Abstract

The article analyzes the protection mechanisms of cloud services. Criteria for adequate evaluation of these mechanisms are identified. In the framework of experimental research, the best mechanism of cloud service protection is identified, taking into account the requirements and needs of the user. In the modern information society, everyone is faced with the problem of securely storing various passwords, logins and other data. Someone wrote them down in a notebook or just on a piece of paper that was glued to the computer from which they authenticated. All this is long in the past. Any data leak will cause moral and material harm to both an ordinary person and a large company. Today, cloud computing is used for this as the main method of storing data at work or at home. The leaders in cloud technologies are the following Internet services: Dropbox, OneDrive, Google Drive, iCloud, Yandex.Disk, Cloud Mail.Ru, MegaDisk, Mega, BOX, pCloud, Files.fm, WDfiles.ru, wdho.ru, Anonfile.com, My-Files.Ru. Not only must cloud service providers protect their customers, network infrastructure, applications and platforms, but the user himself must ensure the security of his data and applications using strong passwords and authentication measures.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call