Crack security Suspicion Pepper map technology push security Cloud solution

Source: Internet
Author: User
Keywords Cloud computing Pepper Map technology

The rapid development of information technology is always accompanied by the breeding and trouble of various security problems, and cloud computing is no exception. As a representative of a new generation of information technology, cloud computing has subverted people's understanding of the application of information and business models, which ushered in the innovation trend of the IT industry, and once again pushed the safety issue to the forefront, which attracted the attention of it manufacturers at home and abroad. Recently, the domestic information security manufacturers Chili Technology in Beijing, held a Jhse Security cloud Solutions Conference, the first to the outside world of pepper map technology in the cloud computing security concept, and focus on cloud computing infrastructure platform to build a system of security cloud solutions, Opened up a new path to solving the cloud-computing environment's security doubts.

Cloud computing development Encounters "security Robbery"

Research reports show that the development of cloud computing is divided into three stages: first, the preparation stage, the main technical reserve and concept promotion, the solution and business model is still in the attempt, the user's understanding of cloud computing remains low, the number of successful cases is less; User understanding of cloud computing and recognition procedures are also increasing, more and more manufacturers began to intervene, the market appears a large number of application solutions; third, the mature stage, cloud computing industry chain, the industry's ecological environment is basically stable, the vendor solutions more mature and stable, the user cloud computing applications to achieve good results, and become an integral part of IT systems. In the process of cloud computing industry, the 2011 is undoubtedly the year of cloud computing application, all over the cloud computing data center has been built and perfected, many software and hardware manufacturers also launched a cloud computing development planning and corresponding cloud computing products and solutions, cloud computing industry shows a strong momentum of development. However, the cloud computing security incidents in the past year, such as Amazon Cloud Computing Center downtime, Microsoft Cloud Computing Exchange Online service failure, Google mailbox user data disclosure, etc., so that the development of cloud computing industry inevitably suffered a security doom.

The industry pointed out that cloud computing is a resource delivery and application model, rather than a new technology, which brings two aspects of the problem. First of all, the traditional information application environment security problems, such as operating system vulnerabilities, Third-party application software vulnerabilities and other security risks, in the cloud environment still exist; second, cloud computing as a new application model, in the form of the traditional internet compared with some changes, is bound to bring new security problems, For example, the high concentration of data causes the risk of data leakage to explode, and multiple client access increases the risk of data interception and so on. The two-way threat of traditional information security and emerging security issues makes cloud computing security a barrier for users, cloud service providers and information security vendors.

Hot Pepper Technology Refresh "safe cloud" concept

Pepper Map Technology is the leading professional information security vendors, long-term concern about the safety of operating system technology research and product research and development, the first to introduce a national standard three-level security detection of the general security operating system-pepper Map Host Security environment system (referred to as Jhse), And in the long-term information security construction has accumulated a wealth of practical experience. In the hot pepper map Technology Jhse Security Cloud Solution Conference, Hot pepper Map Technology general manager Zhang Yuaming, National Information Security Standardization Technical Committee member Zhao, the Chinese Academy of High Energy Physics Institute Network Security Laboratory chief scientist Hu Shansheng leaders and experts gathered together to discuss the cloud computing era of information security construction Road. At the meeting, Ke, executive vice president of Chili Technology, officially released the Jhse product as the core of the security cloud solution, with the original security operating system solutions refresh the traditional information security products in the cloud computing environment security protection concept.

Ke, executive deputy general Manager of Chili Technology, said that in the cloud computing environment, the server, storage and other hardware facilities to provide computing and storage capabilities, virtualization technology is through the integration of hardware resources and on demand, in the form of resource pools to respond to the internal IT system resource requirements. Virtualization, it can be said, is an important support technology for cloud computing. and the network environment of virtualization technology is changeable at any time, which brings new challenge to the traditional information security products such as firewall and IDs. "For example, when a computing task needs to be increased from 10 hosts to 20, the virtual boundary changes." The traditional information system security concept has been difficult to adapt to the cloud computing environment, only the products with high coupling degree can be combined with the virtual operating system mirroring to provide reliable guarantee for the safe operation of cloud computing information system.

"In the cloud computing system architecture, operating system mirroring, as an important hub for connecting the underlying resource pool and the upper level application system, is the cornerstone of the virtualization application and the need to strengthen security protection." "Ke said that at the beginning of product design, the pepper map technology fully take into account the characteristics of cloud computing, through enhanced RBAC, DTE, BLP three security models to restructure and expand the operating system security subsystem (SSOOS), so that Jhse products with each operating system mirroring close integration, And through the Jhse Security Cloud Management Center for each deployment of JHSE servers centralized management for cloud computing information system to build a defense-in-depth system. At the same time, pepper map technology also put forward the safety management cycle (JSML) concept, the management function and the security function is integrated, enables the user to carry on the daily it Operation Dimension management at the same time realizes the security protection, has solved "the security and the ease of use cannot simultaneously have" the traditional information application "the bottleneck", Help users quickly into the cloud computing era!

China's cloud computing needs to be controlled independently

National Information Security Standardization Technical Committee member, CAS graduate School professor, the original Information security state Key Laboratory director Zhao-Sheng believes that cloud computing involves hardware, software, operating systems and many other aspects, so the security protection against cloud should also cover all aspects, not only to deploy targeted security products in the cloud , but also from the system level to ensure the security of the cloud computing infrastructure environment. Because of China's lack of autonomous chip and operating system, traditional information system relies on imported hardware and software, which is difficult to be controlled by itself, and it undoubtedly buries a great security hidden trouble in the architecture of cloud computing infrastructure. In particular, compared to the traditional operating system applications, the cloud computing environment in the operating system mirroring the security problems, will be running on the base platform for all the virtual machines, resulting in incalculable losses. Therefore, it is possible to achieve real security on cloud applications only if a security cloud is established on the basis of a truly secure operating system.

As one of the earliest research security operating system enterprises, the chili technology has been committed to promote domestic security operating system products and technology development, its core personnel have participated in the Information security technology information system security level protection basic requirements (gb/t22239-2008), " Information security Technology Server security technology requirements (GB/T21028-2007), such as the drafting of national standards, and has undertaken the 29th Olympic Games, the 41st World Expo and other major projects information security work, in the field of safe operating system has accumulated deep research and development and practical experience. It is on this basis, pepper map technology will be a number of national invention patents and more than 200 new technology into the Jhse products, for the server operating system to build a multi-dimensional three-dimensional protection system. At present, Jhse has passed the Ministry of Public Security Computer Information System safety product quality Supervision and inspection center, become the first national standard three security detection of the general security operating system, to fill the domestic information security field a large gap, for the construction of autonomous and controllable cloud computing information system has laid a solid product and technology base.

Industry experts pointed out that cloud computing has been widely recognized as a PC, the internet after the third wave of it innovation, has been governments, it manufacturers and users of high priority. At present, China has also included cloud computing in the national strategic emerging industries, cloud computing will usher in a greater space for development in the future. In this trend, cloud computing security is becoming more and more important, need to arouse more attention from all sectors of society. As the leading information security manufacturer in China, hot pepper technology has been concerned about the development of Chinese cloud computing industry, and actively promote the relevant security technology, products and solutions innovation, the release of the Jhse Security cloud solutions, will undoubtedly promote the development of our own cloud computing industry, The tide of the application of cloud computing in China continues to move forward.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.