RRESEARCH ON CLASSIFICATION ISSUES AND SECURE DATA STORAGE
DOI:
https://doi.org/10.18372/2225-5036.29.18074Keywords:
SOC2 Type 2, Big Data, data classification, data storage, confidentiality, threats, cybersecurity, DDOSAbstract
In the modern world, the storage of large volumes of data has become an extremely relevant issue. Consumers and organizations continuously generate large amounts of information, and this trend is increasing. To ensure effective and secure storage of this data, it is important to consider the challenges and strategies used in this field. A global trend in data storage is expanding access to information. However, the risk of data loss through various factors remains very high. International information security standards recommend ways to balance confidentiality with accessibility for different types of data, which can help make informed decisions. Auditing for accuracy and reliability is also suggested by these standards. The volume of information will continue to grow, and with it, the importance of ensuring the security and transparency of its storage. Developing new strategies and technologies to achieve this will be a significant task for the data storage industry in the future.
References
Kai, Z. (2021). Research on network data storage Technology based on Autonomous Controllable system. In 2021 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI), Shanghai, China, pp. 183-186. https: // doi.org /10.1109/icceai52939.2021. 00035.
Русин, Б. П., Погрелюк, Л. В., Висоцька, В. А., Осипов, М. М., Варецький, Я. Ю., & Капшій, О. В. (2019). Архітектура системи дедублікації та розподілу даних у хмарних сховищах під час резервного копіювання. Інформаційні технології та комп’ютерна інженерія, 45(2), pp. 40-63. https://doi.org/10.31649/1999-9941-2019-45-2-40-63.
Yatskiv, V., Kulyna, S., Yatskiv, N., & Kulyna, H. (2020). Protected Distributed Data Storage Based on Residue Number System and Cloud Services. 10th International Conference on Advanced Computer Information Technologies (ACIT), pp. 796-799. https://doi.org/10. 1109/acit49673. 2020.9208849.
Aujla GS, Chaudhary R, Kumar N, Das AK, Rodrigues JJ. SecSVA: secure storage, verification, and auditing of big data in the cloud environment. IEEE Commun Mag. 2018; 56(1), pp. 78-85.
Vyas J, Modi P. Providing confidentiality and integrity on data stored in cloud storage by hash and meta–data approach. Int J Adv Res Eng Sci Tech. 2017; 4: pp. 38-50.
https: // www.schgroup.com/wp-content/uploads / 2021/08/SCH-Group-A-Comprehensive-Guice-to-SOC-Reports-eBook.pdf
https: // provectus.com/wp-content/uploads/ 2022 / 05 / Provectus-IT-Inc.-SOC-2-Type-I-Report-Final. pdf.
https: // www. logicmanager.com / re-sources/ complian-ce-management/download-soc-2-compliance-checklist/.
https: // securitycheckbox.com / blog /2016/ soc2-controls-free-download-xls-csv/.
https://secureframe.com/hub/soc-2/compliance-documentation.
https: // learn.microsoft.com / en-us / az-ure/ compliance / offerings / offering-soc-2#azure-and-soc-2-type-2.
https: // aws.amazon.com / compliance /soc-faqs/.
https: // cloud.google.com / securi-ty/compliance/soc-2.
Ren, Y.; Huang, D.; Wang, W.; Yu, X. BSMD: A blockchain-based secure storage mechanism for big spatio-temporal data. Future Gener. Comput. Syst. 2023, 138, pp. 328-338.
Яцків, В.В., Кулина, С.В. (2019). Метод на-дійного зберігання даних на основі надлишкової сис-теми залишкових класів. Вісник Хмельницького національного університету. Технічні науки, 6, С. 98-104. http://journals.khnu.km.ua/vestnik/wp-content/ uploads/2021/01/20-9.pdf.
Rafique, A.; Van Landuyt, D.; Beni, E.H.; Lagaisse, B.; Joosen, W. CryptDICE: Distributed data protection system for secure cloud data storage and computation. Inf. Syst. 2021, 96, 101671 p.
Reena, M. and Nargunam, A.S., 2019. Se-cured Storage of Big Data in Cloud. International Jour-nal of Recent Technology and Engineering (IJRTE), 8(2S3), pp. 6-10.
Li, Yibin & Gai, Keke & Qiu, Longfei & Qiu, Meikang & Zhao, Hui. (2016). Intelligent Cryptography Approach for Secure Distributed Big Data Storage in Cloud Computing. Information Sciences, pp. 387.
Ab, Anantha Babu. (2018). Apache Hadoop, 10.13140/RG.2.2.30673.48483.
Anwesh Bhattacharyya. Beginning Apache Hadoop Administration, 252 p.
B. Chambers, M. Zahariaю Spark: The Defini-tive Guide, Big Data Processing Made Simple. Published by O’Reilly Media 2018. 601 p.
Коробейнікова, Т & Цар, О. (2023). Аналіз сучасних відкритих систем виявлення та запобігання вторгнень. Grail of Science. С. 317-325.
Butt, Saad. (2022). Cognitive Analysis of Intrusion Detection System. Journal of Siberian Federal University. Engineering & Technologies. 15. 10.17516/1999-494X-0377.
Harasymchuk O, Bloshchenko O., Ramsh V. Analysis of principles and systems for detecting remote attacks through the internet. Wydawnictwo Naukowe Akademii Techniczno-Humanistycznej w Bielsku-Bialej. 2020.
Prykaziuk, Nataliia & Gumenyuk, Ludmila. (2020). Cyber-Insurance as an important tool of enterprise protection in the digitization economy. Efektyvna ekonomika. 10.32702/2307-2105-2020.4.6.
Laden, Guy & Ta-Shma, Paula & Yaffe, Eitan & Factor, Michael & Fienblit, Shachar. (2007). Architectures for Controller Based CDP. pp. 107-121.
Заплотинський Б.А. Основи інформаційної безпеки. Конспект лекцій. – К І І В і П НУ “ОЮА”, кафедра інформаційно-аналітичної та інноваційної діяльності, 2017. 128 с.
Sokolov, V. Y., & Kurbanmuradov, D. M. (2018). Методика протидії соціальному інжинірингу на об’єктах інформаційної діяльності. Електронне фахове наукове видання «Кібербезпека: освіта, нау-ка, техніка», 1(1), С. 6-16.
Корченко О., Горніцька Д. Гололобов А. “Розширена класифікація методів соціального інжинірингу.” Ukrainian Scientific Journal of Information Security 20 (2014): С. 197-205.
Laktionov, I., Kmit, A., Opirskyy, I., & Harasymchuk, O. (2022). Дослідження інструментів захисту інтернет-ресурсів від DDоS-атак під час кібервійни. Електронне фахове наукове видання «Кібербезпека: освіта, наука, техніка», 1(17), С. 91-111.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Ukrainian Scientific Journal of Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Ukrainian Scientific Journal of Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.