The security of the electronic file Center in the cloud computing mode
Source: Internet
Author: User
KeywordsElectronic files cloud computing
There are similarities and differences in the security of information system under the cloud computing model and traditional mode. The first goal is to ensure the integrity and security of data and information, and then the objects are the same, such as hardware and software, network, storage systems, and so on, and again will adopt some similar technology, such as various security detection technology, decryption encryption technology. The differences include management and technology issues such as virtualization, security issues that can result from the transition to cloud computing service patterns, and so on.
1. The security problems caused by the non-standard cloud computing. Cloud computing as a new technology is only in its infancy, there is no internationally recognized standard system, the security and privacy standards for cloud computing and data integrity, availability, confidentiality in the physical and logical standards are not perfect, manufacturers can only be limited to their own cognitive scope to achieve cloud computing security, Therefore, there may be security risks.
2. Security of data transmission. The core of the electronic Document Center is the electronic Document information data. In the cloud computing model, these very important electronic file data are transmitted through the network to the cloud Computing data center to store and process, there are several issues involved in this process: how to ensure that file data is not compromised when it is delivered to the cloud computing datacenter; How to ensure safe and effective access to electronic file information data and all access to the data center are legitimate and harmless.
3. Security of data storage. The importance of data storage in an electronic file center is self-evident, including storage locations, storage methods, and disaster backup and recovery of data. Cloud computing Data center storage space with a high degree of integration and large capacity characteristics, according to the application requirements of the electronic file Center, to open up a part of the storage space as an electronic file storage center. The backup includes a backup of the whole machine and a backup of the corresponding electronic file center storage space. Cloud computing data centers should ensure that backups are effective and can be recovered quickly in the face of significant surprises to prevent data loss.
4. Availability of cloud computing services platform. In the cloud computing service model, not only data, but also its business applications are provided by the cloud computing system, so the business process of the electronic file Center also relies on the services provided by the cloud computing system, and then the service continuity, security policy, SLA (Services level agreement) of the cloud computing platform. And it processes, time processing and analysis will be tested.
5. The attack-proof performance of the computing platform. The electronic File center data area contains a large number of sensitive data and related data, the function and characteristic of cloud computing service platform will result in the high concentration of users and information data, so it will be the target of hacker attack, and the result will be more destructive, wider and longer influence time.
6. The security implications of virtualization technologies for cloud computing. Cloud computing relies on and leverages virtualization to deliver services, integrating infrastructure into virtualization for storage, networking, and management, one of the most important features of virtualization is scalability, the ability to enhance the service capabilities of cloud computing systems in all its aspects, and hence security issues: a compromised virtual machine is compromised, The danger can spread through the network to other virtual machines, threatening the entire virtual machine system, if the virtual network is compromised, the client may also be compromised.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.