Cloud computing: information security concerns
Matematičeskaâ biologiâ i bioinformatika, Tome 10 (2015) no. 2, pp. 567-579.

Voir la notice de l'article provenant de la source Math-Net.Ru

The rapid development of information technology in today's society dictates new requirements for information security technologies of data, methods of remote access and data processing, integrated reduction of financial expenses on working with information. In recent years, the ideal solution to all these problems that is widely suggested is the concept of cloud computing. This technique really makes a number of clear advantages when working with information and is already widely used in a number of areas of scientific and business activities, but many aspects of information security, characteristic of cloud computing is still far from a satisfactory solution. The article discusses the main challenges of information security of cloud computing. A review of methods to ensure data security, the choice of the most secure cloud computing is discussed, and models to provide the method of increasing the security of cloud computing are looked at.
@article{MBB_2015_10_2_a1,
     author = {E. A. Isaev and D. V. Dumsky and V. A. Samodurov and V. V. Kornilov},
     title = {Cloud computing: information security concerns},
     journal = {Matemati\v{c}eska\^a biologi\^a i bioinformatika},
     pages = {567--579},
     publisher = {mathdoc},
     volume = {10},
     number = {2},
     year = {2015},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/MBB_2015_10_2_a1/}
}
TY  - JOUR
AU  - E. A. Isaev
AU  - D. V. Dumsky
AU  - V. A. Samodurov
AU  - V. V. Kornilov
TI  - Cloud computing: information security concerns
JO  - Matematičeskaâ biologiâ i bioinformatika
PY  - 2015
SP  - 567
EP  - 579
VL  - 10
IS  - 2
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/MBB_2015_10_2_a1/
LA  - ru
ID  - MBB_2015_10_2_a1
ER  - 
%0 Journal Article
%A E. A. Isaev
%A D. V. Dumsky
%A V. A. Samodurov
%A V. V. Kornilov
%T Cloud computing: information security concerns
%J Matematičeskaâ biologiâ i bioinformatika
%D 2015
%P 567-579
%V 10
%N 2
%I mathdoc
%U http://geodesic.mathdoc.fr/item/MBB_2015_10_2_a1/
%G ru
%F MBB_2015_10_2_a1
E. A. Isaev; D. V. Dumsky; V. A. Samodurov; V. V. Kornilov. Cloud computing: information security concerns. Matematičeskaâ biologiâ i bioinformatika, Tome 10 (2015) no. 2, pp. 567-579. http://geodesic.mathdoc.fr/item/MBB_2015_10_2_a1/

[1] Lakhno V. D., Isaev E. A., Pugachev V. D., Zaitsev A. Yu., Fialko N. S., Rykunov S. D., Ustinin M. N., “Razvitie informatsionno-kommunikatsionnykh tekhnologii v Puschinskom nauchnom tsentre RAN”, Matematicheskaya biologiya i bioinformatika, 7:2 (2012), 529–544 | DOI

[2] Antonopoulos N., Gillam L., Cloud Computing: Principles, Systems and Applications, Springer-Verlag, London, 2010, 379 pp. | Zbl

[3] Kornilov V. V., Isaev E. A., Isaev K. A., “Perspektivy ispolzovaniya tsentrov obrabotki dannykh pri reshenii zadach matematicheskoi biologii i bioinformatiki”, Matematicheskaya biologiya i bioinformatika, 10:1 (2015), 60–71 | DOI | Zbl

[4] Oplachko E. S., Ustinin D. M., Ustinin M. N., “Oblachnye tekhnologii i ikh primenenie v zadachakh vychislitelnoi biologii”, Matematicheskaya biologiya i bioinformatika, 8:2 (2013), 449–466 | DOI

[5] Isaev E. A., Kornilov V. V., “Problema obrabotki i khraneniya bolshikh ob'emov nauchnykh dannykh i podkhody k ee resheniyu”, Matematicheskaya biologiya i bioinformatika, 8:1 (2013), 49–65 | DOI

[6] Amazon Web Services Customer Agreement. Website of Amazon Web Services, , 2008 (data obrascheniya: 21.12.2015) http://aws-portal.amazon.com/gp/aws/developer/terms-and-conditions.html

[7] Jansen W., Grance T., Guidelines on Security and Privacy in Public Cloud Computing, NIST Special Publication 800-144, , 2011, 80 pp. (data obrascheniya: 09.10.2015) http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf

[8] White J. S., Pilbeam A. W., A survey of virtualization technologies with performance testing, Cornell University Library, arXiv: (data obrascheniya: 22.10.2015) 1010.3233v1 [cs.DC]

[9] Mell P., Grance T., The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-145, , 2011, 7 pp. (data obrascheniya: 09.10.2015) http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf

