DATA PROTECTION METHODS IN CLOUD SYSTEMS FOR WORKING WITH ELECTRONIC DOCUMENTS
Keywords:
Cloud security, ERMS, cyber attacks, DBMS, SQL, database, Secure Sockets Layer, VPN, password.Abstract
Cloud computing security refers to the broad set of policies, technologies, applications, and controls used to secure virtualized IP, databases, applications, services, and cloud computing infrastructure. Protecting cloud systems is part of computer security, network security, and, more broadly, information security. Data protection is one of the most important aspects in the problem of the security of cloud systems for working with documents. To increase the security of cloud environments, enterprises need to use modern technologies and best practices to protect their data.
References
Aleksandrov K.S. Account for petabytes // Machines and mechanisms. 2013. No. 6. S. 20-27.
Murzin F.A., Batura T.V., Semich D.F. Cloud technologies: basic concepts, tasks and development trends // Software products, systems and algorithms. 2014. No. 1. S. 2-22.
Berholts K.A. The use of cloud technologies in the electronic document management of commercial organizations // Innovative development. - 2018. No. 10. P. 9-12.
Smooth M.V. Application security on cloud computing platforms // Proceedings of BSTU. 2015. No. 9. From 204-207.
Gorokhov S.N., Lobanov E.M. Modern technologies for storing electronic documents // Bulletin of the archivist. 2015. No. 1. S. 193-200.
Guseev A.V. Prospects for cloud computing and informatization of healthcare institutions // Medical Information Systems. 2011. No. 2. S. 6-16.
Denisov D.V. Prospects for the development of cloud computing // Applied Informatics. 2009. No. 5. S. 52-58.
Dovgal V.A. Cloud computing and analysis of information security issues in the cloud // Bulletin of the Adygei State University. 2015. No. 2. P. 160-166.
Dogwal. EAT. Methods for improving security in the field of "cloud" technologies // Bulletin of the ASU. 2014. No. 4. pp. 170-174.
Ivonin P.V. Cloud security in detail // Izvestiya SFedU. 2013. No. 2. S. 35-40.