The first task of cloud security: building a good faith system
Source: Internet
Author: User
KeywordsIntegrity cloud terminal through can
Cloud computing and large data has become an irreversible development direction in the field of information technology, while cloud security has become a difficult problem in the development process, which has seriously hindered the promotion of technology and the acceptance of users. It is noteworthy that the cloud computing security problem is largely manifested in the trust system for cloud terminals and cloud platforms.
Cloud Terminals-the first security threat portal
in the cloud computing environment, cloud terminals form the portal of the first security threat to the cloud platform. Liu Jinwei points out: Compared with the general-purpose computer platform, cloud terminals have their own characteristics are very different: it is the application-centric, there is a specific application scenarios, hardware design freedom, cloud terminal hardware can often be independently designed, the system software and hardware design flexible, with the ability to cut; cloud terminals tend to function, reliability, cost, volume, Power consumption and so on strict requirements.
While traditional terminals or traditional PCs are used, user roles, applications, and operating systems are effectively isolated through a physical shell. And now, through the terminal desktop, these roles and applications, the operating system into another environment, through people mapping to different devices.
Each cloud terminal is a computer that has no substantial changes to the physical computer we use, just the ability to change it, or delete some unwanted equipment, which leads to a terminal security problem. At present, enterprises are also seeking to establish some security within the terminal to ensure that the cloud terminal can be trusted. The
Cloud platform urgently needs to build trust relationships
On the other hand, with the development of enterprise data center and mobile terminals, many enterprises now set up a data center within the enterprise, and employees can access the information of the enterprise with mobile phone or another computer. In this way, the enterprise with a lot of strength to build enterprise internal security protection, as if suddenly ineffective. Because in this process, the information security management of the enterprise brings new insecurity factor and challenge.
Zhang For example: "The so-called cloud computing, is to concentrate resources, such as telecommunications, unicom, mobile room, there will be many companies machine." So how to ensure that the cloud platform is to believe that a certain machine? Anyone in uniform can move a machine to the cloud data center, maybe he installed some software in the server, it accidentally becomes a part of your cloud resource management, you may put the virtual machine safe operation on this unfamiliar platform.
with existing technologies, you can build a trust relationship between servers through group signing. However, these trust relationships are now available only through software, and in the future they will be built on hardware.
The building of a good faith system is critical
In addition, the current integrity of cloud computing applications has not yet been established, which has become a cloud security problem. As the director of the China Electronics Society, Lou Thrifty said: "If our management model is to block the development, this will inhibit the application of cloud computing." If the information on the Internet is not guaranteed to be reliable, good faith, and can not promote the application of cloud computing, so the construction of integrity system is also extremely critical. The
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.