Systems and Means of Informatics
2016, Volume 26, Issue 4, pp 38-50
ON SYSTEM-TECHNICAL AND REGULATORY-METHODOLOGICAL PROBLEMS OF DATA SECURITY IN CLOUD AUTOMATED INFORMATION SYSTEMS USING ARTIFICIAL INTELLIGENCE TECHNOLOGIES
- V. E. Gavrilov
- A. A. Zatsarinny
Abstract
The article focuses on information security in cloud automated information systems (AIS) and the possibility of using artificial intelligence in data protection systems. Major problems of data protection in cloud computer systems are analyzed. General components of a data protection system are considered. Presently, artificial intelligence is used in data protection systems to some extent. The authors propose to extend the area of application of artificial intelligence in order to protect data. The article contains an analysis of the current regulatory base regarding information security in the cloud computer systems.
[+] References (22)
- Department of Defense Trusted Computer System Evaluation Criteria. 1983. DoD 5200.28-STD. Orange Book.
- FSTEC Russia. 1998. Sredstva vychislitel'noy tekhniki. Zashchita ot nesanktsioniro- vannogo dostupa k informatsii. Pokazateli zashchishchennosti ot nesanktsionirovannogo dostupa k informatsii [Computer technics means. Protection from unauthorized access to information. Security settings regarging unauthorized access to information].
- FSTEC Russia. 1998. Avtomatizirovannye sistemy. Zashchita ot nesanktsionirovannogo dostupa k informatsii. Klassifikatsiya avtomatizirovannykh sistem i trebovaniya po zashchite informatsii [Automated systems. Protection from unauthorized access to information. Classification of automated systems and requirements for data protection].
- Grusho, A. A., N. A. Grusho, M.I. Zabezhaylo, and E.E. Timonina. 2016. In- tellektual'nyy analiz dannykh v obespechenii informatsionnoy bezopasnosti oblachnykh vychisleniy [Intellectual data analysis in data protection of cloud calculations]. Su- perkomp'yuternye Tekhnologii: Mat-ly 4-y Vseross. nauchn.-tekhnich. konf. [Supercomputer Technologies: 4th All-Russian Scientific and Technical Conference Proceedings]. Rostov-on-Don. 2:149-153.
- Grusho, A. A., N. A. Grusho, E. E. Timonina, and S. Ya. Shorgin. 2015. Vozmozhnosti postroeniya bezopasnoy arkhitektury dlya dinamicheski izmenyayushcheysya informa- tsionnoy sistemy [Regarding capabilities of secured architecture creation for dynamic changing information system]. Sistemy i Sredstva Informatiki - Systems and Means of Informatics 25(3):78-93.
- Grusho, A. A., M.I. Zabezhaylo, and A. A. Zatsarinny. 2015. Kontrol' i upravlenie informatsionnymi potokami v oblachnoy srede [Control and management of information streams in cloud environment]. Informatika i ee Primeneniya - Inform. Appl. 9(4):95- 101.
- Grusho, A. A., N. A. Grusho, E.E. Timonina, and S. Ya. Shorgin. 2014. Bezopasnye arkhitektury raspredelennykh sistem [Secured architecture of distributed systems]. Sistemy i Sredstva Informatiki - Systems and Means of Informatics 24 (3): 18-31.
- Grusho, A. A., M.I. Zabezhaylo, A. A. Zatsarinny, V. O. Piskovsky, and S.V. Bo- rokhov. 2015. O vozmozhnostyakh prilozheniy intellektual'nogo analiza dannykh v zadachakh obespecheniya informatsionnoy bezopasnosti oblachnykh sred [Regarding opportunities of intellectual data analysis applications in problems of data security provision in cloud environment]. Nauchno-tekhnicheskaya informatsiya. Ser. 2: Infor- matsionnye protsessy i sistemy [Science and technical information. Part 2: Information processes and systems] 11: 1-11.
- Grusho, A., N. Grusho, and E. Timonina. 2016 (in press). Detection of anomalies in non-numerical data. 8th Congress (International) on Ultra Modern Telecommunications and Control Systems and Workshops Proceedings.
- Grusho, A. A., andD. V. Smirnov. 2016. Zashchitabiznes-logikiotataknulevogodnya [Business-logic protection from zero-day attacks]. Sistemy i Sredstva Informatiki - Systems and Means of Informatics 26(3):60-73.
- Grusho, A., N. Grusho, and E. Timonina. 2016. Content analysis in information flows. AIP Conference Proceedings. 1738:220002-1-220002-4.
- Grusho, A. A., N. A. Grusho, and E. E. Timonina. 2014. Analiz metok v skrytykh kanalakh [An analysis of labels in hidden channels]. Informatika i ee Primeneniya - Inform. Appl. 8(4): 12-16.
- Sozdany memristory novogo tipa, sposobnye effektivno imitirovat' neyrony golovnogo mozga [New type memristors have been created, which are capable to effectively imitate the brain neurons]. Available at: http://www.dailytechinfo. org/infotech/7051-sozdany-memristory-novogo-tipa-sposobnye-effektivno-imitirovat- neyrony-golovnogo-mozga.html (accessed May 31, 2016).
- European Network and Information Security Agency (ENISA). Jan. 2011. Security & Resilience in Governmental Clouds: Making an Informed Decision.
- Cloud; SLAs for Cloud services. Technical Report ETSI TR 103 125.
- ISO/IEC TS 27017. Information technology - Security techniques - Information security management - Guidelines on information security controls for the use of cloud computing services based on ISO/IEC 27002.
- ISO/IEC 27002:2005. Information technology - Security techniques - Code of practice for information security management.
- ISO 27001:2005. Information technology - Security techniques - Information security management systems - Requirements.
- ISO/IEC 27018. Code of practice for data protection controls for public cloud computing services.
- ISO/IEC 27040. Information technology- Security techniques- Storage security.
- NIST SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing.
- NIST SP 800-53 R3. Recommended Security Controls for Federal Information Systems and Organizations.
[+] About this article
Title
ON SYSTEM-TECHNICAL AND REGULATORY-METHODOLOGICAL PROBLEMS OF DATA SECURITY IN CLOUD AUTOMATED INFORMATION SYSTEMS USING ARTIFICIAL INTELLIGENCE TECHNOLOGIES
Journal
Systems and Means of Informatics
Volume 26, Issue 4, pp 38-50
Cover Date
2016-11-30
DOI
10.14357/08696527160404
Print ISSN
0869-6527
Publisher
Institute of Informatics Problems, Russian Academy of Sciences
Additional Links
Key words
automated systems; information security; cloud computer systems; artificial intelligence; standards (norms); data security threats
Authors
V. E. Gavrilov and A. A. Zatsarinny
Author Affiliations
Institute of Informatics Problems, Federal Research Center "Computer Science
and Control", Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
|