Analyzing the five information security bottlenecks of cloud computing

Source: Internet
Author: User
Keywords Cloud computing cloud security cloud security

  

With the development of cloud technology, cloud computing has become the gossip of most enterprise employees.

What is cloud computing? There are many ways to define cloud computing. At least 100 explanations can be found for what cloud computing is. It is now widely accepted that the National Institute of Standards and Technology (NIST) defines: Cloud computing is a pay-as-you-go model that provides available, convenient, on-demand network access, into a configurable pool of computing resources (resources including networks, servers, storage, applications, services), These resources can be provided quickly, with little or no management effort, or with little interaction with service providers.

Although the advantages of cloud computing are obvious, cloud computing also has many problems, especially those involved in sensitive information security protection issues, but also by many people "criticized." What are the instability factors in cloud computing, and what are the bottlenecks in its development? Below let the information security field experts Shanli network Ann tell you.

Five cloud computing "bottleneck" big public

Introduction: Cloud Attack Event--"Code MSN Event"

Not long ago, in the true case of source code hosting operator code MSN, attackers exploited the combination tool to invade Codespaces's overall architecture based on Amazon Web Services (AWS). The threat begins when an attacker attempts to blackmail Codespaces as an exchange condition for stopping a multiple-carrier DDoS attack against it. Finally, the attacker controls the Codespacesaws console and deletes almost all data stored in the cloud. The resulting loss of data and the cost of providing an SLA remedy will make codespaces companies unable to operate anymore.

Such events, though not very common, but the side reflects an important problem: when the enterprise plans to migrate data to the cloud, the further thing to do is to deploy a rigorous plan to deal with rampant DDoS (distributed denial of service) attacks and increasing threats.

However, most companies do not believe they will become DDoS attackers. So, when making it budgets, always put the right defensive measures at the end of the proposal. But the brutal reality shows that because most companies do not have detection tools, their assets are invaded by others, they are often unconscious.

Second, how to protect cloud computing? At present, the important data of the enterprise is placed on different storage devices, which are provided by different providers and partners, so the enterprise must monitor and protect the new "security boundary", while How to carefully balance the right to protect data based on cloud computing is one of the security issues that the entire enterprise should consider.

Customers should also evaluate the DDoS mitigation capabilities of cloud providers while proactively taking appropriate defensive measures, and should also point out the problems encountered in applying DDoS mitigation strategies in cloud-based solutions. These problems are also the main "bottleneck" that binds the development of cloud computing.

First: How to protect new business boundaries

In the past, businesses simply focused their safety on the export of data centers. The adoption of cloud technology means that enterprise data and applications are distributed to multiple data centers, creating new security boundaries for businesses that need to be protected in more places. So how does an enterprise defend itself against all the local data that holds the enterprise?

Second: Maintaining remote access

In terms of definition, cloud technology is a remote access technology. If the enterprise's cloud service provider encounters a severe DDoS attack, the network access to the service is banned, which equates to the enterprise application being "down". What is the enterprise's cloud service provider going to do to prevent this from happening to the enterprise?

Third: How to achieve internal and external isolation protection

Attackers can buy cloud services like ordinary users. So how to protect enterprise data from threats within the cloud environment?

Four: How cloud protection with small beats big

Weekly headlines will talk about the latest mega-traffic attacks on big banks or reputable websites. However, only about 25% of DDoS attacks are large traffic attacks. How can cloud service providers help businesses cope with these massive traffic attacks?

V: How the Security protocols change with the cloud

To establish pricing that is conducive to competition in the cloud computing market, most providers will choose to create generic protection profiles that are available to most users to reduce solution costs. So how does a cloud service provider with a common security protocol meet specific security requirements?

Bottlenecks in the bottleneck data security how to protect

While the above five is a major obstacle to the development of cloud computing, there is one obstacle to the existence of "normality" in all modern information technology development-that is, the security of data. Cloud computing improves the efficiency of data processing, but also greatly increases the risk of data leakage, how to ensure that those who interact and store in the cloud security has become the cloud computing development "bottlenecks."

However, although the problem is grim, but the protection of the law is "already owned", for modern and diverse, by the development of information technology and the various data protection issues, the use of data encryption technology is the best choice.

Data encryption is used directly in the data itself, so that data can be encrypted in various situations. Moreover, because of the specificity of encryption protection, so that data even if leaked, encryption protection still exists, as long as the algorithm is not deciphered, data and information can still be called safe. As a result of these two-point guarantee, encryption software has become the most important and reliable means to protect the information security of modern enterprises. At the same time, due to the diverse needs of information security protection in the future, in the encryption software or encryption technology, the use of the forefront of the era of Multimode encryption technology or the best choice.

Multi-mode encryption technology using symmetric algorithm and asymmetric algorithm, while ensuring the quality of data source protection, its multimode features can allow users to choose the encryption mode, so that more flexible to deal with a variety of encryption requirements and security environment. As a typical representative of this technique, the Multimode encryption module of the mountain-li waterproof wall adopts transparent encryption technology based on system kernel, which further ensures the convenience and integrity of information security protection (encryption and format independent).

All in all, there are many security problems with cloud computing, so people are still more worried about whether cloud computing is safe or not. But the reality is not always so cruel, it turns out, companies in the use of cloud computing after a large number of data migration work list data leakage and theft is still a minority. In fact, most corporate data theft incidents involving cloud providers are caused by enterprise errors, not by cloud service providers. However, it seems most prudent to take the initiative to use flexible and targeted cryptographic software to protect the source of data, even though the "few" but possible problems cannot be "taken lightly".

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.