概述云计算对数据安全和完整性的威胁

IF 0.2 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia Pub Date : 2023-03-28 DOI:10.30837/rt.2023.1.212.03
M.V. Yesina, A.A. Kravchenko, S.O. Kravchenko
{"title":"概述云计算对数据安全和完整性的威胁","authors":"M.V. Yesina, A.A. Kravchenko, S.O. Kravchenko","doi":"10.30837/rt.2023.1.212.03","DOIUrl":null,"url":null,"abstract":"Cloud computing has become an integral part of our lives, and today it is used almost everywhere. In general, cloud computing is a concept of providing IT resources in the form of services. There are two cloud computing models: deployment models, which differ in the type of cloud management and access to the cloud and the level of security, and service models, which differ in the level of service provision, which affects, among other things, the level of responsibility of the service provider and the consumer. Cloud services began to gain popularity in 2009, and the demand for them has grown exponentially every year. They became especially popular during the pandemic in 2019, when people had to stay at home without interrupting their work processes, and now, in post-covid times, they also remain popular due to their convenience, high availability, easy scalability and cost savings. Due to the widespread use of cloud computing services, a high level of security is required. Unfortunately, the popularity of cloud computing has its drawbacks – in addition to the fact that it is more difficult to monitor the security of a remote environment than the security of a local computer, there are many other threats. In today's reality, people use cloud computing technologies in large volumes, for example, at work, for personal purposes, etc., as they have great trust in these technologies. This is the reason why it is necessary to maintain a high level of security and constantly improve it. Cloud computing security threats are usually divided into confidentiality, integrity, and availability threats. To prevent the loss of confidential information, service providers must ensure its integrity. Users want to be sure that their data will not fall into the hands of an intruder or third-party services. Therefore, this article discusses the most common threats to data security and integrity in cloud computing and the existing methods that prevent these vulnerabilities and possible problems at different levels and with the help of different tools.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"3 1","pages":""},"PeriodicalIF":0.2000,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An overview of threats to data security and integrity in cloud computing\",\"authors\":\"M.V. Yesina, A.A. Kravchenko, S.O. Kravchenko\",\"doi\":\"10.30837/rt.2023.1.212.03\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing has become an integral part of our lives, and today it is used almost everywhere. In general, cloud computing is a concept of providing IT resources in the form of services. There are two cloud computing models: deployment models, which differ in the type of cloud management and access to the cloud and the level of security, and service models, which differ in the level of service provision, which affects, among other things, the level of responsibility of the service provider and the consumer. Cloud services began to gain popularity in 2009, and the demand for them has grown exponentially every year. They became especially popular during the pandemic in 2019, when people had to stay at home without interrupting their work processes, and now, in post-covid times, they also remain popular due to their convenience, high availability, easy scalability and cost savings. Due to the widespread use of cloud computing services, a high level of security is required. Unfortunately, the popularity of cloud computing has its drawbacks – in addition to the fact that it is more difficult to monitor the security of a remote environment than the security of a local computer, there are many other threats. In today's reality, people use cloud computing technologies in large volumes, for example, at work, for personal purposes, etc., as they have great trust in these technologies. This is the reason why it is necessary to maintain a high level of security and constantly improve it. Cloud computing security threats are usually divided into confidentiality, integrity, and availability threats. To prevent the loss of confidential information, service providers must ensure its integrity. Users want to be sure that their data will not fall into the hands of an intruder or third-party services. Therefore, this article discusses the most common threats to data security and integrity in cloud computing and the existing methods that prevent these vulnerabilities and possible problems at different levels and with the help of different tools.\",\"PeriodicalId\":41675,\"journal\":{\"name\":\"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia\",\"volume\":\"3 1\",\"pages\":\"\"},\"PeriodicalIF\":0.2000,\"publicationDate\":\"2023-03-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.30837/rt.2023.1.212.03\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30837/rt.2023.1.212.03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

摘要

云计算已经成为我们生活中不可或缺的一部分,如今它几乎无处不在。一般来说,云计算是一个以服务的形式提供IT资源的概念。有两种云计算模型:部署模型和服务模型,前者在云管理和云访问的类型以及安全级别上有所不同,后者在服务提供级别上有所不同,后者会影响服务提供者和使用者的责任级别等。云服务在2009年开始流行,对它的需求每年都呈指数级增长。在2019年大流行期间,当人们不得不呆在家里而不中断他们的工作流程时,它们变得特别受欢迎。现在,在新冠肺炎后的时代,它们因其便利性、高可用性、易于扩展和节省成本而仍然受欢迎。由于云计算服务的广泛使用,需要高水平的安全性。不幸的是,云计算的普及有其缺点——除了监视远程环境的安全性比监视本地计算机的安全性困难这一事实之外,还有许多其他威胁。在当今的现实中,人们大量使用云计算技术,例如,在工作中,出于个人目的等,因为他们对这些技术非常信任。这就是为什么需要保持高水平的安全性并不断改进的原因。云计算安全威胁通常分为保密性威胁、完整性威胁和可用性威胁。为了防止机密信息的丢失,服务提供商必须确保其完整性。用户希望确保他们的数据不会落入入侵者或第三方服务的手中。因此,本文将讨论云计算中对数据安全性和完整性的最常见威胁,以及在不同级别和借助不同工具防止这些漏洞和可能问题的现有方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
An overview of threats to data security and integrity in cloud computing
Cloud computing has become an integral part of our lives, and today it is used almost everywhere. In general, cloud computing is a concept of providing IT resources in the form of services. There are two cloud computing models: deployment models, which differ in the type of cloud management and access to the cloud and the level of security, and service models, which differ in the level of service provision, which affects, among other things, the level of responsibility of the service provider and the consumer. Cloud services began to gain popularity in 2009, and the demand for them has grown exponentially every year. They became especially popular during the pandemic in 2019, when people had to stay at home without interrupting their work processes, and now, in post-covid times, they also remain popular due to their convenience, high availability, easy scalability and cost savings. Due to the widespread use of cloud computing services, a high level of security is required. Unfortunately, the popularity of cloud computing has its drawbacks – in addition to the fact that it is more difficult to monitor the security of a remote environment than the security of a local computer, there are many other threats. In today's reality, people use cloud computing technologies in large volumes, for example, at work, for personal purposes, etc., as they have great trust in these technologies. This is the reason why it is necessary to maintain a high level of security and constantly improve it. Cloud computing security threats are usually divided into confidentiality, integrity, and availability threats. To prevent the loss of confidential information, service providers must ensure its integrity. Users want to be sure that their data will not fall into the hands of an intruder or third-party services. Therefore, this article discusses the most common threats to data security and integrity in cloud computing and the existing methods that prevent these vulnerabilities and possible problems at different levels and with the help of different tools.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia ENGINEERING, ELECTRICAL & ELECTRONIC-
自引率
33.30%
发文量
0
期刊最新文献
Combined heat conductive boards with polyimide dielectrics Synthesis and analysis of the trace detector of air objects of an interrogating radar system Creating a call center test bench for load balancing Asterisk servers in a cluster Current state and development trends of class E oscillators: an overview Experimental studies of a lidar emitter built according to the oscillator-amplifier scheme
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1