Please wait a minute...
Computer & Telecommunication
Current Issue | Archive | Adv Search |
Discussion on Data Security in Cloud Computing Environment
ZHANG Yuan-yuan
The People's Armed Police Command College
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  According to the widely usage of data, data security has brought a series of problems. This paper firstly gives a brief analysis of data security in cloud computing environment; then gives the corresponding data safety protection strategy. It is hoped that this article can provide some suggestions and ideas for the relevant staff.
Key wordsbig data      cloud computing      data security     
ZTFLH:  TP309.2  

Cite this article:

ZHANG Yuan-yuan. Discussion on Data Security in Cloud Computing Environment. Computer & Telecommunication, 2017, 1(12): 64-66.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2017/V1/I12/64

[1] LIU Hui-fang. Research and Application of Anti-fraud Model Based on Big Data of Communication Operator[J]. 电脑与电信, 2021, 1(7): 46-52.
[2] WANG Jia-hao. Risk Evaluation of Telecom Big Data Application Project Based on AHP-entropy Weight Method[J]. 电脑与电信, 2021, 1(7): 53-55.
[3] JIANG Xin WANG Fei. Survey on Blockchain Technology and Application[J]. 电脑与电信, 2021, 1(5): 25-29.
[4] HUANG Han-yan. Intelligent Classroom Design Based on Three-tier Architecture[J]. 电脑与电信, 2021, 1(5): 22-29.
[5] YAO Jian-sheng LIU Yan-ling. Teaching Reform and Practice of Smart Tourism Data Science Course[J]. 电脑与电信, 2021, 1(4): 9-11.
[6] SONG Man. Research on Talents Training Program of Big Data Majors in Higher Vocational Colleges ——Taking Guangzhou City Construction College as an Example[J]. 电脑与电信, 2021, 1(4): 16-22.
[7] LI Ai-sheng. Exploration and Practice of Intelligent Training Based on CDL Architecture ——Take the Major of Information Security and Management as an Example[J]. 电脑与电信, 2021, 1(4): 81-85.
[8] YANG Yu XU Wang-ming . Research and Implementation of Real-time Data Processing Platform Based on Storm Technology[J]. 电脑与电信, 2021, 1(1): 51-.
[9] SONG Zhi-yang ZHOU-Chen ZHANG Juan CHEN Ying-ying. Design and Implementation of PositionAnalysis System of Recruitment Website[J]. 电脑与电信, 2020, 1(9): 6-10.
[10] HUANG Xiang. Research on theApplication of Cloud Computing in the Construction of Smart Campus[J]. 电脑与电信, 2020, 1(9): 60-62.
[11] LIU Yi-xuan. Research on theApplication of MongoDB in Urban Drainage[J]. 电脑与电信, 2020, 1(8): 55-.
[12] ZHENG Dan ZHOU Xiao-long. Research and Exploration on Smart FinancialAid in Colleges and Universities in the Background of Big Data[J]. 电脑与电信, 2020, 1(7): 25-27.
[13] WANG Chen-hao JIAHai-tian. Consumption Behavior Guidance and Risk Prevention of College Students Based on Big Data[J]. 电脑与电信, 2020, 1(7): 51-.
[14] SUN Shu-tong. Research onArtificial Intelligence Method and System for Dynamic Scheduling of Cloud Resources Based on Business Prediction[J]. 电脑与电信, 2020, 1(5): 67-70.
[15] ZHOU Hong-cheng FENG Kai-zheng XIAO Feng . Intelligent Forestry System Design Based on Big Data[J]. 电脑与电信, 2020, 1(4): 56-59.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd