Information Security Technology under Cloud Computing Technology

被引:0
|
作者
Zhao Xiaojin [1 ]
机构
[1] Hainan Vocat Coll Polit Sci & Law, Haikou, Peoples R China
关键词
Cloud computing; Information security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the coming of information era, cloud computing has become a strong pillar for important management, storage, etc. in modern society development. In people's development course, its application has also been in unprecedented development speed. In the process of this development, through collecting summary of global information, it further completed the response construction of modern economic globalization so as to realize the definition of the overall information through comprehensive information construction, which completes the final guidance of cloud computing information. In the application development of information computing, it can also further perfect the comprehensive construction of cloud computing application information security and promote global security implementation. Based on information security applications, this paper gives a brief analysis on information security technology application in cloud computing technology. With the continuous development of modern science and technology, the concept of cloud computing was put forward and in the field of information technology, it has become the key to realize in fields of modern industry, life, etc. But the security of cloud computing technology has also become one of the system's most controversial points. Because of safety problems influence, the research object in the field of computer science is in dispute. To complete the application of operation maintenance service management, on the concept, strengthen the focus from all walks of life on cloud computing technology, and according to the actual production application, make effective information regulation. According to production application, make effective information adjustment. According to production security challenges form, complete the comprehensive information construction of cloud computing. Here this paper briefly argues from the information security technology perspective of cloud computing technology.
引用
收藏
页码:1157 / 1160
页数:4
相关论文
共 50 条
  • [31] Cloud Computing Technology for Collaborative Information System in Construction Industry
    Abedi, Mohammad
    Fathi, Mohamad Syazli
    Rawai, Shakila
    INNOVATION AND SUSTAINABLE COMPETITIVE ADVANTAGE: FROM REGIONAL DEVELOPMENT TO WORLD ECONOMIES, VOLS 1-5, 2012, : 593 - 602
  • [33] Research on the key technology of data security protection based on cloud computing
    Guo, Juan
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 66 - 69
  • [34] The study of security management platform technology and methods based on cloud computing
    Jie, Zhang
    INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1999 - 2003
  • [35] The Study of Security Management Platform Technology and Methods Based on Cloud Computing
    Jie, Zhang
    INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION, 2013, 180 : 487 - 491
  • [36] The Application of Network Security Technology in Computer Laboratory based on Cloud Computing
    Wang Liangliang
    2019 4TH INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2019), 2019, : 104 - 107
  • [37] Research on cloud computing data security protection technology satisfying differential
    Yang, Hui
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 125 : 101 - 101
  • [38] Technology Diffusion of Cloud Computing
    Liu, Yang
    Liimatainen, Tiina
    RISUS-JOURNAL ON INNOVATION AND SUSTAINABILITY, 2014, 5 (01): : 80 - 87
  • [39] Cloud Computing Technology and Science
    Hsu, Ching-Hsien
    Udoh, Emmanuel
    INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2013, 5 (04) : 1 - 4
  • [40] Technology Diffusion of Cloud Computing
    Liimatainen, Tiina
    Liu, Yang
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INNOVATION AND MANAGEMENT, 2013, : 243 - 247