CLOUD COMPUTING SECURITY ISSUES AND SOLUTIONS

Ruslan B. Senaliev

Master’s Student, Department of Information Security,

Volgograd State University
This email address is being protected from spambots. You need JavaScript enabled to view it.
Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Vladislav G. Yarikov

Candidate of Sciences (Pedagogy),
Associate Professor, Department of Mathematics and Physics Teaching Methods, ICT,

Volgograd State Social and Pedagogical University
This email address is being protected from spambots. You need JavaScript enabled to view it.
Prosp. Lenina, 27, 400005 Volgograd, Russian Federation

Abstract. The article highlights issues related to key security aspects in modern cloud environments. The systematized review of the types of cloud technologies and their current security issues highlights the significance and complexity of threats that organizations face when moving to cloud solutions. In today’s world of information technology, cloud computing has taken a key role, allowing organizations and individuals to access powerful computing resources, data storage and applications over the Internet. This model offers flexibility, scalability

and economy, opening up new opportunities for business development, research and social life. However, along with unprecedented benefits, cloud technology brings new security challenges. The importance of security in cloud computing cannot be overemphasized. Data and applications stored in the cloud become targets for cyber-attacks, information leaks, and regulatory compliance breaches. Given that cloud services are often used to process and store sensitive information, including personal data, financial records, and intellectual property, security risks can have serious implications. The analysis concludes that despite the benefits of flexibility, scalability, and economy that cloud services offer, meaningful strategies and measures are needed to secure data and infrastructure. Inadequate identity and access management, threats to data protection, lack of visibility and monitoring, interoperability and interconnectivity issues, and regulatory compliance and governance require a comprehensive approach and continuous adaptation to new threats.

Key words: cloud computing, cloud data security, identity management, multifactor authentication, data encryption, protocol standardization, cloud services integration.

 

Creative Commons License
This work is licensed under a 
Creative Commons Attribution 4.0 International License.
Attachments:
Download this file (3_Senaliev, Yarikov.pdf) 3_Senaliev, Yarikov.pdf
URL: https://ti.jvolsu.com/index.php/en/component/attachments/download/948
1 DownloadUpdate this file (3_Senaliev, Yarikov.pdf)