Information Security Technology under Cloud Computing Technology

被引:0
|
作者
Zhao Xiaojin [1 ]
机构
[1] Hainan Vocat Coll Polit Sci & Law, Haikou, Peoples R China
关键词
Cloud computing; Information security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the coming of information era, cloud computing has become a strong pillar for important management, storage, etc. in modern society development. In people's development course, its application has also been in unprecedented development speed. In the process of this development, through collecting summary of global information, it further completed the response construction of modern economic globalization so as to realize the definition of the overall information through comprehensive information construction, which completes the final guidance of cloud computing information. In the application development of information computing, it can also further perfect the comprehensive construction of cloud computing application information security and promote global security implementation. Based on information security applications, this paper gives a brief analysis on information security technology application in cloud computing technology. With the continuous development of modern science and technology, the concept of cloud computing was put forward and in the field of information technology, it has become the key to realize in fields of modern industry, life, etc. But the security of cloud computing technology has also become one of the system's most controversial points. Because of safety problems influence, the research object in the field of computer science is in dispute. To complete the application of operation maintenance service management, on the concept, strengthen the focus from all walks of life on cloud computing technology, and according to the actual production application, make effective information regulation. According to production application, make effective information adjustment. According to production security challenges form, complete the comprehensive information construction of cloud computing. Here this paper briefly argues from the information security technology perspective of cloud computing technology.
引用
收藏
页码:1157 / 1160
页数:4
相关论文
共 50 条
  • [1] Study of Cloud Computing and Advanced Manufacturing Technology under Information Technology Development
    Zhou, Guohong
    [J]. GREEN POWER, MATERIALS AND MANUFACTURING TECHNOLOGY AND APPLICATIONS III, PTS 1 AND 2, 2014, 484-485 : 227 - 230
  • [2] Cloud Computing: Technology, Security Issues and Solutions
    Ahmad, Naim
    [J]. 2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), 2017, : 30 - 35
  • [3] Design of network security storage system based on under cloud computing technology
    ThiBac, Do
    Minh, Nguyen Hieu
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 103
  • [4] Research on Applied Technology for Computer Network Security Under Cloud Computing Environment
    Xu, Haili
    [J]. 4TH INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING FOR ADVANCED TECHNOLOGIES (ICMEAT 2015), 2015, : 529 - 532
  • [5] The Realization Path of Network Security Technology Under Big Data and Cloud Computing
    Kang, Nan
    Zhang, Xuesong
    Cheng, Xinzhou
    Fang, Bingyi
    Jiang, Hong
    [J]. SIGNAL AND INFORMATION PROCESSING, NETWORKING AND COMPUTERS (ICSINC), 2019, 550 : 570 - 577
  • [6] Cloud Computing - an Emerging Trend in Information Technology
    Wattal, Suneel
    Kumar, Ajay
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 168 - 173
  • [7] Information Technology Education Based on Cloud Computing
    Zheng, Jiangyan
    Cao, Shijie
    Zheng, Jianhui
    Chen, Zhihui
    Hong, Liang
    [J]. INFORMATION COMPUTING AND APPLICATIONS, ICICA 2013, PT I, 2013, 391 : 417 - +
  • [8] Information security technology based on DNA computing
    Cui, Guangzhao
    Qin, Limin
    Wang, Yanfeng
    Zhang, Xuncai
    [J]. 2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 288 - +
  • [9] The Application of Cloud Computing Technology in Network Data Security
    Shi, Liang
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 912 - 916
  • [10] Security of Big Data Based on the Technology of Cloud Computing
    Zhou, Xiaojun
    Lin, Ping
    Li, Zhiyong
    Wang, Yunpeng
    Tan, Wei
    Huang, Meng
    [J]. 2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 703 - 706