China's breakthrough of network security in "cloud" era

Source: Internet
Author: User
Keywords Cloud computing cloud security cloud security

  

  

The United States has secretly invaded Yahoo, Google's main communications network between national data centers and stolen hundreds of billions of users ' information, the Internet News Research Center said on May 26, the US global surveillance operation record. This also shows that the rise of "cloud computing" in recent years has brought great convenience to people at the same time, there are not negligible security risks.

1 cloud computing is a double-edged sword

As industry experts have pointed out, as a new internet model, cloud computing will be the next generation is a very long time the basic model, since the advent of the people have been widely concerned. Cloud computing based on the existing distributed network, the user data storage and operations are done in the "cloud", clearly embodies the "network is the computer" concept.

The advent and widespread application of cloud computing not only reduces the cost of computing, but also greatly changes the user's use of desktop as the core, and changes the way of information acquisition and knowledge dissemination, which brings unprecedented convenience to people. In a way, the arrival of the "cloud" era is no less than a revolution.

"Cloud computing set off a new internet revolution, cloud computing through the mode of centralized supply, breaking the geographical and temporal constraints, the real formation of information." Through cloud computing, people can greatly improve the efficiency of computing, so that time and energy more effectively into the main work. "said the industry expert.

At the same time, cloud computing also lurks a certain security risk. It can even be said that security and privacy issues have become a major obstacle to the further development of cloud computing. As data processing and storage are done on the remote cloud, users are vulnerable to denial of service attacks, man-in-the-middle attacks, network sniffing, port scans, and more. In the face of serious cyber attacks, users face risks such as data loss and privacy disclosure, and threats to social stability and national security.

Hequan, academician of the Chinese Academy of Engineering, said: "Cloud computing also has a lot of security problems, cloud computing logic is easy to focus on the target, and cloud storage virtualization and physical distribution and isomerization, lack of physical security boundaries." The separation of user data management rights from all rights makes the data exposed and tamper-risk. There are also security vulnerabilities in cloud storage for end-user applications. ”

In fact, many foreign well-known internet companies in the cloud platform since the operation has been a number of failures. In addition, because of the high concentration of data on the cloud platform, the risk of attack and the losses suffered after the attack have increased exponentially. All this adds to the difficulty of cloud security protection, and also suggests that cloud security has become a problem that can not be overlooked in the smooth advance of cloud computing.

2 United States fourth space a single big

The United States is the pioneer of cloud computing concepts and technology, as early as 2006, the US internet giant Google formally proposed the "cloud" concept. Since then, Amazon, Microsoft, Intel, IBM and other internet giants have followed up, followed by the "cloud" trend in a short period of time swept the world.

With the rise of computer network, cyberspace has become the fourth space after territory, territorial sea and airspace, and network space security is also called as an important part of national security. In view of this, the United States and other developed countries began to actively deploy, trying to grasp the commanding heights. The United States to strengthen its network hegemony, on the one hand to enhance the relevant aspects of security work, on the other hand, through its domestic companies to actively deploy the global "cloud computing" architecture.

As early as 2003, U.S. President George W. Bush launched the U.S. National Strategy for the protection of cyberspace, and in June 2009, the United States formally established Cyber Warfare command. The United States now actually controls the global Internet.

As Hequan pointed out, the world's 13 root domain Servers in addition to the United Kingdom, Sweden and Japan each have 1, the remaining 10 are in the United States. The Internet domain name and number distribution Agency (ICANN), which signs and distributes the root servers, is actually controlled by the United States. Although more and more countries are proposing that the United States should transfer Internet management rights to international organizations as soon as possible. The United States has refused to hand over internet management to the United Nations, despite numerous games by the parties involved.

At the same time, the United States relies on the domestic internet giants to grasp the absolute control of global information, and monopolize and control the development trend of cloud computing. Because cloud computing requires a high technology threshold, the world's real strength to develop and provide cloud computing services to the company only Microsoft, Google, Cisco, IBM and a few internet giants. Microsoft also plans to combine other giants to form a "cloud computing alliance". In addition, Britain and South Korea have stepped up their domestic cloud computing deployments in recent years.

