CLOUD TECHNOLOGY AND SECURITY ISSUESWord文档格式.docx

上传人:b****5 文档编号:18364980 上传时间:2022-12-15 格式:DOCX 页数:19 大小:33.68KB
下载 相关 举报
CLOUD TECHNOLOGY AND SECURITY ISSUESWord文档格式.docx_第1页
第1页 / 共19页
CLOUD TECHNOLOGY AND SECURITY ISSUESWord文档格式.docx_第2页
第2页 / 共19页
CLOUD TECHNOLOGY AND SECURITY ISSUESWord文档格式.docx_第3页
第3页 / 共19页
CLOUD TECHNOLOGY AND SECURITY ISSUESWord文档格式.docx_第4页
第4页 / 共19页
CLOUD TECHNOLOGY AND SECURITY ISSUESWord文档格式.docx_第5页
第5页 / 共19页
点击查看更多>>
下载资源
资源描述

CLOUD TECHNOLOGY AND SECURITY ISSUESWord文档格式.docx

《CLOUD TECHNOLOGY AND SECURITY ISSUESWord文档格式.docx》由会员分享,可在线阅读,更多相关《CLOUD TECHNOLOGY AND SECURITY ISSUESWord文档格式.docx(19页珍藏版)》请在冰豆网上搜索。

CLOUD TECHNOLOGY AND SECURITY ISSUESWord文档格式.docx

CloudTechnology,HistoryofCloudTechnology,SecurityIssuesofCloudTechnology,SolutionsofIssuesontheCloudTechnology,FutureofCloudTechnology

TABLEOFCONTENTS

Abstract5

1.0INTRODCTION6

1.1BackgroundInformation6

1.2TheAimsofThisStudy9

2.0CURRENTTRENDOFCLOUDTECHNOLOGY10

3.0METHODOLOGY11

4.0SECURITYRISKSofCLOUDTECHNOLOGY12

4.1SecurityissuesofCloudTechnologyoperationmode15

4.2UnsuitablesecuritystandardsandtheevaluationsystemofCloudTechnology16

4.3WeakregulatoryinCloudTechnology17

5.0RECOMMENDATIONSFORSECURITYISSUESFROMTHEVIEWOFIT19

5.1Provingtheexistenceandusabilityofdata19

5.2Dataprivacyprotection20

5.3Virtualsecuritytechnology21

5.4Cloudresourceaccesscontrol22

6.0SOLUTIONSTOSECURITYISSUESCLOUD25

7.0CONCLUSION27

RFERENCES30

ABBREVIATIONS

3DThreeDimensional

ITInformationTechnology

GBGigaByte

MBMegaByte

HDHarddisk

DECNETDigitalEquipmentCorporationNetwork

CPUCentralProcessingUnit

CIOChiefInformationOfficer

USAUnitedStatesofAmerica

SLAServiceLevelAgreement

CSACloudSecurityAlliance

C2ComputingCloud

EC2ElasticComputerCloud

Abstract

Inordertosatisfytheneedsoftheusersfortheconvenienceofinformationstorage,theideaofcloudtechnologycameup,whichisthekindoftechnologylinksresourcesinthefilesofcomputer,resourecsinthestoragespace,togetherwithresourcesinthesoftwarstovirtuallyestablishahugesharedITresourcespool(Anthony,2010).

Asanemergingindustrycurrently,cloudtechnologybringsaboutthesecurityissuesaswellalongwiththeconvenienceinpeople’sdailylifeandwork.Cloudtechnologyhasgraduallyalteredtheservice,howeveritdidnotwhollychangethetraditionalmodelforsecurityissues.Inthiseraofcloudtechnology,themaindifferenceisexistedinthedeployedplacementbetweenthesecurityequipmentandsecuritymeasures,therefore,itisquiteresponsiblenowtohavesomechangesintermsofsecurityaccordingtothedifference.Firstofall,theyhavetomakesurethesafetyofserviceusers,whichcouldbedonebythecloudserviceproviderthroughthewayofcalculationtoensurethesecurityoftheprovidedservices.Besides,thesecurityofcloudcomputingisveryessentialaswell,andasforcloudcomputing,thereliabilityaswellasavailabilityisneededtobepaidmoreattention.Cloudcomputingprovidesvendorsofthetraditionalsecuritywithmoreadvantagetoperfectthequalityandtoelevatetheservicelevel(Anita,2012).

Sincethecloudtechnologyplaysanimportanceroleinpeople’slifeandwork,inevitably,thecontrolofthecloudsecuritythreatsandthefeasiblesolutionscouldhelppeoplemakethebestusethetechnologyfortheconvenienceandtheefficiencyinahealthierenvironment.

KeyWords:

CloudTechnology,HistoryofCloudTechnology,SecurityIssuesofCloudTechnology,SolutionsofIssuesonCloudTechnology,theFutureofCloudTechnology

1.0INTRODCTION

1.1BackgroundInformation

Withtherapiddevelopmentofeconomyandsociety,scienceandtechnologyhavebeenimprovedcontinuously.Decadesaftercomputersshowedup,moreandmorepeoplehaveonecomputerorseveralcomputersandtheytakethecomputerasaveryimportantelectricequipment,nomatterinworking,studyingorentertaining.Yearafteryear,peoplearenotanylongersatisfiedwiththebasicfunctions,butstarttoexploremoreintermsofthefunctions,suchastherelevanceofthequalityofperformance,alongwiththebreakthroughofvisualeffectsetc.(Derrick,2013).

