Research on security Trust and guarantee registration project of Cloud Security alliance

Cloud Security Alliance Security Trust and Assurance Registration Project Research Ye Runguo Fanco Xuchu Cai Lei in order to address the credible lack of public cloud services, the Cloud Security alliance launched a security Trust and assurance registration project. This paper studies the background of the project and the Open authentication framework aimed at transparency, as well as the typical certification process including self-assessment and third party evaluation, and introduces the progress of current registration and certification of the project, as well as the follow-up research plan of continuous monitoring and certification. Finally, the paper gives some suggestions on the research and development of the evaluation and certification standards of cloud computing security in China. Cloud Security Alliance Security ...

Research on access control technology based on negation rule in cloud computing

Research on access control technology based on negation rule in cloud computing the security and privacy protection of Wu Zhengxue data poses great challenges to the cloud computing field, and a access control technique based on negative rules is proposed to realize the sharing of some data among cooperative enterprises in a cloud environment without involving confidential information. The main idea is to prevent illegal access by judging whether the access query is authorized and whether there is conflict between the authorization and the negative rule. Theoretical analysis and experimental results show that this mechanism can effectively guarantee the security of cloud data. Research on access control technology based on negation rule in cloud computing

Wave trusted servers to fill cloud computing security space gaps

"Trusted Computing" is not a new term for the industry. But in the server domain, the application of trusted computing and products has not been a breakthrough development.   This may be due to the server for performance and stability requirements higher, in the development to the virtualization server, the underlying platform virtualization is not effectively supported, on the other hand, the user's own confidence in computing and the degree of adoption is far from reaching the standard of popularization. However, with the great changes in the international information security situation, especially since the "prism door", the state and enterprises are facing unprecedented ...

Who are the companies facing cloud security challenges with?

Cloud computing as a new IT service model has changed it consumption patterns. For small businesses, when entrepreneurs want to start a new business, they often want to manage it in a flexible and scalable way. It is not as important to set up an IT department as it is to market, invest in research and development, and protect the flow of money. Because small micro-enterprises have no IT infrastructure in-house, most of them choose the public cloud service providers to supply IT services, thus becoming the pioneer of public cloud service application. For small micro Enterprise IT managers, the security of public cloud services looks ...

Cloud security Architecture design and Practice Tour

In the coming months, Aliyun will also work with the technology media community such as Infoq to open a cloud technology course in 12 cities across the country, communicating face-to-face with lecturers to make developers truly understand cloud computing and better use cloud computing.   Although Aliyun the pace of the classroom a little later, but we will carefully walk every step, welcome to pay attention to Aliyun Open class, I hope we do not miss! This issue of the public class we invite to Aliyun flying Systems Two senior security experts Li (nickname) and Yang Mengzhe (nickname Mengjie), two lecturers on the "cloud computing security system in the sandbox ..."

The scholar safe Cloud actual combat each road master is praised

The way of Wushu stresses the combination of form and spirit, both inside and outside. However, the world Martial arts, more research Wei Gong, but rare constant practice of the people. All because of the Wei Gong, the acquisition of convenience, the time spent is short and small, regardless of what kind of internal strength, few years, many decades can be effective.   Therefore, the real martial arts in addition to a variety of outside the law, will also practice one or two kinds of internal kung fu to complement their shortcomings. In Wu's view, the Internet world can be Sango. For example, Google, Gmail user accounts by the black, icloud photos of the crazy leak, and then to the global prism door, snow this series ...

Scholar Security Cloud to enter the domestic market Enterprise cloud Disk + private cloud

At just the beginning of the curtain of ISC China Internet Security Conference, the scholar security cloud fully open the server, to the road master to launch a challenge. In the competition, the scholar company will simulate the safety environment to the most extreme situation, after the notary uploads files to the server, the server management password is released to the challenger. In front of the 100,000 grand Prize, the Challenger is eager, however, after a day of "attack and defense war", still no one has successfully invaded to get the document plaintext. We know that the common method of data security vendors is to protect the server and prevent hackers from invading cloud storage servers. However, in the hacker's ...

Sohu Cloud View and safety treasure cooperate to perfect cloud security Service

Recently, Sohu Cloud as a gold sponsor participated in the "GITC Global Internet Technology Conference", officially announced the full opening of the registration, and the synchronous launch of the "1 Yuan Package Plan", in the cloud security, security Bao became Sohu Cloud's first partner, Sohu Cloud users in the use of convenient public cloud PAAs services,   can have more security. Sohu Cloud View is the design and development of Sohu company with language-independent, scalable services to provide flexible public cloud PAAs platform, in addition to providing the core application engine, but also equipped with a wealth of distributed expansion services (including database 、...

Research on remote user authentication technology in cloud environment

Research on remote user authentication technology in cloud Environment Lanzhou University of Technology Han Wei This paper proposes a dynamic password authentication scheme based on ECC for cloud environment. This scheme is based on two sides of cloud user and cloud service provider to realize two-way authentication. By using elliptic curve cryptography, the protection of password is enhanced, the function of password modification is increased, and it can resist many kinds of attack methods such as replay attack, man-in-the-middle attack, privileged insider attack, pseudo attack, Denial-of-service attack, The security of the scheme is improved. Compared with the existing cloud authentication scheme, it is found that the scheme is ...

Too early morning: application delivery How to solve the cloud computing security and application of the two major problems?

In recent years, more and more enterprises have opened the cloud computing application model. However, although cloud computing has many performance advantages, the security of the public cloud, the response speed and availability of cloud business are still the main factors restricting the overall popularity of cloud computing.   Especially for the latter, that is, the delivery of cloud applications, is the number of application delivery vendors are eager to meet the enterprise's efficient demand through continuous innovation. Industry insiders say the advanced application delivery system can offload network-related functionality from the server, increasing the efficiency of the data center by 20% to 50%. At the same time ...

