With the gradual maturation of cloud computing, telecom operators are not outdone, in the application of cloud computing technology for its own IT support at the same time, the three major domestic operators to carry out cloud computing practice, based on traditional data centers and mobile Internet business innovation launched Cloud host, cloud storage, cloud mobile phone and other telecommunications cloud services. Some enterprises are beginning to try to relocate the business system to the telecom cloud environment.
However, the seemingly beautiful cloud computing is now facing challenges-users have been concerned about the security of data in the cloud environment. In recent years, the successive security incidents of the mainstream cloud computing service providers such as Amazon, Google and Microsoft have exposed many hidden dangers in service availability, content security and privacy protection, among which cloud application security and virtualization security have been the most concerned. To reduce the impact of security issues on the size of operators ' cloud operations, telecom operators need to be proactive.
Secure the Cloud Application
In the challenge of Telecom cloud, the data security and privacy protection of cloud application is an important part of the security of the whole telecom cloud computing platform. Because, in the cloud computing mode, the ownership and management of the data assets of the user or enterprise are separated, and the data belong to the telecom operators who provide the cloud service. Customers accessing and using data assets need to connect to the Internet through cloud applications, giving users serious security concerns about their data security and privacy protection.
At present, the domestic operators are actively promoting the cloud host business as an example, users in the process of using cloud host services, inevitably to the Internet to move data from its host to the cloud, and log on to the cloud for data management. In the process, if insufficient security measures are taken, the security risks of data leakage and tampering are also faced.
What should operators do with the data security requirements of enterprise customers based on cloud applications? In this respect, safenet, one of the leading professional security enterprise leaders, offers a range of safenet solutions that ensure virtual application security, including the Datasecure solution and the Luna SA hardware Security Module (HSMs). These solutions provide a complete set of capabilities that enable telecom customers to deploy scenarios in a traditional and cloud-based hybrid environment, benefiting from the telecommunications cloud.
This column more highlights: http://www.bianceng.cn/Network/Security/
It is understood that the Datasecure solution for securing application security is a device based platform that provides data protection and fine-grained access control features that apply to both virtual and non-virtual applications, databases, host environments, and personal folders. A trusted Luna SA solution in the cloud is a solution for enterprises with the following requirements: paper transfer to electronic solution, digital signature, DNSSEC, hardware key storage, transaction acceleration, certificate signing, encoding or file signing, batch key generation, Data encryption and other functions have strong encryption security requirements of the enterprise.
Ensure the security of virtual scenarios in the cloud
On the other hand, cloud computing is based on virtualization technology. For virtualization security issues, enterprise users to the telecommunications cloud to be able to encrypt the virtual situation in the cloud environment, while the encryption mechanism deployed by the enterprise can not affect the dynamic flexibility of the virtual environment, or they can not eliminate the first migration to the cloud system has many benefits.
As a result, telecom operators need to help users consider how to ensure that information is isolated and secure in a remote multiuser environment where many traditional security controls cannot be deployed in that environment. How can you protect your product against a virtual situation that is not constrained to replicate? How do you get the underlying visibility you need to understand your virtual applications? How can responsibility separation and granular control be implemented to mitigate the threat of cloud administrators abusing their superuser privileges?
In this respect, SafeNet launched the PROTECTV instance program to ensure the security of virtualization. With this scenario, organizations can effectively take advantage of the benefits of cloud services while maintaining control and ensuring the privacy of their sensitive data. Specifically, the scheme enables companies to encrypt and ensure that virtual machines (VMS) mirror the entire contents of the content and protect those assets from theft or disclosure. PROTECTV instance is based on proven safenet technology with extended, strong security performance to meet the new needs of cloud environments.