Cloud era: The security of personal information is too much controversial

The popularity of smartphones and the development of mobile interconnection have allowed more and more users to put interactive social, business banking or entertainment on the mobile platform. The emerging cloud computing, cloud services is a strong advocate for users to upload personal data to the network server for storage, backup, to facilitate users to use different types of Internet terminals for anytime and anywhere access. Cloud computing is providing unprecedented convenience and speed to our lives, but at the same time the new security threats seem to follow--20CSDN website more than 6 million user database leaks; Then, Renren, mop and so on ...

Research on cloud data storage security and Privacy protection strategy under the environment of IoT

Research on cloud data storage security and Privacy protection strategy in IoT Environment Ming, familiarise, Liang Wenhui, Raihai, early morning IoT relies on cloud computing's powerful data-processing capabilities to implement information intelligence, and the current cloud computing management of data and services does not deserve the full trust of users. In order to ensure the accuracy and privacy of the data in the cloud, the paper puts forward a security and privacy protection strategy for cloud data storage under the environment of IoT environment. The experimental results show that the scheme is effective and flexible, and can resist byzantin ...

Eight ways: To become a cloud security expert

In a public cloud environment, where there is relatively little information on how to secure data, how do enterprise IT consultants and IT staff get information about cloud computing security? Through a survey, it consultants and IT staff get information about cloud security through three sources: niche meetings, large conferences, and networks.   Now the author of these eight ways to all of you to make an introduction. Cloud computing Security Niche Conference: 1. November 2011 16 ~ 17th, the Cloud Computing Security Alliance CSA will hold CSA2011 in Orlando, USA ...

H3C: The leading operator Cloud Security road

In the field of cloud computing applications, operators have always been a force to be reckoned with. In order to occupy a more advantageous position in the next round of market competition, the operators represented by the telecom enterprises are at the forefront in the cloud computing construction tide. China Mobile, for example, has invested heavily in building the big cloud, and Unicom has released its cloud plan, which is also part of its strategic transformation.   This is also evidenced by the launch of the Cloud Computing Center project, which is dominated by telecoms companies around the world. Operators in the cloud computing gradually exerting force, on the one hand to find a new industry ...

[Document] Virtual security situation in cloud computing environment

State-of-the-art virtualization Security in Cloud Computing Zhongyuan Qin, Qunfang Zhang, Changsheng Wan, yuxing Di in this p Aper, we review and classify the State-of-the-art Virtu ...

Cloud computing security issues and access control solutions

Cloud Computing Security Issues and Access control FX Young-gi Min, Hyo-jin Shin, Young-hwan Bang at this monitors, the Auth ORS tried to study the threats and attacks ...

Is the cloud security infrastructure really worth it?

On cloud security issues for small and medium-sized Enterprises, Microsoft released this week the results of the use of cloud security software. Both Microsoft and other vendors found that their overall it budget ratios were 5 times times less secure than they were three years ago. Their time spent managing security is 32% of the use of prefabricated software. 14 months ago, SkyWire began to use the Microsoft Cloud Security services Windows Intune software, will use the cloud security services, in the network marketing platform across a number of industries to develop and sell, so it is very meaningful to the company. ...

Trend technology releases deep security 8.0 escort Cloud computing safety

June 19 News, Trend Technology in Beijing recently held a new media communication, the official launch of the server and virtualization security products deep 8.0. Trend technology says Deep Security 8.0 is a server-safe platform that integrates malware, patch management, patch fixes, firewalls, IPS, WEB Application Protection, integrity monitoring, and log checking in one solution. For physical servers, Deep security 8.0 is based on the cloud automatic event whitelist and configurable ...

Document] Mobile Cloud Computing Security Considerations

Mobile Cloud Computing Security Considerations Soeung-kon, Jung-hoon Lee, Sung Woo Kim This monitors discusses the different Security issues this heroism about how safe the mobile Cloud Co ...

Cloud computing safe Road at foot

Cloud computing Tornado Storm August 9, 2006, Google CEO Eric Schmidt in the search engine conference for the first time "cloud computing" (Cloud Computing) concept. Since then, the concept of "cloud computing" has expanded at an extremely rapid pace, and everything in the ICT industry has been tagged with "cloud" and flown into the air. In 2011, Google and Baidu search for "cloud computing" and "cloud computing", respectively, feedback more than 100 million and 4千多万条 results, "...

Six benefits of cloud computing technology for security

1. Data centralized storage reduces data disclosure: This is one of the most talked about by cloud service providers. Before the advent of cloud computing technology, data was often easily compromised, with cloud security technology, which made it easier for security monitoring to be implemented in data-centralized storage.   By storing in one or several data centers, data center managers can manage the data in a unified, responsible resource allocation, load balance, software deployment, security control, and more reliable real-time monitoring of security, but also to reduce user costs. 2.

[Document] Cloud security architecture and trends

Cloud security architecture and trends China Unicom 2011.9 [directory] ——— cloud security background ——— Cloud Security Development ——— Cloud Security Architecture and trends download address: http://bbs.chinacloud.cn/showtopic-10236.aspx

Thinking of solving cloud computing security problem

Characteristics of cloud Computing application environment Many people talk about cloud computing, always in good faith to ignore the internal data center itself in the security of a lot of deficiencies, but assume that if the application and data in the enterprise internal data center is foolproof and very stable. In fact, we have a detailed comparison of cloud computing centers and enterprise data centers in the following four areas: 1. High availability In addition to some large enterprises, large machines and very expensive high-availability solutions (such as IBM Power HA) are used to ensure that core applications reach ...

Dispel See Cloud security

Recent cloud security topics are hot, but many colleagues don't know what cloud security is all about. This article attempts to work with colleagues on the topic of cloud security. Mention cloud security, not to mention cloud.     So what is a cloud? A, God horse is cloud blue skies, cloudless, for us ordinary people this means a good weather. However, for a leader in the field of information security, there must be another concept of "cloud" in our minds. Because in the computer field, "Cloud" is some can self dimensional ...

The fog of cloud computing security

The current IT industry has come to the point of saying cloud computing, but most of the confused, especially it users, still have doubts about it, often thinking it's not time to use cloud computing. Why not? Because of security, because the current IT products are basically able to solve the existing problems of enterprise users, because users need to see the cloud mature application case ... But the point is that cloud computing is a better solution than the traditional it architecture. The analogy is that, when you can open the faucet in your own home to get the water you need, you basically do not want to ...

Keep enterprise data secure in the public cloud environment

Considering the maturity of IT outsourcing services, enterprises will naturally choose public cloud computing services in order to achieve greater cost savings and resource utilization. That is not the case. The security questioning of public cloud services is the main reason why enterprises dare not adopt public cloud service.   For most businesses, the risk of data security makes them very fearful. This article will outline why companies should adopt public cloud services for better benefits, and what are the key security issues and challenges facing the adoption of public cloud services, as well as in ...

Asia Anti-Virus conference focus on cloud Security 360 setting industry standards

360 Cloud security system unveiled in Asia Anti-virus conference with the 14th session of Asia Anti-Virus Conference (AVAR2011) held in Hong Kong, "cloud security" technology has become the focus of the security industry.   As the first company to launch the cloud killing engine manufacturers, 360 invited to participate in the Conference, and by the 360 Vice President Lu Jianfeng keynote speech, with Asian anti-virus researchers to share 360 cloud security system technology innovation. It is reported that the cloud killing engine was first launched by 360 security guards in September 2009, is the first cloud security concept into large-scale applications of the network ...

Three sides start to reduce cloud security worries

Cloud computing can accelerate it responsiveness to changing needs.   However, cloud computing data management has been extended to the service provider's infrastructure, and the traditional it operating model is incompatible with cloud integration, which complicates the problem. Through HP's new consulting service, it provides a comprehensive approach to building a secure cloud strategy while assessing storage requirements for managing data in the cloud effectively.   These services include best practices, management scenarios, and cloud simulations to train customers to successfully protect and store data in a cloud environment. Use protective clouds ...

Protecting API keys in the cloud improves enterprise cloud security

The API key, like the SSL key, is the top priority in security policy. Many people verbally say they want to protect the information in the cloud, but in fact we are all stones in cloud security. Most organizations use some form of API key to access cloud services. The protection of these API keys is important.   This article will discuss the issue of protecting API key and recommend some solutions. In the 2011, the importance of API keys was gradually recognized, and companies were more aware of their full protection of these keys. After all, API keys and access to sensitive information in the cloud have ...

RSA chief Technology Officer: Cloud Security focuses on identity authentication and compliance

November 2-3rd, RSA Conference held in Beijing, this is the second time RSA conference to China, EMC Information Security Division, RSA chief technology officer Bret Hartman in an interview with CNET reporter, described RSA in the cloud security deployment and planning. Bret Hartman says that as more it shifts to cloud computing, the security of the cloud becomes a very important issue and is critical for RSA. Earlier this year, RSA launched the cloud Security program, called Cloud Trust Authorit ...

Total Pages: 2156 1 .... 1404 1405 1406 1407 1408 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.