Analysis on Key Technology of "Cloud Computing"

被引:0
|
作者
Wang, Bei [1 ]
机构
[1] Shanxi Ind Vocat Coll, Xianyang City 712000, Shaanxi Provinc, Peoples R China
关键词
Cloud computing; Cloud security; Cloud services; Information technology;
D O I
暂无
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
This paper introduces the background of cloud computing, takes analysis of key technology, analysis of cloud computing and traditional competitive intelligence information model for comparative study, for the security of cloud computing, function and service of the following aspects to elaborate, to explore the influence of cloud computing on the information.
引用
收藏
页码:58 / 62
页数:5
相关论文
共 50 条
  • [1] Analysis of parallel computing technology in cloud computing
    Li Jun
    [J]. PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 293 - 297
  • [2] Research on Key Technology of Authentication and Key Negotiation in Cloud Computing Environment
    Wang Linjing
    Zhao Chunxia
    [J]. PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 246 - 250
  • [3] KEY TECHNOLOGY OF HOSPITAL DATA SECURITY BASED ON CLOUD COMPUTING
    Zhang, Y.
    Meng, Q. W.
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2015, 117 : 38 - 38
  • [4] The Key Technology Research of Virtual Laboratory based On Cloud Computing
    Zhang, Ling
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 1516 - 1521
  • [5] Analysis technology of data mining technology and cloud computing
    Chong, Liu
    Lei, Wang
    [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, : 121 - 124
  • [6] A Bibliometric Analysis of Cloud Computing Technology Research
    Yu, Junfeng
    Yang, Zijiang
    Zhu, Shiwei
    Xu, Beibei
    Li, Sisi
    Zhang, Mingjun
    [J]. PROCEEDINGS OF 2018 IEEE 3RD ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC 2018), 2018, : 2353 - 2358
  • [7] Security in Cloud Computing: An Analysis of Key Drivers and Constraints
    Mohammed, Derek
    [J]. INFORMATION SECURITY JOURNAL, 2011, 20 (03): : 123 - 127
  • [8] Performance analysis of key splitting algorithms for cloud computing
    Buchade, Amar
    Ingle, Rajesh
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 562 - 566
  • [9] Research on the key technology of data security protection based on cloud computing
    Guo, Juan
    [J]. PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 66 - 69
  • [10] The Key Technology of Electronic Evidence Collection Research Based on Cloud Computing
    Xu, Yanwei
    Gong, Honghui
    Zhang, Ting
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 3031 - 3035