Cloud security risks at mobile end: A new challenge for cloud computing

Source: Internet
Author: User
Keywords Cloud computing cloud security cloud security

  

As a new IT technology, the problem of security is that cloud computing cannot be bypassed. In order to scramble for the future information Society control, the cloud computing and mobile Internet infrastructure layout, access and control of the vast number of data, has become the world's strategic plan. At the same time, the rapid development of mobile terminals such as smartphones brings new security risks to cloud computing industry.

For cloud computing companies around the world, the security and privacy of data in the delivery of mobile devices is challenged. IBM recently registered a patent for a cloud computing security technology because its researchers found that the lack of an application's security protocol could risk compromising the data pushed on the mobile network. At the same time, "malicious advertising" has become a new source of viruses for mobile applications in cloud computing. "Malicious ads" mainly by "malicious software" and "advertising" two words synthesized, the nature of its ancillary advertising easy to make people relaxed vigilance.

And for China's cloud computing companies, the danger is more than that. The smart phones used in China are almost entirely controlled by US companies, which means that the key elements of each of us calling, sending information, and account information on the Internet bank may be sent back to the US cloud server at any time. Therefore, to speed up the development of autonomous and controllable operating systems and cloud computing, the focus on the cultivation of domestic cloud services enterprises and industrial systems, is the current primary task.

The complexities of cloud computing security are also reflected in their differences from traditional data security. First of all, cloud computing technology has a distributed character, its boundary is more ambiguous, secondly, cloud computing service provider's space is open, the environment is relaxed, if a server with powerful hardware resources replaces the original dozens of physical machines, the application on the virtual machine may belong to different business or even different company, We can no longer regulate them within a security domain. In the future, there will be a growing number of security attacks on cloud computing technology features and mobile-side security vulnerabilities that need to be stepped up.

In fact, our country's cloud computing security is not as difficult as most people think, in the cloud computing industry in the background, our cloud computing technology is not completely behind the developed countries in Europe and the United States, in the cloud services market to do data autonomy, application controllable, in fact, it is not difficult.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.