Overview of Secure cloud storage and key technologies Fu Yingxun Rosant Shujiwu with the rapid development of cloud storage, more and more users choose to use cloud storage to store their own data. The biggest feature of cloud storage is that storage is a service that allows users to upload their data to the cloud through the public API. But because the user loses the absolute control to the data, some data security hidden trouble also produces. In order to eliminate the hidden danger and to improve the service quality of the system as far as possible while guaranteeing the safety, the domestic and foreign institutions have done a lot of research in recent years, which opens up a research direction in cloud storage —...
Secure cloud computing based on admission key Liu Yin Fang Wang Jian introduced a secure cloud computing framework. This paper discusses the characteristics of the key mechanism of admission certificate and the main realization in cloud computing, including the distribution of identification key, identity authentication, data exchange and so on. Based on the basic operation, dense cloud computing can also realize the classification of network data extraction and other extended services to meet the needs of large data applications. Secure cloud computing based on the key of admission certificate
Moving security controls such as public key infrastructure to cloud computing can be a real cost savings, but is cloud computing security strong enough to ensure its security? When you consider the different components of a PKI-based system, the public key infrastructure is clearly gaining a meaningful foothold in the IT field. From certificate licensing to certificate revocation lists to the registration structure, it is very obvious that ensuring the security of communications within a PKI environment is a very computational resource-intensive task. In view of this, the phase ...
"51cto.com Comprehensive News" in many similar shop, how to strengthen the buyer's memory of the store, bring "repeat customers", to build their own brand from many online shop in the fore? A simple and practical way is to have an independent "house number" on the Internet and register a Web site with a. com domain name. As one of the leading global top-level domain names,. com and. NET has become the preferred domain name for 93.5 million of the world's internet users, with a global high degree of cognitive advantage. However, there are still many network sellers to the. com domain name registration methods and procedures to know ...
"Even if the industry safety standards already have the encryption technology and a set of rules for payment information, the Web operators still face the risk of information theft, so they need to re-examine ways to enhance payment security," CyberSource said in a new white paper. At present, the online Payment Security application protocol includes Secure Sockets Layer protocol (SSL), Secure Electronic Transaction Protocol (set), 3D Secure protocol, Secure Hypertext Transfer Protocol (HTTPS) and so on. &nb ...
Web threats are rampant, and traditional methods of protection are far from being pervasive in Web 2.0 and the growing use of exploitable vulnerabilities, limitless networks, and a mobile workforce have exacerbated web threats. The findings of this observation are confirmed by the discovery of TrendLabs, a global network of trend technology research, services and support centers. From 2005 to the first two quarters of 2008, TrendLabs reported a 1,731 increase in web threats. TrendLabs predicts that if the number of threats continues to grow at the current rate, then 2015 ...
Recently, the "provincial capital Women's coffee shop against WiFi out of the bank card was deducted more than 500 Yuan" reported by many netizens, said a woman in the café with no password WiFi access, the results of the bank card information leakage, was transferred more than 500 yuan and can not be recovered. According to Zhang Hongbin, an associate professor of network engineering at Hebei University of Science and Technology, Ms. Liu should have accidentally used someone else's malicious WiFi hotspot platform, leading to the disclosure of personal information. At this point, the network security Hot topic was again ignited, how can we prevent network crime? How to avoid information leakage due to WiFi?...
The router is an important bridge for the LAN to connect the external network, is an indispensable part in the network system, and also the Frontier Gateway of the network security. But the maintenance of the router is rarely appreciated. Just imagine, if the router even its own security is not guaranteed, the entire network there is no security to say. Therefore, in the network security management, the router must be properly planned and configured to take the necessary security measures to avoid the security problems of the router to the entire network system to bring loopholes and risks. We are here to introduce some of the router to enhance the security of the measures and methods, let me ...
The intermediary transaction SEO diagnoses Taobao guest Cloud host Technology Hall 360 searches on-line also has some time, from the beginning of the fiery touts to slowly cool down. Zhou This step under the position is extremely critical, drop time slightly poor but not hinder the overall situation. Old week's usual security stunt even do search engine is no exception, its slogan is clean, safe, can be trusted sword refers to Baidu. This has to let people think of the same time to kill soft and rogue software in collusion, 3721 of old weeks turned to security Guardian netizens escort. Take a 360 safe browser to say things, ie ...
As an important means of protecting information confidentiality, integrity and non-repudiation, encryption and digital signature are widely used in various information and communication situations. At present, there are many commercial encryption and digital signature products, such as commercial software PGP (pretty good Privacy). In addition, there are free encryption and digital signature software in the open source repository, the most recognized being GPG (GNU Privacy Guard). GPG is a completely free, source-code-compliant software product that is completely compatible with PGP. Today, GPG has ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.