Theadventoftheinformationagefloodrequireshighefficiencyandlowcostofinformationstorageandprocessingsystems.Withthedevelopmentofwidelyused3Dtechnology,high-definitiondigitalcameras,high-definitionvideoandotherinformationtechnologiesandproducts,aswellastheInternetWeb2.0,moreandmoreindividualsandbusinessesinvolvedintheproductionandconsumptionofinformation,theglobalgenerationdramaticallyexpandtheamountofinformation.Peoplebegantobuyserverstoragespace,andthenstoredinthefileuploadtotheserverstoragespaceneedsagainfromtheserverstoragespacetodownloadthefile.Thus,thesizeoffilesisgettingbigger.Forexample,avideofileofamovieforthesizelessthan1GBbeforechangedintoHDvideoupto1080pixelwiththesizemorethan10GB,computerconsoleshootinggamelikecounter-strikedevelopedintogameslikethebattlefieldorcallofduty,andthesizechangedfromaround500MBintoaround20GB.Therefore,theimprovementofthestoragesystemmustbehugeaswell,thesizeofmemoryaboutthestoragesystemchangedfromkilobytetogigabyteoreventrillionsgigabyte,butsometimeit'

sstillnotenoughtosatisfytheneedsoftheusers,becausethereistheboundaryanywayevenifpeoplehaveaharddrivewith1000TBmemory(Carr,2014).

Becauseofthat,theideaofcloudtechnologycameup.Theideaofcloudtechnologyisthatthiskindoftechnologylinksresourcesinthefilesofcomputer,resourecsinthestoragespace,togetherwithresourcesinthesoftwarstovirtuallyestablishahugesharedITresourcespool.CloudtechnologyprovidesunlimitedITserviceswiththeideaofCalledforthem,marchingorderstogo,whichmeansonepersondoesnotneedhishardwarestorageequipmentanymore,justloginhisaccountonthecloud,andhecouldgetallhisbackupfile.That'

sfarwayeasierthantakinghisharddriveeverywhere,andworriedaboutthefilesmissingwhenheaccidentlydropitontheground.Onthiscondition,theappearanceofcloudtechnologyisveryconvenienttodealwiththeconstantlyincreasedstorageneedsofcomputerusers(Anthony,2010).

In1980s,fortheoreticalphysicsofheavylatticegaugecalculations,thisideaofthecloudtechnologyhasbeenproposedtohostthecomputeroverthenetworkforcollaborativecomputing,andthenthenetworkisanearlyDECnet.WiththerapiddevelopmentoftheInternet,theneedsfortheearly21stcenturytopromotethescientificcomputinginfieldssuchasphysicsofhighenergytothebirthofnetworktechnology,astheWWWsitetoachieveglobalsharingofinformationresources,likenetworktechnologycouldenabletheworldwidecomputerCPU.Memoryshares,capabilities,anddataresources,sothatthe"

CPUandmemoryresourceslikewaterandelectricityastheuseof"

thevisionintoreality(Catlett,2013).CloudcomputingisabigchangeforITindustry,justlikethelocalgeneratortakestheplaceofthepowergrid.Cloudtechnologyprovidesutilitycomputing,andischangingthecompetitivenatureofthecomputerindustry.Cloudcomputingisamodel,itsupportstheconvenience.Accordingtotheneedthroughthenetworkaccessprovisioningcomputingresourcesthesharedpool,inasmuchaspossible,don'

tneedmanagementorserviceproviderinteractiontoprovidefastandreleasetheconfigurablecomputingresources(Derrick,2013).

Experiencedthe2010ITindustrymanufacturers,operatorsandmajormediacloudtechnologyactivelyfosterandguide,cloudtechnologyhasbeenoutoftheconceptstageImagination,andthecloudtechnologyismovingintothefollowingstagetothesteadygrowth.UsersandcorporateITdepartmentsforthecloudcomputingmodelhaveundergonetremendousrecognitionandacceptanceofthischange,atthesametime,foresightoperatorshavebegunsubstantiveoperations,andcloudtechnologyhascometopeopleanditisusedbymoreandmoreusers(Catlett,2013).

Cloudtechnologycanbeseeneverywhereafteritcameout.Admittedly,manypeoplehavesmartphonesduringashortperiod,nomatterthephoneiswiththewindowphonesystem,androidsystemorIOSsystem.Attheotherhand,therearealwaysoptionsaboutinputtingthepersonalaccount,nomatterHotmail,GmailoriCloudaccount.Thoseaccountsarejusttheaccountsforeverysinglecloudspace,andthepersonalphonecouldautomaticallybackupthesystem,suchasthesetup,contacts,photos,andetc.Whenpeoplegetintothecloudsystem,theydonotneedtoworryanymoreaboutinputingeverythingagainiftheychangetheirphone,becauseeverythingisjustinthe"

cloud"

.Andtheycouldfindstoredinformationinthecloudthroughusinganotherphonejustthroughthewayofenteringintotheirownaccount(Shadli,2013).

Eventhoughcloudtechnologybroughtpeoplealotofconvenienceandhugeefficiencies,butitbroughtsomeproblemsaswell.Themostimportantissueamongthoseproblemsisthesecurityissue.Forexample,theaccountofsomepeoplegothacked,andthedetailsgotchanged,thepersonalinformationgotstolen,orthefinancialinformationgotintothedangeroussituationandsoon.Thiskindofproblemsnotonlymakesitpossibletoattaintheinvasionofpersonalprivacytodisturbthepersonallife,butalsomakeitpossibletocausetheinvasionofcorporateintelligence.Forthisreason,itmadethecompaniesnotreallytrustthecloudtechnology,sincetheirinformationistheircoretomakeprofitsinthebusinessbattlewiththecompetitors(Smith,2011).

Thecloudstores

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 小学教育 > 英语

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1