Ðóñ Eng Cn Translate this page:
Please select your language to translate the article


You can just close the window to don't translate
Library
Your profile

Back to contents

National Security
Reference:

Tsaregorodtsev, A.V., Kachko, A.K. Guarantees of information security at the “cloud” architecture of the organization.

Abstract: Cloud computing becomes one of the most popular IT technologies for the applications, due to their key specifi c features: fl exibility of solutions, accessibility upon request and good correlation of price and quality. Migration to the cloud architecture allows the organizations to lower the costs on introduction and support of the infrastructure, and it shortens the term of development of new business application. At the same time the most topical issue regarding migration of the data to this cloud is the issue of information security. There are many factors, which infl uence the complex security of the cloud structure, since its multi-rent structure causes new more complicated problems and vulnerabilities. The article includes analysis of the existing models of provision of cloud services (saas, paas, iaas), the authors view the key levels of cloud formation, a number of considerable bonuses and modern solutions, which the organizations can apply, while using cloud technologies. Much attention is paid to the issues of information security and possible solutions while forming a complex system of information protection in cloud architecture.


Keywords:

military, information, security, threats, risks, cloud, services, management, counter-measures, assets.


This article is unavailable for unregistered users. Click to login or register

References
1. Upravlenie oblachnymi tekhnologiyami // Tekhnicheskiy otchet CSA, 2009.
2. http://www.idcrussia.ru (Otchet «Rynok oblachnykh uslug v Rossii» kompanii IDC)
3. Oblachnye vychisleniya: Preimushchestva, riski i rekomendatsii po upravleniyu bezopasnost'yu //
4. Tekhnicheskiy otchet ENISA - Evropeyskoe agentstvo po setevoy i informatsionnoy bezopasnosti,
5. 2009.
6. Ouns S. Elastichnaya bezopasnost' v oblachnykh tekhnologiyakh. - Izdatel'stvo Commun ACM 53(6), 2010.
7. - S.46–51.
8. Chen I. Pekson I., Pekson V. Novye problemy informatsionnoy bezopasnosti oblakov //Tekhnicheskiy
9. otchet UCB/EECS-2010-5, Departament EECS, Universitet Kalifornii, Berkli, 2010.
10. Molnar D., Sheshter S. Obespechenie bezopasnosti oblaka na urovne khosta // Tezisy doklada konferen-
11. tsii «Otkrytye voprosy informatsionnoy bezopasnosti», 2010.
12. Baldvin A., Dalton K., Shiu S., Kostienko K., Razhput K. Obespechenie servisov bezopasnosti dlya
13. virtual'noy infrastruktury. -Izdatel'stvo SIGOPS Oper Syst Rev 43(1), 2010. - S.44–51.
14. Dzhinpeng V., Ksyaolyan' Z., Glenn A. Upravlenie bezopasnost'yu virtual'nykh obrazov v oblachnoy srede
15. t // Tezisy dokladov konferentsii CCSW ’09, 2009. - N'yu-York, SShA. - S. 91–96.