METHODS FOR PROTECTING PERSONAL DATA IN CLOUD SERVICES

Authors

  • Olga Ukrainets Lesya Ukrainka Volyn National University
  • Oksana Onyshchuk Lesya Ukrainka Volyn National University

Keywords:

encryption, Software, cloud technologies, multi-factor authentication, artificial intelligence, containerization

Abstract

The article examines the functionality of cloud storage systems and the challenges of ensuring their information security. It highlights the evolution of data protection measures — from traditional network tools to advanced approaches such as client-side encryption, containerization, multi-factor authentication, and future directions in quantum cryptography. Special attention is given to the differences between private and corporate cloud usage, as well as issues of authorization and authentication within enterprise IT infrastructures.

References

Безпека хмарних сховищ і технологій. Основні правила [Електронний ресурс] //DataMi.–2024.– https://datami.ee/ua/blog/bezpeka-hmarnih-shovish-i-tehnologij-osnovni-pravila/ ( 30.04.2025).

Безпека хмарних сервісів [Електронний ресурс] // ESKA Global. – 2024. – Режим доступу: https://eska.global/blog/bezpeka-hmarnih-servisiv (дата звернення: 30.04.2025).

Google Cloud. (n.d.). Google Compute Engine documentation. https://cloud.google.com/compute/docs

ISO/IEC. (2013). Information technology – Security techniques – Information security management systems – Requirements (ISO/IEC 27001:2013). International Organization for Standardization. https://www.iso.org/standard/54534.html

National Institute of Standards and Technology. (2020). Framework for improving critical infrastructure cybersecurity. https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf

Published

2025-06-03