Cloud threats: experts talk about data protection in cloud services. What is cloud storage. Regulatory Compliance

Web giant Google provides many great features in its cloud storage. Google says it's safe to store your data with them. Even if your computer, tablet or phone fails, the data on Google Drive are safe. The company also claims that files stored in their data center cannot disappear.

To use Drive, you need a Google account. Creating a Google account couldn't be easier. Google will ask you to come up with strong password. The password must contain at least 8 characters. However, there is no requirement for case-sensitive or varied letters and numbers when registering with Google. Although this could improve security.

Protecting your Google account is a fundamental step in keeping your Drive storage secure. Google offers two-step verification (two-factor authentication) in order to increase the security of your account. Once you enable this feature, every time you log into any of the Google services you will need to enter an additional code. After entering the correct username and password on the Google account page, you will receive an SMS with a verification code on your mobile phone. You will be able to log into Google only after entering this code. Thus, two-step authentication can make Google Drive more secure from hackers. You can also receive such codes using smartphone apps.

In accounting Google posts There is a security question and the ability to enter an email address or phone number to recover the account, and this will also allow you to resume control over the account in the event of a hack. You also control the apps you sign into with your account. Browsing history, IP address, and device information are also available so you can track activity on your Google account.

Encryption is simply vital for any cloud service. Although Google Drive uses HTTPS, it does not provide own service on file encryption. So if you want to encrypt your files, do so before sending them to Google Drive. You can use Boxcryptor for free to secure your cloud files.

Google Drive offers whole line individual options for exchange. Using these settings, you can control who can access files, who can download them, edit them, etc. You can view file versions on Google Drive. So if you need a previous version, you can get it by right-clicking on the required file and selecting the ‘Manage Versions’ option.

It may be noted that the security of Google's online storage service depends on the security of your Google account. If you can protect your Gmail ID accounts, then you can count on reliable protection files on Google Drive.

Microsoft OneDrive

Cloud storage OneDrive from the most powerful software developer Microsoft. To use OneDrive, you must have a Microsoft account. Visit Outlook.com to open a new Microsoft account. During the subscription process, Microsoft takes a number of robust security measures to protect the consumer from hackers. Microsoft prompts and requires input complex password, consisting of at least 8 characters with case-sensitive letters. All this is done for the sake of safety.

The security of OneDrive depends on the security of your Microsoft account. So if your Microsoft account is secured, it also keeps your OneDrive space secure.

Microsoft takes account security on Outlook.com very seriously. To create an account, you need to go to the “Account Settings” option and confirm your identity there using two-step authentication. For account settings, this feature is enabled by default.

Microsoft's two-step verification has more functionality than Google's similar feature. However, you can safely trust both services.

OneDrive uses an HTTPS connection to operate. ‘Recent activity’. From there, you can also manage apps that you've authorized for use with Outlook.com.

OneDrive offers a free file history view for office documents. ‘Previous versions’ of other file formats are available for business level users. So if you make changes to Office documents, you can view the previous version for free in OneDrive. OneDrive files are not accessible without your permission. Despite this, OneDrive does not encrypt files uploaded to its server. In this way, it is possible to provide more high level security for your data, you can use third-party encryption services, for example, Boxcryptor.

Dropbox is one of the most popular online storage providers. It is used for both personal and commercial purposes. Dropbox is exclusively cloud storage. So all their energy is concentrated on the cloud..

Dropbox says data security is their top priority. When subscribing to Dropbox, you will notice that the process is quite simple and fast. You will need to enter your name, address Email and password. The account creation page will prompt you to use a strong password. However, there is no obligation to maintain a certain level of security.

Subscribing to Dropbox may not require immediate email verification, but you will need to verify your email in order to seamlessly share files. All these options will be available as you use the service.

Dropbox offers a file version feature so you can revert to an older version necessary files. If the file was edited and later you needed to get its previous version, simply right-click on the new version of the file and select the “Previous Versions” option in the context menu.

A Dropbox account comes with a range of additional systems security. You can also use two-step verification, which requires you to enter a unique code every time you sign in to Dropbox. This code can be received on your mobile phone. You can also get the code through a smartphone app. Either way, two-factor authentication can significantly increase the security of your account.

The Dropbox Security Settings page also allows you to monitor and manage connected devices, browsing history, linked apps, and more to prevent unauthorized access.

Dropbox uses an HTTPS connection on its website and during data transfers between you and the cloud storage. You can control access to files using data sharing options.

Dropbox itself does not provide the option to encrypt files before uploading to their server. Dropbox says it encrypts files during transfer and at all other times. However, you can encrypt files before sending them to Dropbox. There are a whole lot of tools for this. Boxcryptor is one of them. It uses industry standard "AES-256 bit" encryption technology to further enhance the security of your files.

