|
|
Security Analysis of User Identity Authentication in the Background of Cloud Computing |
Shen Yan |
Nantong Secondary Vocational School of Jiangsu Province |
|
|
Abstract As an important product of the combination of computer technology and the Internet, cloud computing has opened a
new round of technological revolution in the field of IT and information. However, cloud computing has a lot of risk problems.
There are still many vulnerability problems under the current regulatory network environment, producing a huge threat for the information
security of the network users. In order to solve this problem, it is imminent to carry out the user authentication security analysis
in the background of cloud computing. This paper will focus on the cloud computing security problems and puts forward some
specific measures.
|
Published: 14 November 2017
|
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|