Research on the method of data privacy protection in cloud computing Nanjing University of Posts and telecommunications in this paper, based on the distributed characteristics of cloud computing, the secret sharing strategy is used to establish the encryption scheme with distributed Su Hong. At the same time, in order to manage the multiple identities of cloud users uniformly, the identity-based public encryption Algorithm (IBE) is adopted and the secret sharing strategy is combined in IBE. The solution is primarily for untrusted cloud computing service providers, so use the appropriate threshold strategy to reduce the threat of data disclosure from a single untrusted service provider, and ...
Keeping Data Private while Computing at the Cloud Yuriy Brun Nenad Medvidovic ensuring the privacy of that computation A significant challenge. In the monitors, we address ...
McAfee is upgrading its cloud security platform to address "three major traffic channels" because of the new features of e-mail, web, and identity information. "Identity, Web, and e-mail security components will be the prerequisite and key to deploying cloud-based solutions for Enterprise IT customers in the next few years," said Phil Hochmuth, project manager at IDC Security Products services. "Here is a brief introduction to the new features added to the Maikfeil security platform: • Data loss-prevention capabilities in email and web gateways &mi ...
14 months ago, SkyWire began to use the Microsoft Cloud Security Services Windowsintune software, will use the cloud security services, in the network marketing platform across a number of industries to develop and sell, so it is very meaningful to the company. In the past six months, the security cost of in-house software deployment for small and medium-sized enterprises is 90,000 U.S. dollars, including the IT staff of 330 dollars a month, this is the Intune software annual subscription fee, Intune software protection Company's laptop desktop computers and mobile phones are not virus-infected, and prevent malicious software; ...
Overview of Virtual machine system security Shen Zhi, Zhang Qun, Dichen with the wide application of cloud computing, virtual machine technology has been revived and developed, but it also brings new security threats, so the research on the security threat and defense of virtual machines has become a hotspot in the field of computer security. Taking the current widely used virtual machine Xen as an example, this paper analyzes the existing vulnerabilities and threats according to the technical characteristics of virtual machines, and puts forward the corresponding defense and protection methods from the angle of computer security science. A more comprehensive summary of the current domestic and foreign research on the safety of virtual machines related to the ...
Research and implementation of data center security system based on cloud computing level, Li Jizhen, Zhang Fengchen, Li Xiaobo, Yu Min in view of current data center security status, take the traditional data center security guard system as the framework, according to the cloud computing requirements and characteristics, adopt "cloud security" Architecture for data Center security system proposed a new solution, and according to the design of the program using some key technology to the relevant modules in the laboratory environment Control implementation, through the intuitive interface to the security of the data center, to protect the number ...
Cloud computing model based on Peer-to-peer and its security analysis Shen Jingpo Chin The paper presents a reliable, scalable, low-cost file-sharing model Pa-cloud by combining Peer-to-peer technology with cloud computing. This paper introduces the process of downloading and updating Pa-cloud files, and analyzes the security of the system. By comparing experiments with Pa-cloud, it is shown that Pa-cloud can effectively improve the scalability of the system and reduce the cost of service providers. Keywords: peer-to-peer network cloud Meter ...
A distributed approach to Privacy on the Cloud Ernesto Damiani, Francesco Pagano Davide Pagano we a a approach where con Fidential data is stored in a highly distributed D ...
Amazon's cloud computing center in North Virginia State, in April 2011, has been hit by a number of websites that use the Amazon service's answer service Quora, news services Reddit, HootSuite and location tracking service Foursquare. The interruption lasted nearly 4 days. For this reason, Amazon has issued more than 5,700 letters of apology to users for the downtime event, and has provided 10-day service points for the affected users. March 2011, Google mailbox outbreak of large-scale user data leakage incident, about 150,000 GM ...
April 25, 2012, Global virtualization and Cloud Infrastructure Leadership VMware Inc. and Symantec Company (NASDAQ:SYMC) announced the five most recent security solutions for integrated VMware Cloud Infrastructure suite, designed to provide extensive protection for both virtual and cloud environments, And for the enterprise to save operating costs. With the latest VMware Integration solution, Symantec will support customers with data loss protection, it risk and compliance, data center protection, security information and event Management (SIEM), and endpoint protection solutions ...
