Identity authentication to make cloud services more reliable
Source: Internet
Author: User
KeywordsCloud services security private cloud
The concept of "cloud computing", after several years of operation after Microsoft, has been widely accepted, "private cloud", "public Cloud", "mixed cloud" is gradually known, and even used. For cloud computing, however, security is a major concern for potential users, and a survey by CAS and Ponemon Cato found that most users think cloud computing risks outweigh the benefits.
Information security challenges Cloud era
Cloud computing is a kind of management and business model that relies on the data center to transform centrally managed large-scale IT resources into services to deliver the customer using flexibility, on demand, and on a pay-as-you-go basis, essentially a more automated and flexible outsourced service approach. Compared with the traditional outsourcing mode, cloud computing has the advantages of traditional outsourcing in terms of flexibility, implementation cycle and cost: it can respond to the real economic predicament and the growing pressure of development, reduce the cost and improve the efficiency and flexibility of calculation. It solves many problems, but it also creates many new problems. Today, consumers and suppliers of cloud services face an unprecedented challenge in the cloud era, the security of information, which is also the main reason why many companies remain on the sidelines of cloud services.
Two misunderstandings of cloud security
In the process of cloud computing concept, it is easy to divide the cloud into two parts: "Safe" private cloud and "unsafe" public cloud. Because private clouds are deployed within the boundaries of the enterprise's own data center, it is easy to think of private clouds as safe, and because of the openness of the public cloud, it is generally assumed that the public cloud is less secure. Security has always been considered the inherent benefit of private cloud and the basic flaw of public cloud computing, but the discussion of cloud security boils down to the formula "public cloud is unsafe, private cloud is safe" is too one-sided and simplistic.
A poorly managed, poorly configured private cloud application is also vulnerable to attack, while a properly managed, well configured, security-focused public cloud application can achieve good security. It is harmful to the normal development of cloud environment to describe the private cloud and the common cloud security as black and simple.
Identity Management Guarding Cloud security
The fast, convenient and open of cloud service is the fundamental of its rapid development, but the application of "cloud" can not be used as the price of leaking, security becomes the urgent demand of cloud application. 13 years for the government departments and a number of enterprises to continue to provide "security" of the Ministry of Commerce China International Electronic Commerce Center, Gouffouin Electronic Commerce Security Certification Co., Ltd. experts believe that to ensure that the security of cloud services is the basis of cloud portal identity management, in the area of identity management, CA Electronic Certificate Security certification system Gouffouin in the field of digital certification at home and abroad reputation of the core technology and services, can issue authoritative digital certificates with legal benefits, can safely achieve strong user identity certification. Establishing an "identity-trusted mechanism" through the CA system will be one of the key points in the implementation of "cloud security".
The security, trust, compliance, and transparency of cloud services determine the likelihood that cloud services will be accepted by adults, and the current development and use of cloud computing is growing geometrically. At this stage, the community has basically reached a consensus on the direction of cloud service development, and the subsequent stage of deployment has been jianzaixianshang. Of course, in the deployment of cloud computing, security performance improvement, the industry still need to discuss, but domestic manufacturers in improving security efforts are also to promote the cloud services into a benign development, and obtain the initial affirmation of the market. We believe that a safe cloud will add luster to human life.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.