The legacy of data security and integrity in the cloud must be prevented

Data security has been a hot issue in the IT field, a variety of data leaks, theft has become commonplace. Hosting data in cloud services is making the battle for data security more intense, Preetam choudhary a post on the security issue of cloud-computing legacy data in Dzone, which involves legal differences/imperfections, data transmission of the public network, the hidden dangers of information integrity, and public cloud-specific Neighbour's influence "and so on. The following is the translation: cloud computing brings convenience and cost-benefit, but it also brings the security hidden dangers that cannot be noticed. Cloud meter ...

A safe ecological environment model of cloud computing with self-healing capability

Self-healing cloud computing security Ecological environment Model Lin, founder with the rapid development of cloud computing, the cloud computing environment of the system security more and more people pay attention to, if not solve the cloud computing environment exist many security problems, the organization in the process of moving the business and data cloud will certainly be worried. On the basis of introducing cloud computing, Trusted platform computing and security situational awareness technology, this paper discusses a cloud computing security ecological model which combines the cloud computing trusted platform technology, the security situation awareness technology and the active defense technology, and has the self-healing capability, and the modules and functions of the model.

Opacity of cloud security affects cloud landing

Cloud services move businesses to the cloud with obvious cost advantages and flexibility, but it's another thing to convince the security team to accept cloud services. Statistics show that seven of eight information technology people distrust cloud providers, who find it hard to believe that cloud service providers can protect the company's most sensitive data, according to a recent survey by Lieberman Software, where most people do not believe the supplier's privileged access to management products. For those companies with higher security requirements, the data leaks without knowing ...

2013 Cloud computing risk is becoming more significant

Companies are moving into cloud computing, either for lower costs or for innovative drivers. Especially in China, the Government attaches importance to the development of cloud computing, policies, funds continue to promote the development of cloud computing industry. Recently, there is news that the Ministry of Industry is stepping up the development of cloud computing industries guidance, and is expected in 2013 after the formal introduction of the two sessions. Therefore, the 2013 for cloud computing, will be vigorously developed, accelerated the popularization of the year. In this regard, Symantec China's director of technical Support Division Li Gang, as the cloud development into depth, security risk issues will be gradually revealed and in 201 ...

How is the cloud safe? Five Perspectives on future cloud security

The solution of the security problem is the key factor of whether cloud service can get the user's approval, and cloud security is one of the main obstacles to the current cloud computing application. In addition to the possible system failures of large-scale computing resources, cloud computing security risks include the lack of uniform security standards, applicable regulations and privacy protection for users, data sovereignty, migration, transmission, security, disaster preparedness and so on. Cloud security can be divided into two categories in nature, one is the user's data privacy protection, the other is the security of traditional Internet and hardware devices. In data privacy protection, user information is stored in their own ...

Key management strategy in hybrid cloud

Key management strategy in mixed cloud Robert W. Griffin 1 Cloud Key Management Problem 2 Key management model in private, public, and mixed cloud 3 Key Management protocol for Cloud 4 key management strategy in mixed cloud

The security of mobile payment in cloud computing era

The security of mobile payment in cloud computing era

2013 Cloud computing security is the key to industry

Gartner predicts that by 2015, 10% of the IT Security enterprise features will be delivered via cloud computing. For cloud computing security, there is a greater tendency towards communication, web security, and remote vulnerability assessments, but in the future there will be more technologies, such as data loss protection, encryption, and authentication, to support the maturing development of cloud computing. Cloud computing security is changing rapidly, which could affect the traditional business relationships of IT security providers with their value-added distributors. But the overall trend will drive more hosting security service providers to use cloud delivery. In addition, Gartner predicts ...

The security of the electronic file Center in the cloud computing mode

There are similarities and differences in the security of information system under the cloud computing model and traditional mode. The first goal is to ensure the integrity and security of data and information, and then the objects are the same, such as hardware and software, network, storage systems, and so on, and again will adopt some similar technology, such as various security detection technology, decryption encryption technology. The differences include management and technology issues such as virtualization, security issues that can result from the transition to cloud computing service patterns, and so on. 1. The security problems caused by the non-standard cloud computing. Cloud computing as a new technology is only in the initial stage ...

Research on the security of Cloud computing virtualization network based on cryptography

Dong Guishan, Deng Chunmei, Deng Virtualization Network technology is the key to building a new generation of cloud computing data centers to provide infrastructure support for cloud computing environments. On the basis of studying the typical architecture and Access application mode of cloud computing data Center, this paper analyzes the security requirement of data center virtualization network from the aspects of user security access, communication isolation and confidentiality protection, and puts forward the security technology framework of virtualization network, focusing on the enhancement of virtualization network security based on cryptography technology, Protect the communication between virtual machines, information isolation and security exchange and other security mechanisms ...

