Security issues on the road to cloud computing

Source: Internet
Author: User
Keywords Cloud Security
Tags .net access to the internet application based behavior change client cloud
Cloud computing is another big change since the 1980 mainframe computer to client-server transformation. Users no longer need to know the details of the infrastructure in the cloud, without the expertise or direct control. Cloud computing describes an internet-based new IT service growth, usage, and delivery model that typically involves providing dynamically scalable and often virtualized resources over the Internet.


  


Cloud is actually a metaphor of the internet and the Internet. Because in the past, the cloud was used to represent the telecommunication network, which was later used to express the abstraction of the Internet and the underlying infrastructure. Typical cloud-computing providers often provide a common network business application that can be accessed through software such as browsers or other Web services, while software and data are stored on the server. The key elements of cloud computing include a personalized user experience. Broad cloud computing refers to the delivery and usage patterns of services, which refer to the required, extensible way to obtain the required services over the network. This service can be it and software, Internet-related, but also other services. So it seems that cloud computing to achieve the integration of resources, saving it costs should be the most attractive place, and the delivery model of cloud computing has changed the traditional mode of application, which allows many enterprises to choose cloud computing, but for now, security is still the main problem.


  


What is cloud security? Cloud Security (cloudsecurity) program is the latest manifestation of information security in the network age, it integrates the parallel processing, grid computing, unknown virus behavior and other emerging technologies and concepts, through the network of a large number of clients on the Internet Software behavior anomaly monitoring, access to the Internet Trojan, malicious program of the latest information, Transfer to the server for automated analysis and processing, and then distribute virus and Trojan solutions to each client. This is just a reference to the connotation of cloud security, we simply understand how users will be their business data transfer to the cloud, how to transfer, after the transfer how to ensure that the data is safe.


  


Cloud Security sketch The concept of "cloud security" created by Chinese enterprises is unique in the field of international cloud computing. Cloud security through the network of a large number of clients on the Internet Software behavior anomaly monitoring, access to the Internet Trojan, malicious program of the latest information, pushed to the server for automatic analysis and processing, and then the virus and Trojan solution distributed to each client. The entire internet, turned into a super large anti-virus software, this is the grand goal of cloud security program. Such a localization concept is also rooted in the application of cloud computing in our enterprise needs.


  


Everyone is talking about the implementation of cloud computing, where at least 75%-81% of companies are considering the current cloud of all forms. Clearly, companies have a strong interest in cloud services, with 73% of respondents saying they have adopted or are using some form of cloud service, and that security services are the first to suffer. Today's top cloud services companies are using cloud services, including e-mail services such as management or security, security management, Web pages, and instant Messaging (IM) security.


  


However, only a handful of companies have fully implemented the migration to the cloud computing environment. According to the report, less than 20% of companies have implemented any cloud computing environment covered by the survey, about 1/4 are currently in the deployment phase, and about 2/3 are still in the early stages of discussions and testing, or not at all about cloud applications. But not too pessimistic, there must be some dark horse in such a wave, 87% of respondents are confident that entering the cloud will not affect their information security, or even really improve security. After all, cloud security is not a knot.


  


implementation of cloud computing is not an overnight thing, so need to deploy the system, not because of cloud computing security problems, and refused to cloud computing, after all, this is the future of the industry should be the trend, now began to deploy cloud computing, step-by-step implementation of the cloud computing model, while facing cloud security problems Can have more experience to deal with, so should be able to do the best of both worlds.


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.