METHODS FOR PROTECTING PERSONAL DATA IN CLOUD SERVICES
Keywords:
encryption, Software, cloud technologies, multi-factor authentication, artificial intelligence, containerizationAbstract
The article examines the functionality of cloud storage systems and the challenges of ensuring their information security. It highlights the evolution of data protection measures — from traditional network tools to advanced approaches such as client-side encryption, containerization, multi-factor authentication, and future directions in quantum cryptography. Special attention is given to the differences between private and corporate cloud usage, as well as issues of authorization and authentication within enterprise IT infrastructures.
References
Безпека хмарних сховищ і технологій. Основні правила [Електронний ресурс] //DataMi.–2024.– https://datami.ee/ua/blog/bezpeka-hmarnih-shovish-i-tehnologij-osnovni-pravila/ ( 30.04.2025).
Безпека хмарних сервісів [Електронний ресурс] // ESKA Global. – 2024. – Режим доступу: https://eska.global/blog/bezpeka-hmarnih-servisiv (дата звернення: 30.04.2025).
Google Cloud. (n.d.). Google Compute Engine documentation. https://cloud.google.com/compute/docs
ISO/IEC. (2013). Information technology – Security techniques – Information security management systems – Requirements (ISO/IEC 27001:2013). International Organization for Standardization. https://www.iso.org/standard/54534.html
National Institute of Standards and Technology. (2020). Framework for improving critical infrastructure cybersecurity. https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf