Cloud Environment

Alibabacloud.com offers a wide variety of articles about cloud environment, easily find your cloud environment information here online.

The eight Secrets of cloud security

While the benefits of cloud computing continue to be highlighted – including on-demand services that increase enterprise efficiency and control it costs, cloud security is often considered the first major obstacle to making cloud solutions widely accepted.   According to industry experts, many companies also hesitate to the cloud environment in the data integrity, recovery and privacy, the rules of compliance.   At the Gartner Security and Risk Management Summit, Verizon Business offers the following tips to protect data and network security. Evaluate your goals in deciding to migrate IT services ...

Palo Alto NX launches "cloud sandbox" firewall product

Network security company Palo Alto NX today launched a "cloud sandbox" firewall product, which can real-time through the network of Anti-malware definition to analyze known and unknown threats, the firewall will be suspicious content (including DLLs and EXE) submitted to a virtual cloud environment, Use 70 behavior profile samples to determine if the file is malicious and prevent malicious software from infecting the network. (Responsible editor: The good of the Legacy)

Research on KNN algorithm based on MapReduce in spatial database

Research on KNN algorithm based on MapReduce in spatial database Dalian Maritime University Liu Biao The first attempt is to design an inverted grid index in cloud environment and a spatial KNN query based on MapReduce on the basis of this index. The main work of this paper is as follows: (1) aiming at data points in two-dimensional space, this paper designs a distributed inverted grid indexing method, which conforms to the standard of spatial data index. Because the inverted grid index has a loose coupling and no shared special structure, the ...

Twice times the ecc! SandForce new Push Cloud SSD controller

SandForce today announced the introduction of LSI acquired the first product of a new SSD SF-2481 controller, it is reported that the product is mainly designed for the cloud environment.   According to the introduction, this controller is based on SandForce existing STA 6Gbps solution, after optimized design can better meet the various needs of cloud service providers. Similar to consumer-level products, SF-2481 and MLC (Multi-level-cell) memory are common ...

30 days to deploy a private cloud? HP Push Cloudstart Cloud Solution

It takes only 30 days to build an enterprise private cloud, and 30 days to build a cloud service architecture similar to Amazon EC2 within the corporate firewall, does that sound incredible? But not long ago, HP,      VMware and Samsung are working together on the experimental platform offered by Carnegie Mellon University in the United States to deploy a private cloud environment based on HP's converged infrastructure, which takes only less than 30 days to complete ... The cloud platform built by several vendors at Carnegie Mellon University in the United States is mainly used for research experiments in cloud computing, with a single ...

The real threat comes from the security of the internal cloud

A more common problem will revolve around the security of access to cloud computing, where data loss is usually taken away by employees who have previously resigned or been dismissed.    Although this has been the case before, only through the cheap USB flash can be done, but it is important that the current cloud environment makes it easier to implement, enterprise employees through the cloud environment can access to the cloud based data center, access to a large number of sensitive data. The best way to defend against this data loss is to investigate the working background of a good employee, while ensuring that no one user can download all the data through the cloud environment ...

How to load balance server in private cloud

In many ways, managing a private cloud is similar to managing an internal data center.   IT administrators still have several important steps to monitor and balance the infrastructure, but the real success of the cloud environment depends on several aspects: security, server density, network planning, and load management. Before placing workloads in a "cloud Ready" server, administrators must plan their physical server environment.   In this planning phase, cloud administrators can adjust the environment, understand the workloads they provide, and really understand the resource information available. Distributed computing allows users to start from a variety of ...

Key to Cloud computing: Service level Agreements

While many people are talking about cloud computing, the focus is on technology, software, or what kind of new cloud computing services they are launching, but everyone ignores one of the most fundamental issues that we should discuss: service level agreements. Migrating to a cloud environment means looking at calculations from a service perspective, so consumers and business users should first consider service level agreements, not shiny high-tech elements. Consider cloud computing from a relational perspective: in the past, customers and manufacturers have a long way to go, after a short but passionate sales link, is long distant waiting for the new version of ...

[Document] Task scheduling based on Fuzzy neural network algorithm in cloud environment

Job scheduling Using Fuzzy neural receptacle algorithm in Cloud Environnement v. Venkatesa Kumar and K. Dinesh Keywords-cloud ing, neural receptacle, Fuzzy Logic, Job scheduling, Berge ...

Virtinspector: Design and implementation of a virtual machine dynamic security Metric framework based on UEFI

Virtinspector: Design and implementation of a virtual machine dynamic security Metric framework based on UEFI Shi Shi Xiang Li Zhihua Wang Yu Zhang Qi through trusted hardware can make up for the lack of pure software security, improve the security of the cloud system as a whole. However, in the face of the security of cloud environment, traditional trusted hardware technology can not provide enough protection. In this paper, a dynamic security framework of virtual machine based on UEFI is proposed--virtinspector. The framework will be able to uefi firmware as a trusted foundation for the cloud system's infrastructure layer for real-time ...

