Secure and efficient cloud computing environment

Chaikovska, M. and Chaykovskyy, O. Secure and efficient cloud computing environment. International Scientific Journal Industry 4.0, 2018, vol. 3, n. 3, pp. 112-114. [Journal article (Paginated)]

[img]
Preview
Text
SECURE AND EFFICIENT CLOUD COMPUTING ENVIRONMENT.pdf - Published version
Available under License Creative Commons Attribution.

Download (544kB) | Preview

English abstract

The cloud computing environments are cost and productivity efficient, they are quickly replacing the traditional centralized systems. These “clouds” inherit a lot of security concerns of the older systems, but also bring the new ones. This paper examines 3 most popular cloud vulnerabilities, as well as a vulnerability intrinsic to the cloud environments. It proposes solutions and classifies the risks.

Item type: Journal article (Paginated)
Keywords: cloud computing; data breach; data loss; public cloud; vulnerable interfaces; hardware failures; compartmentalization; isolation; STRIDE
Subjects: L. Information technology and library technology
L. Information technology and library technology > LD. Computers.
Depositing user: Chaikovska M
Date deposited: 21 Jul 2020 06:28
Last modified: 21 Jul 2020 06:28
URI: http://hdl.handle.net/10760/40171

References

1. Microsoft Azure. Official site. What is the cloud computing? - https://azure.microsoft.com/en-us/overview/what-is-cloud-computing/

2. Top Threats Working Group. The Treacherous 12. Cloud Computing Top Threats in 2016. – CSA, 2016. – 35 р. - https://downloads.cloudsecurityalliance.org/assets/research/top- threats/Treacherous-12_Cloud-Computing_Top-Threats.pdf

3. Chaikovska M. Adoptive models of management modern IT-projects/ Materials I International Scientifical and Practical Conference Forsight- management: best world practice of development and integration of education, science and business.- Tbilisi:TSU, 2017. – c.114-116.

4. Subra Kumaraswamy. The IRS Breach and the Importance of Adaptive API Security, JUN 05, 2015 - https://apigee.com/about/blog/technology/irs- breach-and-importance-adaptive-api-security

5. Tadapaneni, N. R. (2017). Different Types of Cloud Service Models. Available at SSRN 3614630.

6. Security Guidance for Critical Areas of Focus in Cloud Computing. – CSA, 2014. – 177 р. - https://downloads.cloudsecurityalliance.org/assets/research/security- guidance/csaguide.v3.0.pdf

7. Чайковська М.П. Моделювання комплексної системи інформаційної безпеки організацій в сучасних економічних реаліях/ А.С.Азеев, М.П. Чайковська //Global aspects of World Economy and International Relations in an unstable economy. – Polska, Czestochowie, Akademia Polonia, 2016. – С.879-889.

8. Чайковська М.П., Азєєв А. С. Сучасні напрямки типологізації інформаційних загроз та тренди ринку інформаційної безпеки// "Економіка та суспільство" # 13/2017. Електронне фахове видання. Мукачівський державний університет . - http://www.economyandsociety.in.ua/index.php/journal-13


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item