Cargando…
The Realization Path of Network Security Technology Under Big Data and Cloud Computing
This paper studies the cloud and big data technology based on the characters of network security, including virus invasion, data storage, system vulnerabilities, network management etc. It analyzes some key network security problems in the current cloud and big data network. Above all, this paper pu...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7119949/ http://dx.doi.org/10.1007/978-981-13-7123-3_66 |
_version_ | 1783514868743143424 |
---|---|
author | Kang, Nan Zhang, Xuesong Cheng, Xinzhou Fang, Bingyi Jiang, Hong |
author_facet | Kang, Nan Zhang, Xuesong Cheng, Xinzhou Fang, Bingyi Jiang, Hong |
author_sort | Kang, Nan |
collection | PubMed |
description | This paper studies the cloud and big data technology based on the characters of network security, including virus invasion, data storage, system vulnerabilities, network management etc. It analyzes some key network security problems in the current cloud and big data network. Above all, this paper puts forward technical ways of achieving network security. Cloud computing is a service that based on the increased usage and delivery of the internet related services, it promotes the rapidly development of the big data information processing technology, improves the processing and management abilities of big data information. With tie rapid development of computer technology, big data technology brings not only huge economic benefits, but the evolution of social productivity. However, serials of safety problems appeared. How to increase network security has been become the key point. This paper analyzes and discusses the technical ways of achieving network security. |
format | Online Article Text |
id | pubmed-7119949 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
record_format | MEDLINE/PubMed |
spelling | pubmed-71199492020-04-06 The Realization Path of Network Security Technology Under Big Data and Cloud Computing Kang, Nan Zhang, Xuesong Cheng, Xinzhou Fang, Bingyi Jiang, Hong Signal and Information Processing, Networking and Computers Article This paper studies the cloud and big data technology based on the characters of network security, including virus invasion, data storage, system vulnerabilities, network management etc. It analyzes some key network security problems in the current cloud and big data network. Above all, this paper puts forward technical ways of achieving network security. Cloud computing is a service that based on the increased usage and delivery of the internet related services, it promotes the rapidly development of the big data information processing technology, improves the processing and management abilities of big data information. With tie rapid development of computer technology, big data technology brings not only huge economic benefits, but the evolution of social productivity. However, serials of safety problems appeared. How to increase network security has been become the key point. This paper analyzes and discusses the technical ways of achieving network security. 2019-03-12 /pmc/articles/PMC7119949/ http://dx.doi.org/10.1007/978-981-13-7123-3_66 Text en © Springer Nature Singapore Pte Ltd. 2019 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Kang, Nan Zhang, Xuesong Cheng, Xinzhou Fang, Bingyi Jiang, Hong The Realization Path of Network Security Technology Under Big Data and Cloud Computing |
title | The Realization Path of Network Security Technology Under Big Data and Cloud Computing |
title_full | The Realization Path of Network Security Technology Under Big Data and Cloud Computing |
title_fullStr | The Realization Path of Network Security Technology Under Big Data and Cloud Computing |
title_full_unstemmed | The Realization Path of Network Security Technology Under Big Data and Cloud Computing |
title_short | The Realization Path of Network Security Technology Under Big Data and Cloud Computing |
title_sort | realization path of network security technology under big data and cloud computing |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7119949/ http://dx.doi.org/10.1007/978-981-13-7123-3_66 |
work_keys_str_mv | AT kangnan therealizationpathofnetworksecuritytechnologyunderbigdataandcloudcomputing AT zhangxuesong therealizationpathofnetworksecuritytechnologyunderbigdataandcloudcomputing AT chengxinzhou therealizationpathofnetworksecuritytechnologyunderbigdataandcloudcomputing AT fangbingyi therealizationpathofnetworksecuritytechnologyunderbigdataandcloudcomputing AT jianghong therealizationpathofnetworksecuritytechnologyunderbigdataandcloudcomputing AT kangnan realizationpathofnetworksecuritytechnologyunderbigdataandcloudcomputing AT zhangxuesong realizationpathofnetworksecuritytechnologyunderbigdataandcloudcomputing AT chengxinzhou realizationpathofnetworksecuritytechnologyunderbigdataandcloudcomputing AT fangbingyi realizationpathofnetworksecuritytechnologyunderbigdataandcloudcomputing AT jianghong realizationpathofnetworksecuritytechnologyunderbigdataandcloudcomputing |