Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Recolector de Cienci...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
versions View all 2 versions
addClaim

Sobre la seguridad del almacenamiento en la nube

Authors: Galmés Hernández, Andrés;

Sobre la seguridad del almacenamiento en la nube

Abstract

Los servicios y productos de almacenamiento de datos en la nube permiten a sus usuarios guardar y compartir cualquier tipo de documento y archivo desde cualquier dispositivo conectado a Internet. Estos almacenes de información son un objetivo para cualquiera que pretenda hacerse con información confidencial o privada. Existen diferentes amenazas tales como violación y pérdida de datos que ponen en riesgo la seguridad de la información almacenada en la nube. Es importante señalar que el usuario debería ser consciente de las garantías de seguridad que estos ofrecen. Para tomar la decisión correcta en relación al servicio que se ajusta a las necesidades de cada usuario, una buena práctica consiste en analizar las medidas de seguridad de los productos de almacenamiento en la nube. Es importante considerar metodologías de análisis que permitan estudiar la seguridad de uno o varios productos y comparar sus resultados. El presente trabajo se centra en analizar la seguridad de productos pertenecientes a varios proveedores de distintos ámbitos geográficos y jurídicos (Yandex.Disk, CloudMe y Google Drive). Los resultados demuestran que estos productos tienen carencias en cuanto a la implementación de los requisitos de seguridad. Este hecho los expone a importantes amenazas.

Els serveis i productes d'emmagatzematge de dades en el núvol permeten als seus usuaris guardar i compartir qualsevol tipus de document i arxiu des de qualsevol dispositiu connectat a Internet. Aquests magatzems d'informació són un objectiu per a qualsevol que pretengui fer-se amb informació confidencial o privada. Hi ha diferents amenaces com ara violació i pèrdua de dades que posen en risc la seguretat de la informació emmagatzemada en el núvol. És important assenyalar que l'usuari hauria de ser conscient de les garanties de seguretat que aquests ofereixen. Per prendre la decisió correcta en relació al servei que s'ajusta a les necessitats de cada usuari, una bona pràctica consisteix a analitzar les mesures de seguretat dels productes d'emmagatzematge en el núvol. És important considerar metodologies d'anàlisi que permetin estudiar la seguretat d'un o diversos productes i comparar els seus resultats. El present treball se centra en analitzar la seguretat de productes pertanyents a diversos proveïdors de diferents àmbits geogràfics i jurídics (Yandex.Disk, CloudMe i Google Drive). Els resultats demostren que aquests productes tenen mancances pel que fa a la implementació dels requisits de seguretat. Aquest fet els exposa a importants amenaces.

Cloud storage products and services enable users to store and share data from any device connected over Internet. This data store is an attractive target for those who seek to get users¿ confidential information and private data. There are threats such as data breaches and data loss, which can compromise the security of information stored in the cloud. Importantly, users should be aware of the guarantees of the cloud security offered by providers. In order to make the right decision on the service to meet users¿ needs, the best practice is to analyze the cloud security measures. It is important to consider methodologies that enable a comparative analysis of the cloud storage security for different products and services. The present research focuses on analyzing the cloud security of products from several providers located in different geographical areas, administrative and legal frameworks (Yandex.Disk, CloudMe and Google Drive). The results show that the products have weaknesses regarding the implementation of security requirements. Therefore, these products are exposed to important threats.

Country
Spain
Related Organizations
Keywords

threats, cloud computing, seguretat informàtica, Computer security -- TFM, computación en la nube, storage, amenaces, Seguridad informática -- TFM, almacenamiento, informàtica en núvol, amenazas, emmagatzematge, Seguretat informàtica -- TFM, seguridad informática, computer security

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green