Cloud storage is a mode of online storage, that is, data is stored in a number of virtual servers hosted by a third party, rather than a dedicated server.
When a hosting company operates a large data center, people who need data storage hosting can meet the needs of data storage by purchasing or leasing storage space from them.
Data center operators prepare the storage of virtualized resources in the back end according to the needs of customers and provide them in the form of storage resource pool. Customers can use this storage resource pool to store files or objects.
In fact, these resources may be distributed on many server hosts.
The
cloud storage service is accessed through web service application program interface (API) or through web based user interface.
In terms of function realization, remote file access and file sharing technology has been applied since the beginning of the formation of the Internet.
In the last century, when the Internet just entered China, some manufacturers provided network disk services. At that time, the so-called network disk was not the network virtual disk as well-known. At that time, the network disk was more like a SVN or FTP client.
After more than ten years of development, the "network disk" integrated with the marketing concept and new technology of mobile Internet has been packaged as "cloud storage" and appeared in front of the public.
According to the relevant statistical data, the new increment of user data of domestic first-line cloud storage service providers has reached Pb per day. It can be seen that hundreds of millions of users are uploading and downloading various files to their own cloud storage space every day. In this environment, excluding the consumption of network broadband, should we reflect on the potential risks of cloud storage in the future.
Copyright risk
Copyright issues have appeared in a wide range of domestic online disk services. Some individuals or groups will upload the files with video music as the main body to the network disk through the client of cloud storage, and then provide download to the network disk through sharing.
A large number of copyrighted video music is spread by this special piracy method, and this mode of transmission is temporarily in the blank of supervision. Under the pressure of copyright units, some cloud storage providers began to limit the scope of link sharing and strengthen file filtering.
However, these methods can not fundamentally solve the problem of piracy of files uploaded by users in cloud storage.
In addition to the huge operation and maintenance costs of research and development, it is difficult to achieve the technical standard unification among various interest groups in the short term to establish a complete set of digital fingerprint signature inspection system for film and television files. However, before the problem is solved, this sharing is still in progress, and it is not only users but also cloud storage providers that are facing infringement problems.
privacy
There are many mobile platform users like to quickly upload their photos and videos taken with their mobile phones or tablets to the network disk through cloud storage at any time, so that they can quickly retrieve photos in different places or even instantly through web or PC clients.
But what you may not believe is that every photo or other file you upload may be plaintext saved on the server side of cloud storage.
According to the personnel who participated in the development of a cloud storage project, it is not realistic to realize private key encryption from the perspective of operation and maintenance cost. Administrators can directly view and delete the files uploaded by users from the server platform.
There are many users' confidential documents or users' privacy in these documents. At present, large-scale servers restrict the professional ethics of management personnel by establishing strict system. However, people all have weaknesses. Once people's integrity is abandoned, will the visible content within their power still belong to you?
data security
It is analyzed from two aspects of data security,
·Operation safety of users
Most cloud storage designs multi client data synchronization mechanism, which is generally based on the last update, and is automatically synchronized when other clients are turned on.
This is quite different from the design of SVN. When a user edits a file in the company and goes home to edit it again, the file has been updated at home last night when he returns to the company. This is an ideal state.
Most of the time, after users edit a file, they will find that there is an error in editing. When they want to retrieve the version of the file that exists in the company, the version management may not be supported. In the cloud storage, your copy has been updated by mistake.
In the same way, if you delete a file, if there is no additional backup, you may go to the online disk recycle bin and find it again. There is no problem in version management technology, but it will increase the user's operation difficulty. Cloud storage service providers only have limited support from a small number of private cloud providers. In most cases, this kind of coverage often occurs.
·Safe operation of server
Cloud storage server has long been the target of hackers' intrusion, because there are not only infinite user data on the server, but also the hijacking of such large user group services is an important source of black income.
In other words, the security of the server directly affects the security of users' uploading data. With the support of server virtualization technology, the reliability of V2V migration is quite high. Most cloud storage manufacturers have prepared security protection schemes, but the operation of eternal people cannot be ignored.