Cloud Environment

Alibabacloud.com offers a wide variety of articles about cloud environment, easily find your cloud environment information here online.

Cloud storage Integrity detection algorithm based on Hashi

Cloud storage Integrity detection algorithm based on Hashi Shintao Li Cloud storage service enables users to enjoy large capacity and high specification storage services without a large amount of hardware and software input, but it also brings security issues such as data confidentiality, integrity and availability in a cloud environment. Aiming at the integrity problem in cloud storage, a new data integrity detection algorithm based on Hashi structure is proposed by using Hashi structure and large number modulus operation. The analysis results show that the algorithm allows users to detect the end of the remote server data file with high probability and accuracy only in the constant storage, computing and network resources.

Information security in large data and cloud environment

The Dictionary of Information Security was published by Shanghai Dictionaries Publishing house The book, compiled by the Institute of Information, Shanghai Academy of Social Sciences, analyzes the new challenges facing global information security, from information security, information security threats and information security policies, laws, standards, institutions, technology, industry, education, research and 10 other aspects, This paper makes a comprehensive analysis and carding of the information security problems at home and abroad. The information security is ushered in the big data age and the cloud computing environment new risk and the new challenge, this new environment information security although has the historical logic to continue with the past information security, but has formed some newly special ...

Cloud computing needs to face six challenges

After a long period of development, cloud computing has been recognized by many customers. Here I publish my personal opinions and discuss with each other. 1. Security: Cloud computing security has two main aspects: First, the security issues brought by the cloud computing environment, the second is how to achieve cloud computing security protection. The former includes technical aspects of the security issues and policies above the regulatory safety issues. The latter is mainly reflected in the traditional sense of the security software system are based on their own loom, and these software services framework in the cloud environment, the software itself is far from the security of the user to ...

[Document] Dynamic optimal algorithm for task scheduling in cloud environment

A Dynamic optimization algorithm for Task scheduling in Cloud environnement Monika choudhary Sateesh Kumar peddoju this monitors pro Poses a scheduling algorithm abound addresses ...

Research on the design of large data cloud storage technology in geographical situation

A study on the design of the cloud storage technology of the geographical national conditions large-volume data Zhu Liwi Wang Wang June studied the characteristics and data content of the massive data in the geographical conditions, and studied the concept of cloud storage and the key technologies related to the existing problems in data storage. Using HDFs technology, the cloud storage model of large data organization and resource sharing under the cloud environment is proposed, and the cloud storage service is accessed through Cloud Application service interface, which can effectively solve the problem of massive storage and service of geographic national data resources and provide reference for the transformation of the data management mode of the geographical situation. Research on the design of large data cloud storage technology in geographical situation

How safe is your cloud computing?

Attackers are targeting cloud computing.   At present, the number of attacks on cloud computing has reached the same level as the internal deployment environment.   According to a new report, increasing cloud adoption will drive cyber attackers to target the cloud environment, and the current amount of attack is almost equivalent to the amount of attack in the internal deployment environment.   According to a survey of 2,200 consumers by alert logic, a strong attack on the cloud computing environment increased from 30% to 44%, while vulnerability scans increased from 27% to 44%. Last year, 49% of the internal data center ...

Cloud security trick: Ten tips for protecting virtual systems

Now, more and more enterprises are deploying desktop and server virtualization technology, all kinds of racks, computing, storage, network and other resources are integrated into the resource pool. And the future trend is also towards the "smaller performance is stronger, less energy consumption, simple and easy to use" development. However, as enterprises move more from the physical platform to virtualization, cloud service creation and deployment is becoming more and more convenient, security has become a top priority issue. So, in the cloud environment, how to effectively protect the virtual system? Below, we provide you with the following ten tips: First, the traditional security control can still be used in the transition to virtual ...

The impact of cloud computing on software development and testing

1, cloud computing impact on software development in the cloud environment, software technology, architecture will change significantly. First, the software developed must be compatible with the cloud, it can be combined with virtual cloud platform to adapt to the dynamic change of computing ability and storage ability, and the other is to be able to satisfy the use of a large number of users, including data storage structure, processing ability, third is to Internet, based on the Internet to provide software applications;   Four is higher security requirements, can resist attacks, and can protect private information, five can work in mobile terminals, mobile phones, network computers and other environments. Cloud meter ...

Design and implementation of information collection system in cloud computing environment

Design and implementation of information collection system in cloud computing environment Sun Fuquan This paper mainly introduces the information collection of virtual machine and monitoring control of cloud environment in the environment based on OpenStack Cloud platform, in order to achieve the commercial purpose of cloud computing. This paper analyzes the cloud platform OpenStack and virtualization technology used in the usage information Acquisition system KVM, XEN, evaluates and uses the Libvirt virtual software, web.py, JSON and other key technologies. The function and sex of the dosage information collection system.

Cloud computing storage optimization based on tiered file system

Cloud computing storage optimization based on stacked file system Guo Wan Zhangxiaofung The redundancy caused by a large number of virtual mirrors in the cloud environment will result in lower resource utilization and the use of deduplication to ease the need for storage space and network bandwidth, but there are also problems in handling performance degradation. In this paper, a cloud storage optimization scheme based on stacked file system is proposed. The scheme utilizes a scalable file system to store a small amount of modification information of a user to a virtual instance on a read-write disk, storing the virtual image in a reading disk, saving only a small amount of modification information for the virtual instance at a time, without saving ...