Copy is one of the most popular cloud storage services, competing with Dropbox, Google Drive, OneDrive, etc. The service also offers a referral bonus through which existing users can increase their free storage. The registration process for Copy takes just a few seconds. You will be asked to provide a name, email address and password. During the registration process for Copy. All that was indicated regarding the password is that it must consist of at least 6 characters.

Copy.com uses a secure HTTPS connection during data transfer between the user and its server. The company also claims that they store data in an encrypted format. But despite this, you cannot encrypt data on Copy.com yourself. But no one has canceled third-party services for encrypting data before sending it to Copy. So you can safely encrypt your files first, and then send them for storage to Copy.

Copy.com does not offer two-step verification, which plays a very large role in maintaining account security. Hopefully they will start offering this valuable option soon.

Copy has a file history check feature that allows you to get previous versions of your files. Unfortunately, Copy.com does not have an option to view your account history.

Despite its excellent user interface and functionality, Copy still lacks some essential features.

Mega service, which is known for its confidentiality. Mega was founded by Kim Dotcom. The service provides each new user with 50 GB of free space. To register with Mega, you need to provide basic information such as name, email address, password, etc. Mega requires you to use a strong password. If the password is not strong enough, you will receive the following message: ‘your password is not strong enough to continue’.

Mega uses an HTTPS connection and client-side encryption technology. This means that locally encrypted information will be sent to Mega. When downloading information from the service, it is decrypted. According to Mega's security help page, your files cannot be read on the server. The company strongly recommends not to lose your password. The Mega password is not only a password, but a code that opens the main decryption key. Mega claims that it is impossible to recover the password on the service. If not backup copy the main decryption key, then all data stored on the service server will be lost.

However, there are reports that Mega's browser-based encryption system has certain weaknesses.

Mega offers excellent security features, but, unfortunately, the service does not have file version history. Can be restored deleted files using the 'SyncDebris' application from Sync Client, or from the 'Rubbish Bin' folder on Mega. To monitor activity, Mega provides a browsing log option and an application management option.

What's interesting is that Mega doesn't have a two-step verification option, which would greatly improve the service's privacy and security efforts.

This section took a detailed look at the available security features of popular cloud storage providers such as Google Drive, Dropbox, Copy and Mega. When it comes to security, they all have their own and special offers. Now let's see what basic security features these services offer. Below is an easy-to-follow checklist.

    Password Strength Requirement: Google, Microsoft and Mega require you to use a strong password. Dropbox and Copy are more flexible in this regard.

    Email address verification requirement: All services sooner or later require you to verify your email address.

    Two-step verification: Google Drive, OneDrive and Dropbox provide two-step verification. Copy and Mega do not currently provide this option.

    Client-side encryption: Only Mega offers client-side encryption. This is done from the device from which the files are downloaded.

    Server-side encryption: Dropbox, Mega and Copy store files encrypted on their servers. Where you can use local encryption to avoid risks.

    Using a secure connection (HTTPS): All of these providers use a secure HTTPS connection. However, Mega gives users the option to disable it (optional).

    Usage security questions to verify users: Google Drive has this option available. OneDrive, Dropbox, Copy and Mega do not currently use a security question.

From the above, it is clear that Google Drive provides almost all security features except encryption. Microsoft OneDrive and Dropbox follow closely behind. Mega provides sophisticated security such as encryption, but the service does not have two-step verification. Copy needs to work on turning its great cloud storage experience into a more secure environment with two-step verification, password strength requirements, and other innovative security systems.

20.11.16 4392

Cloud file storages there are various types. It is difficult to directly compare different providers because they focus on providing different services:

Most services provide a certain amount of storage space for free, but if you plan to back up media files, you will quickly reach the limit. In addition, you need to find out which operating systems are supported, whether it is possible to perform backup and use files from multiple devices.

The security of cloud data storage is also important factor. All services claim to have the best possible security policies, but few of them give users real control over their data. Pay attention to services that follow the policy " zero awareness". This means they can't view or transfer your files even if they wanted to. But be prepared for the fact that you will bear greater responsibility for the safety of your data.

Here's a quick look at the top 20 cloud file storages and their advantages compared to other services:

1. SugarSync

SugarSync plans start at $9.99 per month for 100GB or $74.99 per year. For the money, you'll get the ability to back up an unlimited number of devices on Mac or Windows. There is a 30-day free trial.

You can add or change a file on one device and it will be instantly available on another. You can also back up your existing folder structure, which makes things much easier.

With just a few clicks, you can save a folder in real time and access it from any device. It's simple but powerful cloud file storage , which has a reasonable price-quality ratio:

2. Carbonite

Offering users tariff plans From $4.92 per month or $59.99 per year, Carbonite is one of the most competitive cloud services in terms of price. It is aimed at private users and small businesses. Tariff plan ' Pro‘ allows you to back up from an unlimited number of workstations for $269.99 per year.

The service also offers support 7 days a week, from 8:30 to 21:00. A 15-day free trial is included. Carbonite's Disaster Recovery Suite is another solution that includes site recovery and cloud backup options, with 500 gigabytes of storage capacity. cloud space and 1 terabyte on the local disk. This plan costs $1,199.99 per year:

3. IDrive

IDrive provides users with 5 GB of disk space free of charge and the ability to use it from an unlimited number of devices. There are paid plans that start at $4.95 per month for 150GB, or $49.50 per year. The service only works with Windows and Mac.

It offers a one-stop solution that allows you to back up PCs, Macs, and even Facebook pictures. Business users can back up computers, servers, Exchange, SQL, NAS and mobile devices.

In addition to 256-bit AES encryption, the service provides the ability to use a private key known only to you. In addition, it supports saving different versions files (up to 10).

IDrive also has interesting way working with clients: they send the user a physical disk onto which he copies his data and sends it back to them. This way, you don't have to worry about exceeding your weekly limit.

4. Dropbox

For many, Dropbox was the first and remains the only cloud storage service. This is a popular service for personal use thanks to him simple interface and competitive prices. For $9.99 per month or $99.99 per year, you get 1,000 GB of storage, with 2 GB free to use. Dropbox is available for Windows, Mac and Linux users.

This file storage syncs files to automatic mode and allows you to share them with family and friends, even if they do not have an account with the service. Saved files are accessible from any device. You can share folders for general work with documents, although Dropbox is aimed more at individuals than companies.

5. Google Drive

Google offers users a reliable and inexpensive storage solution. You get 15GB free, and if you need more, 100GB costs $1.99 per month, or $23.88 per year. Google Drive can be used on an unlimited number of devices. The service does not support Linux, but only Windows and Mac.

The catch is privacy. Many companies are moving to a work model in which they charge a nominal fee for their services, but monetize the attracted customers by using their data for various purposes, including advertising. Unfortunately, this is not very good from the point of view of the security of stored information:

6.BackBlaze

Cloud file storage for just $5 per month or $50 per year. For this money you will get unlimited copying. You are also given the opportunity to use the service for free in trial mode for 15 days.

Backblaze is different from most cloud services. The user downloads the software and installs it, after which the backup occurs automatically. No need to select files and folders. Everything is done automatically. Backblaze scans your computer and finds photos, music, documents, and other important files. When you're not working on your computer, Backblaze copies, compresses, and encrypts your data before sending it to a secure data center for storage.

What’s especially nice is the absence of any restrictions. You can back up your data to the cloud with external hard disk at no additional cost. There are also no file size restrictions.

Backblaze runs in the background on Windows or Mac. The service is not only secure, thanks to strong encryption, but also easy to use:

7. CrashPlan

Provides service file storage for $5.99 per month or $59.99 per year, a 30-day free version is available. The service runs on Windows, Mac or Linux. Once you've set up your basic settings, CrashPlan works in the background, automatically copying your files to the cloud.

Can choose free option backup to an external hard drive so all files are stored locally. For obvious reasons, this option has a number of limitations.

It is also possible to create backup copies on other trusted computers on the Network ( for example, relatives and friends). Finally, there is the cloud storage option, which is the most secure: you get unlimited backups, with no restrictions on capacity, bandwidth usage, or file type. CrashPlan uses equipment corporate level and military-grade encryption. Files can be accessed from any device of your choice.

8.Mozy

Mozy offers a free starting plan of 2GB of storage. Paid ones start at $5.99 per month or $65.89 per year for 50GB.

The service is used by more than 6 million people and 100,000 companies around the world, who trust it with more than 90 petabytes of their data. Option " set it and forget it» allows you to schedule backups for certain time. Everything else will be done automatically.

This free file storage provides dual encryption: 256-bit AES or 448-bit Blowfish managed key, as well as data transmission over an encrypted SSL connection.

Monitoring of data centers is carried out 24/7: temperature control, backup power, seismic activity analysis and other safety measures. This service has several data centers in EU countries, so European data can be stored in Europe:

9. JustCloud.com

JustCloud offers unlimited storage space starting at $4.49 per month or $53.88 per year. A 14-day free trial is also available. JustCloud provides a fast and secure service, synchronizing across multiple computers and devices.

There are free mobile applications. With their help, you can easily share files with friends. This is a simple and automated service that strives to implement Newest technologies, with a wide range of supported devices and operating systems.

The service also provides the creation of an unlimited number of versions of file copies. All files are encrypted using multi-level encryption and stored in secure data centers.

10. Mega

Prices for services file storage Mega data start at 9.99 EUR per month for 500 GB, or 99.99 EUR per year. You can also get 50 GB for free. The service works with Windows, Mac and Linux.

Mega entered the market in 2013, but has already earned a good reputation. The service takes a strict approach to security. Powerful system Full encryption protects user data even from Mega itself. But this does not affect the convenience and ease of use.

Although Mega remains the only cloud storage provider with high-performance, browser-based full encryption, it is quite simple, and this attracts millions of users.

11. SOS Online Backup

Another low-cost cloud storage provider, offering services starting at just $5 per month for unlimited storage, or $59.99 per year. A 14-day free trial is also available and the service works with Windows and Mac.

You have the opportunity to store an unlimited amount of data in the cloud for a long time. End-to-end encryption is always enabled, so files will always be encrypted before they leave your computer.

A powerful Android application is also available that can help you save all your data on your mobile devices. You can restore lost files from any device.

Cloud file storage SOS involves the user generating keys that are never stored in the cloud. This way, only the owner can access the files. Data is stored on secure servers with constant monitoring, and data is backed up to various devices every night.

12. SpiderOak

Prices start at $7 per month for 30GB, or $84 per year. You can use the service on an unlimited number of devices. It works with Windows, Mac and Linux. The maximum amount of available storage is 5 TB, with 1 TB costing just $12 per month. In addition to an impressive amount of disk space, the user receives full control over your data. All information is stored on servers in encrypted form.

Despite its strong encryption bias, it is a relatively flexible solution that offers a variety of options. customized services For individual users and corporate clients.

The approach of other services that only use local encryption leaves your data vulnerable. If you don't need such a service, then SpiderOak is a good option.

13. Norton

Norton is famous name in the field of online security, the company is now expanding its activities to the segment file storages.

There is no starter on the service free plan and free trial version. But for $4.17 per month ($49.99 per year) you'll get 25GB of storage space that you can use on up to 5 Windows or Mac computers.

Norton offers strong encryption. Backups important files are created automatically. You can also increase the storage capacity if you need more space.

You can transfer files between computers and retrieve backups from any PC through password-protected web pages. Previous backups are retained for 90 days. To save space, files are automatically compressed when creating a backup.

14. SafeCopy

SafeCopy offers a lot of cloud space at a reasonable price. The user receives up to 3 GB for free, with 200 GB available for $4.17 per month ($50 per year).

A 30-day free trial is offered. You can use the service on an unlimited number of devices running Windows and Mac operating systems. Files are protected with military-grade 448-bit encryption. Most of the calculations are done by SafeCopy's own servers, so the CPU load user computer will be low.

It is possible to store unlimited amount versions, you can back up multiple folders. When you delete a file on your computer, it remains in file storage without registration. So what is it great way insure against errors.

15. LiveDrive

LiveDrive provides unlimited cloud storage for $8 per month or $48 per year. A 14-day free trial is offered, but does not include free storage. The service runs on Windows and Mac.

LiveDrive is one of the most dynamically developing services cloud storage data. The proposed software package is easy to install, and with the help of a special application allows you to see your files from any device on IOS, Android or Windows 8.

You can synchronize files on different computers and work on different devices. Shared access to documents is carried out via the Internet. Tariff plan includes 2 TB available space. The “Pro” version provides additional functionality and 5 TB of space.

16. pCloud

pCloud provides 10 GB free storage, which will be available to the user from an unlimited number of devices. The service supports Windows, Mac and Linux. If you need more space, it's only $4.99 per month or $49.99 per year for 100GB. You can also get 10 additional gigabytes for referred friends. For business users, there is a 5 TB plan with enterprise-grade tools for collaboration and user management.

Cloud file storage pCloud allows you to access files from your computer, smartphone or other mobile device. It is possible to increase security by encrypting sensitive files using pCloud Crypto. It will cost $3.99 per month. Encryption is done on the client side, even pCloud does not have access to the files.

17.OpenDrive

OpenDrive offers unlimited cloud storage, accessible from any number of devices, for $9.95 per month or $99 per year. Supported systems are Windows and Mac. You get 5GB of disk space for free.

Along with the desktop version, there is an Android app that you can use for quick and easy backups.

The service offers 24/7 support for business users, as well as many tools for sharing files with other people. You can manage free space and channel, as well as the number of connected users. You can also share files and folders of any size with friends and play media directly from the cloud.

It also supports hotlinking, which allows you to insert links to cloud files into emails and documents. You can also add users to shared folders.

18. altdrive

Altdrive file storage does not have a free starting plan, and the service can only be used from one device. A 30-day trial is also available and works on Mac, Windows and Linux, Solaris. Unlimited storage can be purchased for $4.45 per month or $44.50 per year.

Altdrive supports files up to 4 GB. The service places a strong emphasis on security. This is one of the reasons why it does not offer synchronization or sharing.

In addition, the service is aimed at technically savvy users. It offers services that other services do not. For example, geolocation of stolen devices. File versioning is also supported, allowing you to back up on demand or on a schedule.

19. Zoolz

Zoolz is a more expensive solution than most other services on the market. It doesn't provide a free starter plan, you can only use one device, and it only supports Windows. Usage of this service costs $14.17 per month or $169.99 per year for unlimited space.

This cloud file storage specialize in long-term storage. Its creators claim that they will store your data in the cloud for life and that other companies do not offer such a long period.

Before files are stored on the servers, they are encrypted using military-grade 256-bit AES encryption. It also supports many additional functions, such as scheduling and setting download speed limits. There is a hybrid backup option if the user requires a second backup on a local server.

Although, if necessary, you can restore from backups separate files or all at once. The process starts with a delay of 3-5 hours.

20. ADrive

ADrive is a flexible service that supports Windows, Mac and Linux. You can use an unlimited number of devices, and a free 50 GB plan is available. Paid plans start at $6.95 per month or $69.95 per year.

You can access files from anywhere in the world, and you can share or edit them over the Internet. The service offers convenient tools to search for files. Premium and business plans support data sharing, restoring different versions of stored files, limiting the availability of public files, and SSL encryption. And " No third party advertising". This assumes that basic package will contain advertising.

You can access your files over the Internet from anywhere. Free file storage also offers special applications for downloading from Android and iOS.

Translation of the article " Top 20 Best Cloud Storage Providers – Reviews and Comparison of the Top Secure Solutions and Services. Find Unlimited Cloud Based Data Storage Services and Options "was prepared by the friendly project team.

Good bad

How and where to store your data? Some people use flash drives, others buy packs of hard drives and set up their own home storage, but there is an opinion that the most safe place for data storage – cloud. And this opinion is fully justified.

Currently, cloud storage providers offer you the most advanced solutions in terms of your data security and management. Of course, you can do these as many times as you like. loud statements, but here are the arguments:

Data in safe hands

What is the user worried about? About personal data: card and phone numbers, information about actions, and so on. The cloud is like the Presidential Administration: a lot of security, CCTV cameras and locks.

No matter how far away the boss’s laptop with the data of all employees is, it is still easy to get to it by hacking the network to which it is connected. Now conclude why a cloud protected and scanned 24/7 by various security tools is more reliable than your physical media.

All data in the cloud is carefully encrypted, so even after gaining access to it, an attacker will have to deal with this:

Cloud backup is automatic and permanent, so even the angry “young lady” you broke up with yesterday is not able to destroy your collection of German films, which you have been cataloging since the distant 90s.

Security at your fingertips

If you, for example, are a software developer and are developing own application, then you probably update it often, because without updates it becomes dead weight. Each a new version associated with debugging code, and during this it is very important process vulnerabilities appear that can give an attacker access to your users’ personal data. The cloud can solve this problem thanks to its features:

  • The administrator can define the rights and roles of each user who works on the project
  • Automation of some processes eliminates the human factor: accidental or intentional damage to release code
  • Various utilities like Amazon Inspector scan your system 24/7 to find flaws
  • Any actions are secretly recorded in a log file - total control is ensured

Google reads my emails!

Numerous rumors that Google employees and Amazon gather at a round table every day and begin to read users’ personal messages - nothing more than rumors. That's not why companies spend millions of dollars maintaining cloud infrastructure.

All files are stored on several hard drives, which are restored independently. Moreover, one file can be split into parts on different disks.

At the end of the day, the benefit of the cloud comes down to minimal impact human factor, which already guarantees impeccable security. Think for yourself, who is more likely to fail, your hard drive or the entire cloud system, in which such drives are used as consumables and are constantly updated?

Over the past few years, so many services have appeared for remote storage and synchronization of user data that it is almost impossible to refuse to use them. However, many are deterred by privacy issues. After all, when we upload files to the cloud, we are transferring them to someone else's computer, which means that someone else besides us may have access to our information.

On the other hand, it is difficult to refuse the numerous conveniences that data storage services give us: having a backup copy of files, the ability to access your documents from any device from anywhere in the world, convenient transfer of files to other people. You can find several ways to solve the security problem of remote file storage. Some of them will be discussed in this review.

Cloudfogger— free encryption for any cloud

Perhaps the easiest way to ensure the security of files stored in the cloud is to manually encrypt them. To do this, you can use password-protected archives or one of many existing applications for encryption. But for those who are dealing with a large number For documents that are constantly being changed, such methods are not very suitable. Since services for remote file storage relieve us of the need to upload files to them manually, then the encryption process should be automated. This can be implemented using specialized program Cloudfogger. It works with Windows, Mac, and can also be installed on Android and iOS devices.

