Wave trusted servers to fill cloud computing security space gaps
Source: Internet
Author: User
KeywordsCloud computing trusted cloud
"Trusted Computing" is not a new term for the industry. But in the server domain, the application of trusted computing and products has not been a breakthrough development. This may be due to the server for performance and stability requirements higher, in the development to the virtualization server, the underlying platform virtualization is not effectively supported, on the other hand, the user's own confidence in computing and the degree of adoption is far from reaching the standard of popularization.
However, with the great changes in the international information security situation, especially since the prism door, the state and enterprises are confronted with unprecedented information security challenges. Especially since this year, the national series of measures to achieve the autonomous control of information security has become an important goal. In this context, the introduction of a wave of trusted servers has attracted the attention of the industry.
It is reported that since 2007, the wave began to pay attention to credible computing, and to proceed with the relevant technical research. This May, the tide began to carry out a trusted server from technology to the realization of product level research and development. In September, at the China Internet Security Conference, the wave officially released the industry's first trusted server for the cloud data center, including 2 and 4-way models.
Wave Group Information Security Division security trusted Cloud host product manager Liu said: "There are three important features in the Trusted Computing system: building a trusted information chain, identifying the identity of the platform, and keeping the key." "And the wave of the launch of the trusted server, is based on the server trusted Security module and the latest wave of the two-way server platform." It is reported that the main technology of the server includes chips, trusted chips, as well as the motherboard security modules and a variety of security software. "Wave-trusted servers will build a platform of high security, high performance and high reliability servers for users as a whole." "Liu said.
It is worth mentioning that the Wave trusted server in the Trusted Security module is the use of TPM2.0 chip, the chip using national technology, and obtained the National Security Bureau Model certification. And in the machine architecture, TPM2.0 chip also pliers to the tide of self-developed motherboard. And through this embedded to ensure that the infrastructure is a solidified platform, in addition to the fixed-level, the adoption of a wave of independent research and development of the comprehensive support TPM2.0 module.
These key features determine that this is a new generation of independent research and development of High-performance server platform, at the same time, the server in the algorithm also fully conforms to the National encryption algorithm requirements. Through the establishment of integrity and the establishment of the chain of trust, wave trusted server can ensure that the whole system is controllable at the time of operation.
In addition, at the software level, the Wave trusted server will also have trusted software operation support, and the wave will be based on SSR comprehensive support of credibility, the entire credibility of the application level. Liu said: "The wave will be based on a trusted server to provide users with a level of security, including traditional host and cloud host of a secure and credible solution to meet the needs of different users." ”
According to the Wave Group Information Security Division general manager Zhang, based on the release of the wave of trusted server products, the wave will also be in the October wave of the General Assembly to publish the overall security of the cloud host solution. This solution will include trusted computing as well as operating system security, operating system hardening, virtual computing security technologies, how to build support for virtual hosts with trusted chips, and how to deal with the security risks of cloud hosts.
And in the Wave Group Information Security Division, deputy general manager Dr. Cai, the wave of the release of the trusted server to the credibility of the chip as a starting point for customers to build from the hardware to software, from the bottom to the top level platform trust chain, to provide a safe and credible environment for cloud computing data center. And it all depends on three key technologies: "One is the tide in the server domain has accumulated key technologies, the second is the tide in the operating system security of the accumulation of key technologies, the third is in the virtualization security of this business, the wave has its own operating system. With these three key technologies, and then the traditional trusted computing technology, as well as new breakthroughs in the virtualization of security technologies into the formation of a software, hardware, firmware trinity of the overall solution, so as to build a complete credit chain for users to present a comprehensive security value. "Cai said.
And the wave of trusted server release, but also for the cloud data center to provide a secure and reliable server infrastructure platform, the formation of a trusted server based on the security of the cloud host solution, to fill the cloud of security gaps in the field.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.