Cloud Computing Security

Learn about cloud computing security, we have the largest and most updated cloud computing security information on alibabacloud.com

Is the public key infrastructure moving to a public cloud secure?

Moving security controls such as public key infrastructure to cloud computing can be a real cost savings, but is cloud computing security strong enough to ensure its security? When you consider the different components of a PKI-based system, the public key infrastructure is clearly gaining a meaningful foothold in the IT field. From certificate licensing to certificate revocation lists to the registration structure, it is very obvious that ensuring the security of communications within a PKI environment is a very computational resource-intensive task. In view of this, the phase ...

Research on security Service mechanism in cloud computing

Research on security Service mechanism in cloud computing Fujian Normal University Cao Xi with the rapid development of cloud computing technology and applications, security issues become increasingly important. It is of great theoretical and practical significance to study and analyze all kinds of security problems faced by cloud computing comprehensively. This paper focuses on three types of security services in cloud computing: Secure storage services in cloud computing, secure authentication services in cloud computing and secure access services in cloud computing, including: 1. Cloud computing Security Storage services: In the cloud storage network environment, the Security Storage protocol SSP (Secure Store) is designed.

Network security threat and its prevention based on cloud computing

Network security threats based on cloud computing and its prevention Huang Zhihong, Hullie, Zhang introduces the concept and architecture of cloud computing and discusses the security issues facing cloud computing.   Based on the research and analysis of cloud Security Strategy and network security strategy, this paper designs a secure cloud computing framework from cloud, client and cloud and client interaction 3, and expects to provide some reference for cloud computing security prevention. Key words: cloud computing; Security policy; Security Framework Temp_12 ...

[Document] Research progress of cloud security and development trend of technology solutions

Research progress of cloud security and development trend of technology solution Chen Wang Jiqing is a gap in the development of cloud computing-security, this paper introduces the concept of cloud security and its connotation, and expounds the main directions of cloud security research and the current situation and development trend of the major manufacturers ' technical solutions of cloud security research. This has a certain reference significance for the development of cloud computing security in China. Key words: Cloud security Technology Solution temp ...

"Password Gate" event for China cloud computing security sounded the alarm

A few days ago, China's Internet outbreak has been the most widespread, the largest and most harmful leakage incidents, the cumulative leak user password up to 230 million. It is also predicted that because users may use the same registration name, mailbox, password in other sites that are not compromised, the disclosure will indirectly affect the information security of a total of 500 million accounts. Such a serious password leak has once again put the Internet security issue on the cusp. Since China's current Internet applications are used to communicate or publish information, users are still relatively little stored in private data from operators. However, with the widespread popularity of cloud computing, the number ...

Eight reasons why cloud computing is more suitable for small companies

The April 9 News, according to foreign media reports, cloud computing for a variety of enterprises to bring the cost of business, the advantages of cloud computing provides the advantage for the newly established small companies are particularly obvious. But there is also the opposite view that cloud computing is only significant in large companies. On the one hand, the economic benefits of cloud computing in the original budget is not much of the small companies clearly show no advantage, on the other hand, large companies cloud computing security, integration and other common problems in small companies are not serious. But there are still eight reasons to conclude that small companies are more suited to using cloud computing. 1. Scale benefit: Big Company's ...

Security will become a key factor in the popularity of cloud services

Recently, a cloud computing research report sponsored by Microsoft showed that cloud computing is a good way to effectively increase security and save costs for those small and medium enterprises that actually use cloud services. The report also said that among those SMBs that did not use cloud services, the main concern was cloud computing security issues and the cost of cloud migration as an obstacle. Tim Rains, director of Microsoft's Trusted Computing, believes that the grave of this research lies in unearthing the expectations of SMEs for cloud services and at the same time experiencing and experiencing cloud services.

Research on security evaluation model of IAAS layer in cloud computing system

Study on the security evaluation model of IAAS layer in cloud computing system the Li Chuanlong of Inner Mongolia Agricultural University is as follows: (1) This paper summarizes the cloud computing security Service and technology support and cloud computing standards at home and abroad, and studies the key technologies of the IAAS layer, and compares the existing two open source cloud platforms. To find out its pros and cons. (2) detailed analysis of the Cloud Safety Alliance (Cloud Security ALLIANCE,CSA) of the nine threats, at the same time the IAAS layer of the unique threat of detailed adjustment ...

Security identity authentication of cloud computing based on OTP authentication method

Cloud computing security identity authentication based on OTP authentication Caoyang in view of the information security problem brought by cloud computing, this paper studies the identity authentication method under the cloud computing platform, and analyzes the loopholes in the authentication method of the first password (OTP). A secure identity authentication scheme based on OTP authentication is proposed in combination with elliptic curve cryptosystem. This scheme can realize two-way identity authentication between service and user, effectively prevent man-in-the-middle attack, reduce information leakage and realize secure communication. Security identity authentication of cloud computing based on OTP authentication method

Cloud security: On several security risks of cloud computing services

The solution of the security problem is the key factor of whether cloud service can get the user's approval, and cloud security is one of the main obstacles to the current cloud computing application. In addition to the possible system failures of large-scale computing resources, cloud computing security risks include the lack of uniform security standards, applicable regulations and privacy protection for users, data sovereignty, migration, transmission, security, disaster preparedness and so on. Cloud security can be divided into two categories in nature, one is the user's data privacy protection, the other is the security of traditional Internet and hardware devices. In data privacy protection, user information is stored in their own ...

