TrustView: Information leak-proof solution under cloud computing

Source: Internet
Author: User
Keywords Cloud computing Solutions

Cloud is one of the hottest concepts in the global IT industry in recent years.

IDC survey data show that cloud computing services will reach 10% of overall it consumption in 2013, with annual earnings of up to $44.2 billion trillion, and 5 annual average growth of 26%, which is 6 times times the growth rate of the traditional IT industry.

Cloud computing will be an unavoidable technology development trend for enterprise-class users in the future. Using the cloud model, users can access the cloud and immediately enjoy cheap, stable computing power resources, this service form will greatly reduce the threshold for individual users to apply terminal equipment, the former desktop computer as the center of Application mode of the PC era is nearing the end.

First, cloud computing challenges

Cloud computing has been widely publicized in the country, disruptive technology means the birth of a new market, but this is not an overnight thing. For the software giant, this is a beautiful new world, but on the other hand, the company is floating in the air of the "cloud" is safe, seems particularly concerned about. Survey statistics, 56.6% of users because of data security and do not recognize the cloud model.

Cloud Computing security key technologies: Trusted Virtual Platform Trust key construction, virtual Terminal remote credibility authentication method, management domain privilege set optimization technology under virtualization architecture, transparent encryption technology oriented to virtual platform, and leak behavior monitoring under VMM architecture. The cloud computing security issues include: 1. Security risk research; 2 data security (Privacy data protection, ciphertext data query, privacy data protection, integrity verification, confidentiality, availability, privacy) 3, Dynamic cloud security services (Virtual machine protection: To prevent data leakage, protect the environment trustworthy, security mirroring management). 4, Security risk supervision (key management and virtual platform binding, on the legitimate platform to read data smoothly, on the illegal platform, unable to read confidential data)

2012 cloud computing farewell to the excitement, into a rational period of development. Cloud ecosystem is beginning to show, cloud computing main face problem exists malware and privacy leak problem. In recent time, information leak-proof events occur frequently, and information leak-proof becomes the most important part of cloud computing.

Second, TrustView (whole bay) cloud computing information leak-proof solution

TrustView (Whole bay) is the authority of the domestic information leak prevention, one of the world Trustworthy Information leakage protection software provider, has obtained China, Japan, the United States three 9 patents. TrustView is committed to the research of copyright protection Technology (DRM) and fine-grained privilege implementation technology, and has brought breakthroughs in the fields of copyright audit watermarking Technology, dynamic Privilege technology, application recognition technology and so on. Using these technical advantages, TrustView quickly expanded the market to Japan and the United States.

from the end of 2010, TrustView United Japan ElectricQualcomm, China Telecom, Taiwan fixed network, such as three operators, to the East Asian Small and medium-sized users to provide information on the cloud structure of the leak-proof services. The TrustView cloud leak-proof solution is a SaaS-based DRM product designed for cloud architectures. The solution is cloud-oriented, providing basic document security services for cloud applications, guaranteeing users ' ownership of documents in cloud applications, and solving core file protection issues that are most concerned by users of public cloud applications. The

TrustView Cloud leak-proof solution offers two application modes: Trustview-top and TRUSTVIEW-IOP.



Trustview-top Application Mode

  



TRUSTVIEW-IOP Application Mode

The Trustview-top model uses multi tenancy technology to provide users with the SaaS service that protects the core documents of the enterprise directly. In cooperation with the TRUTVIEW-TOP model, each single Trutview DRM Cloud service server can provide document leak-proof services for 3,000 enterprises.

The TRUSTVIEW-IOP model is a way to provide security for existing SaaS applications. This model is Japan's current 5 countries to operate the main mode of operation, the project called Plexus is now progressing rapidly to provide cloud users with a trusted PLM application services, the most characteristic of this cloud PLM is that the user's core product design drawings using the TrustView technology to protect.

TrustView has been working on cloud architecture Security since 2009, through continuous cooperation with large operators around the world, running-in technology to solve the cloud leak-proof technology performance and stability issues.

Three, TrustView cloud expectation

In the age of all clouds, change or subversion is unavoidable. By 2015, cloud computing will begin to become the mainstream application model, and the leak-proof technology suitable for cloud era will be adopted on a large scale. Considering that big business and small and medium-sized enterprises have different ways of landing the cloud, Trutview is also gradually promoting the formation of private cloud and public cloud two kinds of solution system, in order to deal with the differentiated needs of different enterprises, improve the solution of cloud security, let information flow more free, to achieve "share without worry" cloud era ideal.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.