How cloud computing is safe to fall

Source: Internet
Author: User

  

Editor's note the establishment of the Central network security and Information Technology leadership group, China's information security attention to the level of unprecedented new heights. How should government procurement match the national will, from the source of information system construction to put good safety? At the second China International cloud computing Technology and Application Forum held on March 4, the senior domestic information industry experts, scholars and manufacturers representatives have made suggestions to share the huge opportunities brought by cloud computing and large data. It also indicates the hidden danger and risk of network insecurity. It was generally agreed that to solve the problem of information security and build a credible, controllable and manageable network security environment, we could better promote the healthy development of China's information industry.

The actual application of cloud computing begins with the use of redundant computing resources from Amazon, which is now widely used in the mining of commercial potential. But whether cloud computing is suitable for large-scale application in the field of E-government and the key industries involved in the national livelihood, how to build a safe and controllable e-government platform, improve the vigilance of information leakage, test the wisdom of governments.

Recently, German Chancellor Angela Merkel proposed to establish an independent communication network in Europe, to avoid e-mail and important information between EU countries to pass through the United States, which once again explains the "Prism Gate" incident, alarmed the governments of the network information security attention.

Integrated planning for on-demand deployment

The experience of foreign governments in e-government construction is worthy of our reference. Countries in Europe and the United States in the establishment of information network at the beginning of the importance of data ratings, in order to determine what data can be shared, which data need to be highly confidential, and to prepare for a rainy day, in advance to be vulnerable to network attacks or data loss or emergency plans.

At present, many provinces and cities in China are speeding up the construction of intelligent cities and e-government, but some local governments are not aware of the hidden dangers of information security, in addition to the rapid development of cloud computing and large data, there are problems of blind construction and repeated construction.

Hongren, deputy director of the National Informatization Advisory Committee, pointed out that in the construction of e-government cloud in our country, it should not be used as a reference to explain the importance, necessity and urgency of cloud computing because of the different national conditions. Even from a business point of view, cloud computing does not necessarily mean a huge economic benefit, and should be deployed in real terms.

Zhou, general economist of the Ministry of Industry and Industry, thinks that if China wants to make a breakthrough in cloud computing and large data, it must first strengthen the planning Guide and reasonable layout, plan the development of the national cloud computing infrastructure and cloud computing service industry, and support the formation of cloud computing applications with regional characteristics and industry characteristics.

Build standards are available according to

Security is a major problem in the spread of cloud computing. There is a view that if China's IT industry to achieve the entire industry chain of independent intellectual property rights, with the core components of the development and manufacturing capabilities, you can ensure that the source of cloud security.

"The realization of independent intellectual property rights can not 100% guarantee information security." Supurao, a researcher at the Institute of Software Studies of the Chinese Academy of Sciences, does not agree with this, "only the establishment of scientific cloud computing, cloud Security industry standards, the strengthening of trusted computing as the core of independent intellectual property technology, product research and development, strengthening information technology product evaluation Technology system construction, to make the network information "

Ministry of Electronics Five Certification Center technical Director Liu Xiaoyin is using statistical data to explain the "unsafe" factors: human factors accounted for 52%, natural disasters accounted for 25%, and the proportion of technical errors only about 10%.

"Taking the US e-government experience as an example, although the United States has mastered the core information technology and products, but the government website will still be attacked, so only from the point of view of hardware equipment to solve the security problem is clearly not comprehensive, must establish a rule and order." "Liu Xiaoyin said.

Fortunately, the Ministry of Industry and Software Services department director Chen Wei revealed in the forum, the Ministry of the Organization of Standardization agencies and experts compiled cloud computing Integrated Standardization technology system, has now formed a draft.

Zhou also said that the Ministry of Industry to promote the rapid development of cloud computing from five. Among them, to strengthen the planning and guidance and rational layout, the overall planning of the national cloud computing infrastructure and cloud computing services industry development, strengthen the standard system, organize the cloud computing and service standards for the establishment of cloud computing standards system, is the most participants are concerned about two aspects.

Security issues do not stop the application of cloud computing to improve people's lives. The popularity of cloud computing and the resolution of cloud security, it is necessary to rely on the scientific and realistic top-level design, in order to respect the objective law of the market to determine the flow of resources, with the help of standardization, standardization, dynamic security management and control means, can finally form a credible, controllable and manageable network security environment and improve the healthy industrial ecological chain

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.