data, using securitybased solutions based on data encryption. Using the appropriate encryption methods prevents unauthorized access to data, regardless of where they are located, in the process of transmitting or storing it in the cloud, and allowing organizations to take advantage of cloud computing without compromising or minimizing risk.
KEYWORDS: CLOUD COMPUTING, CLOUD SERVICES, INFORMATION SECURITY.
REFERENCES
- Lakhno, V.D. (2012). Razvitie informatsionno-kommunikatsionnykh tekhnolohii v Pushchinskom nauchnom tsentre RAN.[Development of information and communication technologies in the Pushchinsky Scientific Center of the Russian Academy of Sciences]. / V.D. Lahno, E.A. Isaev, V.D. Pugachev, A.Yu. Zaytsev, N.S. Fialko, S.D. Ryikunov, M.N. Ustinin. // Matematicheskaia biologiia i bioinformatika.- T. 7, # 2. - S. 529-544. [in Russian]
- Antonopoulos, N., Gillam, L. (2010). Cloud Computing: Principles, Systems and Applications. London: Springer-Verlag. - 379 p.
- Isaev, E.A., Kornilov, V.V. (2013). Problema obrabotki i khraneniia bolshikh obiemov nauchnykh danykh i podkhody k ee resheniiu. [The problem of processing and storing large amounts of scientific data and approaches to its solution]. Matematicheskaia biolohiia i bioinformatika. T. 8. № 1. - S. 49-65. [in Russian]
- Jansen, W., Grance, T. (2011). Guidelines on Security and Privacy in Public Cloud Computing.- 80 p. (NIST Special Publication 800-144). URL: http://csrc.nist.gov/publications/nistpubs/800-144/SP800- 144.pdf
- Amazon Web Services Customer Agreement. Website of Amazon Web Services. 2008. URL: http://aws-portal.amazon.com/gp/aws/developer/terms-and-conditions.html
- White J.S., Pilbeam A.W. A survey of virtualization technologies with performance testing. arXiv.org: Cornell University Library. URL: http://arxiv.org/pdf/1010.3233.pdf
- Xavier, M.G., Neves, M.V., Rossi, F.D., Ferreto, T.C., Lange, T., De Rose, C.A.F. (2013). Performance Evaluation of Container-Based Virtualization for High Performance Computing Environments. In: 21st Euro. Int. Conf. on Parallel, Distrib. & Network- based Processing. IEEE. - P. 233-240.
- Morabito R. Power Consumption of Virtualization Technologies: an Empirical Investigation. arXiv.org: Cornell University Library. URL: http://arxiv.org/pdf/1511.01232v1.pdf
- Cacciatore, K., Czarkowski, P., Dake, S., Garbutt, J., Hemphill, B., Jainschigg, J., Moruga, A., Otto, A., Peters, C., Whitaker, B.E. (2015). Exploring Opportunities: Containers and OpenStack. OpenStack White Paper. - 19 p. URL: https://www.openstack.org/assets/pdf-downloads/Containers-and-OpenStack.pdf
- Reshetova E., Karhunen J., Nyman T., Asokan N. Security of OS-level virtualization technologies. arXiv.org: Cornell University Library. URL: http://arxiv.org/pdf/1407.4245v1.pdf
- Patel, A., Taghavi, M., Bakhtiyari, K., Junior, J.C. (2013). An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications. V. 36. - P. 25-41.
- Brenton, C. (2011).The basics of virtualization security. Cloud Security Alliance. - 17 p. URL: https://cloudsecurityalliance.org/wp-content/uploads/2011/ 11/virtualization-security.pdf
- Kelley, D. (2011). How Data-Centric Protection Increases Security in Cloud Computing and Virtualization Security Curve. Website of Cloud Security Alliance. - P. 1-6. URL: https://cloudsecurityalliance.org/wp- content/uploads/2011/ 11/DataCentricProtection_intheCloud.pdf
- Berdnik, A.V. (2013). Problemy bezopasnosti oblachnykh vychislenii. Analiz metodov zashchity
oblakov ot cloud security alliance. [Cloud computing security issues. Analysis of cloud protection methods from cloud security alliance]. Almanakh sovremennoi nauki i obrazovaniia. V: Almanakh sovremennoi nauki i obrazovaniia. - Tambov: Gramota. № 10. - S. 35-38. [in Russian]
- Lubacz, J., Mazurczyk, W., Szczypiorski, K. (2014). Principles and Overview of Network Steganography. Communications Magazine. IEEE. V. 52. # 5. - P. 225-229. URL: http://arxiv.org/pdf/1207.0917.pdf
- Bishop, M. (2004). Introduction to Computer Security, 1st ed. Boston: Pearson Education. -747p.
- Prescott, E. Small (2011). Defense in Depth: An Impractical Strategy for a Cyber World. SANS Institute. - P. 2 - 4. URL: https://www.sans.org/reading- room/whitepapers/assurance/defense-depth- impractical-strategy-cyber-world-33896
- Rzhaby, V. (2015).Yzbav'tes' ot opasenyy otnosytel'no bezopasnosty dannikh v oblake. [Get rid
of concerns about data security in the cloud]. IBM developer Works. - 16 p. URL:
https://www.ibm.com/developerworks/ru/library/dm-1408datasecuritycloud/dm-1408datasecuritycloud- pdf.pdf [in Russian]
- Avoiding the hidden Costs of the Cloud: report of Symantec Corporation. (2013). - P. 1-11. URL: symantec.com/content/en/us/about/media/pdfs/b-state-of-cloud-global- results-2013.en-us.pdf
- The Challenges of Cloud Information Governance: A Global Data Security Study: Ponemon Institute Research Report. (2014). P. 1-30. URL: http://www2.safenet- inc.com/cloud-security- research/SafeNet-Cloud-Governance.pdf
- Sultan, N. (2014). Making use of cloud computing for healthcare provision: Opportunities and challenges. International Journal of Information Management. V. 34. - P. 177-184.
- Hoff, Ch. (2011). In: Security guidance for critical areas of focus in cloud computing. - P. 12-20. URL: https://cloudsecurityalliance.org/ guidance/csaguide.v3.0.pdf
AUTHOR
Vorkut T.A., PhD, Professor, Head of Department of Logistics and Transport Law, National Transport University, Kyiv, Ukraine.
Ivohin E.V., PhD, Professor of Department of System Analysis and Decision-Making Theory, Faculty of Computer Science and Cybernetics, Taras Shevchenko National University of Kyiv, Kyiv, Ukraine.
REVIEWER
Khrutba V.O., Doctor of Technical Sciences, Professor, Department of Ecology and Safety of Vital Functions, National Transport University, Kyiv, Ukraine
Skrypnyk V.S., the Candidate of Technical Sciences, docent, the Deputy Director for Educational Work in Nadvirna college of the National Transport University, Nadvirna, Ukraine
Article language: Ukrainian
Open Access:
http://publications.ntu.edu.ua/visnyk/46/427.pdf
Print date: 15.04.2020
Online publication date: 27.10.2020