Cloud Security non 100% cloud User Data Security Initiative

Source: Internet
Author: User
Keywords Cloud computing data center cloud security data center cloud security

Cloud computing is the 2011 it darlings, and there are endless offerings of cloud-carrying products. The server is no exception, so the cloud server with the heat, the cloud data center on the controversy; accept "cloud services" users are a constant stream. What's the "cloud" on the front line? Convenient, flexible, customization, low power consumption, low cost, high capacity ... The reasons are countless. However, what is the result of the cloud landing as a user service? is a question worth pondering. Can users take "cloud services" to rest their peace of mind? Please recall some fixed 2011 cloud server Downtime History moment.

★ March 2011, the first proposed cloud computing services Google burst large-scale user data disclosure incident, about 150,000 Gmail users said all their own mailboxes and chat records were deleted, while some users said that their accounts were reset. As the internet giant, Google provides cloud services, put all the data on the Internet, to protect the cloud, the results of security problems inevitably broke out.

★ April 2011, Amazon Cloud Data Center, its built-in server large area of downtime, the specific performance of the Amazon in the North Virginia State Cloud Computing center downtime, including answering service Quora, news service Reddit, HootSuite and Location tracking service Foursquare Some websites have been affected. The incident was considered the most serious cloud-computing security incident in Amazon's history.

★ In May 2011, Microsoft's Office365 e-mail service was interrupted and many U.S. customer rights were compromised. Microsoft's Cloud computing service sounded the alarm.

The vivid example is present, the cloud is unsafe, the user's data leaks and loses the question inevitably. How to deal with cloud security is the key to cloud service providers when they focus on solving problems. And from the client of cloud services, it is recommended that users choose to use cloud services to protect their data security from the following steps, safekeeping.

Step one: Clearly decide which part of the business application to participate in the cloud and evaluate the selection of appropriate cloud service partners

In the cloud era, the cloud provides customized services based on specific application requirements. As enterprise users, should first think well, which part of the business application to participate in the cloud, is a private cloud or public cloud sharing. Evaluate the suitability of the partner according to the specific application requirements. The evaluation partner can refer to similar services provided by the partners in the past for other users, including service usefulness and proximity, interruption rate of service and problem resolution interval, and the quality of service feedback.

Step two: Communicate with selected partners to prepare a plan for early warning and disaster preparedness

Enterprise users decide to accept cloud services to a large extent, the value of cloud services is high, but security is relative. For example, the choice of aircraft, its safety is the highest and the lowest, the aircraft, a problem, the survival of passengers than other means of transport is the lowest. And so is the cloud. Enterprise users must communicate with selected partners to envision possible service outages, including hardware problems, external attack intrusion, content documentation errors, and so on. In the light of the problems that may arise in the process of accepting services, companies and partners, namely cloud service providers, jointly prepare early warning and disaster preparedness initiatives.

Step Three: Enterprise users develop identity authentication system and establish internal monitoring mechanism

When data is as valuable as gold, the data that companies put in the cloud must be kept safe. Enterprise users can develop identity authentication system with partners, set up checkpoints to ensure that only enterprise users in the cloud of the application of the relevant personnel and the need for shared personnel to be able to access, and third-party unrelated personnel have no right to enter. The application of data storage cloud, in addition to the cloud service provider to establish a corresponding monitoring mechanism for real-time monitoring, as the enterprise users themselves, should arrange for the fixed responsible personnel to the cloud of the things also dynamic real-time monitoring.

Step four: Multiple backups more worry-free

Since cloud security cannot guarantee 100%, it is important for enterprise users to make additional backups of their own cloud data. Cloud storage allows you to call anytime, but traditional hard disk storage can give you the most in return for a failure in your cloud. For individual users, it is important to do more of their own data backup.

(Author: Fangfei Editor: Xu Jinyang)
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.