In The Cloud It

Discover in the cloud it, include the articles, news, trends, analysis and practical advice about in the cloud it on alibabacloud.com

Fine count common errors in cloud computing application deployment

When many organizations deploy applications in cloud computing, they often make common mistakes. Among them, the most obvious common errors are often focused on application performance, application security, and tools to monitor virtual environments. Of course, there are some other common mistakes. The bugs associated with deploying applications in Http://www.aliyun.com/zixun/aggregation/14039.html > Private cloud Computing are more urgent than the challenges of deploying applications in public cloud computing. ...

Identification and data protection in cloud computing

The RSA,EMC (NYSE:EMC) Information Security Division has released a new rsa® security profile entitled "Identification and data protection in cloud computing: Best Practices for building a trustworthy environment". This overview provides guidance and the best possible solution for organizations that need to address identity authentication and data security challenges in cloud computing. The RSA security profile for this issue brings together top technical experts in cloud computing security to help organizations understand how to build a trusted environment for cloud services, how to defend against cyber fraud, and how to respond to new cloud environments ...

Common problems in cloud computing application deployment

The enterprise cannot complete the necessary upfront planning to determine which application is more suitable for cloud computing deployments. Applications that require mainframe support, applications running on UNIX cluster services, and numerous existing applications running on mainframes are destined not to migrate to cloud computing. These programs are complex, and deployments based on the X86 hardware and software environment may require a redesign of the schema or rewrite of the application code. If deployed in public cloud computing, applications with high security requirements may not be the ideal implementation object for cloud computing deployments. ...

Research on security Service mechanism in cloud computing

Research on security Service mechanism in cloud computing Fujian Normal University Cao Xi with the rapid development of cloud computing technology and applications, security issues become increasingly important. It is of great theoretical and practical significance to study and analyze all kinds of security problems faced by cloud computing comprehensively. This paper focuses on three types of security services in cloud computing: Secure storage services in cloud computing, secure authentication services in cloud computing and secure access services in cloud computing, including: 1. Cloud computing Security Storage services: In the cloud storage network environment, the Security Storage protocol SSP (Secure Store) is designed.

Mobile Internet security monitoring and protection system in cloud computing mode

Security is the key to the healthy development of mobile internet in cloud computing mode. At present, in the 3G network has become mature, mobile internet services have been widely popularized, more and more network and mobile security problems began to appear. Especially with the development of 3g/lte and the introduction of cloud computing Application model, the security problem of broadband mobile Internet becomes more complicated, which brings unprecedented challenge to the security of mobile Internet. Cloud computing virtualization, multi-tenant and dynamic introduced a series of new security issues, mainly in data security, privacy protection, content security, operating environment security ...

Explanation of disaster recovery in cloud computing

Disaster recovery in cloud computing is a relatively new concept, and like many technology trends, there is a lot of hype and wrong information. In the "Storage" magazine article from Jacob Gsoedl, one can understand the top disaster recovery issues of cloud computing, such as security and data recovery, and whether disaster recovery in the cloud is a good choice for the organization.

Yimin: Unicom will continue to invest more in cloud computing infrastructure

Beijing, also Zhuang Yun World Congress 2013 on December 12 in the village of Creative Living Plaza. This Cloud World Congress takes "Cloud now" as the theme, revolves "The trend development World cloud" and "The Independent Innovation China Cloud" two main lines. Continuation of the Beijing Silicon Valley dialogue "a tale of twins" tradition, from the Silicon Valley's top cloud computing experts, the cloud computing industry's top companies and China's Internet and cloud computing sector leaders, the man, through technology, innovation, investment, trends and other aspects of the collision, interpretation of the nature of cloud computing ...

Security risk analysis in cloud computing environment

1. What is cloud computing security? In the rapid development of the Internet today, the security of the network is an unavoidable problem, especially the various security threats to the business system of potential harm gradually magnified today, any IT system construction is difficult to ignore the existence of security problems. and a variety of private cloud or public cloud of data Center building, safe, efficient business delivery is its success and necessary requirements. Every moment of the construction of the link, including the physical environment of the building process, cloud computing business system construction, server storage resource pool deployment, as well as the operation of the system operations, are security risks of the dive ...

Research on an instance-intensive workflow scheduling algorithm in cloud computing environment

Case-intensive workflow scheduling algorithm in cloud computing environment Zhejiang University of Technology Fang This paper studies the case-intensive workflow scheduling algorithm under cloud computing environment, and first introduces the background, significance and research status of the instance-intensive workflow scheduling algorithm in cloud computing environment. Secondly, this paper introduces the concepts of cloud computing and cloud workflow, classifies and expounds the workflow scheduling algorithm, and emphatically discusses the existing instance-intensive workflow scheduling algorithms. Then, according to the characteristics of cloud computing environment, designed for the cloud computing environment for instance-intensive ...

DNS in cloud services: Building Secure DNS schemas

In terms of security challenges, the DNS solution in cloud computing is incomplete and relies heavily on the combination of people, processes, and technologies. Cloud computing has been challenged by the vast majority of businesses that have implemented a full range of outsourcing to these three areas by migrating applications to cloud computing. All the key technologies are in the cloud-computing vendor, and cloud users rely entirely on cloud providers to secure their information and infrastructure. Therefore, cloud computing customers must also consider the lack of physical control, and provide suppliers with DNS management and processing related 、...

