Traditional Culture Encyclopedia - Traditional stories - Cloud security can solve what problems

Cloud security can solve what problems

Summary: Cloud security is not the traditional sense of security software, it combines parallel processing, grid computing, unknown virus behavior judgment and other emerging technologies and concepts, can solve the user identity security issues, *** enjoy business security issues, user data security issues. There are many problems with the development of cloud security software, which requires a large number of clients, specialized anti-virus technology and experience, and a large amount of capital and technical investment before it can be built. The next step is to take a look with the editor. Cloud security can solve what problems

1, user identity security

Cloud computing through the network to provide elastic and variable IT services, the user needs to log in to the cloud to use applications and services, the system needs to ensure the legitimacy of the user's identity in order to provide services to them. If an illegal user obtains the user's identity, the data and business of the legitimate user are jeopardized.

2, *** enjoyment of business security issues

The underlying architecture of cloud computing (IaaS and PaaS layer) is to achieve resource *** enjoyment call through virtualization technology, the advantage is the advantage of high resource utilization, but *** enjoyment will introduce new security issues, on the one hand, the need to ensure the isolation of the user's resources between the other hand, need to be oriented to the virtual machine, virtual switch, virtual storage and other virtual objects of the security protection strategy, which is completely different from the traditional hardware on the security policy.

3, user data security issues

Data security is the most important concern of the user, broadly speaking, the data not only includes the customer's business data, but also includes the user's applications and the user's entire business system. Data security issues include data loss, leakage, tampering and so on. In traditional IT architecture, data is very "close" to the user, and the "closer" the data is to the user, the safer it is. In the cloud computing architecture, data is often stored in data centers that are far away from the user, and effective protection measures, such as multiple copies and encryption of data storage, need to be adopted to ensure the security of the data.

Difficulties in developing cloud security software

1, the need for a large number of clients (cloud security probe). Only with a massive number of clients can we have the most sensitive perception of viruses, Trojan horses, and horse-hanging websites appearing on the Internet. Assuming that there are more than 100 million of its own clients, if you add Xunlei, Jiyu and other partners of the client, it can completely cover all the Internet users in the country, no matter which Internet users poisoned, visit the page of the horse, can be the first time to respond.

2, the need for professional anti-virus technology and experience. The development of cloud security software requires a large number of patented technologies, virtual machines, intelligent active defense, massively parallel computing and other technologies, only then can make the "cloud security" system can handle the massive amount of reported information in a timely manner, the results of the processing **** enjoy to the "cloud security" system each member. "The system will be able to process large amounts of reported information in a timely manner, and the results will be ****ed to each member of the system.

3, need a lot of money and technology investment. "Cloud security" system alone in the server, bandwidth and other hardware investment is very high, and the corresponding top technical team, the next few years of continuous research spending will be several times more than the hardware investment, the scale of such investment is non-professional vendors can not do.

4, cloud security software must be an open system, so that its "probe" and all the software is fully compatible, and the need for a large number of partners to join, in order to strengthen the "cloud security" system coverage capabilities.