Please wait a minute...
Computer & Telecommunication
Current Issue | Archive | Adv Search |
Discussion on Data Security in Cloud Computing Environment
ZHANG Yuan-yuan
The People's Armed Police Command College
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  According to the widely usage of data, data security has brought a series of problems. This paper firstly gives a brief analysis of data security in cloud computing environment; then gives the corresponding data safety protection strategy. It is hoped that this article can provide some suggestions and ideas for the relevant staff.
Key wordsbig data      cloud computing      data security     
:  TP309.2  

Cite this article:

ZHANG Yuan-yuan. Discussion on Data Security in Cloud Computing Environment. Computer & Telecommunication, 2017, 1(12): 64-66.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2017/V1/I12/64

[1] DING Wen-chao YU Shuang-bo XUE Yan-zhu FANG Dong-li. A Trust Service Adaptation Method Based on Security Proxy[J]. 电脑与电信, 2024, 1(6): 31-34.
[2] NIE Cheng WANG Jie.
A Review of Research and Development in Data Analysis Methods
[J]. 电脑与电信, 2024, 1(4): 200-25.
[3] LIU Chun TAN Kun ZHANG Li-hua LI Hong-bo AN Yuan. Research on Virtual Simulation Experiment Teaching of Cloud Computing and Automatic Operation and Maintenance Course Group[J]. 电脑与电信, 2024, 1(3): 17-.
[4] WANG Zi-ming XIAO Da-wei LIU Ya-nan. Knowledge Graph Construction for Data Science and Big Data Technology[J]. 电脑与电信, 2024, 1(1): 32-34.
[5] LI Xin JIA Mei-juan LIU Chun MAO Kai-ji. Reform and Practice of Computer Public Basic Education Model for Training Applied Talents in the Era of Big Data and Artificial Intelligence[J]. 电脑与电信, 2023, 1(11): 19-22.
[6] ZHANG Liang ZHANG Li-mei.
Design and Implementation of Comprehensive Training Platform for Big Data Specialty
Based on Docker Technology
[J]. 电脑与电信, 2022, 1(1-2): 46-48.
[7] ZHU Feng. Million Enrollment Expansion in Higher Vocational Education——Research on Talent Training Strategy for Big Data Technology and Application Specialty[J]. 电脑与电信, 2021, 1(9): 85-89.
[8] LIU Hui-fang. Research and Application of Anti-fraud Model Based on Big Data of Communication Operator[J]. 电脑与电信, 2021, 1(7): 46-52.
[9] WANG Jia-hao. Risk Evaluation of Telecom Big Data Application Project Based on AHP-entropy Weight Method[J]. 电脑与电信, 2021, 1(7): 53-55.
[10] JIANG Xin WANG Fei. Survey on Blockchain Technology and Application[J]. 电脑与电信, 2021, 1(5): 25-29.
[11] HUANG Han-yan. Intelligent Classroom Design Based on Three-tier Architecture[J]. 电脑与电信, 2021, 1(5): 22-29.
[12] YAO Jian-sheng LIU Yan-ling. Teaching Reform and Practice of Smart Tourism Data Science Course[J]. 电脑与电信, 2021, 1(4): 9-11.
[13] SONG Man. Research on Talents Training Program of Big Data Majors in Higher Vocational Colleges ——Taking Guangzhou City Construction College as an Example[J]. 电脑与电信, 2021, 1(4): 16-22.
[14] LI Ai-sheng. Exploration and Practice of Intelligent Training Based on CDL Architecture ——Take the Major of Information Security and Management as an Example[J]. 电脑与电信, 2021, 1(4): 81-85.
[15] CHEN Xin-yi GE Gao-jing YUAN Ze-yuan.
Prevention and Control Strategies of Telecommunications Fraud Crime
under the Background of "Intelligence-led Policing"
[J]. 电脑与电信, 2021, 1(12): 76-80.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd