Ðóñ Eng Cn Translate this page:
Please select your language to translate the article


You can just close the window to don't translate
Library
Your profile

Back to contents

Security Issues
Reference:

Ensuring information security of cloud storages

Bespalova Natalya Viktorovna

ORCID: 0000-0003-3733-3119

PhD in Physics and Mathematics

Associate Professor, Department of Data Analysis and Machine Learning, Financial University under the Government of the Russian Federation

49/2 Leningradsky Ave., Moscow, 125167, Russia

NVBespalova@fa.ru
Nechaev Sergei Vasilevich

ORCID: 0009-0009-8987-8648

Student, Department of Information Security, Federal State Autonomous Educational Institution of Higher Education "National Research University ITMO"

197101, Russia, Saint Petersburg, Kronverksky Ave., 49/A

sergey.nechaev2018@yandex.ru

DOI:

10.25136/2409-7543.2023.2.40770

EDN:

INXNVX

Received:

17-05-2023


Published:

07-06-2023


Abstract: The subject of the study is cloud storage. The object of the study is the information security of cloud systems. In the course of the work, the regulatory framework was determined, which allows regulating work with cloud technologies at the legislative level. The Russian and foreign statistical data on the use of cloud technologies by corporate clients and individuals were analyzed, the main specific security problems of cloud solutions were identified, such as data storage, the use of modular infrastructure in the cloud, the vulnerability of virtual machines to malware infection, connection instability, access rights differentiation, unbalanced actions of the client and the cloud service provider.   In the course of the work, the concept of building multi-level security of cloud systems was formulated. This approach will not only increase the time spent, but also the complexity of the process of infiltration of an attacker into the system, which will increase the chances of timely recognition and prevention of various types of attacks. A solution for building a security system was proposed, which includes the following steps: choosing reliable encryption and authentication methods, using a firewall to filter traffic and prevent intrusions, ensuring data transmission over the Internet in a secure execution, using an intrusion detection and prevention system.


Keywords:

information security, cloud systems, personal data, encryption, confidentiality, integrity, authentication, malware, operating system, firewall

This article is automatically translated. You can find original text of the article here.

The active development of modern technologies contributes to the expansion of the range of solutions aimed at improving the efficiency and convenience of users. One of the most popular such solutions is cloud systems. Their advantages include:

· availability of information from any convenient device;

· working with large amounts of data;

· relatively low cost;

· high level of computing power

· flexible payment system for services. [1]

Modern cloud computing can provide a high level of protection of stored data, however, system vulnerabilities can lead to unauthorized access and lead to loss of integrity and confidentiality of information. Therefore, solving the problem of ensuring the proper level of security is one of the primary tasks when working with cloud services. According to the forecast of Stratview (Cloud Security Market), the volume of the global cloud security market in the period from 2022 to 2028 will grow from 46.36 to 100.96 billion dollars with an average annual growth rate of 13.85%. (Figure 1.) [2]

Figure 1. Forecast of the volume of the global cloud security market in the period from 2022 to 2028. 

Information security in the cloud should be based on ensuring the basic principles of information security: confidentiality, integrity and availability of information or means of its processing.

Regulatory legal acts regulating the operation of cloud storage

We will highlight a number of regulatory legal acts that regulate work in the field of cloud technologies:

1.                  GOST R ISO/IEC 17826-2015 "Information technologies. Cloud Data Management Interface (CDMI)".

2. GOST R 56938-2016 "Information protection. Information protection when using virtualization technologies. General provisions". The standard defines the requirements for the protection of information processed using virtualization technologies.

3. GOST ISO/IEC 17788-2016 "Interstate standard. Information technology cloud computing. General provisions and terminology of Information technology. Cloud computing. Overview and vocabulary».

4. 149-FZ "On Information, Information Technologies and Information Protection".

5.                 Federal Law "On Personal Data" dated 27.07.2006 N 152-FZ. In accordance with the Federal Law, the recording, systematization, accumulation, storage, updating, modification or extraction of personal data must be carried out on a server that is physically located on the territory of the Russian Federation. It should be borne in mind that the cloud provider is not granted access to information systems that are hosted in the cloud, respectively, the responsibility for ensuring the security of personal data rests with the operator.

6.                 Decree of the Government of the Russian Federation No. 1119 regulates the development of a personal data protection system.

7.                 Order of the FSTEC of Russia dated 02/18/2013 No. 21 "On Approval of Requirements for the Protection of Information that does not constitute a State Secret contained in State information systems".

The document defines the requirements for measures to ensure the security of personal data aimed at neutralizing current threats to the security of personal data. The composition and content of measures to ensure the security of personal data is determined in accordance with a certain level of personal data security. Order No. 17 of the FSTEC of Russia dated 11.02.2013 "On Approval of the Composition and content of organizational and technical measures to ensure the security of personal data during their processing in Personal Data information systems".

The document is aimed at forming requirements for the protection of information contained in state information systems.

