Cloud computing triggers the third it wave: security is the biggest bottleneck in scale development

Source: Internet
Author: User
Keywords Cloud computing security cloud security

Cloud computing is another big change since the 1980 mainframe computer to client-server transformation. The advent of cloud computing was no coincidence, and in the early 60 's, McCarthy's idea of computing power as a utility for utilities like water and electricity became the source of cloud computing thinking. In the the 1980s grid computing, 90 public computing, the beginning of the 21st century virtualization technology, SOA, SaaS application support, cloud computing as a new resource use and delivery model is gradually recognized by academia and industry. After the change of PC and Internet, cloud computing is regarded as the third it wave, which is an important part of China's strategic emerging industry. It will bring the fundamental change of life, mode of production and business model, and become the focus of the whole society.

Because cloud computing involves personal and corporate computing patterns that involve sensitive information about individuals and businesses, the first important issue facing cloud computing is the security of cloud computing. The security of cloud computing is as much a concern as the security of online banking. In cloud computing security, the market is mainly in: in a particular service, the data overflow between different customers, the supplier system is subjected to a large number of malware attacks; Malicious crowd operation "leads to the leakage of information, the insecurity of shared information, and the hacker stealing data from the supplier system." These few aspects are more worried.

Although cloud computing has begun to be used in the area of cyber security, is the cloud computing environment a trap? Does it cause harm to the user? To solve security problems and provide services to the public well, cloud computing must address the following three levels of security issues:

How does cloud security serve?

In the current network environment, rely on a single terminal to check Trojan virus, is considered more and more infeasible, so the need for security vendors to build a cloud platform to bear the detection of malicious code, cloud security system can be scanned in advance each page to identify the Web page whether there is a trojan, whether it contains malicious code. Therefore, when a user accesses a Web page, if it is accessed through a cloud security system, they immediately know whether the Web site they want to visit is secure and whether the Web page being accessed can be downloaded.

This shows that the advantage of cloud security is to use large computing power to scan all the Web pages, to protect users from malicious code when surfing the Internet. But for end users, the Internet is only one of the sources of threats, and some of the threats are from the mail, U disk, and so on, and users do not want to expose all their privacy, so based on this model of the cloud security system can not be all.

In addition, cloud-centered cloud security system also has some fatal problems, which is excessively dependent on the transmission channel. Because the user's resources and information are given to the cloud to deal with, so the cloud becomes a centralized security station, all resources and information to the cloud in a circle, which caused the transmission channel restricted problem. As a result, cloud service providers need to work closely with broadband service providers to structure a broadband transmission system for cloud services so that the cloud can play a powerful back-end power. Of course, the recommended practice is the cloud security system and telecommunications operators to combine, by the cloud security system to identify the harmful or not, by the telecommunications operators to inform users of the risk of access to the corresponding site.

Will the security of the cloud itself be compromised?

Providing services in the cloud means openness, and openness often equals insecurity. This is like an open public place that is not safe. So, the future research topic is how to ensure that the cloud is not attacked, and that it can always provide services. Amazon downtime, which provided cloud services, has disrupted Web services such as Twitter. It is worth pondering whether the interruption will cause historical data to be destroyed, which involves the user's tolerance of cloud security. How to solve the security problem of the cloud itself? The solution may include disaster recovery, monitoring systems for the cloud, and so on, which is a problem that needs to be studied in the future.

How does the cloud guarantee user security?

The security standard of the user program in the cloud is not analyzed, the data is not replicated, so that the business secret is not violated, the user's data will not be stolen. What the user needs is a trusted cloud, that is, to ensure that the cloud is trusted is an important prerequisite for the wide application of the cloud. Just as users buy equipment, you can first examine the strength of vendors before deciding whether to buy. In cloud mode, the user may not know how to look at the cloud's trustworthiness, because people do not know the physical location of that part of the cloud that serves the specific user, there is uncertainty. And if the use of encryption, it will lead to user programs running low efficiency.

The openness of the cloud may also turn the cloud into a tool for evil. At present, in the online evil must control terminal, phishing site also need to have a fake website, Trojan also have network control end. The appearance of the cloud causes the network infringement main body to run to the cloud, thus causes the cloud to become the evil source.

The idea of the economic model of the cloud is elasticity theory, that is, the resources provided to users by the cloud is flexible resources, such as a user in a certain period of time to run at full capacity, need 10000 compute nodes, and usually use at most 10,000 nodes 5% to 20%, if in the cloud application, the usual application may be 200 nodes, or 1000 nodes, you need to apply to 10,000 nodes at the critical time.

Currently, some cloud systems provide exclusive private resources to users for security reasons, which makes it easy to make a difference between the user's unique assets and the cost of the unique assets on the cloud. This solution is clearly a violation of the cloud's own economic laws, so that users are not worth the cloud to seek resources, whether this model is a cloud model is still to be explored.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.