STUDY OF SECURITY MECHANISMS CLOUD SERVICES
Natalia A. Golovacheva
Senior Lecturer, Department of Information Security,
Volgograd State University
This email address is being protected from spambots. You need JavaScript enabled to view it.
Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation
Maxim S. Romanov
Student, Department of Information Security,
Volgograd State University
This email address is being protected from spambots. You need JavaScript enabled to view it.
Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation
Abstract. The article analyzes the protection mechanisms of cloud services. Criteria for adequate evaluation of these mechanisms are identified. In the framework of experimental research, the best mechanism of cloud service protection is identified, taking into account the requirements and needs of the user. In the modern information society, everyone is faced with the problem of securely storing various passwords, logins and other data. Someone wrote them down in a notebook or just on a piece of paper that was glued to the computer from which they authenticated. All this is long in the past. Any data leak will cause moral and material harm to both an ordinary person and a large company. Today, cloud computing is used for this as the main method of storing data at work or at home. The leaders in cloud technologies are the following Internet services: Dropbox, OneDrive, Google Drive, iCloud, Yandex.Disk, Cloud Mail.Ru, MegaDisk, Mega, BOX, pCloud, Files.fm, WDfiles.ru, wdho.ru, Anonfile.com, My-Files.Ru. Not only must cloud service providers protect their customers, network infrastructure, applications and platforms, but the user himself must ensure the security of his data and applications using strong passwords and authentication measures.
Key words: information system, information security, cybersecurity, cloud computing, cloud technology, cloud system, DDoS attack, IoT.
This work is licensed under a Creative Commons Attribution 4.0 International License.