SOCIETY & ”INDUSTRY 4.0”

E-university cloud information security issues

  • 1 AMEA, Institute of Information Technologies, Baku, Azerbaijan

Abstract

This article identifies various security problems of electronic education in the provision of cloud services and proposes solutions to ensure security measures. Various types of attacks on e-learning platforms are also discussed. Various models of the usage of cloud technologies in electronic education, threats and security requirements when using these models are investigated.

Keywords

References

  1. N. Antonopoulos, L. Gillam. Cloud Computing: Principles, Systems and Applications. London: Springer-Verlag, 2010. 379 p
  2. H Skleyter. Oblachniye vichisleniya v obrazovanii. Analiticheskaya zapiska/perevod s angliyskogo. Institut YUNESKO po informazionnim texnologiyam v obrazovanii [Elektronniy resurs] // IITO YUNESKO: 2010. URL: http://iite.unesco.org/pics/publications/ru/files/3214674.pdf.
  3. K.Fogarti. Oblachniye vichisleniya: opredeleniya i resheniya. [Elektronniy resurs] // Izdatelstvo Otkritiye sistemi. http://www.osp.ru/: URL: http://www.osp.ru/cio/2011/03/13007508.
  4. V.F. Shangin. Informaionnaya bezopasnost kompyuternix system I setey / V.F. Shangin. – М.: IZD «FORUS»: Ivfra-M, 2008. – 416 s.
  5. https://ec.europa.eu/info/law/law-topic/data-protection_en
  6. А. Pazyuk, М. Sokolova. Zashita personalnix dannix: mejdunarodniye prinzipi i standarti. https://www.researchgate.net/publication/281459857
  7. A.V. Erigin. Analiz effektivnosti sistem predotvrasheniya utechek konfidenzialnoy informazii iz lokalnix setey. Vestnik SibADI, vipusk 2 (20), 2011, s. 40-47.
  8. M.Jensen, J.Schwenk, N.Gruschka, & L.Iacono, Year. On technical security issues in cloud computing. In, 2009. IEEE, pp.109-116.
  9. Callegati, Franco; Cerroni, Walter; Ramilli, Marco. IEEE Xplore - Man-in-the-Middle Attack to the HTTPS Protocol (англ.) // ieeexplore.ieee.org : journal. — 2009. — P. 78—81.
  10. E. B. Fernandez, Nobukazu Yoshioka, and Hironori Washizaki, ―Patterns for cloud firewalls‖, Procs. of AsianPLoP (AsianPattern Languages of Programs) 2014, Tokyo, Japan, March 2014
  11. E.A .Isayev., D.V. Dumskiy., V.A. Samodurov., V.V.Kornilov. Obespecheniye informazionnoy bezopasnosti oblachnix sistem Matematicheskaya biologiya I bioinformatika , 2015. Т. 10. № 2. s. 567–579.
  12. ] Hassan Reza, Madhuri Sonawane,"Enhancing Mobile Cloud Computing Security Using Steganography", Journal of Information Security, July 2016, Page no. 245-259.
  13. https://www.anti-malware.ru/analytics/Market_Analysis/cloud-access-se-curity-broker
  14. https://www.gartner.com/reviews/market/cloud-access-security-brokers/ co-mpare/symantec-blue-coat-vs-skyhigh-networks
  15. C. Lawson, S.Riley Magic Quadrant for Cloud Access Security Brokers. Gartner. 29 October 2018. https://www.bsigroup.com/globalassets/local-files /enie/csir/resources/whitepaper/1810-magic_quadrant_for_casb.pdf
  16. https://www.symantec.com/

Article full text

Download PDF