New Technology

Types of cloud computing technology

Basically, cloud computing can be classified as follows:

Public cloud (Public Cloud): Applications, storage and other resources of the public cloud is made to the public by a service provider available. These services are free or charged according to usage. In general, user data in the public cloud will be stored in the cloud and is authorized for service provider management.

Private Cloud (Private Cloud) infrastructure is cloud only works for a single organization, whether managed, internal storage (internal) or by a third party (external) . With private cloud, users will be assured of the safety data more, it is suitable for users who have sensitive data and requires a high privacy.

Cloud Hybrid (Hybrid Cloud) is a component of two or more clouds (private clouds and public clouds) remain the sole entity but link them together, providing the benefits of multiple deployment models. By using the architecture of “hybrid cloud” , companies and individuals can handle the error, combined with the ability to use the spot immediately without depending on internet connection.

Safety, security of data in the cloud computing

Ensuring safety is vital to the development of cloud computing in practice. Currently, many organizations and businesses have researched and made more secure solution for cloud computing. Following a brief introduction of some models of safety and basic encryption algorithm has been published recently.

Model three layers of data protection in the cloud

Model of the three-tier data protection



Class 1 (Layer 1): Class authenticate users accessing the cloud, the solution often applied is to use one-time password (One Time Password – OTP). The system requires high security authentication, which requests from both sides : users and vendors, but vendors with cloud-free.

Layer 2 (Layer 2):  This layer ensures data encryption (Data Encryption), integrity of data (Data Integrity) and protect user privacy (Private User Protection) through an encryption algorithm for value.

Class 3 (Layer 3): Class user data recovery serves for fast data decoding speed.

Security model based Encryption Proxy

The system is designed to encrypt the entire data of a user before giving up the cloud

Model-based security Encryption Proxy

The process of encryption or decryption and authentication is conducted via Encryption Proxy. This model ensures data safety and confidentiality during transmission and storage between users and cloud. To  make sure that the ciphertext is still being processed and storage management without decrypting, the data encryption algorithm copper ingot (homomorphic encryption algorithm) and complete billet copper (fully hommomorphic) are interested in applied research this model. Confidential information of users to serve the process of encoding / decoding is stored in the secure storage.

Model data protection using VPN Cloud

In this model , to ensure that data is secure channels, people use Cloud VPN to encrypt traffic between private clouds and between users with cloud. For organizations that need high data security, which is often the choice when deploying cloud models Own (Private Cloud Computing). Cloud VPN makes the connection between the user and the cloud, as well as the connection between the private cloud, which is safe and security through IPSec standards.

apple bag check
Previous post

Judge Dismisses Lawsuit From Apple Employees

tim cook
Next post

Could the iPad Pro Start Replacing Laptops?



No Comment

Leave a reply

Your email address will not be published. Required fields are marked *