Abstract: Cloud Computing (cloud computing) is an Internet-based computing method by which shared hardware and software resources and information can be provided on demand to computers and other devices. The whole way cloud computing works is like the grid. The core idea of cloud computing is to manage and dispatch a large number of computing resources with network connection, and compose a computing resource pool to serve the users on demand. The network that provides the resources is called the "cloud". Narrow cloud computing refers to the mode of delivery and usage of IT infrastructure, which means to obtain the required resources through the network in an on-demand, easy-to-expand way; generalized cloud computing refers to the delivery and usage patterns of services, which means to obtain the required services through the network in an on-demand, easy-to-expand manner. This service can be it and software, Internet-related, but also other services. But the development of cloud computing is not smooth. Cloud technology requires a large number of users to participate, there is inevitably a privacy issue. User participation is the collection of certain user data, which raises concerns about user data security. Many users worry that their privacy will be collected by cloud technology. As a result, many vendors are committed to avoiding the collection of user privacy when they join the cloud program, even if they are collected and not disclosed or used. But many people still doubt the promises of the manufacturers, and their suspicions are not unreasonable. Many well-known manufacturers have been accused of the possibility of disclosing user privacy, and leakage incidents do occur.
Keywords: privacy
Body:
I. Privacy in a cloud computing environment
1, the definition of privacy is: Privacy is a public interest, the interests of the Community, the parties do not want others to know or the inconvenience of personal information, the parties do not want to interfere with others or inconvenience others personal private affairs, as well as the parties do not want to invade others or inconvenience the intrusion of personal areas.
2. Network privacy:
①, personal login status, health status. Internet users in the application for online account opening, personal homepage, free mailbox and other services provided by service providers (shopping, medical, dating, etc.), service providers often require users to login name, age, address, ID card, work unit and other status and health status, the provider can legitimately obtain the user's personal privacy, The service person has the obligation and responsibility to keep the secret of the individual, without authorization to disclose it.
②, personal credit and property status, including credit card, electronic consumer card, Internet card, Internet account number and password, transaction account number and password, etc. Individuals in the Internet, online shopping, consumption, transactions, log in and use a variety of credit cards, accounts are personal privacy, must not be disclosed.
③, e-mail address. Email addresses are also personal, and most users are reluctant to make them public. To master, collect the user's mailbox, and make it public or provide to others, causing the user to receive a large number of advertising mail, spam or attack can not be used, so that users are disturbed, it is clear that the user's privacy is violated.
④, network activity Trail. Personal activity on the Internet, such as IP address, browsing trail, activity content, are personal privacy. It is also an infringement to display, track, and use this information in public or in the service of others. For example, a person's IP address to the hacker to be attacked, or a person to browse the yellow Web, office hours, internet and other information to public, so that its image is damaged, these can also constitute a violation of network privacy.
⑤, through the use of pure web version of the software is conducive to the protection of privacy, such as pure web version of the Ppmeet video conferencing, and similar to the 360, QQ and other needs to install to the computer hard disk software will have a significant impact on user privacy security, there is a potential crisis.
3, the characteristics of privacy under the cloud environment:
The problem of privacy under cloud computing environment has all the characteristics of network privacy problem, and
Added new features due to the cloud computing environment.
Second, the Security hidden danger link analysis under the Cloud computing environment's privacy
Cloud computing, through the functions of cluster application, grid technology or Distributed File system, combines a large number of different types of storage devices in the network and works together to provide a system of data storage and business access function. This network is based on a storage device outside the native firewall, which increases the user's concern about privacy confidentiality.
(1) Client Security risks:
Cloud computing is based on existing distributed networks, and every computer on the network can be considered a node. When computers are networked, they become part of the internet and, if not effectively secured, every computer in the cloud has access to other nodes through certain means. For example, some commercial companies use Coolies to spy on the activities of users to surf the Internet, browse Web pages, use Trojans to control other computers, and master what services users use in the cloud. It can be said that any user operation will be on their own computer left traces, and can be obtained through a certain way.
(2) Privacy security of network transmission:
Currently, cloud computing mainly provides the following four services: Servers (Network-based services); IASs (infrastructure as a service); PaaS (Platform as a service); SaaS (software as a service). When users use cloud services, they can be as convenient as invoking local resources, and the process of network transmission is essential, if the service is interrupted due to technical reasons, almost all of the data is stored in the cloud, users can only be helpless. The privacy problems in the process of network transmission mainly include the illegal stealing of packets, illegal attack, illegal modification, destruction and so on.
(3) server-side privacy security issues:
A report by Gartner, a foreign research agency, called Cloud Computing Security risk assessment, lists seven risks to cloud computing technology: access to privileged users, accessibility, data location, data isolation, data recovery, investigative support, and long-term viability. It is clear from these seven risks that the privacy security of cloud computing is mostly on the server side. In the cloud computing mode, the data is stored centrally, and the physical resource sharing brings new data security and privacy crisis, which makes it difficult to rely on the physical boundary of machine or network, which increases the difficulty of server-side data and user management.
Third, the protection of privacy under the environment of cloud computing the countermeasure analysis
From the above analysis of the security hidden danger of network privacy, the issue of privacy protection is a great challenge to the development of cloud computing. In fact, the protection of privacy, through a single means is far from enough, need to have a complete system, involving multiple levels.
(1) Perfecting the legislation and related legal system;
(2) using privacy enhancement technology;
(3) establishing a regulatory body;
Iv. concluding remarks
At present, the development of cloud computing is a sudden emergence, showing good application prospects and great potential, involving almost all areas of information management and services. Privacy protection is a problem that needs to be solved in the process of popularization of cloud computing, but with the development of cloud computing and the maturity of relevant standards, we believe that privacy will be better protected and cloud computing will affect our way of life as well as other application environments on the Internet.
Beijing Biological Diagnosis and treatment center Beijing Special Police Armed Police Corps Second hospital Beijing Biological diagnosis and treatment center
On the concept of service in computer network