Cloud computing technology is the latest in the Internet technology concept, but since the cloud computing technology, whether the Internet users, experts, enterprises, security vendors to cloud computing technology is widely debated, facing new technology as we stand at a fork in the road, one side is heaven is hell. We are faced with a choice, unprecedented, and every technological innovation is the choice for the Internet. Cloud computing Technology: Is it heaven or hell? "If we do well, we will enter a safe haven, but if we do wrong ... According to the Security Research Institute, the security risks of information storage and processing in cloud computing technologies require new ways to deal with them. Cloud computing technology refers to the data storage and processing are dispersed in the intranet outside the entire network of various platforms, which can greatly save the enterprise's IT resource requirements and improve the efficiency of data processing. However, some industry observers still doubt the security of cloud computing technology and the practice of allowing corporate data to be detached from the traditional scope of the business. At the EMC World 2010 Conference in Berlin, Dr Ari Juels of the RSA Security lab said that in a particular case when multiple virtual machines are running on a single server, if each virtual machine runs the same cloud system, Then the data processed in a cloud system of a virtual machine may be accessed by a cloud system in another virtual machine. "This is a dangerous situation," he said. Virtual machines can extract a variety of data from the same platform, such as passwords or keys. "Evolving cloud computing technology poses new security challenges" This method of obtaining data in a roundabout way was not initially taken into account by architects, and today's savvy people can take advantage of it. "Juels that cloud companies should ensure that their products have built-in safeguards to prevent such vulnerabilities from being exploited." Another insurmountable security hurdle for cloud computing technology is that no one can tell exactly where the business data is stored or where it is being processed, Juels said. Uncertainty over the location of data storage in cloud computing has led to a number of tightly regulated data that cannot be run on a public cloud platform. Cloud computing technology allows people running cloud services to connect to data storage or processed hardware, Juels says. "This is the issue of data jurisdiction found by research institutions. "To prevent security threats on cloud computing platforms, RSA has developed a set of tools that let cloud users know how their data is handled on remote computers." This tool can be used to check if sensitive data is running on a virtual machine while another client's virtual machine is running the same cloud platform. Other testing tools developed by RSA include cloud users who can check whether their files are complete or partially deleted, and ensure that files are backed up in multiple locations. RSA Chairman Art Coviello that cloud computing technology is the mainstream, is a chance to integrate security into software and hardware, which will also provide a foundation for future cloud computing platforms. "We can integrate security into the cloud in conjunction with virtual technology," he said. If done well, we will usher in the security field of heaven, but if not done well, face us is a hellish security environment. "This bottom-up security approach requires the creation of in-depth system-safe protocols, leveraging virtual machine platforms that allow multiple systems to work simultaneously, and protecting operating systems, programs, and data running on different virtual machines."
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.