A cloud access control system based on privacy protection

A cloud access control system based on privacy protection Nanjing University of Posts and telecommunications Shaojiu This paper presents a new access control model in cloud computing environment, which can not only provide efficient and flexible access control strategy in complex and changeable cloud environment, but also have the ability to protect the privacy data in Mah-abe. This paper focuses on the principle of the ABE encryption algorithm, in the attribute allocation and multi-attribute authority, attribute cancellation three models to do the algorithm to improve, from the performance and security of a number of angles to design a suitable for the cloud computing environment access control model.

Cloud Passage launches new cloud security software

A few days ago, Cloud Passage, a manufacturer dedicated to cloud computing and virtual server security products, unveiled security products for virtual servers in a public cloud environment (such as Amazon's cloud services). Cloud Passage spokesman said the product could help users solve all the security problems they encounter when using a public cloud service. "This security product, known as Halo Netsec, is a product with both firewalls and dual authentication capabilities," said Rand Wacker, vice president of Cloud passage products.

How do I detect virtual machine sprawl in a private cloud?

The private cloud is generally considered the safest cloud computing model because it is run by the company's own direct control of cloud computing security.   However, as with many theories or product prototypes, the complexity of the actual problems in the real world is often unpredictable, that is to say, new things bring benefits, but also to us the challenge of new security proposition. The biggest challenge is to reduce barriers, create and change production virtual mirrors. Let's imagine how the private cloud environment evolves over time: employees create "disposable" mirrors to meet key dates or QA ...

Li Jian: Cloud Security Risk and Trusted Security Architecture

& nbsp; December 12, 2012 Cloud World Congress was held in the "cloud @ security" scene, Professor Li Jian from Beijing University of Technology from the University From the perspective of scholarly research, I shared my insightful insights on cloud security. The following are live lectures: Good afternoon, everyone is a university, colleges and universities are concerned about various hot issues that are taking place and some are very concerned about the country. .

Research on the shortest distance computing method for privacy protection in cloud environment

Study on the calculation method of the shortest distance for privacy protection in cloud environment Zhang Light Susen Chen Wei Yang Spring release a kind of protection edge value information privacy security based on Homomorphic encryption algorithm the method of calculating the shortest distance between nodes This method encrypts the weighted information of the edge and then outsource the encrypted data to the cloud platform using the breadth-first principle. The cloud server can compute the shortest distance between the initial node and the other nodes directly from the initial node to the encrypted graph data, and compute the shortest distance between any two nodes by the client and the cloud server side.

Multi-user file sharing scheme in cloud environment

Multi-user file sharing scheme in cloud environment Wang Zhenghua Han Yu Liu Jichang with the rapid development of cloud storage technology, More and more users use cloud storage services to transfer local file storage to the cloud to implement file sharing with multiple users. Aiming at the problem of different access rights for multiple users sharing the same file in cloud environment, an efficient multi-user file sharing scheme is proposed. The new scheme is based on ElGamal encryption system and proxy encryption technology, and realizes that the file owner can only add The secret once allows shared users to access different content targets. Compared with the existing scheme ...

Foreign information security experts: Cloud security concerns are exaggerated

According to foreign media reports, experts attending a subcommittee meeting at the RSA security conference this week said cloud security concerns were exaggerated. Now worry about cloud security is just like the worry of virtualization technology earlier. Concerns about security should not discourage businesses from using public cloud services.   If you choose the right cloud service provider, most enterprise workloads and data can be safely migrated to the cloud environment. The Subcommittee believes that at present, security concerns remain a major impediment to the application of cloud services by many large enterprises. This concern comes mainly from thinking about moving to cloud services ...

[Document] A trust based defense system model under cloud computing

Application of trust based defense system model in cloud computing vol.31 No.6 June 2011, Yu Yu (University of Information Science and engineering, Urumqi 830046) (zhouqian@ xju). Edu. CN) Summary: Due to the dynamic and open cloud computing, frequent malicious attacks in the cloud environment, in order to protect the security of cloud computing, combined with the idea of trusted cloud, put forward a trust based defense system model under cloud computing. The model is obtained by real-time monitoring ...

Take you deeper into how to deploy IaaS with Hpyer-v

The deployment of a private cloud in an enterprise enables the sharing of resources within and outside the enterprise. The biggest feature of private cloud distinguishing from public cloud is security and reliability. Companies can enjoy the same characteristics and benefits as public clouds with private clouds.     This includes the scalability, self-service, and scalability of the public cloud. Microsoft's private cloud is optimized for service delivery, providing sufficient flexibility and control to provide powerful cloud power to the enterprise. Microsoft offers customers a unified familiarity across physical, virtual, private, and public cloud environments ...

Cloud computing and resource utilization

Xiao Bian took you to explain, Stephen Smoot and his summary of the issue of private cloud computing on the WAN exchange. First of all, how to treat the relationship between private cloud computing and public cloud computing. The second is how to improve the WAN in order to better support private cloud computing. West let me answer for you one by one. First of all, how do you define cloud computing and how do you view the difference between it and public cloud computing? Stephen Smoot: Public cloud is a resource shared by many users. For example, the cloud is generally compared to unlimited resources, you can immediately find the required funding ...

Total Pages: 11 1 .... 5 6 7 8 9 .... 11 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.