Monday, April 27, 2015

Cloud Monitoring to be the Main Trends in Security Development

In recent years, the biggest technical revolution has taken place in the IT field. That’s cloud computing technology. Based on the architecture and implementation of cloud computing technology in this new IT services, all IT infrastructure will be virtualized. According to the needs of users, it will provide the required software, data and storage, etc. via the Internet. Cloud computing languages are: SaaS(Software as a Service), PaaS(Platform as a Service), IaaS(Infrastructure as a Service).

Cloud computing technology will revolutionize the application of network video surveillance, namely that the video service, VaaS. For users, it will greatly reduce them enormous pressure to learn IT technology. In addition, the back-end storage devices will no longer be visible to user, which avoid a huge investment in equipment maintenance by someone.
 
cloud monitoring


As we all know, real-time video is the main feature of video surveillance. And the cost of this feature to meet is the high requirements for network bandwidth and storage. As rapid deployment of network technologies such as EPON, GPON and FTTH, FTTB networks, applications of 3G, 4G LTE, WIFI wireless broadband technology, as well as the optimization for compression coding technology, bandwidth issues will no longer be the main problem. The cloud-based storage solutions will provide massive storage services. Virtualization, loading balancing and grid computing technology deployed in the back end will greatly solve the storage problem.

Currently, the architecture, deployment, products, management, security, and operation of network video surveillance based on cloud computing technology has matured, especially growing at 20-30% annual growth rate in Europe and other countries. Many domestic manufacturers have begun to deploy cloud-based computing architecture network video surveillance products in some areas. Current network video surveillance with cloud computing architecture mainly approaches by "private cloud". With the investment in safe city, digital city and the wisdom of the city by China Telecom, China Mobile and China Unicom, the "public cloud" of video surveillance will gradually go out into the civil security, such as small and medium enterprises, chain enterprises and individual users.
  
In addition, although intelligence is one trend of the video surveillance, intelligence analysis has been the hot spots of development, but never achieved greatly. The reason is lack of good basic of calculations, such as the CPU calculations capabilities of network camera or NVR. The cloud-based video analysis will provide the best platform and computing power.

Video content analysis only get through the clouds, the user is able to analyze the vast amounts of information with the help of huge virtual computing power, such as human face to statistics, counting, features-based quick search intelligent functions. This application is also known as IaaS (Infrastructure as a Service), and this is also the main usage in network video surveillance. On IaaS, network video surveillance, based on cloud computing architecture, can provide users massive storage space and limitless computing power that can be easily extended.

Technical capabilities provided by cloud computing will realize the function that the user terminal - network cameras’ plug and play, configuration by need. That’s VsaaS. VsaaS is to configure memory space, video programs and mobile applications according to the user's own needs. All of that really realizes free access at any time and any local as the real needs.

Obviously, the convenience of network is bound to bring requirements for the security of network video data. Data security service (PaaS), the security features on the platform of cloud computing will be more perfect, in particular, can make up for almost undefended vulnerabilities of the current network camera surveillance. Opt for IPSec in the network layer or TLS in the transport layer to encrypt the secure transmission of data. Opt for S/MIME mechanism end-to-end encryption in the application layer, also opt for RSA to encrypt the dialogue during transmission, the content transmitted may be using DES, 3DES, AES encryption algorithms.
 
 
The data storage may encrypt by opting for 3DES, AES or SM1 algorithm for encryption. For example, there is security encrypted cameras using 128-bit SM1, SM2, DES/3DES symmetric encryption algorithm. The transmission process using 1024 RSA algorithm, supports PADDING way eligible PKCSII standard. Signature algorithm supports 1024-bit RSA algorithm, hash algorithm supports HASH including SHA-1, MD5, SCH, etc., to ensure data security.


No comments:

Post a Comment