Cloud process stumbling block: cloud security and data confidentiality

Chris Weitz, a head of Deloitte Consulting, is primarily responsible for the financial Services Consulting team's recommendations for cloud computing. He has been in this position for five years, before working for a Deloitte Global consulting service for nine years. He has over 30 years of experience in the IT field. As a result, Weitz has witnessed the impact of cloud computing on the IT industry. In a recent survey by Deloitte on the challenges of implementing a mixed cloud environment, 950 people voted, 49% voted for cloud security and data confidentiality, and he believes that the main cloud providers are actually much better than people think. ...

Application of data envelope technology in cloud data security

Application of data envelope technology in the security of cloud data Pei Huihuiqun cloud computing provides efficient and flexible services at the same time, there are various security risks. Access control methods can improve the security of cloud data and resources, protect users ' privacy, however, traditional access control methods require large security overhead and result in a large amount of data redundancy. This paper optimizes the strategy through the resource segmentation technology, and constructs a secure data envelope for cloud environment with the help of encryption algorithm and viscous strategy. At the same time, the mapping relationship between resources and data envelopes is established, so that users can get the meeting ...

How to simplify a private cloud network

"Ethernet is the backbone of cloud computing. "Is this statement too exaggerated?" Really。 Any data center, cloud computing or anything like that depends on the Ethernet network that allows servers, storage systems, and other devices to transmit to and from each other. No network, no data center. Today, the IT department prepares to deploy an internal cloud environment that can significantly assess how the network infrastructure will affect cloud computing capabilities to meet service level agreements (SLAs). Common terminology to describe cloud computing capabilities, such as agility, flexibility, and scalability, are absolutely applicable to the underlying network and related terms. Considering this point ...

Several factors that must be considered in developing a cloud strategy

Over the past few years, executives at the corporate level have been hesitant to move data within the data center to the outside because of the inability to guarantee the security and availability of the data that was moved out. However, as the cloud technology matures, the ideas of CIOs have changed dramatically, and they want to leverage the mix of public and private clouds in the most efficient way possible. Hybrid Cloud provides an improved way to blend in-house resources and public services. There are many benefits to deploying a hybrid cloud environment: flexibility, on-demand billing, precise scheduling, more resources, better control, better SL ...

Trend technology deep security and Huawei Fusionsphere to create a safe and efficient cloud environment

Recently, the global server security, virtualization and cloud computing security leadership trend Technology announced that the server Deep security protection system (DEEP) has fully supported the Huawei Fusionsphere Cloud operating system and its virtualized network application deployment. The two vendors are actively cooperating on the technical level with an open posture, with the aim of creating a secure and reliable next-generation data center operating model that will help users fully enhance the profitability of virtualization, VDI and cloud investment. And the deep for the construction of Huawei Cloud ecological environment ...

BMC provides policy control and customization solutions for cloud users

In the IT organization, the priority of cloud computing will continue to be ranked ahead, and the BMC software company, which is at the forefront of cloud computing technology, is helping customers move into the next important cloud-computing phase: Implementing the specific needs of the organization from a custom cloud environment. "Companies want cloud computing to take advantage of the existing IT infrastructure without having to undo and replace it," said Donna Scott, vice president and renowned analyst at Gartner. So the enterprise needs a solution that can be based on the existing infrastructure and provide both standardized and personalized cloud solutions ...

Active Immune isolation propagation model in cloud computing networks

The active immune isolation propagation model in cloud computing network is Xu Rongfei, Van Tong the related elements involved in cloud service abstraction, extracts its ecological defense characteristics, and establishes a Seir class propagation model with active immune isolation function according to the virus propagation theory in artificial immune system. The model can take proactive precautions against virus intrusion. Depending on the degree of network risk, different isolation strategies are adopted to maximize the security of service behavior in the cloud environment. Simulation results show that the model has high adaptability, robustness, intrusion tolerance and self-healing ability.

Want to make sure the cloud is secure? Give you eight tips.

According to industry experts, many companies also hesitate to the cloud environment in the data integrity, recovery and privacy, the rules of compliance.   At the Gartner Security and Risk Management Summit, Verizon Business offers the following tips to protect data and network security. Evaluate your goals when deciding to migrate your IT services to the cloud, understand what business goals you want to achieve. Typical goals include reducing the time and effort to release new applications, improving the enterprise's ability to respond to business needs, and reducing capital investment.

Cloud User trust model based on chord algorithm

Cloud User trust model based on chord algorithm Liaoning Normal University Kang Fan This paper introduces the definition and characteristics of cloud computing and security problems in cloud environment, emphatically analyzes the trust evaluation of cloud users, introduces the basic concepts and principles of chord algorithm, and builds a cloud user trust model based on chord algorithm. To provide solutions for the trust assessment of cloud users. The specific content includes: the elaboration related concept, including cloud computing, chord algorithm and trust, direct trust, indirect trust, trust degree and so on, and studies the trust in the cloud computing environment the correlation expression and the application, ...

Virtual cloud computing makes a lot of contribution to enterprise information security

Technology executives are setting new policies and investing in new technologies to take into account the resilience of public and private clouds, the provisioning of services, and the infrastructure for sharing data. New policies and systems for identity management are being designed as users develop third-party services for use outside the firewall, even within the firewall, to collaborate in a real-world shared environment.     In addition, new boundaries for data security and privacy monitoring need to be identified, bearing in mind how migrating to a virtual cloud environment will affect compliance. The Raytheon Company of Waltham, Massachusetts.

Total Pages: 11 1 .... 3 4 5 6 7 .... 11 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.