Specifics of cloud storage security

Based on the results of the Cloud Computing Security Report 2022 (Cloud Security Report 2022), based on a comprehensive global study of the cybersecurity of the global community:

· Most organizations continue to use a hybrid (39% compared to 36% last year) or a multi-cloud strategy. (33%) to integrate multiple services for scalability or business continuity. (76%) use two or more cloud providers.

·        Organizations continue to move workloads to the cloud quickly. Today, 39% of respondents have more than half of their workloads in the cloud, and 58% plan to reach this level in the coming year.

·        Cloud users confirm that the cloud provides flexible capacity and scalability (53%), and also contributes to increased availability and business continuity (45%).[3]

Security in the cloud is still a major concern for cybersecurity experts. About 95% of respondents are concerned about the state of their security in a public cloud environment. Cloud security differs from traditional approaches to information technology security due to its specifics. Consider the main aspects:

· Data stored in the cloud is on public servers, which increases the risk of unauthorized access to data, while the responsibility for the security of information lies with the consumer organization, not the service provider. At the same time, not every organization has the means to conduct a security audit and other means of monitoring the security of the system. An unbalanced security system can dramatically affect the quality of working with data in a cloud solution.[4]

· The use of modular infrastructure in the cloud facilitates the adaptation of the system, but the interaction of virtual machines (cloning, scalability changes, moving between servers) in the cloud can lead to a violation of the integrity of the security system. The solution to this problem is data encryption, which requires an increase in the number of resources, which affects the performance of the system, but significantly increases security. At the same time, an individual approach is required to determine the system settings, which can change based on the frequency of use of the virtual machine and the status of the information being stored and processed. Vulnerabilities of the system are beyond any control during the spread and, therefore, can occur after an unlimited time. Therefore, it is very important to constantly monitor the protection status of the system, regardless of its location.[5]

·        The problem of vulnerability of virtual machines to infection with malicious software can be solved by intrusion detection and prevention systems. At the same time, it is important to remember that the status of the virtual machine (active/inactive) does not affect the possibility of infection with viruses. The solution to this problem may be to connect the virtual machine image storage to the network, in case of inactivity of the virtual machine, additional protection measures are required. [6]

·        The network coverage is not stable and has no clear boundaries, and in some cases disappears completely. Virtual machines must provide their own protection by moving the perimeter of the network directly to the virtual machine itself, thereby separating parts of the system with different levels of trust in the cloud.

· Cloud systems interact with many other systems and services that need to be protected both at the level of organizations and for individuals. Access rights must be managed at all levels. Vendors and users should monitor vulnerabilities caused by unsafe application installation and access to the system.[7]

· Working exclusively via the Internet leads to the impossibility of access control at the physical level and, as a consequence, the need to form a policy of differentiating user access by roles with ensuring transparency of actions.

·        The cloud service provider and the client do not always work in collaboration, sharing responsibility for ensuring a high level of cloud storage security.[8]

The best solution for building a cloud system with a high level of security is the concept of building multi-level security. This approach will not only increase the time spent, but also the complexity of the process of an attacker's penetration into the system. This will increase the chances of timely recognition and prevention of various types of attacks.

It should be borne in mind that information security becomes more complicated for a more distributed infrastructure. This is due to the large number of hosts and services that increase the range of attackers.

As a solution , the following set of actions can be proposed:

· Encryption. Choosing a reliable encryption method guarantees a large amount of computing and time resources for an attacker during the decryption process. Encryption and decryption takes place by key, usually in block encryption mode. The encryption algorithm is built-in and depends on the choice of the system (for example, the LUKS system used in a Linux kernel-based OS uses an AES-like block cipher with a key size of 256 bits). Encryption settings are made individually for all parts of the system. The reliability of encryption will depend not only on the settings and the choice of algorithm, but also on the policy of storing keys and the impossibility of compromising them.

·        Choosing a reliable authentication method. For example, OpenNebula, a hyper-converged cloud computing platform for creating and managing private, hybrid and public clouds and data centers, uses two-factor authentication, delimiting and tracking the resources used for individual user groups.

· Using a firewall to filter traffic and prevent intrusions. It is convenient to use firewalls built into the operating system kernel (for example, NetFilter or ConfigServer Security Firewall for Linux). When writing rules, it is more effective to use the approach: "what is not allowed is prohibited."

·        Provision of data transmission over the Internet in a secure version. (The reason is the location of servers outside the corporate network of the company).

· Use of intrusion detection and prevention system. (For example, the IPS/IDS Suricata system, which allows not only detecting attacks and blocking suspicious integrations, but also processing packets, changing routes based on their content.

The specifics of working with cloud computing form the security policy in the field of cloud services. The growth of security threats in the field of cloud technologies requires an individual and integrated approach to solving this problem. The analysis of the specifics of the threat to the information security of cloud systems allows us to draw conclusions about the need for the formation of a multi-level comprehensive protection, including encryption, authentication, the use of firewalls, antivirus protection, etc. A competent security policy in the field of cloud solutions will increase the volume and prospects of their use.

