Безопасность информационных технологий (Sep 2018)

Some information security problems of cloud data storage

  • Oleg Y. Madatov

DOI
https://doi.org/10.26583/bit.2018.3.05
Journal volume & issue
Vol. 25, no. 3
pp. 45 – 52

Abstract

Read online

Last years the systems of remote data storage based on the Cloud Storage technologies have become widely used. This popularity is explained by its significant advantages for the users as compared to any other technologies of storing and accessing data. Indeed, a remote access of information located in the cloud storage with the help of computers, smartphones, tablets and other similar devices provides an opportunity for its owner to use the data needed at any time and practically everywhere (via the Internet). However, this advantage has a certain risk. A placement of information on the remote media inevitably reduces its security level. It happens due to both hard- and software failures and any illegal activities. To prevent the resulting loss, theft or alteration of the data is an important issue discussed below. The aim of the present research is to identify possible information security problems related to the cloud data storage and try to find its solutions. We study the vulnerabilities of information security of the most popular cloud data stores in Russia. The theoretical basis of the study is given by the works of the leading scientists such as I.Yu. Grishin, A.V. Eskov, V.S. Simankov, A.B. Sizonenko and others. The analyses of the most popular cloud storages have revealed a problem which creates serious threats to the information security of the data. Namely, file downloads to the server in an unencrypted format opens a possibility of unauthorized access both at the information transfer stage and as a result of illegal actions of software owners or servers employees, operations of foreign intelligence services or hacker groups. We justify that in order to solve this problem it is necessary to develop the specialized independent software which allows encrypting the information before its transfer to the cloud storage.

Keywords