SECURITY THREATS IN CLOUD SYSTEMS AND WAYS OF THEIR DESTRUCTION

Authors

  • Ostapchenko Konstantin National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", Ukraine
  • Odynets Tetiana National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", Ukraine

Keywords:

cyberattack, IT-infrastructure, data compromise, cloud systems

Abstract

The article deals with the problem of data security threats that is managed by applications and services running on cloud systems, as well as data that is directly stored in cloud storage repositories. In the scope of this article the main types of threats and recommendations for their minimization are described.

Key words: cloud systems, data compromise, IT-infrastructure, cyberattack.

Bibl.: 3.

References

Wei J. Cloud Security Alliance. Security as a Service [Електронний ресурс] / електрон. наук. вид. Security Guidance for Critical Areas of Focus in Cloud. – 2015. – № 4. – С.102–144. – Режим доступу до журн. : https://downloads.cloudsecurityalliance.org/assets/research/security-guidance/security-guidance-v4-FINAL.pdf.

Ali M. Security in cloud computing: Opportunities and challenges [Електронний ресурс] : електронне видання Elsevier / Khan S. U., Vasilakos A. V. // An International Journal. – 2017. – № 305. – С. 359–373. – Режим доступу до журн. : https://pdfs.semanticscholar.org/40e7/adc40b609cd13f9b84a5cc9ae780ffba6ec0.pdf.

Zissis D. Addressing cloud computing security issues [Електронний ресурс] / Lekkas D. // Future Generation Computer Systems. – 2012. – № 28. – С.15–43. – Режим доступу до журн. : https://doi.org/10.1016/j.future.2010.12.006.

Published

2023-11-08

Issue

Section

Security, Fault Tolerance