[10] Xavier M. G., Neves M. V., Rossi F. D., Ferreto T. C., Lange T., De Rose C. A. F., “Performance Evaluation of Container-Based Virtualization for High Performance Computing Environments”, 21st Euro. Int. Conf. on Parallel, Distrib. Networkbased Processing, IEEE, 2013, 233–240

[11] Bardac M., Deaconescu R., Florea A. M., “Scaling Peer-to-Peer testing using Linux Containers”, Roedunet International Conference (RoEduNet), IEEE, 2010, 287–292

[12] Yuhao Z., David M. N., “A Virtual Time System for OpenVZ-Based Network Emulations”, Proceeding PADS '11 Proceedings of the 2011 IEEE Workshop on Principles of Advanced and Distributed Simulation (2011), 1–10

[13] Bui T., Analysis of Docker Security, Cornell University Library, arXiv: (data obrascheniya: 21.12.2015) 1501.02967v1 [cs.CR]

[14] Morabito R., Power Consumption of Virtualization Technologies: an Empirical Investigation, Cornell University Library, arXiv: (data obrascheniya: 21.12.2015) 1511.01232v1 [cs.DC]

[15] Cacciatore K., Czarkowski P., Dake S., Garbutt J., Hemphill B., Jainschigg J., Moruga A., Otto A., Peters C., Whitaker B. E., Exploring Opportunities: Containers and OpenStack, OpenStack White Paper, , 2015, 19 pp. (data obrascheniya: 21.12.2015) https://www.openstack.org/assets/pdf-downloads/Containers-and-OpenStack.pdf

[16] Reshetova E., Karhunen J., Nyman T., Asokan N., Security of OS-level virtualization technologies, Cornell University Library, arXiv: (data obrascheniya: 21.12.2015) 1407.4245v1 [cs.CR] | Zbl

[17] Patel A., Taghavi M., Bakhtiyari K., Junior J. C., “An intrusion detection and prevention system in cloud computing: A systematic review”, Journal of Network and Computer Applications, 36 (2013), 25–41 | DOI

[18] Brenton C., The basics of virtualization security, , Cloud Security Alliance, 2011, 17 pp. (data obrascheniya: 09.10.2015) https://cloudsecurityalliance.org/wp-content/uploads/2011/11/virtualization-security.pdf

[19] Kelley D., How Data-Centric Protection Increases Security in Cloud Computing and Virtualization Security Curve, Website of Cloud Security Alliance, , 2011, 6 pp. (data obrascheniya: 09.10.2015) https://cloudsecurityalliance.org/wpcontent/uploads/2011/11/DataCentricProtection_intheCloud.pdf

[20] Berdnik A. V., “Problemy bezopasnosti oblachnykh vychislenii. Analiz metodov zaschity oblakov ot cloud security alliance”, Almanakh sovremennoi nauki i obrazovaniya, 10, Gramota, Tambov, 2013, 35–38

[21] Lubacz J., Mazurczyk W., Szczypiorski K., “Principles and Overview of Network Steganography”, Communications Magazine. IEEE, 52:5 (2014), 225–229, arXiv: (data obrascheniya: 09.10.2015) 1207.0917v1 [cs.CR] | DOI

[22] Bishop M., Introduction to Computer Security, 1st ed., Pearson Education, Boston, 2004, 747 pp.

[23] Prescott E. Small, Defense in Depth: An Impractical Strategy for a Cyber World, , SANS Institute, 2011, 24 pp. (data obrascheniya: 21.12.2015) https://www.sans.org/readingroom/whitepapers/assurance/defense-depth-impractical-strategy-cyber-world-33896

[24] Harris S., CISSP All-in-One Exam Guide, 6th Edition, McGraw-Hill, Osborne, 2012, 1456 pp.

[25] Rzhabi V., Izbavtes ot opasenii otnositelno bezopasnosti dannykh v oblake, , IBM developerWorks, 2015, 16 pp. (data obrascheniya: 09.10.2015) https://www.ibm.com/developerworks/ru/library/dm-1408datasecuritycloud/dm-1408datasecuritycloud-pdf.pdf

[26] Avoiding the hidden Costs of the Cloud: report of Symantec Corporation, , 2013, 11 pp. (data obrascheniya: 21.12.2015) http://www.symantec.com/content/en/us/about/media/pdfs/b-state-of-cloud-globalresults-2013.en-us.pdf

[27] The Challenges of Cloud Information Governance: A Global Data Security Study, Ponemon Institute Research Report, , 2014, 30 pp. (data obrascheniya: 21.12.2015) http://www2.safenetinc.com/cloud-security-research/SafeNet-Cloud-Governance.pdf

[28] Sultan N., “Making use of cloud computing for healthcare provision: Opportunities and challenges”, International Journal of Information Management, 34 (2014), 177–184 | DOI

[29] Hoff Ch., Security guidance for critical areas of focus in cloud computing, 2011, 12–20 (data obrascheniya: 21.12.2015) https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf