Please wait a minute...
Computer & Telecommunication  2017, Vol. 1 Issue (4): 34-35    DOI:
Current Issue | Archive | Adv Search |
Cloud Storage System Structure Model and Security Policy
Fan Yueqi
Shanxi Province Logistics Technology School
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  In computer data storage, cloud storage system brings people convenience obviously, but the data security risk is huge. According to the current problems faced by cloud storage data security, cloud storage system model is analyzed from the view of technology, and the corresponding safety strategy is put forward.
Key wordscloud storage system      structural model      security      strategy     
Published: 15 November 2017
ZTFLH:  TP333  

Cite this article:

Fan Yueqi. Cloud Storage System Structure Model and Security Policy. Computer & Telecommunication, 2017, 1(4): 34-35.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2017/V1/I4/34

[1] YE Dong CHEN Chun-tao LI Zong-chen LI Jun-yao. Research on the School-Bureau-Enterprise Collaborative Education Model in the Major of Public Security Audio-visual Technology[J]. 电脑与电信, 2021, 1(8): 30-32.
[2] FANG Jun QIU Hua. Research on the Solution of Soft Credit Control Strategy for Message Billing Project[J]. 电脑与电信, 2021, 1(8): 52-57.
[3] YANG Ye. Research on the Information Security and Management Major Personnel Training Based on“1+X”Certificate System[J]. 电脑与电信, 2021, 1(6): 6-8.
[4] HAN Hai. An Integrated Security Monitoring Solution in the Judicial Field Based on 5G Private Network[J]. 电脑与电信, 2021, 1(6): 76-78.
[5] FANG Xin. Research on Security of Rip Routing Protocol Based on Python[J]. 电脑与电信, 2021, 1(5): 1-21.
[6] JIANG Xin WANG Fei. Survey on Blockchain Technology and Application[J]. 电脑与电信, 2021, 1(5): 25-29.
[7] ZHUANG Yuan-xiang. Teaching Research on Network Security in Technical Schools[J]. 电脑与电信, 2021, 1(1): 62-67.
[8] KUANG Hui. Research on Information Security of Computer Network in 5G Communication Era[J]. 电脑与电信, 2020, 1(8): 33-.
[9] LIU Jie. Research on Service Route Strategy andAlgorithm of ROADM Network[J]. 电脑与电信, 2020, 1(8): 41-44.
[10] WANG Yu HE Zhen-xiang. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 1-3.
[11] JIANG Yi ZHU Jun-wu. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 21-24.
[12] LI Jun-tao. Security Research on Internet of Things Based on NB-IoT Network[J]. 电脑与电信, 2020, 1(7): 62-64.
[13] XIE Feng MENG Jin DING Wei REN Zhao-peng . Overview of Network Structure Transformation and Network Security Construction Based on MajorActivities Guarantee[J]. 电脑与电信, 2020, 1(6): 57-62.
[14] . Construction Strategy of Online Gold Course Based on MOOC Technology[J]. 电脑与电信, 2020, 1(5): 7-8.
[15] ZHONG Yu-ming CHEN Chang-hui. Exploration of Network and Information Security[J]. 电脑与电信, 2020, 1(5): 33-35.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd