Secure Your

Read about secure your, The latest news, videos, and discussion topics about secure your from alibabacloud.com

Research on HDFS authentication and secure transmission mechanism based on PKI

Research on HDFS authentication and secure transmission mechanism based on PKI Li Yan Zhao Huawei to solve the authentication and secure transmission problem in the Hadoop Distributed File System (HDFS) file service process of Hadoop core subproject, this paper analyzes the Kerberos scheme in detail. Aiming at the defects of security and efficiency, this paper puts forward the application of digital certificate authentication technology based on PKI and AES symmetric encryption technology based on digital envelope to HDFS security mechanism. The analysis shows that the security mechanism is compared with Kerberos ...

HP Introduces HP Helion Alliance: A Secure, Hybrid IT Environment

Today, HP officially announced the launch of the Helion Alliance, an alliance that is a global, open coalition that aims to provide customers with the best service portfolio to enable it to create a secure, hybrid IT environment that meets both local and global The demand. Building on HP's leadership in OpenStack® distributed cloud computing, the HP Helion Alliance will provide service providers with unique business and operational models. It will appeal to independent software vendors, developers, system integrators and value-added resellers, including powerful ...

A secure private cloud storage system based on virtual isolation mechanism

A secure private cloud storage system based on virtual isolation mechanism Bowa Shaoping Feng Miuga storage technology is an important research direction in cloud computing field, because of privacy leakage and security problems, public cloud storage services are often difficult to be widely used in organizations that hold core data, such as innovative enterprises and armies. A secure private cloud storage system based on virtual isolation mechanism is proposed VI-PCS: The system virtualized physical storage media and public cloud storage services into virtual storage capabilities and services to the system through centralized lifecycle management; The system files stored procedures ...

A secure network disk system in cloud storage environment

A secure network disk system in cloud storage environment Fu Yingxun Rosant Shujiwu with the rapid spread of cloud storage, More and more users are starting to use the network disk system to store data. However, the latest research results show that the existing network disk system has a common security vulnerabilities. In recent years, the network disk leakage of user data has confirmed the existence of these vulnerabilities. To this end, a secure network Disk system architecture under cloud storage environment is proposed, and the architecture is designed to realize the Corsbox System. Corsbox system uses a directory-tree based synchronization, while improving security ...

Online payment and offline payment, who is more secure?

In an article published today in Wired magazine, it has long been argued that offline trading is safer than online trading when talking about credit card security. Now, the truth has proved that this view is wrong. Online trading is more popular and safer than ever, thanks to advances in digital payment technology, demographic changes, and a growing network security environment. At the same time, offline payments seem to be less secure than ever. Recently, major foreign retailers have erupted in a series of security incidents, suggesting that offline trading is more vulnerable to attack. These trends lead people to consider ...

Efficient multi-keyword search scheme in secure cloud storage

Efficient multi-keyword lookup scheme in secure cloud storage qian Ye Fengshun Wang Guojun users, after leasing the storage space of a cloud service provider (Cloud service PROVIDER,CSP), typically store files in ciphertext on the CSP in order to protect privacy. This brings a problem to search for key words in ciphertext data. In this scenario, the CSP is considered a potential attacker. A secure and efficient cloud computing scheme is proposed to support multiple keyword lookups. This scheme is based on the binary sort tree structure, under the premise of guaranteeing the security and privacy of the user data, the branch ...

Secure fault-tolerant coding for cloud storage

Secure fault-tolerant coding for cloud storage Tan Peng Hu Chenyue Blue Dragon Jia Hongyong in view of the security defects of the current fault tolerant technology based on RC code, a security coding--srcs coding is proposed to ensure the security of data in the high Open environment of cloud computing and cloud storage. The Code gate limit system is introduced into the traditional RC code, and the security problem of the coding matrix in the open environment is solved by using the threshold system based on public key to protect the coding matrix and ensuring the high efficiency and low redundancy advantage of fault tolerant technology based on the traditional RC code. The most ...

Secure cloud computing based on the key of admission certificate

Secure cloud computing based on admission key Liu Yin Fang Wang Jian introduced a secure cloud computing framework. This paper discusses the characteristics of the key mechanism of admission certificate and the main realization in cloud computing, including the distribution of identification key, identity authentication, data exchange and so on. Based on the basic operation, dense cloud computing can also realize the classification of network data extraction and other extended services to meet the needs of large data applications. Secure cloud computing based on the key of admission certificate

The most secure cloud services with five features

The security cloud service is the cloud computing technology in the network security domain application and expands thus realizes the network security namely the service the technology and the business model, it through will enhance the network security ability (including the access control, the DDoS protection, the virus and the malicious code detection and processing, the network traffic security detection and the filtering, Security filtering for applications such as mail, network scanning, web and other specific applications such as security detection, network anomaly flow detection, etc., such as resource clustering and pooling, so that users do not need their own security facilities for maintenance management and minimize the cost of service and business provider interaction, through mutual ...

Hard drive failure rate close to 30% more secure with cloud storage

Intermediary transaction SEO diagnosis Taobao guest owners buy cloud host technology Hall into the mobile internet era, people's living data storage demand surges, but according to Cloud backup services company Backblaze survey showed that the computer hard disk is prone to bad road and other serious damage, some brands of computer hard disk failure rate of nearly 30%, There are thousands of topics about "hard drive broken" on Twitter, "1T hard drive is broken, emotional meltdown, and all the information I have graduated from now on." Do you know how to recover data? " Computer hard drive broken, no data ...

