The first task of cloud security: building a good faith system

Source: Internet
Author: User
Keywords Integrity cloud terminal through can

Cloud computing and large data has become an irreversible development direction in the field of information technology, while cloud security has become a difficult problem in the development process, which has seriously hindered the promotion of technology and the acceptance of users. It is noteworthy that the cloud computing security problem is largely manifested in the trust system for cloud terminals and cloud platforms.

Cloud Terminals-the first security threat portal

in the cloud computing environment, cloud terminals form the portal of the first security threat to the cloud platform. Liu Jinwei points out: Compared with the general-purpose computer platform, cloud terminals have their own characteristics are very different: it is the application-centric, there is a specific application scenarios, hardware design freedom, cloud terminal hardware can often be independently designed, the system software and hardware design flexible, with the ability to cut; cloud terminals tend to function, reliability, cost, volume, Power consumption and so on strict requirements.

While traditional terminals or traditional PCs are used, user roles, applications, and operating systems are effectively isolated through a physical shell. And now, through the terminal desktop, these roles and applications, the operating system into another environment, through people mapping to different devices.

Each cloud terminal is a computer that has no substantial changes to the physical computer we use, just the ability to change it, or delete some unwanted equipment, which leads to a terminal security problem. At present, enterprises are also seeking to establish some security within the terminal to ensure that the cloud terminal can be trusted. The

Cloud platform urgently needs to build trust relationships

On the other hand, with the development of enterprise data center and mobile terminals, many enterprises now set up a data center within the enterprise, and employees can access the information of the enterprise with mobile phone or another computer. In this way, the enterprise with a lot of strength to build enterprise internal security protection, as if suddenly ineffective. Because in this process, the information security management of the enterprise brings new insecurity factor and challenge.

Zhang For example: "The so-called cloud computing, is to concentrate resources, such as telecommunications, unicom, mobile room, there will be many companies machine." So how to ensure that the cloud platform is to believe that a certain machine? Anyone in uniform can move a machine to the cloud data center, maybe he installed some software in the server, it accidentally becomes a part of your cloud resource management, you may put the virtual machine safe operation on this unfamiliar platform.

with existing technologies, you can build a trust relationship between servers through group signing. However, these trust relationships are now available only through software, and in the future they will be built on hardware.

The building of a good faith system is critical

In addition, the current integrity of cloud computing applications has not yet been established, which has become a cloud security problem. As the director of the China Electronics Society, Lou Thrifty said: "If our management model is to block the development, this will inhibit the application of cloud computing." If the information on the Internet is not guaranteed to be reliable, good faith, and can not promote the application of cloud computing, so the construction of integrity system is also extremely critical. The

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.