Cloud computing presses new security threats and challenges

Source: Internet
Author: User
Keywords nbsp Cloud Computing
With the development of information technology to deploy cloud computing is imperative, the advent of cloud computing has changed the IT world, which brings more convenience to people while also presses new security threats and security challenges.




Several core issues of
Cloud security:





, identity and authority control





users lack confidence in cloud computing, first because of concerns about the use of permissions and administrative permissions in cloud mode. In the virtual, complex environment, how to ensure that their applications, data is still clear and controllable, this is both the user's problem, but also the cloud service provider issues, and this is the information security sector to see more clearly. Therefore, the identity and privilege control solution becomes one of the core issues of cloud security.





Certification Control solutions have been able to basically cover all business processes and most business directions, while simplifying certification management and hardening End-to-end trusted access will be one of the next stages of development.





Second, web security protection




In
cloud computing mode, Web application is the most intuitive experience window for users and the only application interface. In recent years, a variety of web attacks, it has a direct impact on the smooth development of cloud computing.





Three, virtualization security





virtualization is one of the most important technical support for cloud computing and one of the hallmarks of cloud computing. The result of virtualization, however, is that many traditional security measures fail. Technically speaking, the biggest difference between cloud computing and traditional IT environments lies in its virtual computing environment, which makes its security problems extremely "tricky". The computation of virtualization makes the interaction between application processes more elusive; Virtualized storage makes data isolation and removal difficult to measure; The virtualized network structure makes the traditional domain protection difficult to realize, and the virtualization service delivery mode makes the identification of user's identity, authority and Behavior, Control and auditing become extremely important.





Cloud Security Services




Faced with the security of cloud computing,
now has a number of security offerings based on cloud services, including web and mail filtering, network traffic access control and monitoring, and tagging for payment card services. An important difference between the different security services is that some of the "in the cloud" are "for the cloud", that is, those integrated into the cloud as a virtual device to provide user access and control of security services.





When choosing a cloud security service, communicate with the service providers to find out what they can provide and what they want, and it is best to sign a service agreement, which helps to reduce the risk of the enterprise.




What are the challenges
cloud computing security faces? Mainly from the technical, management and legal risk three aspects.





One, data concentration, aggregation of users, applications and data resources more convenient for hackers to launch centralized attacks, once the accident has a wide range of effects, serious consequences.





Two, the traditional protection mechanism based on physical security boundary is difficult to be applied effectively in cloud computing environment.





three, Cloud based business model, to the protection of data security put forward higher requirements.





Four, cloud computing system is very large, failure, if the rapid positioning of the problem, the challenge is very big.





v. The openness of cloud computing puts forward new requirements for interface security.





Vi. Management, the challenge lies in the right to management, the management and ownership of cloud computing data are separated, such as whether public cloud services provide some highly privileged management of suppliers, and the need for security to be agreed between companies and service providers, as well as some issues of synergy and management. For example, when the attack of the linkage, the operation of the management model put forward some requirements, as well as regulatory challenges.





    Vii. The problem of legal risk is mainly regional. Cloud computing application has caused the regional weak, the information fluidity is big characteristic, in the information security supervision, the privacy protection and so on may have the legal risk.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.