The work examines threats to the security of cloud storage (leaks, unauthorized access) and compares traditional protection methods (encryption, authentication) with innovations: blockchain for decentralization and AI for proactive monitoring. The necessity of integrating approaches, organizational measures, and economic investments to minimize risks is emphasized.
cloud storage, data protection, security, security threats, encryption, authentication, and unauthorized access
1. Timofeev A. N. Osnovy zaschity informacii. — M.: Izd-vo MGU, 2019. — 456 s.
2. Petrov B. Yu. Informacionnaya bezopasnost' v oblake: vyzovy i resheniya. — SPb.: Nauka, 2020. — 379 s.
3. Sidorov V. L. Oblachnye tehnologii i ih zaschita. — Ekaterinburg: Ural, 2021. — 312 s.
4. Ivanov D. I. Evolyuciya tehnologiy shifrovaniya // Zhurnal kiberbezopasnosti. — 2022. — T. 15, № 4. — S. 12-23.
5. Sergeev K. A. Rol' iskusstvennogo intellekta v bezopasnosti dannyh // Informacionnye tehnologii. — 2021. — T. 12, № 2. — S. 34-47.
6. Nikolaev S. P. Blokcheyn kak tehnologiya zaschity informacii // Mezhdunarodnyy zhurnal informacionnoy bezopasnosti. — 2020. — T. 18, № 7. — S. 56-68.