How to protect personal cloud security in cloud era data crisis outbreak

"China Daily Entrepreneur" icloud is a typical representative of cloud services, providing photos, video synchronization, users can share synchronized data across multiple platforms.   For example, when traveling, mobile phone photos, you can use the home printer output pictures, family can be in the computer, tablet computer, TV sync to watch photos, play video. Cloud service brings great convenience to people's life and work, but it also brings information security problem. icloud is a typical cloud service representative that provides photos, video synchronization, and the user can share synchronized data across multiple platforms. ...

The security of cloud computing in China is not as tricky as it might seem

In order to scramble for the future information Society control, the cloud computing and mobile Internet infrastructure layout, access and control of the vast number of data, has become the world's strategic plan.   At the same time, the rapid development of mobile terminals such as smartphones brings new security risks to cloud computing industry. For cloud computing companies around the world, the security and privacy of data in the delivery of mobile devices is challenged. At the same time, "malicious advertising" has become a new source of viruses for mobile applications in cloud computing. "Malicious ads" mainly by "malicious software" and "advertising" two words synthesized, its ancillary advertising nature ...

How new types of DDoS attack the cloud

Currently, DDoS attacks on the cloud are larger than ever, with the largest DDoS attack in 2013 reaching 309 Gbps, and as more organizations migrate business and services to the cloud, a separate component can cause cascading failures.   This is the next generation of security and DDoS devices to solve the problem. The following is a translation: At a recent large medical organization security meeting, I was fortunate to see the log of the private cloud infrastructure I had helped design. They showed me a set of interesting numbers that I think might appear to come from DDoS attacks. ...

Identification and countermeasures of cloud computing vulnerability risk

The October 8 news, in less than 10 years, cloud computing has evolved from an interesting new concept into the industry's major mainstream market. The industry's expectations for the future of cloud computing are generally high, with Morgan Stanley predicting that Amazon's network service will break 24 billion dollars in 2022.   Of course, the success of any single vendor's cloud computing business depends entirely on its ability to help users eliminate security concerns about cloud computing, and the related issues still appear on on-demand deployments. "Highly virtualized, more ...

Cloud security comes from the details

In recent years, whether the public cloud or private cloud, regardless of enterprise applications or personal applications, cloud computing has been "splendid" infiltration of all aspects of our work and life. A few years ago, employees also rely on enterprise FTP to share information, and now have been all kinds of cloud plate took over. In addition, collaborative Office, Sales progress Management, ERP system and other core applications have been a large number of enterprises to migrate to the cloud.   According to a Gartner study in 2013, more than 19% companies have moved most of their management models to the cloud. However ...

Sky Cloud Shield is the most precious treasure for financial customers to ease the use of cloud services

Customers who have used "intermediary" businesses, such as CDN or cloud security, have an unpleasant experience--for HTTPS authentication, they need to copy their private key to one of these providers. Once the private key leaks, hackers can imitate your website to launch a phishing attack, to your site customers caused great losses, light is caused by loss of credibility, heavy damage caused by serious economic property losses, disastrous consequences. As a result, customers in the financial industry have long been eager to experience the scalability of cloud computing but have no choice but to worry about its security risks. Particularly concerned about their valuable SSL private keys exposed to open interconnection ...

Startup Cloud Security User Guide

As a cloud services solution, Alert logic integrates advanced 24x7 security tools to withstand threats and resolve compliance, as well as an advanced technology partner and security provider for AWS. This article comes from Stephen Coty, chief security officer at Alert Logic, who shares the best practices in cloud security. Here's what Stephen Coty shared: Many years ago, I created a security and development company with huge dreams and little money. However, before I started building the necessary infrastructure and opened ...

Application of formal method in cloud computing

Research on the application of formal method in cloud computing Jilin University Zhang Peng to promote the development of cloud computing, this paper uses the formal method to describe the formal semantics of cloud computing system, and on the basis of the cloud computing in the change impact analysis and data security evaluation of the problem is studied in depth, The main work is as follows: 1 The formal semantics of cloud computing system are depicted by using abstract sources. Based on the idea of introducing dynamic semantics into ontology, this paper presents a new method of knowledge representation-abstract source, using abstract source to form semantics of cloud computing system from two angles of commonality and feature of cloud.

Research on HDFS authentication and secure transmission mechanism based on PKI

Research on HDFS authentication and secure transmission mechanism based on PKI Li Yan Zhao Huawei to solve the authentication and secure transmission problem in the Hadoop Distributed File System (HDFS) file service process of Hadoop core subproject, this paper analyzes the Kerberos scheme in detail. Aiming at the defects of security and efficiency, this paper puts forward the application of digital certificate authentication technology based on PKI and AES symmetric encryption technology based on digital envelope to HDFS security mechanism. The analysis shows that the security mechanism is compared with Kerberos ...

Research on attribute-based user rights management in cloud environment

Research on attribute-based user rights Management in cloud environment Li Yubao Fannai Kihuimin Liu Yan User Rights Assignment is one of the most important problems of cloud computing service, and proposes a user Rights management scheme based on attribute. This scheme takes the new user key distribution in cloud service as the research object, in this paper, the user signature authentication and decryption management mechanism is discussed, and the data owner and the authorized person choose the attribute set, and the data owner defines the ciphertext access structure based on the attribute set, so that the user can obtain the decryption key only through the authorized person authentication. Achieve the goal of user privilege escalation and degraded synchronization management. Another ...

Total Pages: 2156 1 .... 1380 1381 1382 1383 1384 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.