Talking about cloud computing from icloud pornographic door

Source: Internet
Author: User
Keywords Cloud computing US Sheng

Recently, Hollywood 101 actress nude photos on the internet, "icloud cloud storage Black" was suspected to be the "Hollywood pornographic door" culprit. This not only aroused the "who is not" of the public debate, but also the "cloud storage" security has been questioned. Cloud computing as a "disruptive technology" to change the future, to provide users with a lot of convenience, but also faced with the illegal intrusion, theft and other security challenges. In response to the concern of netizens about cloud computing security and the development of domestic cloud computing market, we interviewed the cloud Computing standards Committee members, Sheng product Operations Center General Manager, Cloud Products Committee Chairman Nie Song.

1, Nie, first of all thank you for your acceptance of our interview. In response to the icloud pornographic Zhao door reflects the problem, ordinary users can take measures to protect the cloud of personal privacy and other information?

This topic is very hot recently, attracted countless technical otaku interest.

From the cloud-oriented customers, I will be divided into two categories, one for the end user, that is, c users of cloud computing, ICloud, Baidu Cloud disk, and even NetEase mailboxes belong to this category;

Another class for enterprise users, that is, b users of the cloud computing platform, Sheng, Aliyun belong to this category. The two are similar in technical architectures, with different service objects.

As a cloud platform for the C-terminal icloud, there are many aspects of the attack, such as the use of the icloud Find my IPhone API, a vulnerability to the dictionary attack cracked. Find My iphone service allows an attacker to try the password for an unlimited number of times until the correct password is found.

As a cloud computing service provider, it is very regrettable that such problems have arisen. However, this is a learning process, the platform will become more and more secure and reliable.

What we usually do for users is to prevent the use of simple passwords, multiple backups of important data, and local encryption of sensitive data. And, okay, don't shoot nude pictures, haha.

2, the rise of internet entrepreneurship in recent years, more and more small and medium-sized enterprises, entrepreneurs use cloud computing services, in order to circumvent the network risk, data security, what do you suggest?

That's a good question.

Security, technical risk in the final analysis, not only the cloud computing platform of their own things, or the things of our users.

For IaaS providers like Sheng, which are essentially responsible for operating systems, hardware, and networking, the security aspects of the application level above the operating system need to be shared by customers and application software providers.

This is good to understand, just as cloud computing for you to install the Windows system, but you installed a QQ in the system, but your QQ was stolen number, this should find who? Can you find Microsoft? obviously not; You either report to the police or complain that Tencent's products are not being prompted.

Cloud computing is the same, what does that mean? We have installed an operating system for you, whether it be Windows or Linux. Then Windows, Linux out of the problem to find us, the hardware is bad to find us; However, you installed a database in Windows, put some data in it, but your database itself has a loophole, was hacked, that is the responsibility of the database products, if your password is too simple to break, it is the customer needs to bear.

With this in clear, it's easy to do what the user does: Take care of all the security on the OS, and we'll be responsible for all the security under the OS. In the sense of responsibility, the distinction between our responsibilities and your use of IDC is the same. Just as a professional cloud computing service provider, we have more security protection capabilities below the OS than traditional IDC.

3, not long ago, cloud computing giant Microsoft Azure, Dropbox and so on also occurred the downtime event. It is understood that 2012 Sheng also occurred in this kind of event, the two years Sheng security, stability, there is no improvement?

Yes, we had a loss of user data in 2012 and caused a very bad impact. This is the price of youth. Cloud computing is about providing highly reliable, highly available products. In fact, there is a problem of reliability and usability that can be avoided in the early stages of any cloud computing business. For example, one of our peers in Shanghai had 4 consecutive hours of inaccessible problems this May.

Fortunately, after nearly two years of development, Sheng, from IDC reinforcement, IDS design, vulnerability scans, and any problems affecting reliability, has long crossed the initial reliability pit. Because our products and personnel are dealing with similar things every day, in fact, machines, networks, IDC, the type of problem is so much, basically we have passed the bridge, such as DDoS attacks, ARP attacks, server board damage, disk damage, backbone network link errors, etc. We all have the most reasonable solutions to these problems.

