Shurkhovetsky G. N. (Irkutsk State Transport University)
|
Cloud technologies are now closely integrated into our lives in all its aspects. Users of cloud technologies are often not only individuals and legal entities, but also various government agencies, so that the security of these online services has the highest priority, including in matters of national security. But until now, the providers of these services can not provide adequate protection of user data, especially since by sending personal information to the "cloud", the user no longer controls it. An important role in this issue is played by the user's ability to protect their information on their side before sending it to various online services. An important tool for protecting information for the user will be such a tool that will provide reliable protection, taking into account the existence of several unrelated data warehouses. For example, the split-split method. On the Internet, this method has not yet been considered from the point of view of the reliability of its use, there was no proper verification of its resistance to attacks. This is the question that this article will be devoted to.
Keywords:information security, cloud storage, dissection-separation method.
|
|
|
Read the full article …
|
Citation link: Shurkhovetsky G. N. Protection of information in cloud techonologies the dissecction-separation method // Современная наука: актуальные проблемы теории и практики. Серия: Естественные и Технические Науки. -2021. -№03. -С. 231-236 DOI 10.37882/2223-2966.2021.03.38 |
|
|