Cloud

Alibabacloud.com offers a wide variety of articles about cloud, easily find your cloud information here online.

Protecting API keys in the cloud improves enterprise cloud security

The API key, like the SSL key, is the top priority in security policy. Many people verbally say they want to protect the information in the cloud, but in fact we are all stones in cloud security. Most organizations use some form of API key to access cloud services. The protection of these API keys is important.   This article will discuss the issue of protecting API key and recommend some solutions. In the 2011, the importance of API keys was gradually recognized, and companies were more aware of their full protection of these keys. After all, API keys and access to sensitive information in the cloud have ...

Cstor A8000 uses the green to hold up the massive data cloud creates the storage to help the intelligent city construction

A few days ago, the Ministry of Housing and Urban construction in the national Intelligent City pilot set up a working conference on the publication of "National Intelligent City Pilot Interim management measures" and attached "national Intelligent City Pilot Interim management measures and pilot indicators system", after the publication of the first batch of 90 national Intelligent City Pilot list. One prefecture-level cities 37, counties 50, the Town 3. After 3 years to 5 years of creation period, the Ministry of Housing and Urban construction will be based on management methods and indicators system for these pilot cities and towns evaluation. Smart city, is the new generation of information technology in the context of rapid development, the full use of cloud computing, Internet of Things, mobile interconnection ...

Radware: The five most urgent security problems in cloud computing

As companies continue to accelerate the pace of cloud technology, using new technologies such as infrastructure, Service (IaaS) or software as a service (SaaS), the need for solutions to secure access and reliable operations in the cloud architecture is becoming increasingly evident. It now appears that, as enterprise data is kept in different devices, which are provided by different providers or partners, the enterprise must monitor and protect the new "security boundaries". Similarly, carefully weighing how to protect cloud-based data should be incorporated into the enterprise's context as part of the overall security strategy for the enterprise. and protect ...

Shuguang Company with independent technology to solve the network "cloud security" problem

As China's cloud computing industry leader, Shuguang is looking for a national, layout cloud computing, by summing up the dawning company in the field of cloud computing, it is no exaggeration to say that the dawn of the company's development strategy is the pursuit of China's cloud computing ideal realm. Vision Dawn "cloud computing" Center for the spirit of the national Internet is freedom, equality and sharing, as one of the most embodiment of the internet spirit of the computing model, cloud computing shows a strong vitality. It describes an extensible application that can be accessed over the internet ...

How to use visualization technology for cloud security

I have articulated the idea that cloud computing is not just a collection of services provided by business entities. In contrast, from a security standpoint, cloud computing is a single, interoperable system that includes interconnected subsystems designed to provide on-demand service-specific combinations across multiple entities. In this case, we define a system of "a set of interacting or interdependent components that form a complete whole", and a "set of independent but interrelated elements that contain a unified whole". In short, they voluntarily (e.g. negotiated successful paid services) ...

Cloud Server 7 great security protection tips

The advent of cloud technology does bring great convenience to modern enterprises. However, with the benefits of the accompanying, of course, there is a reluctance to touch the information security risks.   Since enterprises want to take advantage of the benefits of cloud technology, it is natural to find ways to solve the cloud security risks, reduce the risk faced by enterprises. Tip One: Start from the basic, timely installation of system patches.   Whether it is Windows or Linux, any operating system has vulnerabilities, timely patching to avoid vulnerabilities are deliberately exploited, is one of the important security of the server. Tip Two: Install and set up a firewall. To serve ...

Cloud server 7 Big security secret key also need data encryption

"Cloud" This word in recent years has been fired hot, in the information security sector, "cloud" is a big darling, the enterprises have been among the ranks of the cloud. Because, the advent of cloud technology does bring the modern enterprise very big convenience. However, with the benefits of the accompanying, of course, there is a reluctance to touch the information security risks. Since enterprises want to take advantage of the benefits of cloud technology, it is natural to find ways to solve the cloud security risks, reduce the risk faced by enterprises.   The following is to share the cloud of the server's 7 major security secrets, so that enterprises targeted security protection. Server data Security 7 big secret ...

Cloud Note Service Evernote announces acquisition of ipad handwriting apps penultimate

Beijing time May 8 morning news, according to TheNextWeb report, after the completion of 70 million U.S. dollars in financing, cloud note service Evernote announced the acquisition of San Francisco start-up company Cocoa Box design ipad handwriting application penultimate, It is hoped that this can improve the handwriting recognition ability of Evernote. The deal is not just penultimate revenue Evernote, penultimate is for the wider platform and equipment development ...

Cloud ERA blow only 40% enterprises pay attention to cloud security

Now with the continuous progress and development of cloud computing, many cloud computing providers are also starting to serve as a third-party cloud service to users of various cloud computing services, in the cloud, data security has always been the user and enterprise managers have been particularly concerned about, many companies are also beginning to consider their own data security strategy and planning issues.   Cloud ERA blow only 40% enterprises pay attention to cloud security? Now more and more companies choose to put their own data in the cloud, which includes the public cloud and the enterprise's private cloud and mixed cloud, which means that data and network security to become ...

