Information security in large data and cloud environment

Source: Internet
Author: User
Keywords Information security large data cloud environment

The Dictionary of Information Security was published by Shanghai Dictionaries Publishing house The book, compiled by the Institute of Information, Shanghai Academy of Social Sciences, analyzes the new challenges facing global information security, from information security, information security threats and information security policies, laws, standards, institutions, technology, industry, education, research and 10 other aspects, This paper makes a comprehensive analysis and carding of the information security problems at home and abroad.

Information security is ushering in the new risks and challenges of the big data Age and cloud computing environment, the information security in this new environment, although with the past information security has a historical logic, but the formation of a number of features, its risk chain, risk areas and risk degrees have a lot of new changes, showing a hidden relevance, cluster risk, It is necessary to strengthen the research on the characteristics of ubiquitous fuzziness, cross domain infiltration and intersection complexity.

The hidden relevance of information security. Interconnection is a new feature of the development of modern Internet. In large data and cloud environments, whether you are willing or informed, once all kinds of information are entered into the interconnection coverage, through the large data analysis and data mining, countries and regions, institutions and enterprises, individuals and families of all kinds of information will likely become the object of calculation and monitoring, this calculation and monitoring can be used for legitimate needs, may also be used for improper purposes. The risk chain and risk degree of the hidden relevance of this information security are not in the past. The new characteristics of covert relevancy are closely related to the strength of information technology. The great gap between the information technology and the control ability leads the strong person often in the dark and is in the commanding position, but the weak is often in the housetops and is in the vacant unknown passive position, under the surface peaceful tranquility or latent information security infringement threat's turbid wave undercurrent. The disclosure of the U.S. National Security Agency's surveillance of Brazil and the Canadian Communications Security Agency's monitoring of senior Brazilian officials reflects the hidden relevance of information security and presents a new change in the risk chain of information security.

Second, information security cluster risk. We are ushered in the era of large data, but the higher the level of social information, the more integrated cluster, the more digital, networked, intelligent, giant quantization, accompanied by the information security risk greatly improved. In particular, China in the sensor technology and other key technologies and high-end equipment is also subject to the developed countries, the Internet of things and intelligent city construction process There are many information outsourcing security risks, information security legal norms are not perfect. In the cloud cluster environment, under the background of huge data aggregation, there are potential new risks of information leakage, runaway control and big leak. The storage location of cloud data and the access rights of huge amount of data have become a new problem of information security. Once the form of information clustering is lost, it will bring immeasurable loss to the country, institution and individual. At the end of 2011, 6 million of users in the Chinese programmers Community CSDN website leaked information. In recent years, there have been millions of information leaks and large amount of network crime cases, the large data and cloud environment of information security risk degree is not comparable.

Third, the ubiquitous fuzziness of information security. Large data and cloud computing have changed the information security in the past is limited to the system carrier situation, but presented some characteristics of information socialization. From the rapid development of mobile Internet, from the perspective of the smart wearable technology and the wearing of computing equipment, the new form of mobile ubiquitous information produces huge volumes of flowing large data, mobile data and social data, these ubiquitous cloud collections and massive analyses that make the original information rise to sensitive information, Make the seemingly general data evolve into the strategic resources, make the public information of the past become the security information, and may bring the recessive various contradictions into the explicit social conflict risk. This evolution and transformation before and after the analysis, with the difficulty of distinguishing and certain ambiguity, people's understanding of these problems will also have a gradual process of improvement. Due to the ubiquitous information and liquidity, especially the global root servers concentrated in the United States, Europe and Japan, the Cross-border flow of information, its security boundaries are difficult to define clearly; the public and private information of the individual, the public information of the organization and the core data, the public information and the confidential information of the Government, The free flow of information is intertwined with the illegal spread of rumors, which makes the network security appear the characteristic of ubiquitous fuzziness.

Cross-domain permeability of information security. Unlike the local and partial spillover effects of the traditional security era, in large data and cloud environment, information real-time, Cross-domain, stereo, fusion, cluster storage and transfer and interaction, has and will continue to bring huge global and comprehensive spillover effect, thus forming the information security of the cross-domain permeability characteristics, Its risk domain mainly manifests in two aspects: first, the cross domain, namely the information security has penetrated to all walks of life like the mercury discharge. The other is that the information security has broken through the boundary between the country and the region, and has become a strategic issue concerning global security, Common Security and cooperative security, and has become a major issue of concern to the bilateral, multilateral and global economic and political communities in all regions of the world.

V. The cross-cutting complexity of information security. With the continuous advancement of cultural diversity and social informatization, the boundaries of information and the subject become complex; large data and cloud computing have greatly enhanced this crossover complexity, information security has formed you have me, I have your new form, facing difficulties in the organization cutting and geographical identification of new problems and new challenges, and make the source of information security difficult to judge and pursuit. At the same time, large data and cloud computing make the information originally considered rubbish likely to have important value on the basis of all statistics and deep excavation, and these huge amounts of information exist in the cloud, which is available to all and countries. If not aware of the value of these data, indifferent to it, light will lose the possibility of development opportunities and development space, heavy may be economic security, social security, ecological security and other unpredictable new risks.

Many new features of information security in large data and cloud environment bring many new challenges, but also bring new opportunities for development. China can be a potential, homeopathy and for, using our four synchronous development, intelligent city construction, strategic emerging industry layout, peace diplomacy, the opportunity to advance the national information security strategy of the top redesign, mapping strategy clear, integrated synergy, advanced technology, industry leader, attack and defense, talent optimization, legal system sound, internal and external integrated information security blueprint, to solve the information security challenges of the various risks, with the development of a new vision of network power to achieve national prosperity, national rejuvenation, the people happy Chinese Dream to provide information security new protection.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.