Faced with this prospect, although people expect the internet to become a real open space, but because of the very high technology and funding threshold, cloud computing is increasingly by the United States and other minority countries highly concentrated and monopolized. As the US global surveillance record shows, America's cyber blockade of enemy States, not only in wartime, is unambiguous, and the Snowden incident is a sign that even in peacetime, even with allies, American agencies have no moral authority to monitor them. If the future of global personal data is highly concentrated in the U.S. company's cloud computing Center, which is not a blessing for the developing countries, the pace of its information construction will increasingly be subject to the standards and rules of the game set by internet giants.

3 China-style breakout

With the aggressive "enclosure movement" of multinational giants in cloud computing and the tightening up of some countries in cloud computing, a war without smoke (Weibo) began. If we do not have "autonomous" cloud computing capabilities, then we will have to rely on the relevant multinational giants of the cloud computing Center to store and compute data, which will pose a serious challenge to China's network of national security.

Zhang Feng, chief engineer of Industry and information technology, said in a recent meeting of the 2014 China Computer Network security: "2014 is our country's 20 anniversary of Internet access, and now our country has become a veritable network power." However, the development of the Internet has brought a series of challenges to the Economic society, the network security problem is increasingly complex, cloud platform, social network, mobile Internet and other new business rapid development, and constantly bring new security risks. ”

Although compared with the United States, China's current cloud computing base is weak, many studies are still in the initial stage, some of the technology is still immature, and the Chinese information security industry is still surrounded by heavy, but the "cloud" concept has permeated all walks of life, and burst out of infinite vitality and vitality.

As Beijing Tianyi Technology Co., Ltd. President Huhaipo said: "Only the key infrastructure hardware and software on the autonomous control, only to be called security." The development of China's information industry in the 20 has made great achievements, such as China's security companies in the firewall, intrusion prevention, anti-virus, the 3 security system key products or core products are already in the market dominance. ”

The "cloud computing" war has just kicked off, if we can seize the opportunity to win the initiative in a new round of information change, narrowing the gap with developed countries, and beyond. Conversely, it is possible to be "cloud computing" led by the new information age abandoned, further widening the gap.

Especially important is, after many years of information construction, China's information infrastructure has reached a considerable scale and level, and has the world's largest market, if the full use of concentrated power to do major events of the institutional advantages, it is entirely possible to successfully build China's autonomous and controllable cloud computing platform.

NI, academician of the Chinese Academy of Engineering, said: "In this new round of technological change, China has the talent and market advantages, China can be achieved by many other developing countries are unable to achieve breakthroughs and beyond." ”

Cloud Computing (link 1)

The concept of cloud computing has frequently appeared in the Internet and the media in recent years. Cloud computing is an increase, usage, and delivery model of internet-based services, often involving the provision of dynamically scalable and often virtualized resources over the Internet. The cloud is a metaphor for the web and the Internet. In the past, the cloud was used to represent the telecommunications network, which was later used to represent the abstraction of the Internet and underlying infrastructure. There is no clear and uniform definition of cloud computing in the community at present. It is generally believed that cloud computing is a new way of sharing infrastructure, the development of distributed processing, parallel processing and grid computing, or the commercial implementation of these computer science concepts, in the previous network domain. It is the development of various types of equipment interconnection, real-time data flow and information search, open collaboration, social networks and mobile commerce, such as the rapid growth of Web 2.0 applications, while the performance of digital components and price drop brought about by the large number of computer ownership growth, The demand for cloud computing, which is a unified management of large-scale resources, has also become a material basis for its development.

The fundamental features of cloud computing, is that it developed an intelligent algorithm that dynamically manages the total processing power of hundreds of thousands of, millions of, or even tens of millions of of computer resources, and on demand to global users so that they can build stable and fast storage and other network services on top of it, all data processing is remote, Users do not need to know where the data is stored, nor do they need to know where the calculation is going. Cloud computing is seen as another revolution in science and technology.

Cloud Security (Link 2)

Cloud security is the important application of "cloud" technology after "cloud computing", and it is the latest embodiment of information security in the network age. Cloud security is the concept of enterprise creation in our country. It combines parallel processing, grid computing, unknown virus behavior judgment and other emerging technologies and concepts, through the network of a large number of clients on the Internet Software behavior anomaly monitoring, access to the Internet Trojan, malicious program of the latest information, pushed to the cloud for automatic analysis and processing, and then the virus and Trojan solution distributed to each client. After the application of cloud security technology, the identification and killing virus no longer depend on the virus database of local hard disk only, but rely on the huge network service to collect, analyze and process in real time. Cloud security has been widely used in anti-virus software and has played a good effect.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.