When more and more enterprises outsource their business processes through the cloud in order to control costs, is the data in the cloud safe? In the new IT era, the rise of mobile Internet and cloud computing has pried up huge business opportunities based on big data applications. But at the same time, the risk also comes uninvited. Through the Internet, massive amounts of data "at your fingertips", especially the use of mobile terminal equipment (BYOD) within the organization's staff has greatly increased the likelihood of advanced persistent threats (APT).
Although the Chinese government has introduced more supportive policies and financial support in the field of cloud computing in the past two years, there are no specific laws and regulations related to cloud computing operations and security. For enterprises, once the data is threatened, the loss will be incalculable. In front of the massive data, the traditional information security system is not only the exposure of the system's functional flaws, but also the security risks of the entire architectural system. Traditional information security solutions for leakage in the protection done nothing more than input and output ports, optical drives, Bluetooth and other monitoring, but can not control the safe transmission and storage of confidential data.
In the "Prism Gate" incident, the NSA obtained a large amount of personal information stored in the cloud through cloud service providers. If the core of cloud computing is the concentration, integration, correlation, and **** enjoyment of data, and the application of big data plays a role in organizing and analyzing, seemingly irrelevant data after mining, organizing and analyzing may become highly confidential data.
At the application level, the future application of cloud computing and big data will focus on industries such as government, telecommunications, education, healthcare, finance, petroleum and petrochemical, and power. The value of data usage not only drives enterprises to actively integrate data and realize real-time online updates, a large amount of once separate data is integrated into an information resource base with high utilization value, and once these resources are leaked, the risk will double to explode.
Figure 1: China's Cloud Computing Industry Scale and Forecast, 2010-2016 (Billions of Yuan)
Figure 2: China's Big Data Industry Scale and Forecast, 2009-2015 (Billions of Dollars)
It's predicted that the total amount of global data will reach 35ZB by 2020, an increase of nearly 30 times compared to 1.2ZB in 2010. If we are in the early chaotic stage of the massive data explosion, "Prism Gate" has triggered people to think y about and pay attention to data security in the context of cloud computing and big data. According to IDC calculations, only less than 30% of the world's Internet data can be called safe, and with the increase in the recognition of the value of data by enterprises, the importance of data security is self-evident. Therefore, for cloud computing, big data and next-generation Internet firewalls, data leakage protection and other passive to active defense of the new generation of security products will see explosive growth.