Ðóñ Eng Cn Translate this page:
Please select your language to translate the article


You can just close the window to don't translate
Library
Your profile

Back to contents

National Security
Reference:

Los' A.B., Tsaregorodtsev A.V., Sorokin A.V. Integrated approach to the construction of secure information and telecommunication systems based on hybrid cloud environment

Abstract: This article examines the issues of ensuring information security in the sphere of cloud technologies. Information and telecommunication systems, operating on the basis of cloud computing technology, over the recent years have become more widespread, with constantly growing needs in processing of the large volumes of data.The key point in the use of cloud computing is the issue of ensuring reliable protection of data during transmission, processing and storage. The article identifies the main problems of cloud computing from the point of view of information security and examines solutions when building complex systems of information protection in cloud architecture. In order too solve this issue, this work applies the method of theoretical analysis of the source data in various areas of the matter under consideration, the method of summarizing the results and formulating appropriate solutions. Scientific novelty of the work consists in a theoretical comprehensive analysis of this problem, including examination of threat to information in the cloud field, existing solutions in the specified direction and development on the basis of the results of the procedure for the comprehensive protection of cloud computing. Proposed applications of cloud computing for processing and storage of information of various categories, including critical assets. For working with such data, it is proposed to create a hybrid cloud environment, incorporating traditional cloud architecture elements of private clouds.


Keywords:

information risks, security requirements, information assets, information security management, information security threats, critical archives, private cloud, hybrid cloud, cloud computing, information and telecommunication systems


This article can be downloaded freely in PDF format for reading. Download article

This article written in Russian. You can find original text of the article here .
References
1. Oblachnaya bezopasnost' – vzglyad iz Evropy.–rezhim dostupa: http://cloudzone.ru/ articles/analytics/51.html.
2. Oblachnye servisy. Vzglyad iz Rossii/Pod red. E. Grebneva.–M.: CNews.-2011.-34 s.
3. Syurtukov I.V. Chto meshaet aktivnomu perekhodu zakazchikov v Rossii k «oblachnym» tekhnologiyam? Portal iBusiness.–rezhim dostupa: http://i-business.ru/blogs/11529 .
4. Soobshchestvo Security Focus.–Rezhim dostupa:http://www.security focus.com/tools/3189.
5. Thompson B. Storm warning for cloud computing.–rezhim dostupa: http://www.news.bbc.co.uk/2/hi/technology/7421099.stm.
6. Kabanov A.S., Los' A.B. Voprosy obespecheniya informatsionnoy bezopasnosti pri ispol'zovanii oblachnykh tekhnologiy v gosudarstvennom sektore //Kachestvo. Innovatsii. Obrazovanie. M.:«Izvestiya».-2014.-¹6(109).-S.33-39.
7. National Institute of Standards and Technology (NIST). Definition of .–rezhim dostupa: Cloud Computing http://csrc.nist.gov/groups/SNS/cloud-computing/
8. Tsaregorodtsev A.V. Postroenie derev'ev tseley dlya identifikatsii trebovaniy bezopasnosti sredy oblachnykh vychisleniy//Natsional'naya bezopasnost'.–M.: Izd-vo "NB Media".-2013.–¹5(28).–S.51-69.
9. Tsaregorodtsev A.V., Kislitsyn A.S. Osnovy sinteza zashchishchennykh telekommunikatsionnykh sistem.– M.: Radiotekhnika.-2006.-244s.
10. Tsaregorodtsev A.V., Kachko A.K. Odin iz podkhodov k upravleniyu informatsionnoy bezopasnost'yu pri razrabotke informatsionnoy infrastruktury organizatsii//Natsional'naya bezopasnost'.–M.: Izd-vo "NB Media".-2012.-¹1(18).– S.46-59.