Foreign information security experts: Cloud security concerns are exaggerated

According to foreign media reports, experts attending a subcommittee meeting at the RSA security conference this week said cloud security concerns were exaggerated. Now worry about cloud security is just like the worry of virtualization technology earlier. Concerns about security should not discourage businesses from using public cloud services.   If you choose the right cloud service provider, most enterprise workloads and data can be safely migrated to the cloud environment. The Subcommittee believes that at present, security concerns remain a major impediment to the application of cloud services by many large enterprises. This concern comes mainly from thinking about moving to cloud services ...

Research on cloud security authentication problem based on remote proof

Research on cloud security authentication based on remote certificate Shandong Normal University Du Yunyin this paper mainly studies the application of remote proof to solve the problem of component attribute and system behavior security authentication in cloud computing. Firstly, this paper introduces the security problems in cloud computing, and points out that the most basic of security problems is component attribute and system behavior security authentication problem. This paper introduces the research progress of this problem both at home and abroad, and puts forward the idea of using the remote proof in the trusted computing to solve this problem according to the current research trend. Secondly, it introduces the concept of trusted computing and remote proof, and expounds ...

Research and implementation of cloud storage security system based on FPGA

Research and implementation of cloud storage security system based on FPGA Beijing Jiaotong University Wang Chonsen in this paper, the current security incidents and the popular security protection measures have been deeply studied, combined with the existing results proposed a new cloud storage security solution. A trusted network node is installed between the client and the cloud storage server as the data encryption gateway, using the identity authentication method based on face recognition to authenticate and FPGA hardware acceleration technology, the user data can be transmitted to the cloud through ciphertext after encrypting the trusted gateway to improve the security of storing information in the cloud space. This ...

USB identity authentication scheme based on cloud computing

USB identity authentication scheme based on cloud computing Shuai steady Wei Yanfen a USB key authentication scheme based on cloud computing is proposed, which is mainly used to solve the security problems in traditional authentication technology. Using USB key identity authentication technology to log in to cloud Terminal to obtain cloud service can improve the security of user authentication of cloud server. The scheme is mainly discussed in two aspects: a cloud server How to obtain the Cloud Terminal USB key in the digital certificate authentication, so as to ensure the security of the cloud computing environment; b The end user obtains the

Cloud Computing Security Analysis

Cloud computing Security Analysis Lee Li Na with the increase of users ' usage of cloud computing, this makes more demands on the security of cloud computing, and once the cloud computing has security problems, it will bring huge loss to the users. Based on this background, this paper analyzes the security technology applied in cloud computing at first, then analyzes the security risks of cloud computing, and finally puts forward some countermeasures to help solve the problem of cloud computing security. Cloud Computing Security Analysis

SafeNet: Multiple identity authentication protects data access security

SafeNet, the world's leading data protection provider, says that with the increased risk of data protection, and the seamless docking of users across devices and the need for secure access to data, identity authentication solutions have been widely used.   In the 2014 Global Identification survey, more than One-third of organizations are using multiple identity authentication (multi-factor authentication) to allow data access to be performed seamlessly and securely across multiple devices and locations. Survey results show that more and more enterprises are using more ...

Research and application of cloud computing security in telecom industry

Research and application of cloud computing security in telecom industry Dan Guo Xian with the development and application of cloud computing technology, cloud computing will inevitably bring some security problems. This paper introduces the cloud computing security problem and its solution technology, and on this basis, puts forward the security framework and practice suggestion of telecom operator Cloud computing.   Finally, the future development of cloud computing security is prospected. Research and application of cloud computing security in telecom industry

Secure cloud computing based on the key of admission certificate

Secure cloud computing based on admission key Liu Yin Fang Wang Jian introduced a secure cloud computing framework. This paper discusses the characteristics of the key mechanism of admission certificate and the main realization in cloud computing, including the distribution of identification key, identity authentication, data exchange and so on. Based on the basic operation, dense cloud computing can also realize the classification of network data extraction and other extended services to meet the needs of large data applications. Secure cloud computing based on the key of admission certificate

Ribose joins Cloud Security alliance

Ribose, a start-up that redefined cloud collaboration, has joined the Cloud Security Alliance, Cloud Security Alliance, referred to as "CSA" or "Yunan", to work together to promote cloud safety. The Cloud Security Alliance has developed the first industry-approved cloud security standard: The Cloud Security Control matrix (Cloud Controls matrices, referred to as "CCM"); its members include a number of outstanding technology companies, such as Amazon [Weibo] (327.44, 3.28, 1.01%) (Amazon) 、...

Research on role-based Trusted cloud computing Security strategy

Research on role-based Trusted cloud computing Security Strategy Lu Shenjuan Shandong Normal University This paper mainly studies the problem of trust and access control in cloud computing environment, the main work has the following points: 1, the implementation of cloud computing and the concept of a trusted combination of cloud computing and the concept of a trusted, the cloud service requester to authenticate the credibility of The two-level verification strategy is used to correctly judge the credibility of the transaction users, and to achieve more flexible role mapping and permission grant. 2, a new inverse cloud generation algorithm is proposed based on the original one-dimensional inverse cloud generation algorithm, and a new inverse cloud generation algorithm is proposed.

