1. Virtualization security problem: If the physical host is damaged, the virtual server it manages may be conquered because of communication with the physical host. If the physical host and the virtual machine do not communicate, the virtual machine may escape. If the virtual network on the physical host is destroyed, the virtual machine will also be destroyed because of the communication between the physical host and the virtual machine and the scene where one virtual machine monitors another virtual machine.
2. Security issues in data concentration: users' data storage, processing and network transmission are all related to the cloud computing system, including how to effectively store data to avoid data loss or damage, how to isolate data from multi-tenant applications, how to avoid data services being blocked, and so on.
3. Availability of cloud platform: users' data and business applications are in the problem system where the cloud platform is attacked, and their business processes will depend on the continuity of cloud platform services, SLA and IT processes, security policies, event handling and analysis, which all bring challenges. In addition, when the system fails, how to ensure the rapid recovery of user data becomes an important issue.
4. The cloud platform is attacked: Because of the high concentration of users and information resources, the cloud computing platform is easily targeted by hackers, and the consequences and destructiveness caused by denial of service will obviously exceed the traditional enterprise network application environment.
5. Legal risk: the application field of cloud computing is weak and the information is highly mobile. Information services or user data may be distributed in different regions or even different countries, and there are legal differences and disputes in government information security supervision; At the same time, the problem of judicial evidence collection caused by the blurring of physical boundaries between users caused by virtualization and other technologies can not be ignored.