How cloud times weigh the benefits and risks of cloud computing (1)

Source: Internet
Author: User
Keywords Cloud computing cloud services cloud security cloud security
Not long ago, a researcher at the Eli Lilly pharmaceutical company needed to analyze a lot of data quickly. If the analysis turns out to be what he thinks, the company will have a drug that is unparalleled. The only trouble is that the researchers needed 25 servers to handle the huge data, and he knew it would take three months to apply for investment. In an industry with high product delays, Adrian Seccombe, a former global security manager at Eli Lilly, said the company's drug delays cost $150 a second, and it could be thought how expensive three months ' wait would be. The benefits of cloud computing Seccombe continued: "The researchers are looking for an IT technician who has been dealing with the cloud." He pulled out his credit card, plugged into Amazon network services, and started running 25 servers in the cloud within one hours. "Then two people realized that the server was being built incorrectly, so they had to stop running and start over again." The second time, they took 40 minutes to start the server and let it run. "They've been working on this data within two hours," Seccombe said. The study time was suddenly shortened from three months to two hours. "This thing is not over yet." When they realized that the analysis could not be completed before they came home, they were able to prepare for more server acceleration data processing. "They want to take the data back from the cloud because they worry about the data spending the night in the cloud. "They finished the task and needed to pay Amazon 89 dollars." If 150 dollars per hour, three months of waiting will cost more than 1 billion dollars. Cloud computing services: Weighing risks and facilitating this cost comparison is unbelievable, and it embodies the absolute power of cloud computing. But for Seccombe, this example highlights some of the problems of the model, highlighting the risks of some cloud computing. "They safely sent the data back to the company using End-to-end security lines (the company--amazon Cloud). This is safe and fast. "Is that so?" How did they prove that the Amazon Cloud didn't disclose their data? They can only trust Amazon's word. This is just one of many problems with cloud computing, software Services (SaaS), and the emergence of new syndication models that rely on companies to share their digital assets. This is why Seccombe, as a member of the Jericho Forum, a security think-tank, has been working with others, and wants to propose a framework that describes how cloud computing can be done effectively and safely. The result of this work is a three-dimensional cube that graphically describes key security decisions that can be referenced when companies decide which tasks to deliver to the cloud, which tasks should be tightly regulated, and how to make these different methods work together. Over the past six years, the Jericho Forum has challenged the traditional idea of information security and described a "non-side(deperimeterized) "The specific requirements of the world." In their new thinking, fixed and clear boundaries are replaced by the liquidity and cooperation of the enterprise. Two years ago, Jericho released the Cooperative Guidance Architecture (COA) guide, which defines how the system can collaborate without impacting security. Now it wants to further describe the security requirements of cloud computing. The results of this latest practice present some challenges for the security industry, but also provide interesting opportunities for those who have insights to overcome these difficulties. Cloud collaboration Model The idea of the team is that the cloud can combine multiple methods depending on the level of control required by the process. The cloud collaboration model looks like a cube of Rubik cubes, each side of the cube has four faces, so there are eight separate cubes that represent different types of work. The length and width of the cube are: Open/dedicated (open/proprietary) marginalized/non-marginalized (perimeterized/deperimeterized) internal/external (internal/external) 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' style= ' width:541px; height:415px "border=" 0 "alt=" "src=" Http://images.51cto.com/files/uploadimg/20110628/1010520.gif "width=" 671 " height= "508"/> The purpose of this model is to help companies categorize business processes and ultimately plan the system architecture needed to take advantage of the benefits of cloud computing services. "It's a mistake to think of a cloud as something," Seccombe said. "You can use the internal private edge of the cloud, you can also use an external, open, non-marginalized cloud." "Within the Eli Lilly Company, we're trying to determine where we should be doing business." For example, by concentrating the materials of a drug, we may not use an open, external, or marginal cloud. This is more like a dedicated, marginalized, internal cloud, although using the possible cloud technology, I have more control. "The key to progress is to establish an effective security interface between the seed clouds so that the business in the cloud can be seamlessly docked and the necessary services are established to take effect." One, for example, can be an independent data verification service, which checks the returned data after the cloud task completes. "It's not that we don't believe in Amazon, it's a separation of responsibilities," he said. "You don't want auditors to provide you with this kind of service." "1 2 Next page >> view full textContent Navigation page 1th: Benefits of Cloud 2nd: detailing the Jericho "cloud" text: How the Cloud age balances the benefits and risks of cloud computing (1) Return to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.