Cloud computing is cloud computing. Is a super-computing model based on the Internet. Is to put a lot of information stored on the PC, mobile phone or other devices and processor resources together to work together. Cloud computing for the development of unlimited, then let's come to a simple discussion about it.
Cloud computing is an emerging way to share infrastructure and is something that connects huge pools of systems together to provide a variety of IT services. There are many factors that drive the demand for this type of environment, including the dramatic growth of Web 2.0 applications such as connected devices, real-time data streaming, adoption of SOA, and search, open collaboration, social networking and mobile commerce. In addition, the increased performance of digital components has also led to a dramatic increase in the size of the IT environment, further enhancing the need for a unified cloud management.
Cloud theory is a powerful tool to realize the natural conversion between the qualitative value and the quantitative value of concepts.On the basis of cloud theory, this paper proposes a cloud computing method to realize concept calculation (also called simplified calculation) Uncertainty reasoning is given. The logical description of calculation is given, and the process of calculation is taken as the process of reasoning. The machine learning method is used to calculate the process of cloud computing, and the calculation process of cloud is given by the method of indefinite reasoning ; Briefly describes the cloud computing system implementation
Cloud computing is amazing, but the pain is obvious. Companies that choose to use cloud computing abandon direct control over the enterprise assets that run on cloud computing. The data and applications being accessed through cloud computing are in the cloud, not in the enterprise data center that they control (owners can use physical Security Authentication Authorization and Intrusion Prevention Systems or Firewalls protect and control data).
Thus, the consequences of inadequate cloud computing security protection are very serious. Sensitive data theft will have a serious impact on the intellectual property of the enterprise and corporate reputation directly.
In this regard, cloud computing providers have learned about the risks and are working hard to improve security to ensure customer data security. There are many issues to consider when considering the deployment of cloud computing security policies, including how to use cloud computing and how to use it safely.
There is also a need to pay attention to the problem is that third-party companies or organizations from the cloud computing infrastructure for customers to deal with security issues, how can customers know that this security is valid and how to protect itself?
However, however, cloud computing services are widely acknowledged, and there is growing evidence from businesses that cloud computing will become the dominant model for network infrastructures, for which reliability and security will always be Enterprise IT Managers focus.