Cloud computing threatens Internet users ' privacy

Source: Internet
Author: User
Keywords Cloud computing Internet users

Intermediary transaction SEO diagnosis Taobao guest Cloud host technology Hall

"Roy Network" in early 2008, IBM announced, will be in Wuxi Taihu New Town Science and Education Industrial park for China's software companies to establish the first Cloud computing Center (Cloud Computing Centre). The center will provide China's emerging software companies with the ability to access a virtual computing environment, thereby supporting their development activities. Once built, companies in the park will be able to access the common services provided by the center at any time, as they use tools and other shared services. Services provided include IBM Rational software development tools, WebSphere Application Server software, and DB2 database software running on IBM System X, System P, and BladeCenter servers. The cloud computing environment is managed by the IBM Tivoli system management software.

Cloud computing is a new way of sharing infrastructure that can connect huge system pools together to provide a wide range of IT services. Many factors drive the need for such environments, including connectivity devices, real-time data streams, adoption of SOA, and rapid growth in WEB 2.0 applications such as search, open collaboration, social networking, and mobile commerce. In addition, the improvement of the performance of digital components has greatly increased the size of the IT environment, thus further strengthening the need for a unified cloud management.

During the 2008 Beijing Olympics, foreign media reported that a US military computer science professor, Gregg Kendy Greg Conti, a U.S. military security expert, said the trend of software to cloud computing would increase the risk of privacy because people relied on information on the Internet. The popularity of "cloud computing" threatens the privacy of netizens.

Greg Conti, a professor at the American Military Academy, said at the annual Defcon hacking conference in Las Vegas that the site generally captures data that can expose a user's life. As the internet's trend towards cloud computing grows, the risk is increasing that software will be provided by applications that are hosted outside of the computer, rather than by applications installed on the user's computer. A common example is the web-based e-mail service provided by Google and Yahoo. Cloud computing is expanding into many software applications, including files, finance, forms, photo editing, and more. With the advent of cloud computing, it is important that we all consider the threat of privacy. Software tools in others, data is stored elsewhere. In general, this is not a good idea.

Internet users have provided a great deal of their own information when using online search and mapping software. The main example of revealing privacy is social networking sites. People publish personal videos, pictures, and ideas that can only be viewed by selected friends. The most typical cloud computing service is web mail, and cloud computing is moving toward many areas of documentation, finance, spreadsheets, picture editing, and more. "With the growing popularity of cloud computing, we should be aware of its potential threats," Candy said. After all, these applications and data are stored on remote servers. "At the security conference, security researcher Nessen Haimir (Nathan hamiel) and Shawn Moyer (Shawn Moyer) also said that these applications are likely to be embedded in malicious code.

Roy Net www.RoyEC.com Xiangru that using cloud computing, a large number of files, forms, or other files created using external applications may be stored in the company that provides those services. When information is in the public domain, it is finished. The data in your computer can also be protected by law. However, data on other people's computers is not adequately protected.

As early as April 07, Microsoft built a 7-size giant farm in Quincy, an agricultural town in Washington, USA, not for livestock, but for a server farm that Microsoft could host hundreds of thousands of servers. The $ hundreds of millions of trillion data center will ensure that Microsoft is responding to challenges from Web services. Coincidentally, internet companies such as Google and Yahoo have already had huge data centers, but are now spending huge sums to build a range of data centers. In October 07, IBM and Google agreed to jointly fund a large data center for cloud Computing (Cloud Computing) research. Why did the global IT giants start to hit the data center at the same time? Look at Amazon's flexible Computing cloud service last year. Because it allows small businesses to purchase Amazon data Center's processing capacity according to their own needs, it has been enthusiastically pursued by users: the EC2 cloud storage S3 has stored 5 billion objects in less than a year. Spurred by S3, the cloud storage services battle escalated this year, with Google, Microsoft and Apple all recently launching the service in the hope of streaming more users into the Amazon's single market in order to expand the advertising audience. It has become an irreversible trend for more businesses and individuals to choose to share the resources of large data centers through Web services, but the question is, what should the new datacenter be like with Web service orientation?

Support for cloud computing, only such data centers can take on endless web applications. In fact, cloud computing is Google's data center to deal with Internet services, the technology secret, and Google's search engine is the initial cloud computing services, the current cloud storage and future forms of new Web applications will make cloud computing the Web era of new computing language. So what is the mystery of cloud computing? Willy Chiu, vice president of IBM High performance on demand solutions, said in an interview that cloud computing can spread computing across a large number of distributed computers, not local computers or remote server farms, making the enterprise data center run similar to the Internet computing model. The data centers that meet the cloud are enough to deal with the computing challenges of the internet's size, often dealing with huge volumes of data in seconds. By comparing with Grid computing, Willy Chiu The secret of cloud computing. (www.shidai.com network Age), the financial institutions of interest calculation can be used to interpret grid computing: Because the formula for calculating interest is certain, so you can according to the parameters of the database assignment computing tasks, using polymorphic simulation method, in a repetitive form of distributed computing, Finally, the computing tasks are combined to obtain the final results. and search engine computing is the perfect explanation for cloud computing: Web page changes are often large and complex, but cloud computing can easily handle massive data, it can not only cut the search task into a number of small task modules to execute, and a single task module can use different algorithms, such a result set is the search results.

The cloud is not just a simple collection of computer resources because it provides a mechanism for managing these resources, including resource provisioning, change requests, re-mapping, workload rebalancing, resource deregulation and resource monitoring, Xiangru, a veteran Internet combat expert. In a sense, cloud computing is more like an upgrade of grid computing, but its greatest charm is that, in this computing model, computing operations will no longer be limited to personal desktops and business centers, but can become a service based on internet processing. In fact, with the advent of web search and map services, many Internet users have lost some of their personal information, and Candy has specifically referred to social networking sites. At present, more and more people put their own information on social networking sites, in order to customize the Personal page page, they also downloaded from the unfamiliar development of a variety of small applications, these are the hackers left an opportunity. Information that may expose people is stored in computers maintained by social networking sites. If someone searches for their name on the internet, then the record of a route to their home, who they are and where they live, will certainly be stored in the database of the company that provides the services. < Roy net >

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.