Huge amounts of data are transferred to the "cloud" beyond the user's control, and for companies with sensitive information, it is inevitable to worry about information security issues. It is worth exploring whether cloud computing will increase the security risks of IT systems and information assets. Many experts say from a certain point of view, "clouds" data will be more secure, because the enterprise will not only rely on the services provided by the cloud service provider, but also drive it to adapt and explore new ways to protect enterprise systems and information assets, thus forming a new cloud security control mechanism. The problem of cloud is ultimately solved by the way of cloud.
Cloud computing as a new thing, the complexity, challenges and far-reaching impact is self-evident. The introduction of virtualization technology will bring new problems such as physical boundary ambiguity. At present, the problem of cloud security is mainly focused on the following aspects: first, the service security provided by the cloud computing service provider, the second is the control of the important data when the customers use the cloud service, the third is the customer's guard against the security of the account. In the future, with the gradual improvement of cloud security awareness, the risk of cloud computing can be effectively reduced from its own management.
From the cloud service provider's point of view, the flow of traffic between the cloud's data centers will increase dramatically, virtualization raises new security issues, and the client devices accessing the data center have a tendency to move. Therefore, the cloud service provider should attach great importance to the new Internet boundary security problem, to the data flow outside the cloud data center to carry out rigorous intrusion analysis and filtering, to avoid cloud data center and high-speed Internet export bandwidth is exploited by hackers, turned into an attack springboard.
Technology providers are also making unremitting efforts, security vendors have developed the integration of the application of security, security and intelligent characteristics of products to meet and promote users in the cloud computing environment security requirements. In the absence of current cloud computing mechanisms and standards, some independent organizations for cloud security have sprung up and are constantly committed to building standards. For example, the Cloud Security Alliance, an internationally authoritative industry organization, has more than 100 business members and publishes cloud security guidelines to help users become aware of the problems they face at the technical and management levels.
Although cloud computing has such a security risk, but as a new technology and business model, cloud computing by virtue of low-cost, flexible resource scheduling advantages have been deeply rooted. Throughout the development of ICT industry, as is the case with IP technology, the development and security of the information industry is a paradox in itself, there is no absolute security technology and there is no absolute effective control methods, but just as the security vulnerabilities can not stop the Internet, mobile Internet development, cloud computing will be the same. Since it cannot be "cured", how to balance the advantages and security threats of cloud computing is the key to the development of the company.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.