Trusted and reliable to control cloud computing development needs to cross three "ridge"

Source: Internet
Author: User
Keywords Cloud computing security operating system very

As the IT industry hotspot, cloud computing in the domestic popular for many years, the early and vigorous, almost to the point of the word will be called cloud. In the past two years, with the return of rational consciousness, cloud computing discussion craze gradually cooling, more and more cloud computing products and solutions began to surface, cloud computing is moving towards a pragmatic and landing application period. At any stage, security is always accompanied by the ebb and flow of cloud computing, the hardware and software manufacturers, telecom operators and other industry parties can not avoid the key issues.

"Many people are accustomed to comparing cloud computing to tap water, where users can get and pay for what they want, rather than drilling for water." But, as in the past, people are worried about the security of cloud computing, like the safety of water. "Industry insiders point out that the application of cloud computing and sustainable development of the road needs to cross three" ", that is, users of the cloud computing Model Trust problem, the reliability of cloud computing applications and the cloud computing system itself security controllability. Security is a new application model to gain user trust according to a data from IDC, an international consultancy, the number of Chinese data centers reached 504,155 in 2010, with a market size of $9.2 billion trillion. With the deepening of information construction, as well as the development of cloud computing industry, as of this March, the country has 13 provinces and municipalities have planned about 30 large data center construction projects of more than 100,000 servers, the total investment of the project is as high as 270 billion yuan. Compared with the construction boom of the data center, the application of cloud computing data centers around the world is not optimistic. Media reports point out that many local cloud computing centers are designed to build public or mixed clouds, providing computing resources and services to the public and small and medium-sized enterprises. However, due to the current lack of appropriate users, cloud computing data center usage is not high, resulting in the waste of IT resources and investment. As a new application model, cloud computing has obvious difference compared with the traditional information application, and it is difficult to get the user's recognition in a short time. At the same time, because the user has not fully understood the cloud computing, cannot determine the security risk which exists in it, has the inexplicable concern to the cloud computing security question. Especially for enterprise-level users, business data, intellectual property rights, etc. belong to important data and information, it is difficult to move it from the internal IT system to the external "cloud", in recent years, the various types of data leakage incidents have increased the security of the cloud computing business concerns. Therefore, cloud computing in the public, enterprises and other areas of popular application, but also need to establish a set of cloud computing applications, security, management and other content of the standard system. Standard imperfections affect cloud computing application reliability standards are an important driving force for industrial development, especially for cloud computing, a new information technology and application model, because of related technologies, concepts and so on are constantly enriched and extended, more need to standardize the development of the industry through a unified standard. At present, many domestic and foreign organizations have actively explored and promoted the standardization of cloud computing, only because of the lack of mainstream cloud service provider participation in the open standard-setting work progress is relatively slow. On the other hand, many enterprises based on their own considerations to introduce cloud computing related technologies, products and solutions, resulting in the market of cloud-related terminology, technology, interface and so is not uniform, not conducive to the landing of cloud computing applications and sustainable development. Industry insiders pointed out that cloud computing is not a new information technology, but the integration of virtualization, grid computing and other technologies and concepts of a new business application model,The need for normative development and application of the environment as a support. Without a unified cloud computing standard, it is difficult for users to transfer and share large amounts of data and services between different systems, limiting the scope of cloud computing applications. Moreover, with the rapid changes in the market and the rapid development of IT technology, users need to expand their business, add new business systems, in the absence of standards, the new system and the original business compatibility will be difficult to protect, and ultimately affect the overall IT system reliable operation, resulting in the loss of user it assets investment. All this increases the security risk of users investing in cloud computing information systems. Cloud computing system controllability must be done from the infrastructure cloud information systems are typically divided into three levels, namely IaaS (infrastructure as a service), PaaS (Platform-as-service), and SaaS (software as a service). Among them, the IaaS layer includes server, storage, network and other basic hardware facilities, using virtualization technology for hardware integration and on demand, through the cloud computing environment operating system mirroring for the upper PAAs platform and SaaS applications to provide computing, storage capabilities. This shows that the reliability and security of the IaaS layer determines the normal operation of the whole cloud computing system. As the cornerstone of virtualization application, operating system mirroring is the center of Protection for building a secure cloud computing environment. "At present, China's cloud computing development still exist many problems, the core technology for foreign enterprises, especially in the operating system has independent intellectual property rights of the operating system products are very scarce, financial, energy and other countries lifeline industries adopted large commercial server operating systems such as AIX, HP-UX, Solaris, Most of Windowssever and Linuxsever are from overseas, which is not conducive to the construction of autonomous and controllable cloud computing system and information application environment. Therefore, we must develop cloud computing based on safe and controllable key hardware and software products, accelerate the construction of a safe and controllable industrial system with independent intellectual property rights, and improve the safeguard ability of our country's information security. "Pepper Map science and technology security engineers told reporters that the server operating system is an important data information and core business system of the host platform, more need to strengthen control." Last year, pepper map technology launched a green pepper with independent intellectual property rights of the Host Security environment system (referred to as Jhse), through the operating system of the security subsystem (SSOOS) to restructure and expand to create a high security, high reliability, easy to use the server security operating system, The security control of the operating system is firmly in the hands of the user. Early this year, the Chili technology also based on Jhse products launched a security cloud solution, to solve the cloud computing infrastructure platform for operating system mirroring security problems, for the cloud computing environment to build a controlled cloud infrastructure, to protect the cloud computing information System safe and reliable operation. Industry experts believe that cloud computing security is an extension of the traditional information security connotation, so should not be limited to anti-virus, Trojan and against hacker attacks, but to extend it to the system security, reliability and other aspects, buildA full range of cloud computing security system, for cloud computing landing applications to clear the barriers. As a representative of a new generation of information technology, cloud computing has been widely regarded as the mainstream trend of the development of IT industry in the future, and it will be included in the strategic emerging industries in China. It can be believed that with the user's deep understanding of cloud computing and the increasingly perfect standards of cloud computing, in the government, cloud service providers, information security vendors and other sectors of the community to promote the promotion of China's independent control of key hardware and software products, the application of the pace will be further accelerated, China's cloud computing industry will bloom in various fields Application Flower ".