Cloud computing Security: The pros and cons of cloud encrypted data

With the spread of cloud computing, businesses are storing more and more of their core businesses and important data in the cloud, but companies are increasingly worried about data stored in the cloud.   At this point, more cloud encryption service providers have sprung up. Many studies have shown that there is a big divergence between cloud service providers and their customers about who should be responsible for the security of customer data: Suppliers put their responsibilities in the hands of customers, but customers generally disagree. According to the Ponemon Institute last year ...

Cloud computing security: Experts talk about the path of password cracking in the cloud

On-demand cloud computing is a fantastic tool for companies that need some computing capacity in the short term but don't want to invest long term in fixed assets.   For the same reason, cloud computing is also useful for hackers-many hacking activities involve passwords, key cracking, and other forms of brute force, all of which require expensive and highly parallel computations. For hackers, there are two main sources of computational resources on demand: The Zombie network of consumer PCs and the infrastructure of services provided by service providers (IaaS). Each form ...

NET Cloud and Sky Cloud technology to reach a strategic partnership for computing security

With cloud computing surging, in order to cloud computing landed, better do cloud computing, the industry's leading enterprises in various fields are carrying out a series of cooperation. Recently, Beijing network Royal Nebula Information Technology Co., Ltd. and Beijing Sky Cloud Technology Co., Ltd. on cloud computing security in the area of close cooperation reached a strategic agreement. Beijing Network Royal Nebula Information Technology Co., Ltd. by Lenovo Network Imperial Technology (Beijing) Co., Ltd. renamed, its predecessor is Lenovo Group Information Security Division. The net nebula locates in the specialized information security technology, the product, the service and the solution Solution Provider, has the independent intellectual property product, and in ...

Cloud computing is widely trusted

According to the latest cloud computing survey, 82% of today's IT professionals trust cloud computing because they believe the power of cloud computing is strong enough to give cloud computing absolute trust when it comes to the heart of some security issues. "Security" is always the single most watched of sensitive data, and it is even more pronounced when cloud services involve corporate firewall issues. Although the data shows that many U.S. companies still have doubts about cloud computing security, more and more applications of cloud computing have become a necessity. The survey also showed that 52% of respondents included safety ...

Blue Coat won the "SC" magazine's Best Cloud Security solution Award

May 27, 2014--blue Coat, a leading manufacturer of business security technology, recently announced that its products have been named "The Best Cloud computing security solution" and "the best Web Content management Solution" by SC Magazine.   These two products provide the hybrid cloud capabilities required by the enterprise, representing the highest level of the information security industry and the award for the best solution! "Security has never been more important to businesses, governments and consumers," says Dr Hugh Thompson, chief security strategist at Blue Coat.

Cloud computing Security challenges

Security challenges in the cloud computing environnement Sudha M, B Chandrashekar and Sumithradevi K A This monitors discusses the SE Curity challenges and data security in particular, in t ...

Trend Technology releases cloud ERA new strategy pilot cloud computing Security tour

April 24, 2012, Trend Technology announced in Taipei's "Cloud Next-2012 Asia-Pacific Media conference" on the new cloud Era strategy: "3C" cloud Computing (Cloud), it consumption (consumerization) and risk control Over disorientated), designed to help customers deal with the security challenges of cloud security, mobile device protection from IT consumerism, and the emergence of new technology trends such as advanced persistent threats (APT). Trend Technology Global CEO Chen ...

Cloud Security Greatest risk: unclear security responsibilities

The advent of the cloud security era, the Internet's resources to share the characteristics of the ultimate, but also for cloud computing security controversy is also uproar. More and more companies are turning their corporate security into corporate cloud-computing security vendors, trying to use new technology to keep their corporate data from leaking. But in practice, because IT service customers take it for granted that their cloud providers should assume security responsibilities, this makes these customers vulnerable to attack.   At the same time, virtualization and cloud computing also play a role. Science and Technology Business Research company is responsible for the server ...

Research on user behavior habit verification model in cloud computing

Research on user behavior habit verification model in cloud computing Guo Fuliang Zhou Gang Chi Liang based on the analysis of cloud computing security status, this paper establishes a user behavior verification model based on stochastic network model to introduce the behavior habit of user accessing resource or invoking service mainly includes the choice probability deviation degree and the service occupation time two Measure this model to use user access habits for authentication in order to access user resources and invoke service behavior is an effective cloud computing user behavior Verification technology and case analysis shows that it has good practicability. Cloud meter ...

The most concise guide to cloud computing Getting started must read (multiple graphs)

"IT168 Information" cloud computing will be the next big network event, let's look at what is cloud computing and how it works, and is it really safe? These questions, we simply provide some cloud computing concepts to let you understand the use of cloud computing security and convenience.   What is cloud computing? In fact, the Cloud (cloud) on behalf of the Internet (Internet), through the network computing power, instead of using the software you originally installed on your own computer, or replace the original you put the information on your own hard drive, you turn to the net ...

Total Pages: 11 1 .... 4 5 6 7 8 .... 11 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.