Public Cloud makes enterprise it uneasy. For one thing, this is a disruptive technology-transforming computing resources into a shared public facility. This technology also leads to a lack of transparency and less control of IT assets. BYOD has led to concerns about data loss and security, and no wonder some cloud novices have suddenly rushed out of the hive. Searchcloudcomputing.com with Jim Reavis, who is the executive director of the Cloud Security Alliance (CSA), on the public cloud and private cloud real security issues and the enterprise into the cloud ...
When it moves to the cloud, companies need to consider basic security measures, just like locking their own doors. Here are 10 basic security techniques to help you. 1, to confirm the existing basic control is the core of the enterprise security concept. They contain nearly 60 security controls that protect your enterprise's most important assets. They focus on ensuring that cloud technology is applied to your business and that your operations are in compliance with security controls. 2, focus on workload cloud security, corporate credit directly related to the workload. Each workload has unique considerations, such as management factors and ...
Cloud Security Program is the latest manifestation of information security in the network era, it integrates the new technologies and concepts such as parallel processing, grid computing, unknown virus behavior judgment, and obtains the latest information of Trojan and malicious programs in Internet through the network of a large number of clients ' abnormal monitoring of software behavior. Transfer to the server for automated analysis and processing, and then distribute virus and Trojan solutions to each client. Cloud security is the concept of enterprise creation in our country. Is cloud services secure? The US government has used practical actions to tell you that many people do not dare to attempt cloud computing and cloud storage because of the ...
Vendors want to tailor patterns-and eliminate the need to manage and update software hardware-to be attractive, but cost is not the deciding factor. The new study found that over the past three years, companies wishing to reduce their investment in safe management have increased five times-fold. As part of the marketing strategy for small and medium-sized Enterprises, Microsoft has released the research results of cloud security. The survey of small and medium-sized enterprises, whether Microsoft or other suppliers, has found that over the past three years, companies that want to reduce security investments have increased five times times. They also spent 32% less time on safety management. Sky ...
An approach for Data Storage security in Cloud Computing The main objectives of this monitors are, 1) to prevent data access from Unau thorized access, it propose a distributed scheme to provide ...
The rapid development of information technology is always accompanied by the breeding and trouble of various security problems, and cloud computing is no exception. As a representative of a new generation of information technology, cloud computing has subverted people's understanding of the application of information and business models, which ushered in the innovation trend of the IT industry, and once again pushed the safety issue to the forefront, which attracted the attention of it manufacturers at home and abroad. Recently, the domestic information security manufacturers Chili Technology in Beijing, held a Jhse Security cloud Solutions Conference, the first to the outside world to publish the pepper map technology in the cloud computing security concept, and focus on the cloud computing infrastructure platform Construction proposed ...
1. What is cloud computing security? In the rapid development of the Internet today, the security of the network is an unavoidable problem, especially the various security threats to the business system of potential harm gradually magnified today, any IT system construction is difficult to ignore the existence of security problems. and a variety of private cloud or public cloud of data Center building, safe, efficient business delivery is its success and necessary requirements. Every moment of the construction of the link, including the physical environment of the building process, cloud computing business system construction, server storage resource pool deployment, as well as the operation of the system operations, are security risks of the dive ...
Brief discussion on accounting information security Wang of small and medium-sized enterprises under cloud accounting Hu Renxiang Cloud computing has brought a new direction to the accounting informatization construction, the appearance of cloud accounting has lowered the small and medium-sized enterprise accounting informationization cost problem, accelerated the process of our country enterprises accounting informationization construction. Based on the concept of cloud accounting, this paper discusses the advantages that cloud accounting brings to the accounting informatization construction of small and medium-sized enterprises and the possible accounting information security problems, and puts forward the cloud from the cloud technology itself, the supplier, the small and medium-sized Enterprise's own management and the national relevant regulation four.
CLOUD COMPUTING and PRIVACY Regulations:an exploratory STUDY on ISSUES and implications Dr. Mohammed, Dr Alsudiari Va Sista Thus This monitors explores to elicit possible ...
In the fourth session of China Cloud Computing Conference Roundtable discussion, many guests on the current cloud computing generally accepted security concerns have said: cloud computing security is not insurmountable obstacles. "Security is not an insurmountable obstacle, to be perfected and solved continuously in practice," said Ni, a deputy director of the China Institute of Electronic Computing and the vice chairman of the China Academy of Engineering. "Safety is a comprehensive problem, not only the safety of technology, but also the laws, policy rules and so on," said Wang Endong, vice chairman of the China Electronics Society's Special Committee on Cloud Computing, senior vice president of Wave group and president of Wave electronic information company.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.