December 17 News: Since the advent of the Internet in 1968, it has been affecting and changing the course of human development. After entering the 21st century, the Internet becomes more and more important, and obtains the rapid development. While bringing convenience and efficiency to human beings, security issues have been plaguing the development of the Internet. According to the data reported that only domestic, the annual network security problems caused by the loss of up to 7.6 billion yuan.
2011, the Chinese Internet is facing another new change, cloud computing will lead http://www.aliyun.com/zixun/aggregation/32594.html "> The next generation of Internet development trend, the Chinese Internet will enter the" super operation " Big Data "era, security issues will also face greater challenges.
Recently, China IDC Circle reporter on cloud computing security and other issues with several well-known domestic security experts to Exchange (http://www.idcquan.com/special/2011idc/2011interview/), Discuss the security issues and challenges that future cloud computing faces.
"Cloud security is an important issue and a major obstacle to the development of public clouds," said Jiangian, a computing and cloud computing expert at the Chinese Academy of Sciences. However, it is also important to note that not all calculations have high security requirements. As long as it does reduce costs, there will still be user attempts. In addition, all computer systems have security problems, so it is not a unique product of cloud computing systems. Of course, better cloud security schemes will attract more conservative users.
Tianjin Kai CEO Wang said: "Some people say that security is the" Original Sin "cloud computing, because we have the right to data ownership changes, the original whether the enterprise or individuals are in the machine hard disk, is controllable. But now we're using the cloud to put data resources in another place. But there are two levels of security, one is technically, I think can be solved, because whether the individual or the enterprise built their own data center against the risk ability is very poor, there will be no 24-hour power supply configuration, will not have all the operation of these safeguards, that reliability will not be so good , and it's obviously not going to be as perfect as the anti-virus attack. Second, the industry's process rules and even laws, we very much want to through the IDC circle and related associations and other voices, call on the country can have some certification in this respect, or there will be some law or industry rules. Security this issue, one is hardware, one is human. ”
Ninko CTO Shen Zhijie said: "If you want to protect corporate information in the" cloud "security, first, there must be a broad, credible and robust cloud computing architecture; second, the" public cloud "and" private cloud "should be developed in tandem, and the common cloud needs can be made up of" common clouds ", while important confidential information should be placed on" Private cloud. ”
"The security system of the cloud Computing data center should include security protection in the following parts: 1. Cloud computing Data Center perimeter physical boundary protection, 2" cloud computing data Center virtualization platform itself security protection, 3 the security protection of multi-tenant business environment. ”
"Network security under cloud computing-that is, cloud security-is mainly divided into two different perspectives," said Li Na, director of the NSFocus Mss/saas Management Center. A security environment to protect the cloud, to ensure the security of network facilities and information under cloud computing, and the other is to adopt the cloud architecture model, build the cloud environment of security protection facilities, and provide safe delivery for the enterprise in a cloud way. Although the two surfaces are different in object-oriented and objective, however, in the actual security construction, the two are mutually integrated and coordinated, can be summed up in one sentence, that is, "cloud security to protect the security of the cloud." That is, traditional security devices require a greater degree of improvement (such as virtualization, performance tuning, Distributed deployment centralized control, etc., to adapt to the deployment of cloud computing environment, while also building a cloud-safe system, and the use of Mss/saas and other delivery methods, to user terminal/or customer terminal environment to provide security capabilities. ”
Anhui New software market development director Xuhang said: "Cloud security is an important part of cloud computing, no matter what service based on the cloud must consider the protection of enterprise information in the" cloud "security issues. In order to ensure the security of enterprise information in the cloud, first of all, we need to establish a solid cloud computing architecture, and secondly, "public cloud" and "private cloud" should be coordinated development, in the "public cloud" in the overall protection and information collection, and in the "Private cloud" in the directional protection and ”
More exciting views and interviews will be shared with you.
Believe that, as more and more netizens to the network security awareness of the continuous improvement, as well as security manufacturers of "security" tireless pursuit of the cloud computing security environment will be greatly improved.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.