Skip to main content
Log in

Model of hidden IT security threats in the cloud computing environment

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

A model of threats has been proposed that makes it possible to identify potential vulnerabilities of the cloud computing environment, including the actions related to system task scheduler malfunction in a timely manner and, thus, efficiently block information action channels beyond the control of guest operating systems or application software.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Lukashin, A.A. and Zaborovsky, V.S., The system of protection of information services in cloud computing, Inf. Obraz. Nauki, 2013, no. 2 (18), pp. 39–53.

    Google Scholar 

  2. Zaborovsky, V.S. and Lukashin, A.A., Network-centric model and methods to control access to information resources in cloud computing, Nauchno-Tekh. Vedomosti Sankt-Peterb. Gos. Politekh. Univ., Inf. Telekommun. Uprav., 2012, no. 2, p. 183.

    Google Scholar 

  3. Zaborovsky, V.S. and Lukashin, A.A., High performance protected cloud, Otkrytye Sist., SUBD, 2013, no. 6, pp. 10–13.

    Google Scholar 

  4. Molyakov, A.S., Investigation of new models and methods of information security management tools to counteract the means of hidden impact, Informatsionnaya bezopasnost' regionov Rossii (IBRR2013). VIII SanktPeterburgskaya mezhregional’naya konferentsiya. Materialy konferentsii (Proc. VIII St.Petersburg Interregional Conference on Information Security of Russian Regions (IBRR-2013)), St. Petersburg, 2013, p. 151. http://www.spoisu.ru/files/ibrr/ibrr2013/ibrr2013_materials.pdf

    Google Scholar 

  5. Eisymont, L.K. and Molyakov, A.S., An overview of modern domestic and foreign supercomputer computing systems. Problems of information security, in Nauchno-tekhnicheskaya konferentsiya nauchnykh spetsialistov FGU NII Kvant: Materialy otcheta (Proc. Sci.-Tech. Conf. of Sci. Experts of FGU NII Kvant), Moscow, 2012.

    Google Scholar 

  6. Molyakov, A.S., KPROCESSOR_CID_TABLE factoring–a new method in the theory of computer analysis of the virus code and search for software beetles, Probl. Inf. Bezop., Komp. Sist., 2009, no. 1, pp. 7–18.

    Google Scholar 

  7. Molyakov, A.S., Research of hidden control mechanisms in OSon various platforms, Izv. Yuzhnogo Fed. Univ., Ser. Tekh. Nauki, 2007, no. 1.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. S. Zaborovsky.

Additional information

Original Russian Text © A.S. Molyakov, V.S. Zaborovsky, A.A. Lukashin, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Molyakov, A.S., Zaborovsky, V.S. & Lukashin, A.A. Model of hidden IT security threats in the cloud computing environment. Aut. Control Comp. Sci. 49, 741–744 (2015). https://doi.org/10.3103/S0146411615080295

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411615080295

Keywords