GRAMOTA Publishers suggests publishing your scientific articles in periodicals
Pan-ArtPedagogy. Theory & PracticePhilology. Theory & PracticeManuscript

Archive of Scientific Articles

SOURCE:    Almanac of Modern Science and Education. Tambov: Gramota, 2013. № 10. P. 35-38.
SCIENTIFIC AREA:    Technical Sciences
Procedure of Scientific Articles Publication | To Show Issue Content | To Show All Articles in Section | Subject Index

License Agreement on scientific materials use.

CLOUD COMPUTING SECURITY PROBLEMS. ANALYSIS OF CLOUDS PROTECTION METHODS SUGGESTED BY CLOUD SECURITY ALLIANCE

Berdnik Aleksei Vyacheslavovich
Tyumen State University


Abstract. Different types of existing cloud computing threats are considered in the article. Cloud elements attacks and their elimination solutions as well as the approbation of the solution concerning the protection from clouds security threats suggested by the company Cloud Security Alliance (CSA) are analyzed. Solutions concerning the protection from cloud computing security threats are presented.
Key words and phrases: облачные вычисления, информационная безопасность, виртуальная среда, атаки на облака, Cloud Security Alliance, cloud computing, information security, virtual environment, clouds attacks, Cloud Security Alliance
Open the whole article in PDF format. Free PDF-files viewer can be downloaded here.
References:
  1. Berdnik A. V. Sravnitel'nyi analiz reshenii po bezopasnosti SaaS servisa ot kompanii IBM i KROK // Bezopasnost' informatsionnogo prostranstva: sbornik statei. Tyumen', 2012. S. 245-253.
  2. Berdnik A. V., Boiko A. Metody zashchity virtual'noi sredy // Vserossiiskii zhurnal nauchnykh publikatsii. 2013. № 3 (18). S. 24-27.
  3. Emel'yanova Yu. G., Fralenko V. P. Analiz problem i perspektivy sozdaniya intellektual'noi sistemy obnaruzheniya i predotvrashcheniya setevykh atak na oblachnye vychisleniya [Elektronnyi resurs] // Programmnye sistemy: teoriya i prilozheniya. 2011. № 4 (8). S. 17-31. URL: http://psta.psiras.ru/read/psta2011_4_17-31.pdf (data obrashcheniya: 19.08.2013).
  4. Korzhov V. Opasny li oblaka? [Elektronnyi resurs] // Seti / Network World. 2010. № 07. URL: http://www.osp.ru/nets/2010/07/13004633/ (data obrashcheniya: 19.08.2013).
  5. Oblaka: legendy i mify [Elektronnyi resurs]. URL: http://www.anti-malware.ru/node/2333 (data obrashcheniya: 19.08.2013).
  6. Oblachnye vychisleniya, "dyryavye" oblaka i sposoby zashchity dannykh [Elektronnyi resurs]. URL: http://4by4.ru/ru/analytics/oblachnye-vychisleniya-dyryavye-oblaka-i-sposoby-zashchity-dannyh (data obrashcheniya: 19.08.2013).
  7. Osnovnye zashchitnye mekhanizmy, ispol'zuemye v SZI [Elektronnyi resurs]. URL: http://asher.ru/security/book/its/07 (data obrashcheniya: 19.08.2013).
  8. Romanov N. Real'nye problemy virtual'nykh TsOD [Elektronnyi resurs] // Jet Info. 2012. № 3. URL: http://www.jetinfo.ru/jetinfo_arhiv/zaschita-virtualnykh-sred/realnye-problemy-virtualnykh-tsod/2012 (data obrashcheniya: 19.08.2013).

Procedure of Scientific Articles Publication | To Show Issue Content | To Show All Articles in Section | Subject Index

© 2006-2024 GRAMOTA Publishers

site development and search engine optimization (seo): krav.ru