Protection of cloud infrastructure from cyber attacks

DOI: 10.31673/2409-7292.2022.025259

Authors

  • Д. В. Яновський, (Yanovsʹkyy D. V.) State University of Telecommunications, Kyiv
  • В. С. Тищенко, (Tyshchenko V. S.) State University of Telecommunications, Kyiv

DOI:

https://doi.org/10.31673/2409-7292.2022.025259

Abstract

The article analyzes modern cloud systems. The problems, conflicts and possible limitations of cloud software and cloud services are studied. Recommendations for ensuring protection have been developed.

Keywords: cloud technologies, network, cloud computing, servers, route, cloud services, cloud deployment model, digital content, information.

References
1. Haghighat, Mohammad (2015). CloudID: Trustworthy Cloud-based and Cross-Enterprise Biometric Identification. Expert Systems with Applications 42 (21). – P. 7905–7916.
2. Eric Grosse, Mayank Upadhyay, Authentication at Scale. IEEE Security and Privacy, January/February 2013, IEEE Computer and Reliability Societies. – P. 15-22
3. Gnanasundaram, S.; Shrivastava, A., eds. (2012). Information Storage and Management: Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments. John Wiley and Sons. – 255 p.
4. Pritchard, S. (December 2017). "Cloud-to-cloud backup: What it is and why you need it". Computer Weekly. TechTarget. – Режим доступу: World Wide Web. – URL: https://www.computerweekly.com/feature/Cloud-to-cloud-backup-What-it-is-and-why-you-need-it
5. Wayne Jansen, Timothy Grance Guidelines on Security and Privacy in Public Cloud Computing, NIST Special Publication 800-144, 2011. – Режим доступу: World Wide Web. – URL: http://csrc.nist.gov/publications/nistpubs/800-144/SP800- 144.pdf

Published

2022-07-29

Issue

Section

Articles