Security is a big problem in cloud computing

Source: Internet
Author: User
Keywords Cloud computing Cloud computing

Cloud Computing's ability to reduce the cost of IT equipment and to save money on a large scale is the charm of cloud computing and a more economical way to deliver IT services than traditional it. Many models of cloud computing include applications and core it as services, software as a service (SaaS) and it as services (ITaaS).

There have been a number of technical problems that have impacted ITaaS, including manageability, virtualization, security, and billing and recovery, which are key components of four IT services.

For the past 20 years, many of the technical problems that have hindered itaas have been solved, but still remain problems, such as the security issues that have been the subject of great attention, and people do not know how much effort is being made to secure the required level of security.

1. Access speed

The impact of Internet connections on cloud computing may be smaller on some levels. Handling large amounts of data requires a high connection speed between the processing unit and the storage unit. At the same speed, a long-distance connection is always more expensive than a local connection.

In cloud computing, when processing large amounts of data, application software and data will automatically locate the nearest place. The more important the application, the more data is processed and the more likely it is that the data and applications will be closer. For applications that do not require fast processing, or programs with less data, the data may be stored further.

Just as today's IT data centers do not separate the distance between servers and storage by hundreds of kilometers, cloud computing solutions do not separate processing units far apart from processing important applications.

Thus, in most cases, the speed of the network connection will not be a problem, as data and applications will be placed closer to the user and the public ITaaS users of the private ITaaS.

2. Availability and Reliability

The essence of usability issues is the ability of all other technical components required by ITaaS to function successfully. The availability and reliability of services is both a technical issue and a business problem. Technical availability refers to allowing internal service providers and cloud service providers to design solutions that best meet the specific price level. Further, usability is not the level of availability at a particular price, but that's the best way to say it.

Continuous acceptance of service levels and corresponding price differentials continues to improve the maturity of the ITaaS business model. As with local IT services, the cost of each service availability level is significantly higher than the previous level. Service availability grades generally use the number "9" to express. The two "9" service levels represent 99% of the available time, meaning no more than 3 days of downtime per year. 5 "9" service levels represent 99.999% of the available time and no more than 5 minutes per year for downtime.

Currently, many services have only one or two service levels, and cannot make changes to contracts and service levels. Such services are inflexible for many businesses and cannot meet the needs of it consumers for special service levels.

Ultimately, however, as long as consumers are willing to pay for their services, almost any level of availability service will appear. With the increasing number of ITaaS suppliers, contract and price competition will promote suppliers to meet ITaaS users of service levels and prices of different requirements.

3. Safety

To date, security issues remain the biggest concern for potential users of cloud storage. Research has shown that it experts have long considered security to be the most noteworthy issue.

One problem is the lack of control over the network, which is the basis for providing cloud storage and cloud computing resources. As a result, users suspect that data has been stolen or even tampered with. Therefore, sensitive information, such as any login ID and password, should be protected. Most mail and CRM application software providers now provide this security protection in cloud services.

Security generally includes four elements, authentication, authorization, access control, and auditing.

In the past security designs were designed for perimeter security to deny access to external, unauthorized users. In virtualized environments, virtual IT services do not have physical boundaries. As a result, the business must assume that all data transmitted is potentially blocked.

If the system cancels the physical control, it must rely on other reinforcement principles to restrict access to the information. Encryption of information is one of the most important methods that can limit access to useful information, even beyond the level of protection against physical systems. As a result, encryption becomes a critical part of cloud service security.

The problems faced by cloud storage are particularly challenging because the data in the cloud storage must be saved and retrieved in some form of encryption. Once the encryption key itself is lost or corrupted, the data is lost or corrupted. As a result, cloud storage and storage security are more challenging than common cloud security issues.

When transferring data across borders, there are other issues, including access, search and filtering, and other national internet regulations. Europe's policies are very different from those of the United States. Transmission of data to other countries, or transmission of data through other countries, can lead to issues such as litigation, subpoena or national security, thereby affecting the access of Governments or enterprises to data.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.