Cloud computing SPI three-tier architecture explains cloud security from different levels

Source: Internet
Author: User
Keywords Cloud computing security

is the network of cloud computing service providers secure, and is it easy for others to steal user accounts? is the storage safe and will it lead to data leaks? How to deal with the loss caused by cloud services in an emergency? Similar issues need to be addressed by cloud services providers and promised to customers, and authorities need to legislate to regulate them.

Customers should be aware of the need to balance the security of cloud services providers with the security of their data when using cloud services. For example, do not put too important data into the cloud, should at least do a backup; the 2010 Amazon data center blackout sparked concerns about the physical security of cloud computing, But if there are alternative contingency plans, the solution to the problem, like the general power outage, is not a problem that is unique to cloud computing.

Customers need to keep their accounts in order to prevent others from stealing your account and using the services in the cloud.

To be sure, these security problems in fact in the internet era has already appeared, cloud computing is the same as the deepening application of ICT technology, and traditional IT systems security issues are not fundamentally different. Of course, because the "3-4-5-6" architecture of cloud computing has its special features, the corresponding countermeasures and measures should be taken to prevent it.

Cloud computing is characterized by the user to give more control to the service providers, these control rights embodied in the cloud computing SPI three-tier architecture of different levels.

IaaS layer: Need to focus on physical security, storage security, and network security.

PAAs layer: Need to pay attention to system security, management security.

SaaS layer: Need to focus on information security, application security.

Security issues in the cloud computing environment have been exaggerated, and many accusations of cloud security have been a bit emotional, with users needing to compare the security level of their data centers and cloud services providers, many citing the security requirements of cloud computing services, These requirements are not yet implemented in their own data centers.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.