Advantages and disadvantages of cloud computing application services

Source: Internet
Author: User
Keywords Cloud computing security user offerings attacks

Cloud computing (Cloud Computing) is a hot-spot concept in industry and academia, and IBM's first reference to cloud computing in the 2007 technical white Paper has since been widely discussed in the IT field. The concept of cloud computing is the commercial realization of the public of computer resources, which provides a new idea for information management and service. As a rising technology, cloud computing is based on open standards and services, with the Internet as the center, the various computing resources on the Internet, together with T, make up a large number of data centers and computing centres, providing a safe, fast and convenient data storage and network computing services for all types of users.

There is no uniform standard for cloud computing, different businesses and individuals understand cloud computing differently, but the fundamentals of cloud computing can be summarized as follows: In the cloud, all data processing tasks are carried out by a large number of distributed computers, and end users can access computers and storage systems over the network on demand, The Enterprise Data Center is responsible for processing data on the client's computer so that it can provide data services to users with a variety of different devices through a data center, making it possible for anyone with a suitable Internet connection to access cloud applications. For enterprise users, the service integration and on demand supply of cloud computing have greatly improved the utilization ratio of computing resources, reduced the energy consumption, and compared with the traditional way, its advantages are reflected by table 1.

Table 1 Comparison of cloud computing and traditional approaches

Cloud computing applications have many advantages but still face the following security threats:

① threat of service availability. The user's data and business applications are in the cloud computing system, and their business processes will depend on the services provided by the cloud services provider, which challenges the service continuity, SLA and it processes, security policies, event handling and analysis of the services provider. In addition, when a system failure occurs, how to ensure the rapid recovery of user data is also an important issue.

② Cloud User Information abuse and disclosure risk. The user's data storage, processing, network transmission and so on are related to the cloud computing system, if the key or privacy information loss, theft, the user is undoubtedly fatal. How to ensure that the security management and access control mechanism within the cloud service provider conforms to the customer's security requirement, how to implement the effective security audit, and how to monitor the data operation, how to avoid the potential risk of multi-user coexistence in cloud computing environment is the security challenge in cloud computing environment.

③ denial of service attack threat. Cloud computing applications because of the high concentration of users and information resources, easy to become the target of hacker attacks, while the consequences of denial of service attacks and damage will significantly exceed the traditional enterprise network application environment

④ legal risks. Cloud computing applications are geographically weak, information mobility is large, information service or user data may be distributed in different regions and even countries, there may be legal differences and disputes in government information security supervision and so on, and due to the blurring of the physical boundary between users caused by virtualization and other technologies, the problem of judicial levy can not be neglected.

The VPN Integrated Security Gateway (CLOUD-USG) as a new generation cloud environment multi-function virtual integrated Security gateway product, set up a firewall, virtual private network (VPN), Intrusion detection and defense (IPS), network laugh Anti-Virus, web content filtering, anti-spam, traffic shaping, user identity authentication, Trial Juice and BT, IM control applications, can provide users with a full range of security threat protection program. In addition, it provides users with comprehensive policy management, quality of service (Qos) assurance, load Balancing, high availability (HA) and network bandwidth management functions.

CLOUD-USG can be flexibly deployed in a variety of cloud computing environments or gateways to large and medium enterprise networks to protect users ' networks from hacker attacks, viruses, worms, trojans, malicious code and unknown "0-hour" (zero-hour) attacks and other mixed threats; At the same time to provide users with a simple and unified management of various security features and related logs and reports, greatly reducing the equipment deployment, management and maintenance of operating costs. In addition, users can remotely access the cloud juice computing environment through VPN, to ensure that the VPN data do not have harmful content such as viruses. With the protection of new attacks, CLOUD-USG not only delivers outstanding performance for VoIP, im/p2p, spyware, phishing, and hybrid attacks, but also provides defense against cloud-specific attacks.

CLOUD-USG technology uses advanced full content detection technology and unique acceleration engine processing technology, through simple configuration and management, to provide users with a high level of protection at lower maintenance cost of "security isolation" it for the data traffic through the gateway virus, worms, intrusion and other efficient detection, and can block the threat from spam, malicious Web pages, all detection in real-time state, with high network performance.

With the continuous development of cloud computing application, the virtual integrated security gateway in cloud computing environment will play a more important role in security protection.

(Responsible editor: The good of the Legacy)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.