Abstract
Cloud computing has become a necessary component for data storage and processing and is becoming more widespread. However, there are threats to the security and privacy of user data, which is why it is important to find out the most effective methods for ensuring data security in the cloud. The purpose of the study was to develop methods aimed at ensuring privacy and security in cloud environments and in modern applications. The method of analysis was used to review other publications on the topic, and the method of experiment was used for practical implementation. The main results of the study include the development of a security monitoring programme. It analyses event logs and determines the number of failed login attempts, which indicates the detection or absence of suspicious activity. Access to resources is checked, and the necessary information is displayed on the console. A comparison table of cloud platforms has been created, considering their advantages and disadvantages in the context of data security and privacy. It specifies the criteria for delivering services to the selected services. A block diagram of ways to provide security in cloud computing is developed, illustrating the relationship between various aspects of providing security in cloud systems. It contains parameters and strategies for encrypting data, protecting sensitive data, and countering attacks. Various aspects of security and methods of ensuring privacy in cloud computing are considered, namely authorisation, intrusion detection, regulatory requirements, integration with modern applications, monitoring and logging, user identification and authentication. The practical significance of the study lies in the creation of innovative ways to help improve security and privacy in cloud computing. They will allow cloud developers and administrators to effectively protect user data and ensure their privacy in modern applications
Publisher
Scientific Journals Publishing House
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献