Thus, the conclusion is that we are becoming more mature in terms of products, mechanisms and coping strategies, and our customers are growing in scale, and our record and reputation for reliability, usability and so on are constantly increasing.

4, for users, how to reduce the impact of downtime events?

Simple answer:

One, multi-point deployment.

Second, the system uses the horizontal expansion structure.

Third, important data use highly reliable products.

5, the Chinese Internet to promote free mode, for domestic and foreign cloud computing market frequently set off price competition, how to view? Will there be a free model for cloud computing in the future?

Price competition is a trend, on the one hand because the hardware cost is reduced, on the other hand, as the scale expands, the marginal cost is getting lower, which is advantageous to the big cloud computing platform to carry on the price war.

But after all, the resource-type business, IDC, server, bandwidth costs are operators to charge, and expensive; free mode is hard to come by in the foreseeable future. And as to B business, there is no need to go free mode.

Sheng has a very competitive advantage since it opened, by keeping a 60 percent discount on the market.

6, facing the domestic cloud computing market increasingly fierce price war, Sheng have relevant coping strategies?

As I said before, Sheng as the first domestic on-demand cloud service provider, since the official start to maintain a 60 percent discount, we will maintain this discount. Currently we are still one of the most cost-effective cloud computing platforms.

We studied the peer free, price reduction measures, I can only say that the water is too large, such as a so-called 0 yuan Cloud host, in fact, this 0-yuan low distribution model will be low to no one will use. And more than the so-called package bandwidth price is indeed higher than our 100%! You know, for a software/website, the cost of bandwidth usually accounts for more than 50% of the total cost, which means that if you use more than the so-called package, the total cost will be 25% higher than the grand cloud.

Using cloud computing is definitely a formal, long-term operation, the so-called "package" will not meet your requirements, you must consider your long-term operating costs.

Sheng Price system is a standard price system, basically the entry-level price and long-term price is the same, so that can give customers the same expectations, concessions, real.

7, under normal circumstances, which business is more appropriate to use cloud computing?

Internet business, including games, E-commerce, new business, including online education, large data analysis, internet finance and so on, the traditional industry Internet transformation, including chemical industry, biotechnology and so on, are already beginning to use cloud computing, and the use of more and more.

Using cloud computing is very simple, I take Sheng as an example, you go to Sheng (http://www.grandcloud.cn/) with 2 minutes to register an account, filling 100 yuan. In the Cloud host Control Panel, spend 5 minutes to apply for a 34.7 microcomputer, you can use 3 months. Of course, the formal business is required to apply for a higher number of models. But in any case, you need very little cost and time.

8, small and medium-sized enterprises, entrepreneurs using cloud computing services has become a trend, the trend for them, the advantages of using cloud services?

The advantages are very large, I recently in the park and a variety of conferences lectures mainly talk about "cloud entrepreneurship", by many entrepreneurs, it peers are welcome. Specifically:

Cost advantages, our statistics show that customers use Sheng TCO cost savings of more than 50% than the purchase of the server, the initial input of more than 97% savings.

Second, the time advantage, use cloud computing 1 days can above hand, 3 days can migrate, 5 days can be officially operated. Own procurement server, not a month or two is down.

Third, the business model advantages, the use of cloud computing can really do on-demand pay; This allows customers to also turn the business model into an on demand model.

Four, the operational dimension advantage, cloud computing nature is specialized team to be responsible for specialized product and operation dimension, this with oneself to carry out a dozen to carry the dimension a pile of machines, network, operating system is not the same.

Five, security advantages, Sheng IDs System, choose one of the best room in the country, user isolation, two-layer isolation, security groups and other technologies to ensure that we are the most secure one of the cloud computing platform.

In short, cloud computing to this stage, the use of cloud computing to start a business, two of startups should be the IT leaders to consider and choose.

Cloud computing is considered to be a change in the future of "disruptive technology", with its own unique advantages, the Internet companies, entrepreneurs respected. At the same time, with the popularization of cloud technology, the object of network attack has spread to cloud from PC end and mobile end. Cloud service does not mean absolute security, and it, like all IT systems, faces a small probability of hacker attacks on security issues.

Icloud Yan Zhao door to everyone sounded the alarm, involving private photos, nude photos and other personal private information, if you do not want to let others see, either do not film, or do not put on the Internet.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.