Cloud security standards to be unified

Source: Internet
Author: User
Keywords Cloud security cloud security standards servers

A user who uses netbooks, uses g o g l ED o c s for documentation, and entertainment to watch video online, even if the system crashes, his files and information are well stored on the web, almost without the sense of traditional antivirus software. This is the best image of "data security" in the era of cloud computing.

In recent years, with the rise of cloud computing, the pursuit of "cloud security" projects is a wave of high tide. "Cloud security" seems to be scattered in the clouds, more and more clear, and gradually show the appearance of a real industry.

in public, almost all security vendors talk about cloud security, and the vast majority of new security products are labeled "cloud". At present, whether the international manufacturers such as McAfee, Symantec, trend technology, or domestic rising, Jinshan, 360, and so on, have put forward their own cloud security solutions, we all hope to find in this way to the future profit model tickets.

However, is cloud security really safe enough?

April 22, 2011, Amazon Cloud Data Center Server Large area of downtime, the incident is considered Amazon's history of the most serious cloud security incident. Prior to this, Google's G m a I e-mail has also been a global failure, service interruption time of 4 hours; Microsoft's cloud computing platform a z u r e was stopped for about 22 hours by "some factor".

When a value is not found on a user's computer, the target of a "virus" attack has shifted to the core of the cloud: G m A I, Yahoo, Amazon server, or social networking sites such as Facebook, which contains a lot of personal information. At home, all kinds of e-commerce sites and enterprise internal information platform are easy to recruit target.

In this respect, some people in the industry said, in fact, "cloud security" in a sense still remain in the chaos level, the security services to the company there is little consensus between the technical innovation and the opportunity to hype a mixed bag, it is difficult to distinguish clear.

"This is because, although it is known as ' cloud security ', each vendor's understanding of ' cloud security ' is different, so the technology and business models used are quite distinct. One industry insider said.

For example, trend technology emphasizes cloud computing power, relying on a "cloud architecture" system of massive servers, where vendors collect and analyze virus codes via the Internet, and then disinfect end users. And rising is more focused on the terminal virus collection capabilities, distributed in every corner of the Internet user terminals to collect virus code, and then uploaded to the cloud to build a "cloud security" system.

Because of many factors, companies will not have a unified cloud security standard in the short term.

If the future is likely to be set by WHO, then the cloud security technology of the creator must be in the industry's leading position. "A large domestic i T Enterprise Cloud computing project leader said that the technology is in the industry leader by the user, if users use your" cloud security "service, the computer has not had a virus in a year, then your cloud security on the success of half. At the present stage, it is the next problem that the security manufacturer must consider to integrate different defense means and achieve comprehensive protection for each node of cloud.

However, while cloud security may be an opportunity to re-establish user confidence in I-t information security, it is noteworthy that it may yet again disappoint the hopes of redemption.

under security conditions, businesses and governments around the world still believe that ' cloud concept ' can bring good prospects to the local, blindly purchase a large number of server resources, Dajian Data center or out of investment thinking, the introduction of more cloud computing projects. "Insiders believe this could lead to a crisis of trust in cloud computing.

But businesses and governments around the world are still obsessed with cloud concepts.

At present, Shanghai's goal is to build "Asia-Pacific Cloud Computing Center", to nurture 10 of millions of years operating income of billions of dollars in cloud computing enterprises, driving information services new business income of hundreds of billions of dollars. Beijing's "Xiangyun plan" and strive to 2015, the formation of 50 billion yuan industrial scale. Shenzhen's "Kun Cloud Project" is to use the cloud computing platform to serve Shenzhen and even the world's corporate users, and strive to make Shenzhen the "Asian Information Hub Center."

Guangzhou is also deploying the cloud project to build a world-class cloud computing industry base.

in foreign countries, cloud computing is mainly about consolidating existing server resources, integrating idle resources and building a virtual datacenter. But in many places in the country, is often millions of new servers, there is a lot of blindness. "The Minister of the Ministry of Wei said.

Cloud Security can eventually "fall to rain" and it still seems to take time to verify.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.