Three major development trends of cloud Platform security

This article from today's information security industry separatist, with the three features of enclosure and hardware, this paper analyzes the increasingly serious gap between information security and cloud platform with typical cloud platform architecture, and puts forward corresponding solutions, that is, three development trends of information security: the defense of information security itself in depth (Defense in Depth), software defined by the combination of application and information security, defines information security (Software tabbed infomation), combines virtualization technology and information security to drive ...

Analysis of cloud computing security framework

Analysis of cloud computing security framework The experimental Teaching center of the economics Department of Shandong University of Finance and Economy Yang Libo the extensive application of cloud computing, it also brings the security hidden danger to the user convenience. This paper begins with the concept of cloud computing security, analyzes the security architecture of cloud computing, and introduces several key technologies of cloud computing security. Analysis of cloud computing security framework

Ribose becomes the first cloud service provider in the world to obtain multi-level cloud security certification

MTCS is a new cloud service security standard (Singapore standard SS 584:2013) and the world's first multi-level cloud security standard, developed by the Singapore Information Communications Development Authority (IDA) and the IT Standards Committee (ITSC), which puts forward stringent security and operational requirements for cloud service providers and encourage sound risk management and safety practices.   Its security certification is divided into three levels, of which three is the highest. MTCS Standard Certification Body BSI (British Standards Association) for the ribose ...

A secure cloud access method based on SDN

A secure cloud access method based on SDN Xu Yao Guo Zhigang Shouguo This paper combines SDN (Software tabbed Networking) technology to propose a new security cloud access model from the point of Access security. In this model, the cloud service provider (CSP) is concerned only with data processing and storage, and the third server provides the corresponding access security service according to the needs of the cloud users. In a SDN network, a third service can adopt a network management policy based on service name addressing, which makes the service easy to extend or recover. ...

Experts to solve the five security problems of cloud computing

As companies continue to accelerate the pace of cloud technology, using new technologies such as infrastructure, Service (IaaS) or software as a service (SaaS), the need for solutions to secure access and reliable operations in the cloud architecture is becoming increasingly evident. It now appears that, as enterprise data is kept in different devices, which are provided by different providers or partners, the enterprise must monitor and protect the new "security boundaries". Similarly, carefully weighing how to protect cloud-based data should be incorporated into the enterprise's context as part of the overall security strategy for the enterprise. and protect ...

Is the public key infrastructure moving to a public cloud secure?

Moving security controls such as public key infrastructure to cloud computing can be a real cost savings, but is cloud computing security strong enough to ensure its security? When you consider the different components of a PKI-based system, the public key infrastructure is clearly gaining a meaningful foothold in the IT field. From certificate licensing to certificate revocation lists to the registration structure, it is very obvious that ensuring the security of communications within a PKI environment is a very computational resource-intensive task. In view of this, the phase ...

Experts say cloud security concerns are exaggerated

According to foreign media reports, experts attending a subcommittee meeting at the RSA security conference this week said cloud security concerns were exaggerated. Now worry about cloud security is just like the worry of virtualization technology earlier. Concerns about security should not discourage businesses from using public cloud services.   If you choose the right cloud service provider, most enterprise workloads and data can be safely migrated to the cloud environment. The Subcommittee believes that at present, security concerns remain a major impediment to the application of cloud services by many large enterprises. This concern comes mainly from thinking about moving to cloud services ...

"Cloud" volume "cloud" Shuyun security know how much?

In the cloud era, the application of cloud technology has been deep into various fields, as people on the computer and network widely known, cloud concept is also popular, but if the "cloud technology", many people are still confused, and do not really understand cloud technology. If the word "cloud" is simply described, it can be viewed as a transit point for data. In this transit station, people can store and handle all kinds of data from the network for their own services. And for the difference between a private cloud or a common cloud, as long as the network of data exchange is "public" is "private" ...

The SaaS Security Standards Checklist for chief information security officers

Users still need to control potential compliance risks before the SaaS provider improves security standards (visible and controllable to customers).   Clearly, security is the biggest problem in moving business applications out of the enterprise. Without seeing user activity, monitoring, and restricting access control, SaaS is critical to the chief Information Security Officer (CISOS), especially compliance responsibilities.   To reduce security issues, the security team (especially the enterprise) must do a lot of work, including: actively participate in purchasing, take a proactive attitude and audit all SaaS relationships. ...

Microsoft Report publishes MS JavaScript encryption library

Microsoft Research exposes a JavaScript encryption library that is in the development phase, and developers and researchers interested in cloud security and browser security have the opportunity to peek inside the crypto library. HTML5 's cloud services work together.   Microsoft says Ms JavaScript encryption libraries have been tested in IE11 interface environments. But Ms JavaScript encryption library is not limited to IE11. Microsoft said that the encryption library in IE8 or later Internet Explorer browser, the current version of Firefox 、...

Total Pages: 2156 1 .... 1378 1379 1380 1381 1382 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.