Cloud computing: safer or more dangerous

Source: Internet
Author: User
Keywords Cloud computing safer safer
Communications Industry newspaper reporter Igia from the day of the Birth of cloud computing, the discussion of its security issues has not stopped. Now that cloud computing is maturing, cloud computing has begun to land in China with the implementation of a cloud computing project. However, there are still a lot of problems in front of cloud computing, security is the first, the biggest obstacle to cloud computing landing.  However, we should see that any new technology in bringing innovation at the same time, will inevitably lead to some problems, only the positive response, gradually improve the technology is the right choice, can not be unworthy. Since the concept of cloud computing emerged, the discussion of its security has been endless. The two sides of "cloud security" are obvious, on the one hand, through the most advanced technologies, such as parallel processing and grid computing, cloud computing has revolutionized the way the existing network security, especially antivirus anti-virus software works, makes the entire internet look safer.  On the other hand, security is the biggest obstacle to the "landing" of cloud computing, because using the virtualization system, no one can accurately say the location of data storage in the cloud platform, the management and confidentiality of sensitive data are very difficult. How to break the shackles?  Further improvement of privacy protection, data security standards and laws will be the final choice. Anti-virus technology innovation according to the U.S. Ostermanresearch "Cloud Client Enterprise Security Impact Assessment Report," in today's environment, a company with 5,000 employees, in the case of the traditional terminal protection has been deployed, in a year will still have 2/3 of the endpoint is infected, The company will lose more than 2.5 million of dollars in the cost of the threat of elimination.  At the same time, due to the inability to locate the source of the threat of infection, the virus will continue to repeat the infection in the corporate network, resulting in the loss of enterprises are constantly magnified. Future anti-virus software will not be able to effectively handle the increasing number of malicious programs. The main threat from the Internet is from computer viruses to malicious programs and Trojans, in such cases, the adoption of the feature library discriminant method is obviously outdated. After the application of cloud security technology, the identification and killing virus no longer depend on the virus database of local hard disk only, but rely on the huge network service to collect, analyze and process in real time.  The entire internet is a huge "anti-virus software", the more participants, each participant is safe, the entire internet will be more secure. At present, rising, Symantec, Trends, Jinshan, 360 security guards and other security vendors have seen this trend of development, launched a cloud security solutions.  Rising first in July 2008 launched its own cloud security system, the system mainly includes three parts: more than 100 million clients, intelligent Cloud Security server, hundreds of Internet heavyweight Company (rising partner). Trend Technology Cloud security has also been set up in the global 5 large data centers, tens of thousands of of online servers.  Statistics show that the response time of the virus is shortened by 90% after using cloud security technology. In a new generation of cloud security networks, a large number of security threat detection capabilities will migrate from the terminal to the cloud, and the client system will only finishinto scanning and other basic security features.  In the real-time protection process, the client continuously cooperates with the cloud server, thus reduces the client's burden, namely lets the end user in the least possible interference situation, realizes the better security protection. How to ensure data security cloud computing is a highly scalable and manageable system that is capable of computing infrastructure for end user application software. But the danger of cloud is also coming from this, if each cloud infrastructure is different, if the infrastructure to apply virtualization technology, how to solve license licensing is to implement cloud computing needs to think.  At the same time how to solve the cloud computing privileged users access rights, data storage and data isolation, will become the security cloud computing has to consider the problem.  So, in the early days of cloud service delivery, not all businesses can be placed on the cloud, and the first step in the cloud service provider is to determine which of the less important businesses can be placed on a cloud platform, and to accumulate service and operational experience, and then migrate the important business to the cloud platform. As an important public cloud and private cloud service provider, telecom operators have already considered this, the reporter found in an interview. Fan Bing, deputy general manager of China Mobile Communications Group Beijing Co., said Beijing moved to follow the first and foremost after the introduction of cloud computing. "At present, operators ' internal management and some common systems are more suitable for migrating to the cloud platform, while the key business systems that provide services to the public and the business units that are difficult to share with other systems are not suitable for cloud computing." "Consider the security model in the face of cloud computing security, any vendor or operator has become a bit lonely." The industry generally believe that in order to fundamentally solve the cloud computing security problems, many security vendors and other IT industry manufacturers need to seek cooperation to jointly promote the establishment of the unified cloud security standards. At present, many software and solution vendors have put forward solutions to the data security problem of cloud computing, such as SLA, SAS, SSL, etc.  But technical precautions cannot be exhaustive.  He Baohong, director of the Internet Center for Communications Standards at the Ministry of Industry and Information technology, said that in addition to changing the technical concept of information security, industry and security strategy, the security of cloud computing should be regulated from the legal level, administrative level and industry self-discipline level. He Baohong that the relevant laws on privacy protection and data security should be further improved; the government can define cloud computing from the policy level and authenticate the cloud service providers through the testing of communication quality and security, and in addition, the power of industry associations, At the level of business and market competition to take some restrictive measures to maintain the normal order of the industry.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.