Cargando…

The Realization Path of Network Security Technology Under Big Data and Cloud Computing

This paper studies the cloud and big data technology based on the characters of network security, including virus invasion, data storage, system vulnerabilities, network management etc. It analyzes some key network security problems in the current cloud and big data network. Above all, this paper pu...

Descripción completa

Detalles Bibliográficos
Autores principales: Kang, Nan, Zhang, Xuesong, Cheng, Xinzhou, Fang, Bingyi, Jiang, Hong
Formato: Online Artículo Texto
Lenguaje:English
Publicado: 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7119949/
http://dx.doi.org/10.1007/978-981-13-7123-3_66
_version_ 1783514868743143424
author Kang, Nan
Zhang, Xuesong
Cheng, Xinzhou
Fang, Bingyi
Jiang, Hong
author_facet Kang, Nan
Zhang, Xuesong
Cheng, Xinzhou
Fang, Bingyi
Jiang, Hong
author_sort Kang, Nan
collection PubMed
description This paper studies the cloud and big data technology based on the characters of network security, including virus invasion, data storage, system vulnerabilities, network management etc. It analyzes some key network security problems in the current cloud and big data network. Above all, this paper puts forward technical ways of achieving network security. Cloud computing is a service that based on the increased usage and delivery of the internet related services, it promotes the rapidly development of the big data information processing technology, improves the processing and management abilities of big data information. With tie rapid development of computer technology, big data technology brings not only huge economic benefits, but the evolution of social productivity. However, serials of safety problems appeared. How to increase network security has been become the key point. This paper analyzes and discusses the technical ways of achieving network security.
format Online
Article
Text
id pubmed-7119949
institution National Center for Biotechnology Information
language English
publishDate 2019
record_format MEDLINE/PubMed
spelling pubmed-71199492020-04-06 The Realization Path of Network Security Technology Under Big Data and Cloud Computing Kang, Nan Zhang, Xuesong Cheng, Xinzhou Fang, Bingyi Jiang, Hong Signal and Information Processing, Networking and Computers Article This paper studies the cloud and big data technology based on the characters of network security, including virus invasion, data storage, system vulnerabilities, network management etc. It analyzes some key network security problems in the current cloud and big data network. Above all, this paper puts forward technical ways of achieving network security. Cloud computing is a service that based on the increased usage and delivery of the internet related services, it promotes the rapidly development of the big data information processing technology, improves the processing and management abilities of big data information. With tie rapid development of computer technology, big data technology brings not only huge economic benefits, but the evolution of social productivity. However, serials of safety problems appeared. How to increase network security has been become the key point. This paper analyzes and discusses the technical ways of achieving network security. 2019-03-12 /pmc/articles/PMC7119949/ http://dx.doi.org/10.1007/978-981-13-7123-3_66 Text en © Springer Nature Singapore Pte Ltd. 2019 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Kang, Nan
Zhang, Xuesong
Cheng, Xinzhou
Fang, Bingyi
Jiang, Hong
The Realization Path of Network Security Technology Under Big Data and Cloud Computing
title The Realization Path of Network Security Technology Under Big Data and Cloud Computing
title_full The Realization Path of Network Security Technology Under Big Data and Cloud Computing
title_fullStr The Realization Path of Network Security Technology Under Big Data and Cloud Computing
title_full_unstemmed The Realization Path of Network Security Technology Under Big Data and Cloud Computing
title_short The Realization Path of Network Security Technology Under Big Data and Cloud Computing
title_sort realization path of network security technology under big data and cloud computing
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7119949/
http://dx.doi.org/10.1007/978-981-13-7123-3_66
work_keys_str_mv AT kangnan therealizationpathofnetworksecuritytechnologyunderbigdataandcloudcomputing
AT zhangxuesong therealizationpathofnetworksecuritytechnologyunderbigdataandcloudcomputing
AT chengxinzhou therealizationpathofnetworksecuritytechnologyunderbigdataandcloudcomputing
AT fangbingyi therealizationpathofnetworksecuritytechnologyunderbigdataandcloudcomputing
AT jianghong therealizationpathofnetworksecuritytechnologyunderbigdataandcloudcomputing
AT kangnan realizationpathofnetworksecuritytechnologyunderbigdataandcloudcomputing
AT zhangxuesong realizationpathofnetworksecuritytechnologyunderbigdataandcloudcomputing
AT chengxinzhou realizationpathofnetworksecuritytechnologyunderbigdataandcloudcomputing
AT fangbingyi realizationpathofnetworksecuritytechnologyunderbigdataandcloudcomputing
AT jianghong realizationpathofnetworksecuritytechnologyunderbigdataandcloudcomputing