Hang production "Invisible Cloud Encryption Cloud disk" to the cloud disk information added password lock

Source: Internet
Author: User
Keywords Cloud computing cloud storage cloud security cloud security cloud storage

  

  

"There is a cloud of rain in the wind, a cloud made of rain." "Now, this song has been sung for a long time seems to be changed the lyrics is appropriate: Because the cloud is no longer just rain, but 0 and 1."

Cloud computing, cloud storage, cloud terminals, cloud services, Foggy, a Yunshan. The popularity of cloud disk products, to the netizen in the preservation of data information on the provision of a great convenience. According to the latest data released by the Analysys think-tank, the number of domestic personal cloud storage users (Web version) has more than 351 million people, 2013 China's cloud computing industry scale has reached 100 billion yuan.

However, industry insiders pointed out that the fatal weakness of cloud services is information security issues, users enjoy convenience, Low-cost services when the sacrifice is the security of data, at least the user stored in the cloud of data to the server administrator is transparent, Snowden once served the U.S. National Security Agency is believed to be transparent.

"There are plenty of times when data is destroyed is not the worst thing, and the worst is the leaking of sensitive data." "Hangzhou Yi Rui Electronics Co., Ltd. general manager Huang Jun said."

Recently, Aliyun and Yi Rui Electronic cooperation launched the "Invisible Cloud Encryption Cloud disk", that is, to solve the sensitive information cloud storage information security issues.

Financial hotspots

Security concerns in the convenience of cloud storage

Every day we have to upload 1 billion photos to the cloud, 2.5 billion kinds of data information.

"Is the cloud disk you are using really safe?" Huang Jun said that after many years of cloud computing, security issues have been a hurdle, especially the recent outbreak of fast hotel open room information leakage, prism door and other events really scary ah.

A brief look at the public data shows that since 2011, many causes of hackers malicious attacks caused the Internet personal data leakage of large events. Sony's PSN network was compromised by hackers, causing more than 70 million of users ' personal information to be leaked; Citigroup confirmed the system had been hacked and a large number of credit-card holders were being hacked, and the South Korean SK Communications Company's portal, Nate and social networking site Cyworld, was attacked by hackers, Number of users stolen information 35 million. Japan electronics manufacturer Seiko Epson Co., Ltd. is located in South Korea's branch corporate website encounter hackers, about 35 million user information may have been leaked; China's largest developer it community CSDN Server was hacked, a large number of user passwords were exposed, more users data leakage 8 million; Tianya leakage of 40 million user information, Jing Dong Shopping Center, users of the leak, Dangdang 12 million user data leakage ...

"In the case of the Sony leak, there is evidence that hackers who hacked the Sony database took advantage of Amazon's EC2 cloud computing Service," the company said. "Huang Jun said.

For China's information security, the situation is even more serious. Because from the chip, the server, the operating system, the database to the storage equipment, the foreign product in the information technology entire industry chain all occupies the monopoly status. Encryption technology, the last line of information security, is of great significance to the autonomous control of information security in China. "Huang Jun said.

Five years ago, Huang Jun resigned from the general manager of a foreign-invested enterprise in China, and a gang of like-minded friends founded Yi Rui Electronics, is to set up the company into a domestic first-class data security vendors, concerned about data from the generation, use, transformation, transmission, storage, archiving until the destruction of the data lifecycle security, For the relationship between the vital information system escort.

Today, the Yi Rui not only become a national High-tech enterprises, but also have access to the state password administration, the State Security Bureau, the Ministry of Public Security and other products of the company's testing certification, and in the government, finance, telecommunications, public security, armed police, universities, large and medium-sized enterprises have obtained a large number of

After encryption, even the Tianhe computer will take the universe years to crack

"Intelligent hand ring circuit design and back-operation software are our core assets, I am afraid that the server hard drive is bad cause data loss, but if I backup data to the cloud disk is really safe?" will anyone steal our intellectual property? " A well-known medical networking company in Hangzhou, Sun always told reporters.

In fact, Sun's general concern is that small and medium-sized enterprises in the use of cloud storage general security concerns. According to the Sadie study, 80% of companies choose information leaks to worry about as their first obstacle to using cloud computing and cloud storage.

"We and Aliyun cooperation of the invisible Cloud encryption cloud disk, it is to solve the worries such as Sun always launched." Huang Jun said that each file uploaded through the Invisible cloud client will be encrypted with high intensity, and the key is fully in the user's own hands.

What about ciphertext? Even if you have three of the most cattle tianhe computer to crack, but also to spend the universe year (professional terminology, a cosmic year equivalent to billions of years), and the data will be uploaded to the Aliyun server, triple Backup, reliability of 99.99999999%, data security can be said to be "foolproof."

"It's like having a data safe in the cloud, and the key to the safe is firmly in the user's own hands." "By encrypting, you're storing only a bunch of digital permutations that upset the traditional order," says Huang Jun. Others even if you get the files stored in the cloud, also do not know what this pile of numbers performance is, there is no key to your hands, others can not normally browse your files, you can see is a pile of garbled.

For those who are too busy to back up at all, you can select four local folders, and once new data is generated locally, the invisible cloud will automatically be encrypted and backed up to the cloud.

"In order to facilitate user management of cloud disk data, Stealth cloud also supports PC, mobile phone, pad multiple terminal access, whether you go to the streets of Paris to see the scenery, or overnight to Egypt, as long as there is a signal, your data are waiting in the clouds." "Huang Jun said.

In addition, Yi Rui Stealth Bao can also solve the local data security problems. As long as the computer plug in the invisible treasure, hard drive, u disk, network disk and other local data can easily browse, operate, and unplug the invisible treasure, the data quickly invisible. Even if the data is directly copied, even hard disk, U disk was stolen, no stealth treasure, the data is a bunch of useless garbled.

"Cloud computing and mobile Internet are the two major trends in IT industry, and information security is the important support of these two hot spots, with the state, enterprises and even individuals to the increasing importance of information security, information security industry will usher in high-speed development, commercial password in the future of the enterprise Market application prospects." "Huang Jun is full of confidence in the company's future.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.