Education, Science, Technology, Innovation and Life
Open Access
Sign In

Network information security technology based on cloud computing environment

Download as PDF

DOI: 10.23977/jeis.2023.080210 | Downloads: 34 | Views: 566

Author(s)

Li Ke 1

Affiliation(s)

1 Shandong Rongyue Financial Holdings Co., Ltd, Jinan, Shandong, China

Corresponding Author

Li Ke

ABSTRACT

With the rapid development of cloud computing technology, the problem of network information security has become increasingly prominent. This paper aims to study the network information security technology based on cloud computing environment, in order to improve the security and reliability of the network system. Firstly, the challenges and problems faced by network information security in cloud computing environment are analyzed, including data privacy protection, identity authentication, access control and so on. Then, the common network information security technologies, such as encryption algorithm, firewall and intrusion detection system, are introduced, and their applications in the cloud computing environment are discussed. Then, a network information security technology framework based on cloud computing is proposed, which comprehensively considers the characteristics of cloud computing and the requirements of network information security, and can effectively protect the network system in the cloud computing environment. The research results of this paper are of great significance for improving the level of network information security technology in cloud computing environment, and also have certain reference value for promoting the development and application of cloud computing technology.

KEYWORDS

Cloud computing; Network information; Safe practice

CITE THIS PAPER

Li Ke, Network information security technology based on cloud computing environment. Journal of Electronics and Information Science (2023) Vol. 8: 57-62. DOI: http://dx.doi.org/10.23977/10.23977/jeis.2023.080210.

REFERENCES

[1] Wei Yuhao. Discussion on network information security technology in cloud computing environment [J]. China New Communication, 2019, 21(05):123.
[2] Angelababy. Analysis of information security protection technology in cloud computing environment [J]. Software, 2021, 42(04):163-165.
[3] Liu Wenjun. Research on the development of network information security technology in cloud computing environment [J]. China New Communication, 2020, 22(17):33-36.
[4] Tang Rongxiu. Research on the development of network information security technology in cloud computing environment [J]. Wireless Internet Technology, 2021, 18(03):19-20.
[5] Li Minglei. Research on the development of network information security technology in cloud computing environment [J]. Science and Technology Innovation and Application, 2022, 12(36):170-173.
[6] Chen Xiao. Research and Implementation of Network Security Technology and Intrusion Prevention Technology in Cloud Computing Environment [J]. Information and Computer (Theoretical Edition), 2020, 32(11):184-186.

Downloads: 8294
Visits: 280092

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.