A secure cloud access method based on SDN Xu Yao Guo Zhigang Shouguo This paper combines SDN (Software tabbed Networking) technology to propose a new security cloud access model from the point of Access security. In this model, the cloud service provider (CSP) is concerned only with data processing and storage, and the third server provides the corresponding access security service according to the needs of the cloud users. In a SDN network, a third service can adopt a network management policy based on service name addressing, which makes the service easy to extend or recover. ...
A cloud access control system based on privacy protection Nanjing University of Posts and telecommunications Shaojiu This paper presents a new access control model in cloud computing environment, which can not only provide efficient and flexible access control strategy in complex and changeable cloud environment, but also have the ability to protect the privacy data in Mah-abe. This paper focuses on the principle of the ABE encryption algorithm, in the attribute allocation and multi-attribute authority, attribute cancellation three models to do the algorithm to improve, from the performance and security of a number of angles to design a suitable for the cloud computing environment access control model.
The era of application for Wang--the current situation of Huawei Cloud Access Gateway Yiu Ziyang Service Market and the challenges facing the network cloud service: Huawei Cloud Access solution Huawei Cloud Gateway Products Introduction Huawei Cloud Connect Network
Intelligent cities urgently need such a powerful information processing system. In this regard, the implementation of equipment has done a lot of innovative development. Rely on the virtual cloud computing Terminal Equipment Platform virtualization architecture, whether government departments or enterprises, no longer need to build computer rooms and physical servers alone. The virtual cloud Access platform has creatively applied virtualization and Server computing technology, the application of the display logic and calculation logic separation, the application as far as possible from the user device to separate, not to install and use the software on the local device, but the user feels like in the local application software, greatly reduced ...
Cisco believes that the advent of cloud firewalls means the emergence of the fifth generation of firewalls (the first four generations are: software firewalls, hardware firewalls, ASIC firewalls, UTM). Cloud Firewall 4 features include: Anti-Zombie network/Trojan, to prevent the network internal host infection, cloud detection-Global IPS linkage, cloud access-sslvpn, cloud monitoring-the only support NetFlow firewall, the NOC and SOC two integration. Firewall technology refers to the isolation between the local network and the external network of a defense system collectively. Firewall on the Internet is a very effective ...
Cisco believes that the advent of cloud firewalls means the emergence of the fifth generation of firewalls (the first four generations are: software firewalls, hardware firewalls, ASIC firewalls, UTM). Cloud Firewall 4 features include: Anti-Zombie network/Trojan, to prevent the network internal host infection, cloud detection-Global IPS linkage, cloud access-sslvpn, cloud monitoring-the only support NetFlow firewall, the NOC and SOC two integration. Firewall technology refers to the isolation between the local network and the external network of a defense system collectively. Firewalls on the Internet are a very effective ...
According to leading cloud computing industry experts, the market shift has shifted from software as a service to infrastructure as a service (IaaS) as the cloud computing market continues to evolve, giving organizations more choices and opportunities to manage them Own solutions and services. IaaS is a configuration mode in which organizations access computing resources on demand, including storage, hardware, servers, and networking components. Kevin Jackson, vice president and general manager of cloud services at provider NJVC (providing information services to organizations), said with this ...
Micro Cloud is a branch of cloud computing, which refers to some applications of cloud computing in a local scope. With the development of the Internet, the application of micro-cloud will be more and more extensive, just like today's micro-blog, the use of simple, convenient, fast. In the case of a family cloud, a family cloud is a cloud access point that is set up by a family, which can be called a micro cloud. Small and exquisite, full-featured. Micro-Cloud server is a feature that must be small and exquisite, full-featured, it must not be a full height or half high telecommunications cabinet, it is impossible ...
Recently, the days of the letter with Intel in Beijing jointly hosted the Cloud Data Center Border Protection Solutions Conference. Tian Rong Letter Company Senior vice president, Intel Company senior leadership, as well as more than 40 media reporters attended the meeting. As we all know, cloud data center is the most important link of enterprise informatization Construction, which carries a lot of confidential information of enterprise. After the Prism Gate event, Enterprise's sensitivity to data security has been much more than before, and the protection of Cloud data center has become the most important part of enterprise security construction. To this end, the days of the letter to join Intel released the latest generation of cloud data center boundary protection solution ...
The cloud storage market is gradually moving forward, and over the past few years the concept of cloud storage has largely remained in the developer domain, using cloud storage as a cheap, on-demand resource for storing data generated in some projects. Now we've seen the cloud begin to be embraced by traditional IT departments as a new way of storage provisioning and usage. With some manufacturers and users of the exchange, we believe that 2011 years will be closed ...
At present, a variety of personal cloud storage services have emerged, so that more users can enjoy the documents, pictures, videos and other content in the cloud storage and sharing. Compared with the traditional storage mode, cloud storage is undoubtedly more convenient, no need to carry any hardware devices, as long as there is a network can access the cloud storage files, and can be shared remotely with friends. West count My Cloud personal cloud storage Western data as one of the well-known brands in the storage industry, launched its latest personal cloud storage solutions My could series, my Cloud series ...
The cloud storage market is gradually moving forward, and over the past few years the concept of cloud storage has largely remained in the developer domain, using cloud storage as a cheap, on-demand resource for storing data generated in some projects. Now we've seen the cloud begin to be embraced by traditional IT departments as a new way of storage provisioning and usage. By interacting with some vendors and users, we believe that 2011 will be a key year, and that some midsize IT departments and businesses will consider putting cloud storage deployments on the agenda in the year.
The cloud storage market is gradually moving forward, and over the past few years the concept of cloud storage has largely remained in the developer domain, using cloud storage as a cheap, on-demand resource for storing data generated in some projects. Now we've seen the cloud begin to be embraced by traditional IT departments as a new way of storage provisioning and usage. By interacting with some vendors and users, we believe that 2011 will be a key year, and that some midsize IT departments and businesses will consider putting cloud storage deployments on the agenda in the year.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.