Main security measures for the protection of information and data in the cloud: a systematic review

Descripción del Articulo

The systematic review conducted focuses on identifying the main security measures to protect information and data in cloud computing environments. The objective was to highlight the importance of implementing robust security measures and explore their practical applicability. Relevant articles were...

Descripción completa

Detalles Bibliográficos
Autores: Lezcano Gil, Alfredo José, Geronimo Dionicio, Percy Olivarez, Mendoza De Los Santos, Alberto Carlos
Formato: artículo
Fecha de Publicación:2023
Institución:Universidad Privada de Tacna
Repositorio:Revistas - Universidad Privada de Tacna
Lenguaje:español
OAI Identifier:oai:revistas.upt.edu.pe:article/796
Enlace del recurso:https://revistas.upt.edu.pe/ojs/index.php/ingenieria/article/view/796
Nivel de acceso:acceso abierto
Materia:medidas de seguridad
computación en la nube
seguridad de la información
información en la nube
seguridad cibernética
security measures
cloud computing
information security
information in the cloud
cyber security
Descripción
Sumario:The systematic review conducted focuses on identifying the main security measures to protect information and data in cloud computing environments. The objective was to highlight the importance of implementing robust security measures and explore their practical applicability. Relevant articles were selected and their results were analyzed through the PRISMA methodology. The findings emphasize the importance of strong password policies, access control, biometric and multifactor authentication, and the use of firewalls. In addition, specific solutions such as SSH key management in AWS and the adoption of CASB to strengthen cloud security were examined. Finally, it was determined that data encryption, access control, and biometric and multifactor authentication are crucial measures to protect information in the cloud. These measures prevent security breaches and ensure user privacy. Practical applications include robust password policies, multifactor authentication, and data encryption.
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).