Automated Detection and Classification of Sensitive Data in Cloud Environments

Maxim Egorov, Dmitry Namiot

Abstract


The introduction of cloud technologies is inevitably accompanied by an increase in information security risks. One of the most serious problems faced by cloud users is the detection and prevention of data leaks in the cloud infrastructure. Confidential data is information that requires protection from unauthorized access, modification or distribution, as it is highly sensitive and can cause damage to the owner or third parties in the event of leakage or abuse. This data may concern both individuals and organizations and is often regulated by legal acts in order to ensure their security and confidentiality. Compromise of confidential information (personal information, financial transactions, intellectual property), unauthorized access to sensitive data can lead to large-scale reputational and economic losses. According to all analytical reports, as well as analytical reviews by Gartner and Forrester, the number of cyberattacks targeting cloud platforms is constantly growing, and their complexity and sophistication are increasing. Accordingly, the issues of identifying confidential data in cloud environments are becoming extremely relevant.


Full Text:

PDF (Russian)

References


ENISA (European Union Agency for Cybersecurity). "Cloud Security: Key Recommendations."European Union Agency for Cybersecurity, 2018.

OWASP. "OWASP Cloud-Native Application Security Top 10."OWASP Foundation, 2021.

Bhardwaj, Sushil, Leena Jain, and Sandeep Jain. "Cloud computing: A study of infrastructure as a service (IAAS)."International Journal of engineering and information Technology 2.1 (2010): 60-63.

Boniface, Michael, et al. "Platform-as-a-service architecture for real-time quality of service management in clouds."2010 fifth nternational conference on internet and web applications and services. IEEE, 2010.

Tsai, WeiTek, XiaoYing Bai, and Yu Huang. "Software-as-a-service (SaaS): perspectives and challenges."Science China Information Sciences 57 (2014): 1-15.

Hussein, Mohamed K., Mohamed H. Mousa, and Mohamed A. Alqarni. "A placement architecture for a container as a service (CaaS) in a cloud environment."Journal of Cloud Computing 8 (2019): 1-15.

Abdurachman, Edi, Ford Lumban Gaol, and Benfano Soewito. "Survey on threats and risks in the cloud computing environment."Procedia Computer Science 161 (2019): 1325-1332.

Alshammari, Abdulaziz, et al. "Security threats and challenges in cloud computing."2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud). IEEE, 2017.

Konsul'tant pljus. "Perechen' normativnyh aktov, otnosjashhih svedenija k kategorii ogranichennogo dostupa".

Kuˇzina, Vjeko, et al. "CASSED: context-based approach for structured sensitive data detection."Expert systems with applications 223 (2023): 119924.

Huang, Ziyi. "Sensitive Information Detection Using HMM&SVM."Proceedings of the 2021 3rd International Conference on Intelligent Medicine and Image Processing. 2021.

Ali, Munwar, and Low Tang Jung. "Confidentiality based file attributes and data classification using tsf-knn."2015 5th International Conference on IT Convergence and Security (ICITCS). IEEE, 2015.

Xu, Guosheng, et al. "Detecting sensitive information of unstructured text using convolutional neural network."2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2019.

Ahmed, Hadeer, et al. "Automated detection of unstructured context-dependent sensitive information using deep learning."Internet of Things 16 (2021): 100444.

Hulsebos, Madelon, et al. "Sherlock: A deep learning approach to semantic data type detection."Proceedings of the 25th ACM SIGKDD International Conference on knowledge discovery & data mining. 2019.

Zhang, Dan, et al. "Sato: Contextual semantic type detection in tables."arXiv preprint arXiv:1911.06311 (2019).

Masdari, Mohammad, and Hemn Khezri. "A survey and taxonomy of the fuzzy signature-based intrusion detection systems."Applied Soft Computing 92 (2020): 106301.

Qin, Biao, et al. "A rule-based classification algorithm for uncertain data."2009 IEEE 25th international conference on data engineering. IEEE, 2009.

[Phoha, Shashi, et al. "Context-aware dynamic data-driven pattern classification." Procedia Computer Science 29 (2014): 1324-1333.

Cloud Data Loss Prevention https://cloud.google.com/security/products/dlp?hl=en Retrieved: May, 2025

AWS Macie https://aws.amazon.com/macie/ Retrieved: May, 2025

Microsoft Purview https://www.microsoft.com/en-us/security/business/microsoft-purview Retrieved: May, 2025

Suhomlin, Vladimir Aleksandrovich. "Koncepcija i osnovnye harakteristiki magisterskoj programmy" Kiberbezopasnost'" fakul'teta VMK MGU." International Journal of Open Information Technologies 11.7 (2023): 143-148.

Namiot, D. E., E. A. Il'jushin, and I. V. Chizhov. "Iskusstvennyj intellekt i kiberbezopasnost'." International Journal of Open Information Technologies 10.9 (2022): 135-147.


Refbacks

  • There are currently no refbacks.


Abava  Кибербезопасность ИТ конгресс СНЭ

ISSN: 2307-8162