Cloud computing is a double-edged sword security problem can not be underestimated

Source: Internet
Author: User
Keywords Cloud computing security

The United States has secretly invaded Yahoo, Google's main communications network between national data centers and stolen hundreds of billions of users ' information, the Internet News Research Center said on May 26, the US global surveillance operation record. This also shows that the rise of "cloud computing" in recent years has brought great convenience to people at the same time, there are not negligible security risks.

"Cloud" era: cloud computing is a double-edged sword China-style breakthrough heavy responsibilities

1 cloud computing is a double-edged sword as industry experts pointed out, as a new internet model, cloud computing will be the next generation is also a long time the basic model, since the advent of the people have been widely concerned. Cloud computing based on the existing distributed network, the user data storage and operations are done in the "cloud", clearly embodies the "network is the computer" concept.

The advent and widespread application of cloud computing not only reduces the cost of computing, but also greatly changes the user's use of desktop as the core, and changes the way of information acquisition and knowledge dissemination, which brings unprecedented convenience to people. In a way, the arrival of the "cloud" era is no less than a revolution.

"Cloud computing set off a new internet revolution, cloud computing through the mode of centralized supply, breaking the geographical and temporal constraints, the real formation of information." Through cloud computing, people can greatly improve the efficiency of computing, so that time and energy more effectively into the main work. "said the industry expert.

At the same time, cloud computing also lurks a certain security risk. It can even be said that security and privacy issues have become a major obstacle to the further development of cloud computing. As data processing and storage are done on the remote cloud, users are vulnerable to denial of service attacks, man-in-the-middle attacks, network sniffing, port scans, and more. In the face of serious cyber attacks, users face risks such as data loss and privacy disclosure, and threats to social stability and national security.

Hequan, academician of the Chinese Academy of Engineering, said: "Cloud computing also has a lot of security problems, cloud computing logic is easy to focus on the target, and cloud storage virtualization and physical distribution and isomerization, lack of physical security boundaries." The separation of user data management rights from all rights makes the data exposed and tamper-risk. There are also security vulnerabilities in cloud storage for end-user applications. ”

In fact, many foreign well-known internet companies in the cloud platform since the operation has been a number of failures. In addition, because of the high concentration of data on the cloud platform, the risk of attack and the losses suffered after the attack have increased exponentially. All this adds to the difficulty of cloud security protection, and also suggests that cloud security has become a problem that can not be overlooked in the smooth advance of cloud computing.

2 U.S. fourth space a single big U.S. is the cloud computing concept and technology pioneer, as early as 2006, the United States internet giant Google formally proposed the "cloud" concept. Since then, Amazon, Microsoft, Intel, IBM and other internet giants have followed up, followed by the "cloud" trend in a short period of time swept the world.

With the rise of computer network, cyberspace has become the fourth space after territory, territorial sea and airspace, and network space security is also called as an important part of national security. In view of this, the United States and other developed countries began to actively deploy, trying to grasp the commanding heights. The United States to strengthen its network hegemony, on the one hand to enhance the relevant aspects of security work, on the other hand, through its domestic companies to actively deploy the global "cloud computing" architecture.

As early as 2003, U.S. President George W. Bush launched the U.S. National Strategy for the protection of cyberspace, and in June 2009, the United States formally established Cyber Warfare command. The United States now actually controls the global Internet. As Hequan pointed out, the world's 13 root domain Servers in addition to the United Kingdom, Sweden and Japan each have 1, the remaining 10 are in the United States. The Internet domain name and number distribution Agency (ICANN), which signs and distributes the root servers, is actually controlled by the United States. Although more and more countries are proposing that the United States should transfer Internet management rights to international organizations as soon as possible. The United States has refused to hand over internet management to the United Nations, despite numerous games by the parties involved.

At the same time, the United States relies on the domestic internet giants to grasp the absolute control of global information, and monopolize and control the development trend of cloud computing. Because cloud computing requires a high technology threshold, the world's real strength to develop and provide cloud computing services to the company only Microsoft, Google, Cisco, IBM and a few internet giants. Microsoft also plans to combine other giants to form a "cloud computing alliance". In addition, Britain and South Korea have stepped up their domestic cloud computing deployments in recent years.

Faced with this prospect, although people expect the internet to become a real open space, but because of the very high technology and funding threshold, cloud computing is increasingly by the United States and other minority countries highly concentrated and monopolized. As the US global surveillance record shows, America's cyber blockade of enemy States, not only in wartime, is unambiguous, and the Snowden incident is a sign that even in peacetime, even with allies, American agencies have no moral authority to monitor them. If the future of global personal data is highly concentrated in the U.S. company's cloud computing Center, which is not a blessing for the developing countries, the pace of its information construction will increasingly be subject to the standards and rules of the game set by internet giants.

3 China-style breakthrough heavy responsibilities as the transnational giants in the cloud computing field aggressive "enclosure movement" and some countries in the field of cloud computing stepped up the layout, a war of no gun smoke began. If we do not have "autonomous" cloud computing capabilities, then we will have to rely on the relevant multinational giants of the cloud computing Center to store and compute data, which will pose a serious challenge to China's network of national security.

Zhang Feng, chief engineer of Industry and information technology, said in a recent meeting of the 2014 China Computer Network security: "2014 is our country's 20 anniversary of Internet access, and now our country has become a veritable network power." However, the development of the Internet has brought a series of challenges to the Economic society, the network security problem is increasingly complex, cloud platform, social network, mobile Internet and other new business rapid development, and constantly bring new security risks. "Although China's current cloud computing base is relatively weak compared with the United States, many studies are still in the initial stage, some of the technology is still immature, and China's information security industry is still surrounded by heavy, but the" cloud "concept has permeated all walks of life, and burst out of infinite vitality and vitality.

As Beijing Tianyi Technology Co., Ltd. President Huhaipo said: "Only the key infrastructure hardware and software on the autonomous control, only to be called security." The development of China's information industry in the 20 has made great achievements, such as China's security companies in the firewall, intrusion prevention, anti-virus, the 3 security system key products or core products are already in the market dominance. ”

The "cloud computing" war has just kicked off, if we can seize the opportunity to win the initiative in a new round of information change, narrowing the gap with developed countries, and beyond. Conversely, it is possible to be "cloud computing" led by the new information age abandoned, further widening the gap.

Especially important is, after many years of information construction, China's information infrastructure has reached a considerable scale and level, and has the world's largest market, if the full use of concentrated power to do major events of the institutional advantages, it is entirely possible to successfully build China's autonomous and controllable cloud computing platform.

NI, academician of the Chinese Academy of Engineering, said: "In this new round of technological change, China has the talent and market advantages, China can be achieved by many other developing countries are unable to achieve breakthroughs and beyond." ”

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.