JOURNAL ARTICLE

INFORMATION SECURITY OF CLOUD COMPUTING TECHNOLOGY

T Cherviakova

Year: 2020 Journal:   The National Transport University Bulletin Vol: 1 (46)Pages: 427-436

Abstract

The article is devoted to the analysis of theoretical and practical aspects of technology of cloud computing, revealing of the main problems of providing information security of various models of cloud services and models of deployment of cloud environments, as well as the choice of methods for providing security of data processing and methods for improving the safety of cloud computing. Object of research - information security technology cloud computing. The purpose of the work is to analyze the theoretical and practical aspects of information security technology of cloud computing, determination of their principles and perspectives. Methods of research - analysis, synthesis, generalization, systematization, graphic. One of the main approaches to the implementation of cloud infrastructure is the virtualization technology - the provision of computing resources abstracted from their real hardware implementation. With the increase in the degree of cloud computing technology openness, the flexibility of its operation and the universality of access, the security of the system decreases and requires more complicated methods of ensuring its security. The cloud computing system can be exposed to several types of security threats, including threats to the integrity, privacy and availability of its resources, data, and virtual infrastructure. The construction of the cloud computing security system requires taking into account the model of its deployment (private, public or hybrid cloud) and the differences in the levels of control and access for user and provider in different cloud service models (IaaS, PaaS, SaaS). The most effective and thus universal way of ensuring data protection in the cloud, as well as its confidentiality and integrity, is to use the data encryption at the file level when transmitting over information networks and when storing inside the cloud. IT-administrators and users can partially regain control over the security of their data, using security­based solutions based on data encryption. Using the appropriate encryption methods prevents unauthorized access to data, regardless of where they are located, in the process of transmitting or storing it in the cloud, and allowing organizations to take advantage of cloud computing without compromising or minimizing risk. KEYWORDS: CLOUD COMPUTING, CLOUD SERVICES, INFORMATION SECURITY.

Keywords:
Cloud computing Cloud computing security Computer science Computer security Cloud testing Virtualization Utility computing Application security Software deployment Data security Security information and event management Encryption Software engineering Operating system

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.31
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Cybersecurity and Information Systems
Physical Sciences →  Computer Science →  Computer Networks and Communications
Information Systems and Technology Applications
Social Sciences →  Business, Management and Accounting →  Management Information Systems
Sustainability and Innovation in Business
Social Sciences →  Business, Management and Accounting →  Management of Technology and Innovation

Related Documents

JOURNAL ARTICLE

Network information security technology based on cloud computing environment

Ke Li

Journal:   Journal of Electronics and Information Science Year: 2023 Vol: 8 (2)
JOURNAL ARTICLE

Cloud Computing Technology: Architecture, Models and Information Security Aspects

Kateryna SydorYuriy Shcherbyna

Journal:   Vìsnik Nacìonalʹnogo unìversitetu Lʹvìvsʹka polìtehnìka Serìâ Ìnformacìjnì sistemi ta merežì Year: 2025 Vol: 18 (2)Pages: 184-191
BOOK-CHAPTER

Cloud Computing Technology and Security

Joseph Migga Kizza

Texts in computer science Year: 2024 Pages: 519-543
BOOK-CHAPTER

Cloud Computing Technology and Security

Joseph Migga Kizza

Computer communications and networks Year: 2017 Pages: 477-501
© 2026 ScienceGate Book Chapters — All rights reserved.