[] A comprehensive understanding of cloud security cloud security

What is cloud security

"Cloud security (Cloud security)" is the second important application "appears after" "cloud computing", "cloud storage cloud" technology is the safety concept of the traditional IT field in extending the cloud computing era, has been made in the anti-virus software wide range of applications, play good results. In the technological competition virus and anti-virus software, which won the opportunity for the anti-virus software.
Cloud security is the concept of enterprise creation, unique in the international field of cloud computing. "The head," the analyst team combines theoretical development of cloud concluded that security software is a generic term business model based on cloud computing applications, hardware, users, organizations, secure cloud platform.

Learn more about cloud security: [] cloud security infrastructure cloud security overview

What comes to cloud security

"Cloud security" is the "cloud computing" technology is an important branch, has been widely used among the anti-virus field. Cloud security exception monitored by a large number of clients on the mesh network software behavior, obtain the latest information on the Internet Trojans, malware, pushed to the server for automatic analysis and processing, and then distribute viruses and Trojan solutions to every a client. The entire Internet into a super anti-virus software, this is the grand goal of cloud security plan.

In the cloud computing architecture, cloud computing services and open network sharing scenario even more complex challenges in terms of safety even more severe, some new security issues become more prominent, such as among multiple virtual machines to run the business of the tenants safe in parallel secure storage in the public cloud mass data and so on. Due to security issues cloud cover a wide range, introduced only in respect of the following main aspects:

  • User identity security issues

Cloud computing provides elasticity variable IT services through a network, users need to log into the cloud to use applications and services, the system needs to ensure the legitimacy of the user identity in order to provide services. If the user has made an illegal user, it will endanger the legitimate user's data and services.

  • Sharing business security issues

The underlying architecture of cloud computing (IaaS and PaaS layer) is achieved through virtualization technology resource sharing call, the advantage is the advantage of high resource utilization, but shares will introduce new security issues, on the one hand the need to ensure isolation between resource users, other on the one hand the need for the security policy of virtual machines, virtual switches, virtual storage, virtual objects, which security policy on traditional hardware completely different.

  • User data security issues

Data security is the issue of most concern users, generalized data include not only the customer's business data, also includes user applications and the user's entire business system. Data security including data loss, disclosure, alteration and so on. Traditional IT architecture, from the user data is very "near", the data from the user "closer" is more secure. The cloud computing architecture is often stored in the data from the user is "away" in the data center, the data required for the use of effective protective measures, such as multiple copies, encrypted data storage to ensure data security.

Historical development of cloud security

First proposed the "cloud security" concept is Trend Micro, in May 2008, Trend Micro in the United States formally launched the "cloud security" technology. "Cloud security" concept in the early has caused no small controversy, it has been generally accepted. It is worth mentioning that the Chinese enterprises in the network security technology, "cloud security" come to the forefront of the world.

Cloud security technology principle

"Cloud security (Cloud Security)" plan is the Internet age reflect the latest information security, it combines parallel processing, grid computing technologies and concepts emerging, unknown virus behavior judgment, by a large number of client mesh network behavior in software exception monitoring, information on the Internet for the latest Trojans, malware, pushed to end Server for automatic analysis and processing, and then distribute viruses and Trojan solutions to each client.

Cloud security trends

The future of antivirus software will not be able to deal effectively with the growing number of malicious programs. The main threat from the Internet are turning to malicious programs and Trojans by a computer virus, in this case, the discriminant method signature database used is clearly outdated. After the cloud security technology, identifying and killing virus no longer rely solely on the local hard disk in the virus database, but on a huge network services, real-time collection, analysis and processing. The Internet is a huge "anti-virus software," The more participants, the more secure each participant, the entire Internet will be more secure.

After the cloud security concept was put forward, which has caused widespread controversy, many people think it is a meaningless question. But the facts speak for themselves, cloud security development like the wind [1], Rising, trends, Kaspersky, MCAFEE, SYMANTEC, Jiangmin Science and Technology, PANDA, Jinshan, 360 security guards have launched cloud security solutions. Our security company Kingsoft, 360, Rising and so have the relevant technical and operational. Kingsoft cloud technology makes their products greatly reduce resource consumption, can run smoothly on many older machines. Trend Micro Smart has established five large global data centers, tens of thousands of Department of online servers. It is reported that cloud security to support an average of 5.5 billion hits per day queries a day to collect and analyze samples of 250 million, the database for the first time hit rate can reach 99%. With cloud security, Trend Micro virus infection is now blocked every day up to 10 million times.

Ali cloud developer community fully upgraded, one-stop experience, with more cool :( Ali cloud developer community home page )

Guess you like

Origin blog.csdn.net/lsj960922/article/details/93034959