The app encrypts data using 256-bit encryption AES algorithm(Advanced Encryption Standard) before they are uploaded to the cloud. Files arrive on the servers of Dropbox and other cloud storage services exclusively in encrypted form, so they can only be accessed if Cloudfogger is also installed on the device from which you want to open the file.

It is very convenient that encryption does not cause inconvenience in work: the key to access files is entered only once, when the system boots, after which you can work with them in normal mode. But if, for example, a laptop is stolen, then the next time it starts, the attacker will no longer be able to find out the contents of the files in the protected folders.

To start working with Cloudfogger, you need to create an account (and for greater security, you can disable the password recovery option, but in this case, forgetting it is strictly not recommended). Then the application itself will try to find folders of popular cloud services Dropbox, SkyDrive, Google Drive and others. But even if Cloudfogger did not cope with this task automatically, you can still manually select the directories whose contents you want to encrypt.

In addition, it is possible to identify individual files from any other folders. The easiest way to do this is with context menu“Explorer” - Cloudfogger adds its own list of commands to it.

It is also possible to exclude from encryption individual directories and files from those folders that are protected by Cloudfogger. Such data will be uploaded to cloud services as usual. It is worth keeping in mind that after the synchronized folder is protected by Cloudfogger, it will take some time to re-upload the data from it to the cloud storage.

Another feature of Cloudfogger is sharing encrypted files with other people. If the data contained in cloud storage is protected by the application, standard methods sending links to them to other people will not work. But if you allow access to files in the Cloudfogger interface, you can safely share them with other people. Files encrypted by Cloudfogger can be transferred on a flash drive or sent by mail.

Technically, file access works like this: Each Cloudfogger file (.cfog) contains a unique AES key, which is stored encrypted in the file itself. These 256-bit keys are protected by RSA keys, which are unique to each user. Decryption occurs only if the user whose RSA key corresponds to what is written in the header of the .cfog file. If there are several such users, data about their keys is accordingly entered into the file headers.

Another specialized solution for ensuring file security on cloud services is Boxcryptor. Originally created as a complement to Dropbox, today this application supports all popular services for remote file storage. True, in free version Encryption of data stored on only one service is available, and encryption of file names cannot be enabled.

Boxcryptor automatically detects the presence of installed clients for popular services for storing files in the cloud (even Yandex.Disk is supported), creates a virtual disk and adds the corresponding folders to it. In the settings you can manage all connected folders: add new ones, temporarily disable encryption, and so on.

The service offers support for all major platforms, both desktop and mobile. There's even an extension for Google Chrome. To work with Boxcryptor, you will need to create an account - forgetting your password is strictly not recommended!

Tresorit— cloud service with increased attention to security

If, for security reasons, you do not yet use any services for remote file storage, you should pay attention to the young project Tresorit, launched about six months ago. The service was created as an alternative standard solutions to store files in the cloud and is ready to provide a much higher level of file privacy.

Tresorit provides user-side file encryption. Thus, all data is stored on the service’s servers in encrypted form. The strong AES-256 algorithm is used for encryption. When creating a user account, you are warned that if you lose your password, it will be impossible to access data on the remote server. There are no ways to recover the password, since the password is not stored anywhere: neither in the installed application, nor on the service servers. And for users who have lost their password, Tresorit developers offer the only solution - to register again.

Behind increased security You will have to pay by giving up some of the usual functions. For example, you won’t be able to access your files from someone else’s computer—Tresorit doesn’t have a web interface. So far, the developers have not even promised such a possibility, explaining that JavaScript has many vulnerabilities. However, taking into account the ability to install the Tresorit application on mobile devices, this drawback does not seem so serious - after all, if it is not possible to carry a laptop with you everywhere, then the smartphone is certainly almost always with the user.

Invitations sent by mail are used to exchange files. By setting up sharing, you can assign different roles to people: some can only view files, others can make changes to them and add new files to folders, and others can also invite new users.

MEGA— secure 50 GB in the cloud with synchronization

Until recently, the new brainchild of Kim Dotcom could hardly be considered as an alternative to the usual services for remote file storage. The fact is that the only way to load files into it was to drag them into the browser window. Accordingly, there was no talk of automatic loading or synchronization.

But with the release of the application for Android, as well as the beta version of the client for Windows, the service now has these two most important capabilities.

We have already written in detail about the service itself and the security principles on which it was created in the material “Mega-return of Kim Dotcom: 50 GB in the cloud for free”, so we will focus only on the main points. So, MEGA was created as a response to the closure of Megaupload by the American authorities. The servers on which user data is stored are located in New Zealand. All files are encrypted on the user’s side, that is, before being sent to the service, making it impossible to access them without knowing the password. Unlike Tresorit, MEGA runs in a browser and allows users to view lists of files, delete and move them, but online viewing is not available as they are encrypted. To view the file, you must first download it to disk. A 2048-bit RSA key is used for encryption, and forgotten password it is impossible to recover, since it is also the encryption key.