HP provides box.net cloud storage services in business PCs

Cloud storage and collaboration platform Box.net with HP, HP Enterprise computer will install Box.net service. In a recent statistic, Box.net has 7 million users, all over 100,000 companies.   In October, Box.net CEO Allon Levi Aaron Levie said he would eventually work with HP to install its own services in HP's PCs sold to companies.   Today, HP and Box.net announced the deal. In the enterprise with HP computer, will ...

Cloud Security Alliance (CSA) release Cloud Control Matrix (CCM) version 3.0

The Cloud Security Alliance (CSA) announced in Thursday the official release of CSA Cloud Control matrix (CCM) version 3.0, fully upgraded to assess the cloud center information security risks of the industry gold standard. Since the release of the CSA-pioneering guidance field, the CCM3.0 Edition extends its control field to the address change of cloud security risk, and "focus on the key areas of cloud computing Security Guidance version 3.0" has taken a big step towards closer integration. Fully absorb industry-recognized safety standards, terms, and control frameworks such as ISO 27001/2, European Union Network and Information Security (ENI).

Research on data search and encryption scheme based on cloud computing

Research on data search and encryption scheme based on cloud computing re-appointment, Jianhua, Sun Huijie The technology of data search and encryption under cloud computing environment is the research hotspot at present. In view of the shortcomings of existing schemes, an improved data search and encryption scheme is proposed in this paper. In the area of data lookup, in this paper, the identity management model is established, and then the identity-based authentication algorithm is proposed to realize the optimal assignment between the system resources and the number of identities. In data encryption, a computational encryption scheme CES is proposed, which can support fuzzy retrieval of cloud data and basic arithmetic operation, Effectively to the user's ...

The security of the electronic file Center in the cloud computing mode

There are similarities and differences in the security of information system under the cloud computing model and traditional mode. The first goal is to ensure the integrity and security of data and information, and then the objects are the same, such as hardware and software, network, storage systems, and so on, and again will adopt some similar technology, such as various security detection technology, decryption encryption technology. The differences include management and technology issues such as virtualization, security issues that can result from the transition to cloud computing service patterns, and so on. 1. The security problems caused by the non-standard cloud computing. Cloud computing as a new technology is only in the initial stage ...

Active Immune isolation propagation model in cloud computing networks

The active immune isolation propagation model in cloud computing network is Xu Rongfei, Van Tong the related elements involved in cloud service abstraction, extracts its ecological defense characteristics, and establishes a Seir class propagation model with active immune isolation function according to the virus propagation theory in artificial immune system. The model can take proactive precautions against virus intrusion. Depending on the degree of network risk, different isolation strategies are adopted to maximize the security of service behavior in the cloud environment. Simulation results show that the model has high adaptability, robustness, intrusion tolerance and self-healing ability.

Research on cloud computing security scheme and deployment

Cloud computing security solution and Deployment research Wang, District Honghui, Zhu Peijun Cloud Security is the key problem of cloud industry development, the industry has not formed a complete and mature system and solution.   This paper presents a typical cloud computing deployment scheme, analyzes the security elements of cloud computing, and puts forward a comprehensive private cloud security deployment scheme based on typical cloud computing architectures. Keywords-cloud computing; private cloud; security solution Temp_12101111291621.pdf

It's an era of cloud computing.

This is an era of cloud computing. This is an era of Internet. This is a time of division, rapid running. Cloud computing concept in the domestic after years of hype and promotion has gradually landed, with the IaaS, SaaS and PAAs service model continues to fall, cloud computing for the traditional software, hardware service industry has a huge impact. Cloud computing has broken the concept of geography, breaking the traditional enterprise and Internet developers of the resource allocation point of view, almost all the computing and storage resources are concentrated on the "cloud" side, the client will become more and more simple ...

Quantify Cloud computing risk

Quantifying Cloud Computing Risk:cloud Meter, A disorientated assessment and mitigation Tool

Cloud computing security with nymble Marvell

Cloud computing security with nymble Marvell Mr.pradip u.wawge ku.ashvini r.rathod Amit r.manakshe keywords:misbehave Blacklisting, privacy, security, revocation, Erro ...

Cloud era: The security of personal information is too much controversial

The popularity of smartphones and the development of mobile interconnection have allowed more and more users to put interactive social, business banking or entertainment on the mobile platform. The emerging cloud computing, cloud services is a strong advocate for users to upload personal data to the network server for storage, backup, to facilitate users to use different types of Internet terminals for anytime and anywhere access. Cloud computing is providing unprecedented convenience and speed to our lives, but at the same time the new security threats seem to follow--20CSDN website more than 6 million user database leaks; Then, Renren, mop and so on ...

Document] A distributed approach to Privacy on the Cloud

A distributed approach to Privacy on the Cloud Ernesto Damiani, Francesco Pagano Davide Pagano we a a approach where con Fidential data is stored in a highly distributed D ...

Total Pages: 461 1 .... 4 5 6 7 8 .... 461 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.