Cloud security: From single cloud to cloudy

Cloud Computing Security:from to Multi-clouds Mohammed A. Alzain, Eric Pardede, Ben Soh, James A. Thom this monitors surveys Recent related to single and Multi-cloud security and a ...

Big data, cloud computing will be the 10 major information security challenges of the 2013

NetIQ has been providing and managing computing services securely across physical, virtual, and cloud environments to help customers address complex information protection challenges in a cost-effective manner. At the advent of the 2013, NetIQ company focused on the global information security market, the industry's development and trends put forward their own views. 2012: What year in the field of information security, 2012 is undoubtedly the hacker action year, BYOD and the year of the cloud. Many agencies have started deploying the cloud in 2011, and this year is a continuation of the year. Hacker actions occupy ...

The construction path and best practice of cloud security

The construction path and best practice of cloud Security WAN IBM Greater China Area Cloud computing services IBM Wisdom Cloud Computing Network Meeting Cloud Security construction path and best practices

Cloud computing security Threats and risk analysis

Cloud computing security threat and risk analysis Jiang Liu Baoxu introduces the classification and development of Cloud computing, outlines the security status of cloud computing, and analyzes the security threats and risks in cloud computing in detail. This paper points out the 11 kinds of risks which are peculiar to cloud computing or affect more clearly, and gives the description, security influence, examples and countermeasures for each kind of risk. Keywords cloud computing, cloud services, security threats, risks, countermeasures cloud computing security threats and risk analysis

Solutions to cloud computing security problems

1, the construction of virtual technology to support the security system at present, virtualization has become a key technology for cloud services providers to deliver "on-demand" technologies, including infrastructure, storage, computer, and application resources, which are already 1 strides forward in support of virtualization, and only based on this virtualization technology, It is possible to provide personalized storage computing and reasonable allocation of application resources according to the needs of different users, and use the logic isolation between virtual instances to realize data security among different users. Security is based on the network architecture, or on the security as a service ...

Application of information level protection system in cloud security

Application of information level protection system in cloud security The Cloud Security Management Center Cloudfirm Information Hierarchy protection system in cloud security based on the level protection standard system

Analysis of cloud security technology

Cloud security Technology Analysis Sunart Cloud security technology is Peer-to-peer technology, grid technology, cloud computing technology and other distributed computing technologies combined with the natural evolution of the results. Cloud security as a Chinese enterprise in the cloud computing domain original concept, has a great advantage, it will be the entire internet into a huge "anti-virus software" for information security to provide a huge umbrella, this article from the cloud security issues in cloud safety, and on the concept of cloud security, characteristics, The present situation and the development situation are analyzed. Keywords: cloud security, cloud computing; security technology analysis of trusted cloud security cloud

Analysis of security based on cloud computing theory

Analysis on the security research based on the cloud computing theory Shan various applications based on cloud computing have been promoted in many fields of society, and the security of cloud computing has followed.   Based on the concept of cloud computing, this paper focuses on the security status of cloud computing services, the related concepts of trusted cloud security and its key technical support, and the non technical means of trusted cloud security. Keywords: cloud computing, security, trusted cloud, security cloud temp_12121108 ...

Research on a cloud computing security model and architecture design

A study on cloud computing security model and architecture design season one, Kang Jiabao, Pan, Kaozicho because of the security problems of cloud computing, cloud computing, which has the advantage of large, dynamic, open and distributed computing environments, is now more of a small, static private cloud model. In order to solve the security problem of cloud platform, the paper constructs the corresponding cloud Security Service platform and related service from user dimension, data dimension, business peacekeeping environment dimension, and designs a lightweight cloud computing multidimensional security platform architecture based on Eucalyptus platform. To achieve cloud platform security, cloud clothing ...

Cloud computing risk: ensuring virtual secret key security

When it comes to the physical control and/or ownership of others, it is likely to be the case that the security of the virtual machine is the key to the cloud. Key management is still a daunting challenge in the best of circumstances. At the same time the key can access control of the data, poor key management and storage can lead to harm. When third parties control physical and logical access to your infrastructure, additional risk is added, and it becomes more difficult to secure key security. The main reason is key management and key storage related. It's like you rented a bank safe to keep the keys. Authorize your key so that your provider can ...

Total Pages: 2156 1 .... 1392 1393 1394 1395 1396 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.