An intensive stream of messages about the problem of cloud computing security and a significant number of proposals to mitigate and prevent violation of data privacy and the integrity of the cloud computing environment indicate the relevance and significance of the problem. To bring everything into a certain system is the task of this chapter. We use different methodological approaches in order to find such an integrated solution to the combination of these approaches that, on a unified methodological basis, would allow us to look at the whole range of widening issues of ensuring security and the organization of thinking and activity in the near future. This approach allows us to identify additional problems in this area and outline a program for their development. We try to build a system of methodological design and research over the many private methodologies that authors of articles usually use, relying on the experience of generalizing and concretizing system approaches, and, in particular, expanding geographical and historical boundaries, including system generalizations of intercultural studies and philosophical movements. An attempt is made to disassemble the security problem of cloud computing into a certain number of layers, processes, and technologies of thinking, and to reconnect them into a single whole with the character of thinking and activity.
Part of the book: Cloud Computing Security