Network disk competition who will be the first to launch a secure network disk

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall from August onwards, the network disk War began to ferment, until the beginning of September, the network disk War finally came to an end. Seemingly calm and peaceful behind, in fact, still choppy, a variety of nets are gradually improve their own, in the secretly competing. Baidu has launched offline download, and completely free, for all users, and once spent a dollar purchase ...

Ensuring security: Five characteristics of a secure cloud service

Security Cloud service is a kind of technology and business model of http://www.aliyun.com/zixun/aggregation/13422.html "> Cloud Computing Technology Application and expansion in Network security field to realize network security, namely service. It will enhance network security capabilities (including access control, DDoS protection, virus and malicious code detection and processing, network traffic security detection and filtering, mail applications such as security filtering, network scanning, web-specific applications such as security detection, network anomaly flow ...

Implement effective cost management based on MSBE cloud Secure communication

Secure Cloud Communication for effective cost Management System through Msbe Gaurav Raj and Kamaljit Kaur We propose a improved Broker Cloud Communication Paradigm (BCCP) with integration of SEC ...

A secure cloud storage scheme based on secret sharing

A secure cloud storage scheme based on secret sharing Zhang Xu Yanhong Zhang Haojian-Wei article on the basis of the analysis of the current network disk application prospects and security risks, a secure cloud storage scheme based on secret sharing is proposed, which uses information digest algorithm, symmetric encryption algorithm, threshold scheme and data distributed storage to read, write, store and The encryption permission separates, guarantees the user to the file all highest authority, thus guaranteed the user privacy. At the same time, reduce the bottleneck of hardware expansion of each network disk manufacturer. It is beneficial to the establishment of wide cloud platform and has good application prospect. Based on secret sharing ...

Mobile phone hidden trouble? 960 secure phones are easy to handle.

Recently, CCTV 315 party just exposed mobile anti-virus software Network qin collusion Fei software download malicious users of mobile phone charges: Install FEI software will appear after the mobile phone failure, only through the Network Qin Fee update virus library to normal use. CCTV's 315 party unveiled a strange set of phenomena: a large number of parallel mobile phones to China, the need to brush the machine to install the operating system, these operating systems are automatically bundled with the sale of the Network Qin, Fei, and other software, and the user can not see after the brush machine, card 6 small time to find, and can not be deleted, after the deletion will Fei Liu software automatically installed after ...

Shun Fung "secure purchase" to truly implement 7 days without reason return "service

September 18 Noon news, domestic Courier Enterprises Shun Fung in the recent introduction of "secure shopping" services, as long as consumers from Shun Fung signed "Peace of Mind" agreement to purchase goods to pay the merchant, you can directly enjoy the "7 days without Reason return" service, once the occurrence of returns, after the goods returned by Shun Fung will start "   Secure Purchase "Return refund process, reduce the consumer and merchant communication links." For the submission of the application to join the peace of mind purchase business, Shun Fung based on the history of business cooperation, merchandise, such as the rate of return on the dimensions of audit, only through the audit to have opened the "Peace of mind to buy" ...

How to create a secure API design in a cloud environment?

Building a secure API design in a cloud computing environment is a challenging task.   In this article, security research expert Dejan Lukan describes a number of things businesses need to remember when developing security APIs.   An application Programming interface (API) is a simple extension of a normally running application to help users interact with it programmatically. The APIs are used for a variety of reasons, including extracting data from a database, sending and saving data to a database, and pushing tasks into queues, but ...

DNS in cloud services: Building Secure DNS schemas

In terms of security challenges, the DNS solution in cloud computing is incomplete and relies heavily on the combination of people, processes, and technologies. Cloud computing has been challenged by the vast majority of businesses that have implemented a full range of outsourcing to these three areas by migrating applications to cloud computing. All the key technologies are in the cloud-computing vendor, and cloud users rely entirely on cloud providers to secure their information and infrastructure. Therefore, cloud computing customers must also consider the lack of physical control, and provide suppliers with DNS management and processing related 、...

Security dog and Huawei work together to build a secure environment for servers

Abstract: Domestic server security well-known manufacturers of security dogs and the world's leading provider of information and communication solutions Huawei, in the increasingly serious network security situation, the use of resources and advantages of both sides to carry out in-depth cooperation, with the service of users, reduce the user's defense network security threat costs,       Create a secure server usage environment for users. Nowadays, the network security problem is increasingly serious, a variety of network attacks occur frequently, the network attack means constantly changing, the cost of server anti-attack ...

Four guesses make the cloud identity management more secure

Now for 2011 years, our focus has been more on moving things from a corporate position to a cloud floating in the sky. We've seen the zombie network dismantled by the FBI, and we've seen the coming social network. What do all these events have in common? The common point is the need for precise and secure identity management (identity management). According to recent trends, what does it need to look for in their identity software, from their identity vendors? Here are four guesses about new points and future developments in identity management. 1. Body ...

Total Pages: 15 1 2 3 4 5 6 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.