The task execution code security mechanism in the open cloud computing environment

The task execution code security mechanism in the open cloud computing environment Xu Xiaolong Yang Geng Wang Ru cloud Computing can fully aggregate the computing resources of Internet network server and edge terminal nodes for greater benefit. However, the deployment of the computing task to the user terminal implementation has brought security risks. The behavior of the massive terminal nodes belonging to different users is obviously unreliable and the computational security is difficult to guarantee. In particular, a user terminal node that acts as a task performer may tamper with program code or data in a task, returning false results,...

"Cloud computing" safe landing

November 30, 2012, Beijing Network Royal Nebula Information Technology Co., Ltd. in Beijing convened a cloud computing security products "Royal Cloud" of the results of the exhibition. At the meeting, the network Royal Nebula Product director De Weiheng to the participants more than 10 media friends to share the "royal Cloud" products achieved, showing the "Royal Cloud" product advanced performance. De Weiheng said: "The Internet nebula has been committed to the network security industry security Gateway products in-depth development, whether the previous release of the multi-service fusion security gateway, Civil Security gateway, 320G Cloud Data Center security gateway or now released cloud computing virtual ...

Encryption and data security based on cloud computing

More and more different cloud computing applications are creating a "golden" that stores data encryption engineers. Encryption has always been an important security tool, but in most cases we have not used this tool frequently to protect stored data.    This has changed since the advent of cloud computing and the impact of numerous public data leaks. Currently, the reason for using cloud computing encryption may not be as you think. The most common idea is that your cloud services administrator should protect your data (mainly public cloud computing). ...

Privacy Research in cloud computing

Privacy research in cloud computing Nanjing University of Posts and telecommunications Huang, privacy issues in cloud computing second, privacy protection and analysis related research III. software architecture and Privacy Iv. Privacy analysis framework in cloud computing evolution [download Address]:http://bbs.chinacloud.cn/ Showtopic-15358.aspx

Online payment security and cloud identity authentication Keypasco

Objectively speaking, the online payment certification Keypasco This solution raises a question that deserves deep thinking, namely whether we need to continuously upgrade and invest in hardware for security, can we realize online identity security authentication through the new way of cloud service and low cost? Online payment security issues have been a lot of attention, a brief summary, the following three aspects can be seen online payment security in the next few years may become increasingly headaches. One is the growing number of online payment users. CNNIC released the 30th China Internet development Form ...

Gartner: Cloud service outages are more risky than data leaks

Security issues are still a major restraint in the deployment of cloud computing resources in the enterprise, and a Gartner analyst says the biggest problem is not that data could be corrupted in the cloud, but that cloud outages could occur, leading to data loss. Gartner Cloud security analyst Jay Heiser says there is a view that the biggest risk of using cloud computing is that key data may be compromised, but we rarely see such a scenario. In 2011, Sony was exposed to data leaks, involving tens of millions of customers in its cloud, also appeared ...

IaaS Security risk Resolution 6 recommendations

IaaS provides users with computing, storage, networking, and other basic computing resources on which users can deploy and run arbitrary software, including operating systems and applications, without the user managing and controlling the underlying infrastructure, but controlling the operating system, storing, deploying applications, and having network components such as host firewalls The ability to have limited control over permissions. 1, customer data controllable and data isolation. For data leakage risk, the resolution of such risks is primarily through data isolation. There are three ways to achieve data isolation: first, let customers control the networks they need to use ...

Cloud security trick: Ten tips for protecting virtual systems

Now, more and more enterprises are deploying desktop and server virtualization technology, all kinds of racks, computing, storage, network and other resources are integrated into the resource pool. And the future trend is also towards the "smaller performance is stronger, less energy consumption, simple and easy to use" development. However, as enterprises move more from the physical platform to virtualization, cloud service creation and deployment is becoming more and more convenient, security has become a top priority issue. So, in the cloud environment, how to effectively protect the virtual system? Below, we provide you with the following ten tips: First, the traditional security control can still be used in the transition to virtual ...

Cloud process stumbling block: cloud security and data confidentiality

Chris Weitz, a head of Deloitte Consulting, is primarily responsible for the financial Services Consulting team's recommendations for cloud computing. He has been in this position for five years, before working for a Deloitte Global consulting service for nine years. He has over 30 years of experience in the IT field. As a result, Weitz has witnessed the impact of cloud computing on the IT industry. In a recent survey by Deloitte on the challenges of implementing a mixed cloud environment, 950 people voted, 49% voted for cloud security and data confidentiality, and he believes that the main cloud providers are actually much better than people think. ...

