Abstract

Cloud computing has become a necessary component for data storage and processing and is becoming more widespread. However, there are threats to the security and privacy of user data, which is why it is important to find out the most effective methods for ensuring data security in the cloud. The purpose of the study was to develop methods aimed at ensuring privacy and security in cloud environments and in modern applications. The method of analysis was used to review other publications on the topic, and the method of experiment was used for practical implementation. The main results of the study include the development of a security monitoring programme. It analyses event logs and determines the number of failed login attempts, which indicates the detection or absence of suspicious activity. Access to resources is checked, and the necessary information is displayed on the console. A comparison table of cloud platforms has been created, considering their advantages and disadvantages in the context of data security and privacy. It specifies the criteria for delivering services to the selected services. A block diagram of ways to provide security in cloud computing is developed, illustrating the relationship between various aspects of providing security in cloud systems. It contains parameters and strategies for encrypting data, protecting sensitive data, and countering attacks. Various aspects of security and methods of ensuring privacy in cloud computing are considered, namely authorisation, intrusion detection, regulatory requirements, integration with modern applications, monitoring and logging, user identification and authentication. The practical significance of the study lies in the creation of innovative ways to help improve security and privacy in cloud computing. They will allow cloud developers and administrators to effectively protect user data and ensure their privacy in modern applications

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.