At first, users did not even have the opportunity to change the password entered during registration, but now such an opportunity has appeared. Moreover, if the user is already logged into their MEGA account in the browser but does not remember Current Password, he can change it by entering a new one and then following the confirmation link in the letter that is sent to the email address associated with the account.

The MEGASync client makes it possible to synchronize the contents of any folders on the disk with virtual folders, available in the Mega account. Right at initial setup you can choose which folders should be backed up where.

Later in the application settings you can add additional folders. Client settings also provide the ability to view information about free space(remember, Mega offers as much as 50 GB for free), limit download speed, use a proxy.

The MEGA client for Android allows you not only to download files stored on the server, but also to automatically upload to the service all photos and video files taken by the device’s camera. All basic operations for working with files are also available in the client: deleting, moving, creating links to files for sharing with other people, searching.

⇡ Conclusion

The presence of files on your computer, the contents of which no one else should know about, is not a reason to refuse to use services for remote data storage. You just need to take care of privacy by installing software to ensure additional protection or by giving preference to one of the services with encryption on the user’s side. Mega looks the most attractive among all the solutions considered. The service offers a very large amount of disk space for free, and ensures that files are encrypted before uploading to the server without using additional utilities, and also makes it possible to view a list of files and manage them in the browser and from a mobile device on Android.

A data processing center (DPC) is a collection of servers located on one site in order to increase efficiency and security. Data center security includes network and physical security, as well as resiliency and power reliability. Currently, the market offers a wide range of solutions for protecting servers and data centers from various threats. They are united by their focus on a narrow range of tasks to be solved. However, the range of these tasks has undergone some expansion due to the gradual displacement of classical hardware systems by virtual platforms. To known types of threats ( network attacks, vulnerabilities in operating system applications, malicious software) added difficulties associated with monitoring the environment (hypervisor), traffic between guest machines and delimiting access rights. Internal issues and policies for data center protection, as well as the requirements of external regulators, have expanded. The operation of modern data centers in a number of industries requires the closure of technical issues, as well as issues related to their security. Financial institutions (banks, processing centers) are subject to a number of standards, the implementation of which is laid down at the level technical solutions. The penetration of virtualization platforms has reached a level where almost all companies using these systems are very seriously concerned with enhancing security in them. Let us note that literally a year ago the interest was rather theoretical.
IN modern conditions It is becoming increasingly difficult to protect business-critical systems and applications.
The emergence of virtualization has become an urgent reason for the large-scale migration of most systems to VMs, but solving security problems associated with operating applications in a new environment requires a special approach. Many types of threats have been well studied and protections have been developed for them, but they still need to be adapted for use in the cloud.

Existing threats cloud computing
Cloud control and management is a security issue. There are no guarantees that all cloud resources have been counted and that there are no uncontrolled virtual machines, that unnecessary processes are not running, and that the mutual configuration of cloud elements is not disrupted. This is a high-level type of threat, because... it is related to the manageability of the cloud as a single information system and for him general protection must be built individually. To do this, it is necessary to use a risk management model for cloud infrastructures.

Physical security is based on strict controls physical access to servers and network infrastructure. Unlike physical security, network security First of all, it is the construction of a reliable threat model, including intrusion protection and a firewall. Usage firewall involves the operation of a filter in order to distinguish internal data center networks into subnets with different levels of trust. These can be separate servers accessible from the Internet or servers from internal networks.
In cloud computing, the most important platform role is played by virtualization technology. To maintain data integrity and ensure protection, let's look at the main known threats to cloud computing.

