CLOUD COMPUTING SECURITY ISSUES AND SOLUTIONS
Ruslan B. Senaliev
Master’s Student, Department of Information Security,
Volgograd State University
This email address is being protected from spambots. You need JavaScript enabled to view it.
Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation
Vladislav G. Yarikov
Candidate of Sciences (Pedagogy),
Associate Professor, Department of Mathematics and Physics Teaching Methods, ICT,
Volgograd State Social and Pedagogical University
This email address is being protected from spambots. You need JavaScript enabled to view it.
Prosp. Lenina, 27, 400005 Volgograd, Russian Federation
Abstract. The article highlights issues related to key security aspects in modern cloud environments. The systematized review of the types of cloud technologies and their current security issues highlights the significance and complexity of threats that organizations face when moving to cloud solutions. In today’s world of information technology, cloud computing has taken a key role, allowing organizations and individuals to access powerful computing resources, data storage and applications over the Internet. This model offers flexibility, scalability
and economy, opening up new opportunities for business development, research and social life. However, along with unprecedented benefits, cloud technology brings new security challenges. The importance of security in cloud computing cannot be overemphasized. Data and applications stored in the cloud become targets for cyber-attacks, information leaks, and regulatory compliance breaches. Given that cloud services are often used to process and store sensitive information, including personal data, financial records, and intellectual property, security risks can have serious implications. The analysis concludes that despite the benefits of flexibility, scalability, and economy that cloud services offer, meaningful strategies and measures are needed to secure data and infrastructure. Inadequate identity and access management, threats to data protection, lack of visibility and monitoring, interoperability and interconnectivity issues, and regulatory compliance and governance require a comprehensive approach and continuous adaptation to new threats.
Key words: cloud computing, cloud data security, identity management, multifactor authentication, data encryption, protocol standardization, cloud services integration.
This work is licensed under a Creative Commons Attribution 4.0 International License.