Research on the security of virtual machine system facing cloud computing

Research on virtual machine system security for cloud computing Shanghai Jiaotong University Liu Qian cloud computing platform through the Internet to provide a variety of services, this open mode in the user-friendly access, but also bring potential security risks. The cloud computing platform usually takes the virtual machine system as the underlying architecture, so the security of the virtual machine system is the core of cloud computing security. In view of this background, this paper focuses on three aspects of virtual machine system security in cloud computing platform. Keywords: cloud computing, Virtual machine systems, malware, customer virtual machines, privileged virtual machines, virtual machine monitors, ...

Want to make your cloud data more secure? Byod!

The growing popularity of carrying your own device office (BYOD) policy has worried traditional advocates such as CIOs and security experts, but BYOD makes data more secure for organizations that already use software as a service (SaaS) solution. The reason is simple: BYOD reduces the likelihood of user error. BYOD refers to the policy of allowing employees to use their own computing equipment at work. With BYOD, companies cut the cost of hardware purchases and maintenance, and employees are free to choose which phones, tablets, or laptops best suit their preferences. ...

Sharing attack data is critical to protecting cloud computing systems

In the face of growing information storage and cloud computing services that complicate security technology deployments, individual businesses need to use new ways to share anonymous attack data, says Dave Cullinane, chief executive officer and Cloud Security Starfish LLC. Otherwise, it will face serious consequences. At the opening keynote address of the Tuesday Cloud Security Union Congress, Cullinane tried to motivate a roomful of IT security experts to change their security plans: implementing an intelligence based security strategy. Cullinane said the purpose of doing so ...

For cloud security, Fang, what do you think?

Network security is always a hot topic on the internet, but never got a satisfactory answer, and with the progress of science and technology, network security has become particularly important, entrepreneurs are trembling eyes, fearing that the day their own data disappeared, and at present a new technology has drifted into the country, Hit the internet industry is not small ripple, but also the security issue to the tiger, the service providers have to take the necessary protection measures. So this technology is called cloud computing. Why is called cloud computing, my understanding is that the user puts the data all to the third party database, ...

Four common misunderstandings in cloud security understanding

Recently, the vice president and chief analyst of Forrester Research, James Staten, described Forrester's research findings in the field of cloud computing at the Autodesk Innovation Design Technology Summit (Autodesk University, referred to as AU). The annual user conference, held by the European Parker, attracted 8,000 attendees, and cloud computing has always been one of the hottest topics in the conference. The main benefits of cloud computing include connectivity, mobility, flexibility, and the ability to compute indefinitely, which is easy for people to understand. However, ...

Key challenges of cloud services: Data security issues

In 2013, analysts say, big companies will spend more on cloud services, and they will also have stricter requirements for the security of cloud services. A survey of the development of cloud services shows that the Australian market is its early adopters and is now more mature, reflecting a broader global trend in cloud services. The latest research on cloud computing confirms that companies are moving from in-house deployment services and new cloud services applications to external devices and services, a major trend in the development of the Australian cloud services market, while Gartner ...

Mobile security platform strategy for cloud safety security

"Let security everywhere, let security disappear in the invisible." This sentence has been the goal of Zhao and CEO Mr. According to Mr. Zhao's expectation, the introduction of the An Tiuyun open platform will attract more enterprises and developers to participate in, which will usher in an orderly and benign competitive environment for the market. The security company has introduced the new concept of "dimensionality reduction" to the mobile security field, which is driving the development of the platform. This emphasis on mobile security has brought new development opportunities to the market. Tencent, Qihoo 360 and other companies have launched a similar product in 2012 ...

Cloud computing: A threat from the cloud

Faced with the temptation to save management costs, more and more companies are starting to use cloud computing services quickly, but most executives do not begin to seriously assess the risks of using the service or develop appropriate risk prevention measures. Of course, experts agree that the problem is that in the process of applying cloud computing technology, the associated risks are not easily identifiable, making it difficult to buy enough insurance. With the wide use of cloud computing technology, new risks arise. "Cisco 2012 Global Cloud Technology Network Survey" (2012Cisco ...

Golden Hill Private Cloud security system in the "Innovation Day" by the praise

September 13, as a leader in the field of enterprise cloud security, Jinshan was invited to participate in the "Innovation Day in China" event, attended by representatives of both the Chinese and Israeli government organizations. This event, Jinshan introduction of enterprise-level information security Solutions-Jinshan Private cloud security system, by domestic and foreign well-known manufacturers of concern and welcome. including RSA, Radware, Beyond Security, Checkmarx and other leading Israeli information safety vendors participated in the event. In the exchange, Jinshan to Israel information security manufacturers introduced ...