As the focus of IT industry, cloud computing in the domestic popular for many years, the early stage of vigorous, almost to the point of the word will be called cloud. In the past two years, with the return of rational consciousness, cloud computing discussion craze gradually cooling, more and more cloud computing products and solutions began to surface, cloud computing is moving towards a pragmatic and landing application period. At any stage, security is always accompanied by the ebb and flow of cloud computing, the hardware and software manufacturers, telecom operators and other industry parties can not avoid the key issues.

"Many people are accustomed to comparing cloud computing to tap water, where users can get and pay for what they want, rather than drilling for water." But, as in the past, people are worried about the security of cloud computing, like the safety of water. "Industry insiders point out that the application of cloud computing and sustainable development of the road needs to cross three" ", that is, users of the cloud computing Model Trust problem, the reliability of cloud computing applications and the cloud computing system itself security controllability.

Security is the foundation of new application mode to obtain user trust

The number of data centers in China reached 504,155 in 2010, with a market size of $9.2 billion, according to a data released by IDC, an international consultancy. With the deepening of information construction, as well as the development of cloud computing industry, as of this March, the country has 13 provinces and municipalities have planned about 30 large data center construction projects of more than 100,000 servers, the total investment of the project is as high as 270 billion yuan. Compared with the construction boom of the data center, the application of cloud computing data centers around the world is not optimistic. Media reports point out that many local cloud computing centers are designed to build public or mixed clouds, providing computing resources and services to the public and small and medium-sized enterprises. However, due to the current lack of appropriate users, cloud computing data center usage is not high, resulting in the waste of IT resources and investment.

As a new application model, cloud computing has obvious difference compared with the traditional information application, and it is difficult to get the user's recognition in a short time. At the same time, because the user has not fully understood the cloud computing, cannot determine the security risk which exists in it, has the inexplicable concern to the cloud computing security question. Especially for enterprise-level users, business data, intellectual property rights, etc. belong to important data and information, it is difficult to move it from the internal IT system to the external "cloud", in recent years, the various types of data leakage incidents have increased the security of the cloud computing business concerns. Therefore, cloud computing in the public, enterprises and other areas of popular application, but also need to establish a set of cloud computing applications, security, management and other content of the standard system.

