Cloud Computing Technology: Architecture, Models and Information Security Aspects

2025;
: pp. 184 - 191
1
Ivan Franko National University of Lviv, Department of Discrete Analysis and Intelligent Systems, Ukraine
2
Ivan Franko National University of Lviv, Department of Discrete Analysis and Intelligent Systems, Ukraine

Due to the need to store large amounts of data, automate processes, support business continuity, and organize remote work, there is a need for a deep understanding of the concepts and capabilities of cloud computing. The use of this technology is becoming a key factor in the competitiveness of enterprises in the digital age. However, the problem lies not only in understanding the essence of cloud solutions as an innovation, but also in the correct approach to their application, ensuring the necessary level of information security, as well as in the ability to cover a wide range of tasks that arise in the process of digital transformation.

The purpose of this work is to reveal the key features of cloud technologies and explore their significance for modern organizations and users. The work considers basic service models (IaaS, PaaS, SaaS) and deployment models (public, private, and hybrid cloud), which allow adapting solutions to the needs of different users and businesses. The benefits and risks of using cloud solutions are also analyzed, and the main threats to data security and mechanisms for their minimization are classified.

Using the example of three leading global providers Amazon Web Services, Google Cloud Platform, and Microsoft Azure - the range of services they offer to users, including tools for storage, data processing, infrastructure scaling, and artificial intelligence implementation, was examined. As a result, a comparative analysis of each provider's capabilities was conducted and their strengths and weaknesses were identified.

  1. AWS. (2019). Cloud Security – Amazon Web Services (AWS). Retrieved from: https://aws.amazon.com/security/
  2. Dotson, C. (2019). Practical Cloud Security. “O’Reilly Media, Inc.”
  3. Hussain, S. A., Fatima, M., Saeed, A., Raza, I., & Shahzad, R. K. (2016). Multilevel classification of security concerns in cloud computing. Applied Computing and Informatics, 13(1), 57–65. https://doi.org/10.- 1016/j.aci.2016.03.001
  4. Hussain, S. A., Fatima, M., Saeed, A., Raza, I., & Shahzad, R. K. (2017). Multilevel classification of security concerns in cloud computing. Applied Computing and Informatics, 13(1), 57–65. https://doi.org/10.- 1016/j.aci.2016.03.001
  5. Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. NIST, 800(145). https://doi.org/10.6028/nist.sp.800-145
  6. Vaquero, L. M., Rodero-Merino, L., Caceres, J., & Lindner, M. (2008). A break in the clouds. ACM SIGCOMM Computer Communication Review, 39(1), 50. https://doi.org/10.1145/1496091.1496100
  7. Gartner. (2023, November 29). Gartner Says Cloud Will Become a Business Necessity by 2028. Retrieved from: https://www.gartner.com/en/newsroom/press-releases/2023-11-29-gartner-says-cloud-will-become-a- business-necessity-by-2028
  8. Gartner. (2024). Cloud computing is a key driver of tech innovation. Retrieved from: https://www.gartner.- com/en/infrastructure-and-it-operations-leaders/topics/cloud-computing
  9. Google. (n.d.). Privacy and security & Cloud compliance. Google Cloud. Retrieved from: https://cloud.google.com/security
  10. TerryLanfear. (2020). Azure security documentation. Microsoft.com. Retrieved from: https://docs.microsoft.- com/en-us/azure/security/
  11. Zhadan, A. (2022, January 12). World Economic Forum finds that 95% of cybersecurity incidents occur due to human error. Retrieved from: https://cybernews.com/editorial/world-economic-forum-finds-that-95-of- cybersecurity-incidents-occur-due-to-human-error/