Systems and Means of Informatics
2020, Volume 30, Issue 4, pp 76-82
END-TO-END INFORMATION SECURITY OF PRIVATE CLOUD COMPUTING
- A. A. Grusho
- A. V. Nikolaev
- V. O. Piskovski
- V. V. Senchilo
- E. E. Timonina
Abstract
The paper discusses building of a secure enterprise cloud that uses unsecure components. The most important solution is for the organization's employees to work remotely. The solution is based on provision of a simple subcloud that implements secure interactions of remote employees among themselves, cloud services, and interaction with resources in the global Internet.
[+] References (7)
- Grusho, A. A. 1997. Composition of a trusted computer security system on the base of untrusted elements. Probabilistic methods in discrete mathematics. Eds. V. F. Kolchin, V.Ya. Kozlov, Yu.L. Pavlov, and Yu.V. Prokhorov. Utrecht, Netherlands: VSP. 231-236. doi: 10.1515/9783112314074-022.
- Timonina, E. E. 2004. Analiz ugroz skrytykh kanalov i metody postroeniya garan- tirovanno zashchishchennykh raspredelennykh avtomatizirovannykh sistem [The analysis of threats of covert channels and methods of creation of guaranteed protected distributed automated systems]. Moscow: Russian State University for the Humanities. D.Sc. Diss. 204 p.
- Grusho, A. A., A. V. Volodin, and E. E. Timonina. 2001. Bezopasnyy interfeys s glo- bal'noy set'yu iz nenadezhnykh v smysle bezopasnosti elementov [Secure interface with WAN from untrusted elements]. Informatsionnye tekhnologii v nauke, obrazovanii, telekommunikatsii, biznese (vesennyaya sessiya): Tr. Mezhdunar. konf. [Conference (International) "Information Technologies in Science, Education, Telecommunications, Business (spring session)" Proceedings]. Zaporozhye: Laboratory of Publishing Technologies and Computer Graphics of Zaporozhye State University. 149-151.
- Grusho, A. A., and E. E. Timonina. 2006. Garantirovanno zashchishchennye bazy dannykh, postroennye na nedoverennykh s tochki zreniya bezopasnosti elementakh [Guaranteed secure databases built on insecure elements]. Problemy bezopasnosti i pro- tivodeystviya terrorizmu: Mat-ly konf. [Conference "Security and Counter-Terrorism Issues" Proceedings]. Moscow: MCCME. 335-348.
- Borchert, O., S. Mitchell, S. Connelly, andS. Rose. 2000. SP 800-207: Zero trust architecture. NIST. Available at: https://csrc.nist.gov/publications/detail/sp/800-207/final (accessed September 12, 2020).
- Grusho, A., E. Primenko, and E. Timonina. 2009. Teoreticheskie osnovy komp'yuternoy bezopasnosti [Theoretical bases of computer security]. Moscow: Academy. 272 ð.
- Grusho, A. A., E.E. Timonina, and S.Ya. Shorgin. 2017. Modelling for ensuring information security of the distributed information systems. 31th European Conference on Modelling and Simulation Proceedings. Dudweiler, Germany: Digitaldruck Pirrot GmbH. 656-660. Available at: http://www.scs-europe.net/dlib/2017/ecms2017acceptedpapers/0656- probstatECMS20170026.pdf (accessed September12, 2020).
[+] About this article
Title
END-TO-END INFORMATION SECURITY OF PRIVATE CLOUD COMPUTING
Journal
Systems and Means of Informatics
Volume 30, Issue 4, pp 76-82
Cover Date
2020-12-10
DOI
10.14357/08696527200407
Print ISSN
0869-6527
Publisher
Institute of Informatics Problems, Russian Academy of Sciences
Additional Links
Key words
information security; cloud computing; security of remote work on unsecure terminals
Authors
A. A. Grusho , A. V. Nikolaev , V. O. Piskovski , V. V. Senchilo , and E. E. Timonina
Author Affiliations
Institute of Informatics Problems, Federal Research Center "Computer Science
and Control", Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
N. N. Semenov Federal Research Center for Chemical Physics of the Russian Academy of Sciences, 4 Kosygin Str., Moscow 119991, Russian Federation
|