The key technologies that cloud security mainly considers include data security, application security and virtualization security. Cloud security refers to the general term for security software, hardware, users, institutions, and security cloud platforms based on cloud computing business model applications. Cloud security is an important branch of cloud computing technology and has been widely used in the anti-virus field.
#The key technologies that cloud security mainly considers are: data security, application security, and virtualization security.
Cloud security, the analyst team of "Zhu Yuntai" summarizes based on the theory of cloud development, refers to the security software, hardware, users, institutions, and security cloud based on the cloud computing business model application. The general name of the platform.
"Cloud security" is an important branch of "cloud computing" technology and has been widely used in the anti-virus field. Cloud security monitors abnormal software behavior in the network through a large number of clients in the network, obtains the latest information on Trojans and malicious programs on the Internet, pushes it to the server for automatic analysis and processing, and then distributes virus and Trojan solutions to everyone a client. The entire Internet has become a super anti-virus software. This is the grand goal of the cloud security plan.
Since the security issues of cloud computing involve a wide range of issues, only a few main aspects are introduced below:
1. User identity security issues
Cloud computing provides elasticity and security through the network. With the changing IT services, users need to log in to the cloud to use applications and services, and the system needs to ensure the legitimacy of the user's identity before it can provide services. If an illegal user obtains the user identity, the data and business of legitimate users will be endangered.
2. Shared business security issues
The underlying architecture of cloud computing (IaaS and PaaS layers) realizes resource sharing and calling through virtualization technology. The advantage is high resource utilization, but sharing New security issues will be introduced. On the one hand, it is necessary to ensure the isolation of user resources. On the other hand, security protection strategies for virtual objects such as virtual machines, virtual switches, and virtual storage are required, which are completely different from traditional hardware security strategies.
3. User data security issues
Data security is the issue that users are most concerned about. Data in a broad sense includes not only the customer’s business data, but also the user’s application and the user’s entire business. system. Data security issues include data loss, leakage, tampering, etc. In the traditional IT architecture, data is "close" to users. The closer the data is to users, the safer it is. Under the cloud computing architecture, data is often stored in data centers far away from users. Effective data protection measures need to be adopted, such as multiple copies and data storage encryption, to ensure data security.
The above is the detailed content of What are the key technologies to consider in cloud security?. For more information, please follow other related articles on the PHP Chinese website!