Security as service: the advantages and risks of cloud security

The field of information security hides a dark secret from us: We are fighting a losing war and losing our position at an alarming rate in the form of data leaks. This is not because we are not trying to protect the assets of the enterprise, but because it is a simple fact: the attackers have more time and tools to attack than our defenses. Some enterprises simply do not have enough money to invest in the resources needed for information security programs, while others try to deploy "half-baked" information security programs to meet compliance requirements with minimal personnel and budgets. Visible, we are fighting a war and ...

The significance of information security level protection in cloud computing

Cloud computing is another major technological change in the field of information after computers and the Internet. While the advent of cloud computing provides new opportunities for development, the security of cloud computing remains a serious challenge. Since 1994 the State Council promulgated the "People's Republic of China Information System security Regulations" (State Council [order 19,941,147th), Information system security level protection system gradually perfect mature. Has played a significant role in the traditional architecture of the information system. The advent of cloud computing has brought a series of changes in the architecture of the system, but no matter how it develops, it belongs to the letter ...

The bigger the cloud, the safer it is.

The general view is that 2012 is the year of China's cloud computing practice. Indeed, this year is China's cloud computing from concept discussion to landing practice, from technology-driven to application demonstration of the key year. In the government, operators, cloud services and users of the joint efforts of the entire Chinese cloud market has been rapid growth. In terms of the number of companies offering cloud computing services, only a handful of companies in 2011 were able to provide more sophisticated cloud products and services, and this year more companies joined cloud computing service providers to promote the development and prosperity of cloud computing. Many companies that have traditionally provided IDC services have also been ...

Cloud security issues and precautionary measures inventory

The first problem that cloud security faces is the technology and management problems in the virtualized environment. Traditional protection mechanism based on physical security boundary is difficult to effectively protect user application and information security based on shared virtualization environment. In addition, the cloud computing system is so large, and mainly through the virtual machine to calculate, in the event of failure, how to quickly locate the problem is also a major challenge. Secondly, it is the problem that the service model of cloud computing separates the ownership, management and right of use of the resources. Cloud computing, a new service model, separates the ownership, management, and use of resources.

2013 Network threat Prediction: Cloud computing, search and mobile

Researchers at the Georgia Tech Information Security Center recently released a 2013-year network threat forecast detailing the most serious computer security problems they see in the coming year. Cloud computing is first on the list: using cloud computing for malicious purposes. The flexible configuration that allows legitimate business to quickly add or subtract computing power can also be used to quickly build a powerful zombie computer network to complete an attacker's various ulterior motives. Microsoft Windows Azure Outstanding Engineer Yousef Kh ...

Cloud security: Control of the most important standards difficult to introduce

"For security, cloud computing is a nightmare!" "Chambers Shizhini, chairman and CEO of Cisco's board of Directors, rsa2009confer-ence the keynote speech at the recent RSA Conference. Amazon's "Cloud computing Portal" adds a heavy footnote to this pessimistic tone. As of July 19, 6 cloud computing services, including EC2, have failed and data packet loss has occurred. EC2 in 2008 and 2007, respectively, had a wide range of failures. ...

Security in the CLOUD:A stakeholders ' s perspective

Security in the CLOUD:A stakeholders ' s perspective temp_12072215294431.pdf

Research on some theories and key technologies of mixed cloud service security

Research on some theories and key technologies of mixed cloud service security (ph. D.) Zhu Zhiqiang, Wuhan University This paper is based on cloud authentication and on the basis of security requirements such as authorization management, the paper studies the cloud identity management and authentication, authorization management model, cloud infrastructure security and so on, in order to improve the security of mixed cloud service. The specific research contents include: 1. The requirement of user authentication for resource access across the cloud under the hybrid cloud architecture, from the establishment of private cloud based on PKI system ...

Cloud security: Five lessons from Yahoo password attacks

A news incident last week attracted media attention, with nearly 450,000 passwords from 450,000 yahoo services called ' Yahoo Voice ' hacked. The comment on the incident said that hackers mainly through SQL injection (SQL injection) technology is the hacker from the database to information and then release the information of the main technology adopted. Even if the original article is modified, you can find the error if you do a check. Technology is the same, as every more in-depth discussion can find new problems. ...

Maintain data integrity and secure storage of public audit data in cloud computing

Preserving Integrity of data and public auditing for data Storage security in Cloud Computing Abhinandan p Shirahatti, p S khanag Oudar in this monitors, we utilize and uniquely combine t ...

McAfee Enhanced Cloud security platform features build stronger cloud Platform

For enterprises, deploying cloud technologies faces many challenges, not only to protect data residing in the cloud or through the cloud, to avoid sensitive data leaks, but also to protect departments, remote offices and mobile workers from cyber criminals, and more and more cyber criminals are starting to take advantage of emerging technologies such as the cloud, such as      , mobile apps and cloud APIs) to spread malware and launch targeted attacks. Phil Hochmuth of IDC, said: "Body ...

Total Pages: 2156 1 .... 1399 1400 1401 1402 1403 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.