The disorientated Management strategy of applying Cloud Computing

The disorientated Management strategy of applying Cloud Computing Chiang Ku Fan Tien-chun Chen This study attempts to identify and Analyz e loss exposures Of&

Isolate Secure executing environnement for a Safe Cloud

Isolate Secure executing environnement for a Safe Cloud Yuehua Dai, Xiaoguang Wang, Yi Shi, Jianbao Ren, Yong Qi at this paper,we Make ' analysis ' the potential threat to a commodity ...

Cloud computing resource management to support security requirements

Supporting security Requirements to Resource Management in Cloud Computing Ravi Jhawar, Vincenzo Piuri and Pierangela Samarati We Address the problem of guaranteeing security,with ad ...

Active Immune isolation propagation model in cloud computing networks

The active immune isolation propagation model in cloud computing network is Xu Rongfei, Van Tong the related elements involved in cloud service abstraction, extracts its ecological defense characteristics, and establishes a Seir class propagation model with active immune isolation function according to the virus propagation theory in artificial immune system. The model can take proactive precautions against virus intrusion. Depending on the degree of network risk, different isolation strategies are adopted to maximize the security of service behavior in the cloud environment. Simulation results show that the model has high adaptability, robustness, intrusion tolerance and self-healing ability.

The main security threats and development trends of cloud computing

The status of network security in the whole informatization is known by every information worker, whether it is the personal computer of desktop system security, the communication security of network equipment, and the security of mail server and enterprise Information System. In China's security development process, stand-alone anti-virus and anti-virus used to be the last ten years of the most important form of the past century. And into this century, firewalls, intrusion prevention and stereo defense attacks have become new security solutions. However, with the development of the Times and the complexity of the Internet, these common technical means can not fully meet the challenge, the new situation of security issues face ...

On the security of Digital archives information in cloud environment

The advent of cloud computing has proclaimed the advent of Low-cost supercomputing, which has pushed human society into an era of hyper-sharing with its superior computing power, low cost and high efficiency, and the construction of digital archives has entered a qualitative change. In the past two years, all the archives have considered relying on the existing hardware network equipment to build a national and regional cloud computing platform to achieve the unified management of huge amount of archival information. Using cloud computing Architecture system platform, can make a large number of file servers work together to facilitate the deployment and opening of archival operations, rapid detection and recovery of system failures, to the daily ...

Encrypted Phrase searching in the Cloud

Encrypted Phrase searching in the Cloud Steven zittrower Cliff Zou A monitors introduces in the field of novel Rypted searching that allows both encrypted phrase searches and p ...

A comparative study of secret sharing algorithms for data security in cloud

A comparative STUDY of the SECRET sharing algorithms for SECURE DATA in the CLOUD S.jaya Nirmala, S.mary Saira Bhanu, Ahtesham a Khtar Patel in this monitors the configured of NonBlank SECR ...

How to use DLP tools to achieve cloud computing security?

One of the biggest concerns about using cloud computing is the potential risk to their data. Whenever we lose the physical control of our assets, we naturally become anxious about it. Since data-loss (DLP) technology has become one of the few technologies dedicated to protecting data, it is natural that we want to apply that technology to data protection based on cloud computing. At present, cloud computing has three different business can let DLP technology a show of skill. The first is to use it as a tool for controlling data migration to cloud computing. The second is to control the protection data in cloud computing ...

Security technology analysis of cloud storage

Analysis of the security technology of cloud storage forest Qingyun Zhao Shanbin Information Age Technology rapid development, human needs more powerful processing power, cloud computing technology emerged at the same time rapidly popular, and its auxiliary Sangwei cloud storage has been widely concerned and support. However, the data security problem of cloud storage has hindered its popularization and application, which has become the primary problem of restricting the development of cloud storage. The security of cloud storage is not only the traditional security can be completely solved, which involves some new key technologies and management technology. This article describes ...

Research on cloud computing identity authentication mechanism based on moving agent

Research on cloud-computing identity authentication mechanism based on moving agent Yang Nana, Wang Yang, Chen Shulong, Huang, Deng Kun This paper proposes a kind of identity authentication scheme for cloud computing environment according to the security requirement of cloud computing. Firstly, the paper designs the mobile agent structure model which is suitable for the cloud computing identity authentication scene, and then gives the cloud computing security authentication strategy based on Mobileagent. This scheme introduces the trusted third party to establish the quantitative trust evaluation of the authentication agent, and authenticates the authentication by the trust degree before each authentication.

Total Pages: 2156 1 .... 1398 1399 1400 1401 1402 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.