Research on distributed storage and security protection of mass data the Chao Songnan of Shandong University This paper, based on the research of the security strategy of distributed data and information storage, designs a kind of storage model and query mechanism for the distributed platform, which is suitable for the large data (data). At the same time can provide data sharing integrity check function. Firstly, based on the architecture and principle of the open source Hadoop distributed Data File System (HDFS) and the symmetric encryption algorithm and public key cryptosystem, this paper presents a HDFS distributed data security storage model. The model picks ...
Now has entered the cloud computing era, distributed computing, flexible billing has become possible, "resources + operation + security" is the basic services of IDC service providers, focus on resources and operation, and the relatively weak security protection of IDC service providers, how to ensure the cloud computing era of information security? With the Mengjin of information technology, all kinds of powerful security tools are emerging, but the problem of information security is not only alleviated, but increasingly serious. Especially for IDC service providers, not only to face the traditional threat, but also to face endless, unpredictable new challenges. But security issues ...
A new survey by the firewall operations management software company Algosec found that 79% of companies need to be more transparent in their security policy management to unify their internal cloud and public cloud environments. The survey visited 363 information security and network operations professionals, data Center Architects, application developers, and CIOs worldwide. 66% per cent of those surveyed said they were currently deploying or planning to deploy business applications on the infrastructure, the services (IaaS) platform, within the next 12-36 months. The respondents ' main ideas include: Transparency in security management is covered by cloud technology ...
It is reported that CSA (Cloud Security Alliance organization) Ceojim Reavis, such as a line of people visited North Sen, in the first to join the CSA China SaaS Enterprise North Sen issued a corporate membership certificate, with the North Sen CEO Guiweiguo, CTO Zhangqinghua and marketing vice President Gao Yan held in-depth talks. During the talks, the two sides discussed how to promote the talent management SaaS Domain Cloud security standards and looked forward to how to strengthen the industry exchange and learning possibilities on the CSA platform. At the end of the meeting, CSA invited North Sen to participate in the next day in Beijing "...
Research and realization of cloud backup system supporting multilevel privacy protection The arrival of the Yewei large data age in Sichuan Normal University makes the existing information system appear the storage capacity is insufficient, the resource utilization is insufficient, it facilities invests big, the system management is complex and so on, more and more enterprises, Organizations and individuals rely on networked storage and network computing to reduce their cost of maintaining various facilities, and cloud computing and cloud storage are the products of this situation. Cloud Backup enables data to be backed up on the network through cloud storage, making backup data more secure and Cross-platform managed. However, cloud Backup is like a ...
Continuous deployment based on SaaS services and the transfer of data center resources to public and private cloud environments can force organizations to shift IT spending to data protection, monitoring, and managed security services. According to an IBM survey of 150 security chiefs, the perimeter of the network is becoming increasingly difficult to be controlled by security professionals. The security chiefs say the security budget is expected to increase over the next 3-5 years. Kris Lovejoy, general manager of IBM's security services and senior IT architecture and systems engineer, says the increase in security budgets is for hosting security service providers ...
Cloud security becomes a topic of greatest concern when the number of attacks on IT systems with sensitive data is increasing. Unfortunately, the best safety practices are never discounted. In the IT world, there are always attacks. The US Postal computer network is the latest victim. Authorities suspected the attack caused a leak of sensitive data, including names, birthdays, social Security information, addresses and employment records, which could range from 800,000 postal workers and customers. This attack occurred during the last holiday season of target credit card data leaks and recent hom ...
Editor's note: When it comes to the safety of containers, most people say it's not safe enough to give up the high performance and convenience it brings. The author of this article thinks that Docker has already provided a safe mode, and can be used with all Linux security schemes such as SELinux, as, but many people do not use it well. By comparing bare-metal, VMS and container to buildings, apartments and private rooms, the authors illustrate the problem. Of course, from another perspective, the author only considers the problem of single tenant, the situation of the multi-tenant, C ...
Research on the analysis of virus malware based on cloud computing Nanjing University of Aeronautics and Astronautics Menchu This paper presents a dynamic behavior analysis scheme based on cloud computing, which utilizes the characteristics of cloud computing and distributed computing, and completes the analysis of multiple execution paths of virus malware in parallel on multiple virtual machine nodes in cloud computing. Monitoring system calls in virtual machines discovers malicious behavior that virus malware triggers under certain conditions. The PIF algorithm is used to formalize the process of suspicious file analysis and report return, and the improvement of the algorithm also improves the efficiency of the analysis, PIF algorithm is distributed ...
November 5, sponsored by the Data Center Alliance, the Century Interconnection and ucloud support of the national CIO high-end salon activities held in Beijing. With the theme "Cloud Security", the campaign aims to explore cloud-safe solutions in it change, with nearly 50 participating salons from the financial, pharmaceutical, electrical, educational, it internet and traditional industry enterprise CIO, and share cutting-edge perspectives. The north and South CIO gather to discuss cloud computing security The 2010s cloud computing as a new technology trend of rapid development, has completely changed and brought us an unprecedented ...
