"Hollywood photo door" More than 100 injured stars, Apple 3rd issued a statement that the "pornographic door" incident and Apple icloud of the program loopholes or the iphone's specific features have nothing to do. Apple has mobilized all available engineers and technicians to investigate. Still, the security of cloud computing is once again the focus of public opinion.
The "New York Times" 3rd, said the current cloud computing information "Access control Communications card" has many loopholes. For internet companies such as Apple, it is hard to find a good balance between the security and convenience of information. According to the US Bloomberg, the cloud computing system, the user will upload information to the Internet, encrypted by the server storage, and the encryption mechanism itself has enough levels, to prevent the identification and update capabilities, is questionable.
"Cloud computing is characterized by hosting things to someone else, and logically losing control and guardianship," said a senior cloud computing expert at the Global Times. In this case, you protect it with high technology, which is less secure than it is in your own hands. Now hackers can break the internet, the cloud can also be breached. It could be a hacking, or a leak inside. In addition, cloud security involves link security. For example, the photos of Apple mobile users to the cloud, in fact, is to send photos to the United States server, from China to the United States cable is very long, it is likely to leak the information channel, which is like robbing a cash car than robbing banks easier.
The expert says there are now a lot of cloud-security-related technologies, such as encryption and trusted computing. Through trusted computing, users can ask cloud operators to host data to a server in a computer room, and if someone moves your data, you can detect it. Even so, cloud security is relative. Internet companies want to take away your information without technical barriers. The benefits of cloud computing are cost savings, but core business data or personal privacy is not currently recommended for hosting to the cloud.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.