References
1. Klementiev I. P., & Ustinov V. A. (2016). Ââåäåíèå â îáëà÷íûå âû÷èñëåíèÿ [Introduction to Cloud Estimations].
2. Toutov, A., Toutova, N., Vorozhtsov, A., & Andreev, I. (2022). Optimizing the Migration of Virtual Machines in Cloud Data Centers. International Journal of Embedded and Real-Time Communication Systems (IJERTCS)13(1), 1-19.
3. Mironova A. O., Goncharenko, Yu. Yu., Gogol, A. S., & Frolova, A. N. (2021). Ïðèìåíåíèå ìåòîäèêè îöåíêè óãðîç áåçîïàñíîñòè èíôîðìàöèè [Application of the methodology for assessing threats to information security]. Ýíåðãåòè÷åñêèå óñòàíîâêè è òåõíîëîãèè7(4), 71.
4. Akbarova M. R. (2022). Áåçîïàñíîñòü è çàùèòà äàííûõ â îáëà÷íûõ òåõíîëîãèÿõ [Security and data protection in cloud technologies]. Universum, 10-1(103), 17-19.
5. Nesterenko V. R., & Maslova M. A. (2021). Ñîâðåìåííûå âûçîâû è óãðîçû èíôîðìàöèîííîé áåçîïàñíîñòè ïóáëè÷íûõ îáëà÷íûõ ðåøåíèé è ñïîñîáû ðàáîòû ñ íèìè [Modern challenges and threats to information security of public cloud solutions and ways to work with them]. Scientific result. Information Technology, 6(1), 48-54.
6. Alshamrani, A., Myneni, S., Chowdhary, A., & Huang, D. (2019). A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities. IEEE Communications Surveys & Tutorials21(2), 1851-1877.
7. Canizo, M., Triguero, I., Conde, A., & Onieva, E. (2019). Multi-head CNN–RNN for multi-time series anomaly detection: An industrial case study. Neurocomputing363, 246-260.
8. Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications60, 19-31.

Peer Review

Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
The list of publisher reviewers can be found here.

The subject of the peer-reviewed study is the extremely urgent problem of security of cloud storage systems in the modern information world. Taking into account the fact noted by many experts (for example, Basalt PDF, Positive Technologies, the FSB Information Security Center, etc.) of an annual growth of tens of percent (for example, in 2022 alone, the growth was 21%) of cyber attacks on the information infrastructure of Russia, the applied significance of the reviewed article should also be recognized as very high. Unfortunately, the author did not bother to reflect on the methodology used in any way. But from the context, it can be understood that in addition to traditional general scientific analytical methods, regulatory and institutional methods were used (when analyzing the regulatory framework governing the operation of cloud storage in Russia), statistical analysis of secondary sociological data (when identifying the specifics of cloud storage security in Russia), as well as some methods of analyzing information security risks. The correct application of these methods allowed the author to obtain results with some signs of scientific novelty. First of all, we are talking about the specifics of ensuring the security of cloud storage systems in Russia, identified and adapted for socio-humanitarian knowledge, with an emphasis on their regulatory and technological aspects. In this context, the concept of multi-level security developed by the author in relation to cloud storage seems quite useful. Finally, the specific recommendations formulated by the author on solving the problems of information security of cloud storage systems are of particular interest. Structurally, the work should also be considered well thought out: its logic is consistent and reflects the main aspects of the research. The following sections are highlighted in the text: - an uncluttered introductory part, where a scientific problem is posed and its relevance is justified, but unfortunately, there is no setting of goals and objectives, as well as theoretical and methodological reflection; - "Normative legal acts regulating the operation of cloud storage", which analyzes the legal basis for the functioning of cloud storage systems in Unfortunately, there is no comparison of the Russian regulatory framework with that in other countries; - "Specifics of cloud storage security", which examines the features of ensuring the security of data storage in the "clouds", and also substantiates the need to apply the concept of multi-level security; - an uncomplicated final part, which summarizes the results of the study and formulates specific recommendations for ensuring the security of data storage in cloud systems. From the point of view of style, the reviewed article also does not cause serious complaints: the style of the text meets the basic criteria of scientific character, as well as literary and linguistic norms. Although there is a certain amount of stylistic (for example, the wording "Choosing a reliable encryption method guarantees a large amount of computing and time resources for an attacker in the decryption process", etc., is not very successful from the point of view of style, etc.) and grammatical (for example, the uncoordinated sentence "Information security in the cloud should be based on ensuring the basic principles of information security ..."; or incorrect beginning of sentences with parentheses with numbers, for example: "(33%) for the integration of several services for scalability purposes..."; etc.) errors, but in general it is written quite competently, in good Russian, with the correct use of scientific terminology. The bibliography includes 8 titles, including sources in foreign languages, and adequately represents the state of research on the subject of the article. An appeal to opponents takes place when discussing the specifics of cloud data storage security. GENERAL CONCLUSION: the article proposed for review can be qualified as a scientific work that meets the basic requirements for works of this kind. Despite some flaws (which, as the reviewer hopes, will be eliminated by the author in his future works), the results of the study will be of interest to political scientists, sociologists, information security specialists, as well as students of the listed specialties. These results may also be interesting for representatives of Russian business. The presented material corresponds to the topic of the magazine "Security Issues". According to the results of the review, the article is recommended for publication.