1. Difficulties in moving conventional servers to the cloud
The security requirements for cloud computing are no different from the security requirements for data centers. However, data center virtualization and the transition to cloud environments lead to the emergence of new threats.
Internet access to management computing power one of the key characteristics of cloud computing. In most traditional data centers, engineers' access to servers is controlled at the physical level; in cloud environments, they work via the Internet. Separating access control and ensuring transparency of changes at the system level is one of the main security criteria.
2. Dynamics of virtual machines
Virtual machines are dynamic. Creating a new machine, stopping it, and starting it again can be done in a short time. They are cloned and can be moved between physical servers. This variability has a difficult impact on security integrity design. However, vulnerabilities in the operating system or applications in a virtual environment spread uncontrollably and often appear after an arbitrary period of time (for example, when restoring from a backup). In cloud computing environments, it is important to reliably capture the security state of the system, and this should not depend on its state and location.
3. Vulnerabilities within the virtual environment
Cloud computing servers and local servers use the same operating systems and applications. For cloud systems threat remote hacking or malware infection is high. The risk for virtual systems is also high. Parallel virtual machines increase the attack surface. An intrusion detection and prevention system must be able to detect malicious activity at the virtual machine level, regardless of their location in the cloud environment.
4. Protect idle virtual machines
When a virtual machine is turned off, it is at risk of infection. Access to the virtual machine image storage via the network is sufficient. It is absolutely impossible to run security software on a shutdown virtual machine. IN in this case protection must be implemented not only within each virtual machine, but also at the hypervisor level.
5. Perimeter protection and network demarcation
When using cloud computing, the network perimeter blurs or disappears. This results in the protection of the less secure part of the network determining the overall level of security. To delimit segments with at different levels trust in the cloud, virtual machines must provide themselves with protection, moving the network perimeter to the virtual machine itself (Fig. 1.). A corporate firewall is the main component for implementing IT security policies and delineating network segments, which is not able to affect servers located in cloud environments.
Attacks on clouds and solutions to eliminate them
1. Traditional attacks on software
Vulnerabilities of operating systems, modular components, network protocols, etc. are traditional threats, to protect against which it is enough to install a firewall, firewall, antivirus, IPS and other components that are decisive this problem. It is important that these protection tools work effectively in virtualization conditions.
2. Functional attacks on cloud elements
This type of attack is associated with the multi-layered nature of the cloud, general principle security. In an article about the dangers of clouds, the following solution was proposed: To protect against functional attacks, the following protections must be used for each part of the cloud: for proxies - effective protection against DoS attacks, for a web server - page integrity control, for an application server - application level screen, for a DBMS - protection against SQL injections, for a data storage system - correct backups(backup), access control. Individually, each of these protective mechanisms has already been created, but they are not collected together to comprehensively protect the cloud, so the task of integrating them into a single system must be solved during the creation of the cloud.
3. Attacks on the client
Most users connect to the cloud using a browser. It covers attacks such as Cross Site Scripting, password hijacking, web session hijacking, man-in-the-middle attacks, and many others. The only defense against this type of attack is proper authentication and the use of an encrypted connection (SSL) with mutual authentication. However, these protections are not very convenient and very wasteful for cloud creators. There are still many unsolved challenges in this area of ​​information security.
4. Attacks on the hypervisor
The hypervisor is one of the key elements virtual system. Its main function is to share resources between virtual machines. An attack on a hypervisor could result in one virtual machine being able to access the memory and resources of another. It will also be able to intercept network traffic, take away physical resources, and even oust a virtual machine from the server. As standard methods protection, it is recommended to use specialized products for virtual environments, integration of host servers with the directory service Active Directory, use of password complexity and aging policies, as well as standardization of procedures for accessing host server management tools, use the virtualization host’s built-in firewall. It is also possible to disable such frequently unused services such as web access to a virtualization server.
5. Attacks on control systems
The large number of virtual machines used in clouds requires management systems that can reliably control the creation, migration and disposal of virtual machines. Intervention in the control system can lead to the appearance of virtual machines - invisible ones, capable of blocking some virtual machines and exposing others.
Security Threat Protection Solutions from Cloud Security Alliance (CSA)
The Cloud Security Alliance (CSA) has published the most effective cloud security best practices. After analyzing the information published by the company, the following solutions were proposed.
1. Data security. Encryption
Encryption is one of the most effective ways to protect data. The provider providing access to the data must encrypt the client information stored in the data center, and also permanently delete it when it is not necessary.
2. Data protection during transmission
Encrypted data in transit should only be accessible after authentication. The data cannot be read or changed, even if accessed through untrusted nodes. Such technologies are quite well known; algorithms and reliable protocols AES, TLS, IPsec have been used by providers for a long time.
3. Authentication
Authentication - password protection. To ensure higher reliability, they often resort to means such as tokens and certificates. For transparent interaction between the provider and the identification system during authorization, it is also recommended to use LDAP (Lightweight Directory Access Protocol) and SAML (Security Assertion Markup Language).
4. User isolation
Using an individual virtual machine and a virtual network. Virtual networks should be deployed using technologies such as VPN ( Virtual Private Network), VLAN (Virtual Local Area Network) and VPLS (Virtual Private LAN Service). Often, providers isolate user data from each other by changing code data in a single software environment. This approach has risks associated with the danger of finding a hole in non-standard code that allows access to data. In case of possible error in the code the user can get the data of another. IN Lately such incidents occurred frequently.
Conclusion
The described solutions to protect against security threats to cloud computing have been repeatedly used by system integrators in projects to build private clouds. After applying these solutions, the number of incidents that occurred decreased significantly. But many problems associated with protecting virtualization still require careful analysis and well-developed solutions. We will look at them in more detail in the next article.