Research and application of access control mechanism in cloud computing environment

Research and application of access control mechanism in cloud computing environment University Li Shigang based on the research of traditional access control technology, this paper analyzes the application requirements of access control technology in cloud computing environment. Aiming at the problem of virtual machine security and privilege management in cloud computing environment, a security solution based on access control technology is proposed and implemented. The main work is as follows: 1. This paper studies the application status of the traditional access control technology, analyzes the application status of the access control technology in cloud environment, analyzes its characteristics and analyzes the new requirements under the cloud computing environment. 2. For virtual machine security isolation, ...

Security management and enterprise risk control in cloud computing

In cloud computing, effective security management and enterprise risk control are obtained from the process of well developed information security and safety management, and it is an overall enterprise safety management to pay attention to. This paper gives advice and suggestions on security management, enterprise risk control and information risk management in cloud computing. In cloud computing, effective security management and enterprise risk control are obtained from the process of well developed information security and safety management, and it is an overall enterprise safety management to pay attention to. This paper gives advice and suggestions on security management, enterprise risk control and information risk management in cloud computing. In cloud computing ...

See another hotspot in cloud computing-how to operate cloud management

With the popularity of cloud computing, the domestic industry has come to a common understanding of cloud computing: if the information represented by cloud computing is neglected, the Chinese IT industry will miss the third wave of opportunities. A new opportunity for cloud computing It shows that the IT infrastructure construction model based on cloud computing brings the new idea of saving cost, expanding application and making full use of resources, promoting the development of IT industry to green environmental protection and resource saving direction, which accords with the control cost, saving resources, reducing emission, To protect the environment and other aspects of demand trends. According to the relevant data number ...

Data security in cloud computing

Data security Ling Yike in cloud computing This paper explains and analyzes the security of data information in cloud computing from the aspects of data security using virtualization technology and efficient cryptography technology, and clearly deciding which part of business applications to participate in cloud technology. Data security in cloud computing

Research and design of CA certification center in cloud computing environment

Research and design of CA certification center in cloud computing environment the Sheng Yuwei cloud computing as a new concept, new service model is proposed, IT industry is a new direction. Cloud computing on-demand services, reasonable use of resources, simple deployment model and other advantages in the future can not only effectively promote the development of computers, but also can significantly improve people's lives and working methods. However, security issues have been accompanied by the development of cloud computing, but also hindered the development of cloud computing. The Certification center (CA) is the core of the public Key Infrastructure (PKI), in the security ...

Research on open Course application in cloud computing environment

The application of open curriculum in cloud computing environment the main work of Xu Yuanyuan thesis of East China Normal University is as follows: 1. This paper analyzes the characteristics of open courses in cloud computing environment, and probes into the application mode of open courses from the perspectives of teacher-student real-time interaction, learning effect tracking evaluation and heterogeneous terminal access, The sections model of open course application in cloud computing environment is constructed, from Learning Support Service (S), Learning Effect Evaluation (E), knowledge sharing (C), Information Technology (T), interactivity (Ⅰ), open access (0), Network Learning Community ...

Design and implementation of virtual network in cloud management platform

Design and implementation of virtual network in cloud management platform Dalian Wang Tao with the increasingly sophisticated network technology and the rapid development of E-commerce, in the 3G mobile Internet and information hard demand driven, IaaS Cloud management platform is to apply the concept of cloud computing to the Internet Data Center (IDC) A new kind of cloud management platform. In the IaaS Cloud management platform The virtual network management system uses the Java EE architecture MVC design pattern. The database server employs Oracle database databases, which are highly reliable 、...

Lei: In the next 3-5 years, why do we want all in cloud service?

Today the focus of the content is also our millet, Jinshan strategy is an important part. So what's the first PPT I've prepared? Is the importance of cloud services for millet. The amount of data available in millet this year, the number of millet cloud services is 7 times times higher than last year, and is expected to grow 5 times times next year. So today, give us a little dry goods, I let them sum up the recent accurate figures: Millet Cloud user volume 67.955 million people, almost 68 million people; small Mi Yun Total storage 47 PB (no other storage of millet is 10 p); Total Coexistence Storage 24 ...

Application of formal method in cloud computing

Research on the application of formal method in cloud computing Jilin University Zhang Peng to promote the development of cloud computing, this paper uses the formal method to describe the formal semantics of cloud computing system, and on the basis of the cloud computing in the change impact analysis and data security evaluation of the problem is studied in depth, The main work is as follows: 1 The formal semantics of cloud computing system are depicted by using abstract sources. Based on the idea of introducing dynamic semantics into ontology, this paper presents a new method of knowledge representation-abstract source, using abstract source to form semantics of cloud computing system from two angles of commonality and feature of cloud.

Ding Liping: Covert channel analysis in cloud computing environment

From the Institute of Software Research, Chinese Academy of Sciences, National Engineering Research Center system security and Trusted computing, Ms. Ding Liping for you to share "cloud computing environment covert channel analysis."   She described in detail the three aspects of covert channels, security threats and covert channels in cloud computing environments, and their work. ▲ Software Institute of Chinese Academy of Sciences the concept of covert channel covert channel at operating system level refers to the way that malicious process realizes information leakage through collusion information system (Ding Liping), and the covert channel analysis is the security standard at home and abroad.

Total Pages: 15 1 2 3 4 5 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.