The similarities and differences and challenges of cloud computing security and traditional security

Source: Internet
Author: User
Keywords Security cloud computing security

The similarities and differences and challenges of cloud computing security and traditional security

Why do we say cloud computing security is not the same as traditional security? Now let's look at their similarities and differences. The same point: the first goal is the same, the protection of information, data security and integrity, the second protection object is the same, protection of computing, network, storage resources security; The third technology is similar, such as the traditional encryption and decryption technology, security detection technology. Different points: For example, the security problems caused by cloud computing service model, the technology and management problems caused by virtualization.

What are the security threats that cloud computing security faces? Mainly from the technical, management and legal risk three aspects. Challenges include:

1. Data concentration, aggregation of users, applications and data resources more convenient for hackers to launch centralized attacks, once the accident has a wide range of effects, serious consequences.

2. Traditional protection mechanisms based on physical security boundaries are difficult to apply effectively in cloud computing environments.

3. Cloud based business model, the protection of data security put forward higher requirements.

4. Cloud computing system is very large, when the fault occurs, if the rapid positioning of the problem, the challenge is also very large.

5. The openness of cloud computing puts forward new requirements for interface security.

6. In terms of management, the challenge lies in the right to management, the management and ownership of cloud computing data are separated, such as whether public cloud services provide some highly privileged management of suppliers, and the need for security to be agreed between companies and service providers, as well as some issues of synergy and management. For example, when the attack of the linkage, the operation of the management model put forward some requirements, as well as regulatory challenges.

7. The issue of legal risk is primarily regional. Cloud computing application has caused the regional weak, the information fluidity is big characteristic, in the information security supervision, the privacy protection and so on may have the legal risk.

Summary

Virtualization and security are two of the most closely related technologies associated with the emergence of cloud computing concepts, and the two are closely linked, virtualization to the security of rethinking and building natural conditions, in turn, security technology for virtualization dynamic protection can accelerate its deployment and enterprise acceptance of the pace, they will greatly promote the rapid development of cloud computing. If the cloud computing boom, which technology is the most calm, the first push security. It is because of the industry, the user's near-harsh concerns, so that the development of cloud computing security is pragmatic, but also very practical. Regardless of enterprise and user's acceptance of cloud computing, is the need for cloud effect, or security really let the enterprise relieved, the reality is cloud computing security maturity still have a great distance, apply an idiom "cloud computing has not been successful, security still need to work hard." ”

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.