Russian version English version
Volume 10   Issue 2   Year 2015
Isaev E.A., Dumsky D.V., Samodurov V.A., Kornilov V.V.

Cloud Computing: Information Security Concerns

Mathematical Biology & Bioinformatics. 2015;10(2):567-579.

doi: 10.17537/2015.10.567.

References

  1. Lakhno V.D., Isaev E.A., Pugachev V.D., Zaitsev A.Yu., Fialko N.S., Rykunov S.D., Ustinin M.N. Development of information and communication technologies in pushchino research center of the russian academy of sciences. Mathematical Biology and Bioinformatics. 2012;7(2):529-544 (in Russ.).  doi: 10.17537/2012.7.529
  2. Antonopoulos N., Gillam L. Cloud Computing: Principles, Systems and Applications. London: Springer-Verlag; 2010. 379 p. doi: 10.1007/978-1-84996-241-4
  3. Kornilov V.V., Isaev E.A., Isaev K.A. Prospects for using of data centers in solution of problems of mathematical biology and bioinformatics. Mathematical Biology and Bioinformatics. 2015;10(1):60-71 (in Russ.). doi: 10.17537/2015.10.60
  4. Oplachko E.S., Ustinin D.M., Ustinin M.N. Cloud computing technologies and their application in problems of computational biology. Mathematical Biology and Bioinformatics. 2013;8(2):449-466 (in Russ.). doi: 10.17537/2013.8.449
  5. Isaev E.A., Kornilov V.V. The problem of processing and storage of large amounts of scientific data and approaches to its solution. Mathematical Biology and Bioinformatics. 2013;8(1):49-65 (in Russ.). doi: 10.17537/2013.8.49
  6. Amazon Web Services Customer Agreement. Website of Amazon Web Services. 2008. http://aws-portal.amazon.com/gp/aws/developer/terms-and-conditions.html (accessed 21 December 2015).
  7. Jansen W., Grance T. Guidelines on Security and Privacy in Public Cloud Computing. 2011. 80 p. (NIST Special Publication 800-144). doi: 10.6028/NIST.SP.800-144
  8. White J.S., Pilbeam A.W. A survey of virtualization technologies with performance testing. arXiv.org: Cornell University Library. http://arxiv.org/pdf/1010.3233.pdf (accessed 22 October 2015).
  9. Mell P., Grance T. The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology. 2011. 7 p. (NIST Special Publication 800-145). http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf (accessed 09 October 2015).
  10. Xavier M.G., Neves M.V., Rossi F.D., Ferreto T.C., Lange T., De Rose C.A.F. Performance Evaluation of Container-Based Virtualization for High Performance Computing Environments. In: 21st Euro. Int. Conf. on Parallel, Distrib. & Network-based Processing. IEEE; 2013. P. 233-240. doi: 10.1109/PDP.2013.41
  11. Bardac M., Deaconescu R., Florea A.M. Scaling Peer-to-Peer testing using Linux Containers. In: Roedunet International Conference (RoEduNet). IEEE; 2010. P. 287-292.
  12. Yuhao Z., David M.N. A Virtual Time System for OpenVZ-Based Network Emulations. In: Proceeding PADS '11 Proceedings of the 2011 IEEE Workshop on Principles of Advanced and Distributed Simulation. 2011. P. 1-10.
  13. Bui T., Analysis of Docker Security. arXiv.org: Cornell University Library. http://arxiv.org/pdf/1501.02967.pdf (accessed 21 December 2015).
  14. Morabito R. Power Consumption of Virtualization Technologies: an Empirical Investigation. arXiv.org: Cornell University Library. http://arxiv.org/pdf/1511.01232v1.pdf (accessed 21 December 2015).
  15. Cacciatore K., Czarkowski P., Dake S., Garbutt J., Hemphill B., Jainschigg J., Moruga A., Otto A., Peters C., Whitaker B.E. Exploring Opportunities: Containers and OpenStack. OpenStack White Paper; 2015. 19 p. https://www.openstack.org/assets/pdf-downloads/Containers-and-OpenStack.pdf (accessed 21 December 2015).
  16. Reshetova E., Karhunen J., Nyman T., Asokan N. Security of OS-level virtualization technologies. arXiv.org: Cornell University Library. http://arxiv.org/pdf/1407.4245v1.pdf (accessed 21 December 2015).
  17. Patel A., Taghavi M., Bakhtiyari K., Junior J.C. An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications. 2013;36:25-41. doi: 10.1016/j.jnca.2012.08.007
  18. Brenton C. The basics of virtualization security. Cloud Security Alliance; 2011. 17 p. https://cloudsecurityalliance.org/wp-content/uploads/2011/11/virtualization-security.pdf (äàòà îáðàùåíèÿ: 09.10.2015).
  19. Kelley D. How Data-Centric Protection Increases Security in Cloud Computing and Virtualization Security Curve. Cloud Security Alliance; 2011. 6 p. https://cloudsecurityalliance.org/wp-content/uploads/2011/11/DataCentricProtection_intheCloud.pdf (accessed 09 October 2015).
  20. Berdnik A.V. In: Al'manakh sovremennoi nauki i obrazovaniia (The Almanac of modern science and education). Tambov; 2013. No. 10. P. 35-38 (in Russ.).
  21. Lubacz J., Mazurczyk W., Szczypiorski K. Principles and Overview of Network Steganography.  arXiv.org: Cornell University Library. http://arxiv.org/pdf/1207.0917.pdf (accessed 09 October 2015).
  22. Bishop M. Introduction to Computer Security, 1st ed. Boston: Pearson Education; 2004. 747 p.
  23. Prescott E. Small. Defense in Depth: An Impractical Strategy for a Cyber World. SANS Institute; 2011. 24 p. https://www.sans.org/reading-room/whitepapers/assurance/defense-depth-impractical-strategy-cyber-world-33896 (accessed 21 December 2015).
  24. Harris S. CISSP All-in-One Exam Guide, 6th Edition. Osborne: McGraw-Hill; 2012. 1456 p.
  25. Rzhabi V. Izbav'tes' ot opasenii otnositel'no bezopasnosti dannykh v oblake (Get rid of the worries about data security in the cloud). IBM developerWorks; 2015. 16 p. https://www.ibm.com/developerworks/ru/library/dm-1408datasecuritycloud/dm-1408datasecuritycloud-pdf.pdf (accessed 09 October 2015) (in Russ.).
  26. Avoiding the hidden Costs of the Cloud: report of Symantec Corporation. 2013. P. 1-11. www.symantec.com/content/en/us/about/media/pdfs/b-state-of-cloud-global-results-2013.en-us.pdf (accessed 21 December 2015).
  27. The Challenges of Cloud Information Governance: A Global Data Security Study: Ponemon Institute Research Report. 2014. P. 1-30. http://www2.safenet-inc.com/cloud-security-research/SafeNet-Cloud-Governance.pdf (accessed 21 December 2015).
  28. Sultan N. Making use of cloud computing for healthcare provision: Opportunities and challenges. International Journal of Information Management. 2014;34:177-184. doi: 10.1016/j.ijinfomgt.2013.12.011
  29. Hoff Ch. In: Security guidance for critical areas of focus in cloud computing. 2011. P. 12-20. https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf (accessed 21 December 2015).
Table of Contents Original Article
Math. Biol. Bioinf.
2015;10(2):567-579
doi: 10.17537/2015.10.567
published in Russian

Abstract (rus.)
Abstract (eng.)
Full text (rus., pdf)
References

 

  Copyright IMPB RAS © 2005-2024