"Hollywood pornographic door" questioned Cloud security

Source: Internet
Author: User
Keywords Cloud security Cloud security

"Hollywood photo door" More than 100 injured stars, Apple 3rd issued a statement that the "pornographic door" incident and Apple icloud of the program loopholes or the iphone's specific features have nothing to do. Apple has mobilized all available engineers and technicians to investigate. Still, the security of cloud computing is once again the focus of public opinion.

The "New York Times" 3rd, said the current cloud computing information "Access control Communications card" has many loopholes. For internet companies such as Apple, it is hard to find a good balance between the security and convenience of information. According to the US Bloomberg, the cloud computing system, the user will upload information to the Internet, encrypted by the server storage, and the encryption mechanism itself has enough levels, to prevent the identification and update capabilities, is questionable.

"Cloud computing is characterized by hosting things to someone else, and logically losing control and guardianship," said a senior cloud computing expert at the Global Times. In this case, you protect it with high technology, which is less secure than it is in your own hands. Now hackers can break the internet, the cloud can also be breached. It could be a hacking, or a leak inside. In addition, cloud security involves link security. For example, the photos of Apple mobile users to the cloud, in fact, is to send photos to the United States server, from China to the United States cable is very long, it is likely to leak the information channel, which is like robbing a cash car than robbing banks easier.

The expert says there are now a lot of cloud-security-related technologies, such as encryption and trusted computing. Through trusted computing, users can ask cloud operators to host data to a server in a computer room, and if someone moves your data, you can detect it. Even so, cloud security is relative. Internet companies want to take away your information without technical barriers. The benefits of cloud computing are cost savings, but core business data or personal privacy is not currently recommended for hosting to the cloud.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.