Статья 'Комплексный подход к построению защищенных информационно-телекоммуникационных систем на базе гибридной облачной среды' - журнал 'Национальная безопасность / nota bene' - NotaBene.ru
по
Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Editorial board > Peer-review process > Policy of publication. Aims & Scope. > Article retraction > Ethics > Online First Pre-Publication > Copyright & Licensing Policy > Digital archiving policy > Open Access Policy > Article Processing Charge > Article Identification Policy > Plagiarism check policy > Editorial collegium
Journals in science databases
About the Journal

MAIN PAGE > Back to contents
National Security
Reference:

Комплексный подход к построению защищенных информационно-телекоммуникационных систем на базе гибридной облачной среды

Los' Alexey Borisovich

PhD in Technical Science

Docent, the department of Cyber Security, National Research University “Higher School of Economics”

123458, Russia, Moscow, Tallinskaya Street 34, office #810

alos@hse.ru
Other publications by this author
 

 
Tsaregorodtsev Anatolii Valer'evich

Doctor of Technical Science

Professor, the department of Cyber Security, National Research University “Higher School of Economics”

123458, Russia, Moscow, Tallinskaya Street 34, office #809

academic_tsar@mail.ru
Sorokin Aleksandr Vladimirovich

Senior Educator, the department of Cyber Security, National Research University “Higher School of Economics”

123458, Russia, Moscow, Tallinskaya Street 34, office #809

wolfram1985@mail.ru

DOI:

10.7256/2454-0668.2016.3.16542

Received:

02-10-2015


Published:

06-07-2016


Abstract: This article examines the issues of ensuring information security in the sphere of cloud technologies. Information and telecommunication systems, operating on the basis of cloud computing technology, over the recent years have become more widespread, with constantly growing needs in processing of the large volumes of data.The key point in the use of cloud computing is the issue of ensuring reliable protection of data during transmission, processing and storage. The article identifies the main problems of cloud computing from the point of view of information security and examines solutions when building complex systems of information protection in cloud architecture. In order too solve this issue, this work applies the method of theoretical analysis of the source data in various areas of the matter under consideration, the method of summarizing the results and formulating appropriate solutions. Scientific novelty of the work consists in a theoretical comprehensive analysis of this problem, including examination of threat to information in the cloud field, existing solutions in the specified direction and development on the basis of the results of the procedure for the comprehensive protection of cloud computing. Proposed applications of cloud computing for processing and storage of information of various categories, including critical assets. For working with such data, it is proposed to create a hybrid cloud environment, incorporating traditional cloud architecture elements of private clouds.


Keywords:

information and telecommunication systems, cloud computing, hybrid cloud, private cloud, critical archives, information security threats, information security management, security requirements, information assets, information risks

References
1. Oblachnaya bezopasnost' – vzglyad iz Evropy.–rezhim dostupa: http://cloudzone.ru/ articles/analytics/51.html.
2. Oblachnye servisy. Vzglyad iz Rossii/Pod red. E. Grebneva.–M.: CNews.-2011.-34 s.
3. Syurtukov I.V. Chto meshaet aktivnomu perekhodu zakazchikov v Rossii k «oblachnym» tekhnologiyam? Portal iBusiness.–rezhim dostupa: http://i-business.ru/blogs/11529 .
4. Soobshchestvo Security Focus.–Rezhim dostupa:http://www.security focus.com/tools/3189.
5. Thompson B. Storm warning for cloud computing.–rezhim dostupa: http://www.news.bbc.co.uk/2/hi/technology/7421099.stm.
6. Kabanov A.S., Los' A.B. Voprosy obespecheniya informatsionnoi bezopasnosti pri ispol'zovanii oblachnykh tekhnologii v gosudarstvennom sektore //Kachestvo. Innovatsii. Obrazovanie. M.:«Izvestiya».-2014.-№6(109).-S.33-39.
7. National Institute of Standards and Technology (NIST). Definition of .–rezhim dostupa: Cloud Computing http://csrc.nist.gov/groups/SNS/cloud-computing/
8. Tsaregorodtsev A.V. Postroenie derev'ev tselei dlya identifikatsii trebovanii bezopasnosti sredy oblachnykh vychislenii//Natsional'naya bezopasnost'.–M.: Izd-vo "NB Media".-2013.–№5(28).–S.51-69.
9. Tsaregorodtsev A.V., Kislitsyn A.S. Osnovy sinteza zashchishchennykh telekommunikatsionnykh sistem.– M.: Radiotekhnika.-2006.-244s.
10. Tsaregorodtsev A.V., Kachko A.K. Odin iz podkhodov k upravleniyu informatsionnoi bezopasnost'yu pri razrabotke informatsionnoi infrastruktury organizatsii//Natsional'naya bezopasnost'.–M.: Izd-vo "NB Media".-2012.-№1(18).– S.46-59.
Link to this article

You can simply select and copy link from below text field.


Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.