How to view the security problem of cloud computing

Source: Internet
Author: User
Keywords Cloud
Cloud computing is a new way of sharing infrastructure that can connect huge system pools together to provide a wide range of IT services. Cloud computing is the Super computing model based on the Internet. The pooling of information and processor resources stored on personal computers, mobile phones and other devices to work together.




Is it necessary to
cloud computing? Let me give you an example of this. In the past, people own wells, each drink water, to meet their needs can be. But as the population more and more, the demand for water is more and more, at the beginning, their home is not enough can go to the neighbors to borrow some, but always enough words can not borrow, and water resources distribution uneven, some people are thirsty some people support, this How to solve? To this end, the government unified the water resources, to build a water pipe to each household, the home on demand, and pay on demand, this is what we call tap water. In short, cloud computing is like this tap water. It provides IT resources as services, and almost all IT resources can be delivered as cloud services: Applications, computing power, storage capacity, networking, programming tools, and communications services and collaboration tools.





almost all IT resources can be delivered as cloud services: Applications, computing power, storage capacity, networking, programming tools, and communication services and collaboration tools. Cloud computing has the advantage of being low-cost and efficient. In many cases, a variety of institutions and individuals prefer to buy "calculations" as a service, and companies that are already building hyper-distributed data centers will choose to provide this infrastructure as a service, without exception. Cloud computing is a trend that is unstoppable, as well as the water that has become today's tap.





since the deployment of cloud computing is imperative, then we will be fully prepared to meet the cloud computing! However, in the process of deploying the cloud, security issues should not be underestimated. When it comes to cloud computing, the reality of security debate seems to have never ceased.





Cloud computing security issues are broadly divided into three areas. First of all, cloud computing service providers are their networks secure, and are there any other people who break in to steal our account? Are they providing safe storage? These are the problems that cloud computing service providers have to address and promise to users. Second, the services that users use in cloud computing are also to be noted: balance the security of the cloud service provider with the security of its own data, too important data not to be put into the cloud, but hidden in its own safe, or encrypted and then placed in the cloud, only to decrypt the data, Keep the security initiative firmly in your hands, without relying on the service provider's commitment and their actions. Third, users have to keep their accounts, to prevent others from stealing your account to use the services in the cloud, and finally let you pay the bill. It is easy to see that the technology and services used in cloud computing can also be exploited by hackers to send spam, or to launch more advanced malware attacks against downloads, data upload statistics, and malicious code detection. Cloud computing security technology is the same as traditional security technology: cloud computing service providers need to use a firewall to ensure that no unauthorized access, the use of anti-virus software to ensure that the internal machine is not infected with intrusion detection and defense equipment to prevent hackers; File content filtering prevents sensitive data from being stored in a relatively insecure cloud.




Several core problems of
cloud security


Identity and Privilege control: large numbers of users lack confidence in cloud computing, first because of concerns about usage rights and administrative permissions in cloud mode. In the virtual, complex environment, how to ensure that their applications, data is still clear and controllable, this is both the user's problem, but also the cloud service provider issues, and this is the information security sector to see more clearly. Therefore, the identity and privilege control solution becomes one of the core issues of cloud security. Authentication control solutions have been able to basically cover all business processes and most business directions, while simplifying authentication management and hardening End-to-end trusted access will be one of the next phases of development.





Web Security Protection: In the cloud computing model, Web applications are the user's most intuitive experience window and the only application interface. In recent years, a variety of web attacks, it has a direct impact on the smooth development of cloud computing.





Virtualization Security: Virtualization is one of the most important technical support for cloud computing and one of the hallmarks of cloud computing. The result of virtualization, however, is that many traditional security measures fail. Technically speaking, the biggest difference between cloud computing and traditional IT environments lies in its virtual computing environment, which makes its security problems extremely "tricky". The computation of virtualization makes the interaction between application processes more elusive; Virtualized storage makes data isolation and removal difficult to measure; The virtualized network structure makes the traditional domain protection difficult to realize, and the virtualization service delivery mode makes the identification of user's identity, authority and Behavior, Control and auditing become extremely important.




Faced with the security of cloud computing,
now has a number of security offerings based on cloud services, including web and mail filtering, network traffic access control and monitoring, and tagging for payment card services. One important difference between the different security services is that some are "in the cloud" and some are "targeted at the cloud", that is, those security services that are integrated into the cloud environment as virtual devices are provided to users and controls. When choosing a cloud security service, communicate with your service providers to find out what they can provide and what they want, and it's best to sign a service agreement that will help reduce the risk of your business.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.