October 14, Mao Weiming, vice Minister of industry and Information Technology, attended the 2014 World Standard Day Publicity week, revealed that up to now, the industry and information technology in the field of the total number of standards has reached 53,000; in the first three quarters of this year, the industry standard system revision plan 1636, the review plan 2275, Approval of the release of industry standard 2419, Cloud computing security framework, and other 10 standards are approved as international standards. In his speech, Mao Weiming pointed out that with the development of economic globalization, the strategic position of the standard is becoming more and more prominent, which becomes the focus of the industrial commanding point, the dominant power and the right of discourse.
Research on some security problems of cloud computing Ning with the rapid development of cloud computing, more enterprises and individuals rely on cloud technology to realize their storage and computing needs. The security problem of cloud computing has always been the focus of researchers. Firstly, this paper introduces the architecture and characteristics of cloud computing. Then focus on the security issues in the cloud computing architecture in detail. Research on some security problems of cloud computing
Research on the security Problem of cloud service in SaaS Enterprise Jilin University Zhang This paper will focus on the security problem of SaaS Enterprise Cloud service, set up security problem analysis model, design security problem analysis system, realize the automatic generation of security problem solution and assess the degree of harm, can shorten the time of security problem solving, It is more accurate to locate the users involved in security issues and to save the manpower and resources of the suppliers. This paper first introduces the background knowledge of cloud computing, which lays a theoretical foundation for further research. Then focus on the SaaS Enterprise Cloud services and ...
Reflection on the establishment of national standard for cloud Security Review China Electronics Technology Standardization Institute Gao Lin May 22, the National new Office spokesman pointed out that China will launch a network security review system. This system stipulates that important information technology products and services used by systems that relate to national security and public interest should be reviewed through network security. Cloud computing is an important service for government departments and key industries, and its security is under review. Reflection on the establishment of national standard for cloud security review
Virtual Host Security protection system applied to cloud computing center Wang Zhu Zhixiang Govendo The security protection problem of cloud computing environment, this paper proposes a cloud computing center Virtual Host Security protection system. The system takes "the security as the service metallurgy as the starting point, takes the virtual machine as the core, aiming at the characteristic of the virtual computing without boundary, provides the unified security protection with the virtual cluster as the unit." For the different applications under the cloud platform, tenants, virtual host to provide customized security services, in the form of security protection template for different security requirements tailored to the security measures software, Ann ...
In the big data age, the combination of cloud computing and large data has become a mainstream trend, and large data and cloud computing are becoming more and more inseparable, large data needs a flexible computing environment, and the latter can quickly and automatically expand to support massive data. The infrastructure cloud can deliver these requirements precisely. But whenever we talk about cloud computing, we can't avoid the following questions: What is the cloud security strategy for big data? When the cloud security policy is mentioned in the large data use case, we want any security solution to be able without impacting the security of the deployment ...
Cloud computing can make you safer, whether it sounds absurd. Indeed, with data leaks, hacking attacks, and cloud outages, such as Amazon Cloud computing downtime and Dropbox authentication technology, these cloud security issues are a bit chilling. But you can't just deny cloud technology because of this. Before any successful change in history, there have been countless failures and countless hurdles. Over time, cloud computing is bound to be safer than internal management, whether you believe it or not, I believe it anyway. So let's take a look at cloud computing Coach P ...
Cloud computing is an emerging application model that integrates traditional computing resources into a larger, faster cloud service center. Cloud computing is based on virtualization technology, network as the carrier, providing infrastructure (IaaS), platform (PaaS), Software (SaaS) and other services, the integration of large-scale scalable computing, storage, data, applications and other distributed computing resources to work together in the Super computing model. The application of cloud computing can expand and shrink, so that users can get the resources suitable for their own needs, while greatly reducing the cost of users to improve the calculation ...
The advent of cloud technology does bring great convenience to modern enterprises. However, with the benefits of the accompanying, of course, there is a reluctance to touch the information security risks. Since enterprises want to take advantage of the benefits of cloud technology, it is natural to find ways to solve the cloud security risks, reduce the risk faced by enterprises. Tip One: Start from the basic, timely installation of system patches. Whether it is Windows or Linux, any operating system has vulnerabilities, timely patching to avoid vulnerabilities are deliberately exploited, is one of the important security of the server. Tip Two: Install and set up a firewall. To serve ...
The combination of cloud computing and big data can be said to be a perfect match. Large data requires a flexible computing environment, which can be extended quickly and automatically to support massive amounts of data. The infrastructure cloud can deliver these requirements precisely. But whenever we talk about cloud computing, we can't avoid the following questions: What is the cloud security strategy for big data? When referring to cloud security policies in large data use cases, we hope that any security solution will provide the same flexibility as the cloud without impacting deployment security. In the large number of ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.