Standard imperfections affect cloud computing application reliability

Standard is an important driving force of industrial development, especially for cloud computing, a new information technology and application model, because of the related technology, concept and so on are constantly enriched and extended, more need to standardize the development of the industry through a unified standard. At present, many domestic and foreign organizations have actively explored and promoted the standardization of cloud computing, only because of the lack of mainstream cloud service provider participation in the open standard-setting work progress is relatively slow. On the other hand, many enterprises based on their own considerations to introduce cloud computing related technologies, products and solutions, resulting in the market of cloud-related terminology, technology, interface and so is not uniform, not conducive to the landing of cloud computing applications and sustainable development.

Industry insiders pointed out that cloud computing is not a new information technology, but the integration of virtualization, grid computing and other technologies and concepts of a new business application model, but also need to have a normative development and application of the environment as a support. Without a unified cloud computing standard, it is difficult for users to transfer and share large amounts of data and services between different systems, limiting the scope of cloud computing applications. Moreover, with the rapid changes in the market and the rapid development of IT technology, users need to expand their business, add new business systems, in the absence of standards, the new system and the original business compatibility will be difficult to protect, and ultimately affect the overall IT system reliable operation, resulting in the loss of user it assets investment.

All this increases the security risk of users investing in cloud computing information systems.

The controllability of cloud computing systems must start with infrastructure

Cloud computing information systems are typically divided into three levels, namely IaaS (infrastructure as a service), PaaS (platform as a service), and SaaS (software as a service). Among them, the IaaS layer includes server, storage, network and other basic hardware facilities, using virtualization technology for hardware integration and on demand, through the cloud computing environment operating system mirroring for the upper PAAs platform and SaaS applications to provide computing, storage capabilities. This shows that the reliability and security of the IaaS layer determines the normal operation of the whole cloud computing system. As the cornerstone of virtualization application, operating system mirroring is the center of Protection for building a secure cloud computing environment.

"At present, China's cloud computing development still exist many problems, the core technology for foreign enterprises, especially in the operating system has independent intellectual property rights of the operating system products are very scarce, financial, energy and other countries lifeline industries adopted large commercial server operating systems such as AIX, HP-UX, Solaris, Most of Windowssever and Linuxsever are from overseas, which is not conducive to the construction of autonomous and controllable cloud computing system and information application environment. Therefore, we must develop cloud computing based on safe and controllable key hardware and software products, accelerate the construction of a safe and controllable industrial system with independent intellectual property rights, and improve the safeguard ability of our country's information security. "Pepper Map science and technology security engineers told reporters that the server operating system is an important data information and core business system of the host platform, more need to strengthen control." Last year, pepper map technology launched a green pepper with independent intellectual property rights of the Host Security environment system (referred to as Jhse), through the operating system of the security subsystem (SSOOS) to restructure and expand to create a high security, high reliability, easy to use the server security operating system, The security control of the operating system is firmly in the hands of the user. Early this year, the Chili technology also based on Jhse products launched a security cloud solution, to solve the cloud computing infrastructure platform for operating system mirroring security problems, for the cloud computing environment to build a controlled cloud infrastructure, to protect the cloud computing information System safe and reliable operation.

Industry experts believe that cloud computing security is the traditional information security connotation of the extension, so should not be limited to anti-virus, Trojan and against hacker attacks, but to extend it to the system security, reliability and other aspects, build a full range of cloud computing security system for the application of cloud computing to clear the ground. As a representative of a new generation of information technology, cloud computing has been widely regarded as the mainstream trend of the development of IT industry in the future, and it will be included in the strategic emerging industries in China. It can be believed that with the user's deep understanding of cloud computing and the increasingly perfect standards of cloud computing, in the government, cloud service providers, information security vendors and other sectors of the community to promote the promotion of China's independent control of key hardware and software products, the application of the pace will be further accelerated, China's cloud computing industry will bloom in various fields Application Flower ".

(Responsible editor: The good of the Legacy)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.