Please wait a minute...
Computer & Telecommunication  2017, Vol. 1 Issue (4): 34-35    DOI:
Current Issue | Archive | Adv Search |
Cloud Storage System Structure Model and Security Policy
Fan Yueqi
Shanxi Province Logistics Technology School
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  In computer data storage, cloud storage system brings people convenience obviously, but the data security risk is huge. According to the current problems faced by cloud storage data security, cloud storage system model is analyzed from the view of technology, and the corresponding safety strategy is put forward.
Key wordscloud storage system      structural model      security      strategy     
Published: 15 November 2017
:  TP333  

Cite this article:

Fan Yueqi. Cloud Storage System Structure Model and Security Policy. Computer & Telecommunication, 2017, 1(4): 34-35.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2017/V1/I4/34

[1] DING Wen-chao YU Shuang-bo XUE Yan-zhu FANG Dong-li. A Trust Service Adaptation Method Based on Security Proxy[J]. 电脑与电信, 2024, 1(6): 31-34.
[2] LI Chun-hui WANG Xiao-ying ZHANG Qing-jie LIU Han-zhuo LIANG Jia-ye GAO Ning-kang. DDoS Attack Detection Method Based on Multi-scale Convolutional Neural Network [J]. 电脑与电信, 2024, 1(6): 35-.
[3] WANG Xiao-nan . Investigation and Research of AIGC Products Applied in Higher Education Field from the Perspective of College Students[J]. 电脑与电信, 2024, 1(5): 19-.
[4] GUO Xu-kun. Research on the Development Situation and Coordination Strategy of Multi Department Data Sharing of Digital Government in Guangdong - Hong Kong - Macao Greater Bay Area[J]. 电脑与电信, 2024, 1(5): 47-.
[5] SHAO Ze-jun  DAI Bing  HU You-ming  YIN Jun-han  LIU Yue-chao. Research on the Autonomous and Controllable Maturity of Provincial Enterprise Data Centers: Take Shandong Province for Example[J]. 电脑与电信, 2024, 1(5): 103-.
[6] BAO Hai-yan. Leading by Ideological and Political Education, Integrating Industry and Education --Research on the Teaching Innovation of Computer Network Security[J]. 电脑与电信, 2024, 1(1): 4-7.
[7] LI Jing ZHAO Ming-chao.
Application and Research of Classroom Response System in Instructional Design
——Take Ottawa University for Example
[J]. 电脑与电信, 2022, 1(9): 4-9.
[8] HE Zhen-xiang WANG Li-ying.
The Governance Problems and Countermeasures of Network Space
from the Angle of Investigation and Evidence Collection
[J]. 电脑与电信, 2022, 1(1-2): 36-39.
[9] ZHOUChaoLIUYun-peng.
Connotation,FrameandPromotionofDigitalLiteracyofHigherVocationalSchoolStudents
undertheBackgroundofDigitalChinaConstruction
[J]. 电脑与电信, 2022, 1(12): 6-.
[10] YE Dong CHEN Chun-tao LI Zong-chen LI Jun-yao. Research on the School-Bureau-Enterprise Collaborative Education Model in the Major of Public Security Audio-visual Technology[J]. 电脑与电信, 2021, 1(8): 30-32.
[11] FANG Jun QIU Hua. Research on the Solution of Soft Credit Control Strategy for Message Billing Project[J]. 电脑与电信, 2021, 1(8): 52-57.
[12] YANG Ye. Research on the Information Security and Management Major Personnel Training Based on“1+X”Certificate System[J]. 电脑与电信, 2021, 1(6): 6-8.
[13] HAN Hai. An Integrated Security Monitoring Solution in the Judicial Field Based on 5G Private Network[J]. 电脑与电信, 2021, 1(6): 76-78.
[14] FANG Xin. Research on Security of Rip Routing Protocol Based on Python[J]. 电脑与电信, 2021, 1(5): 1-21.
[15] JIANG Xin WANG Fei. Survey on Blockchain Technology and Application[J]. 电脑与电信, 2021, 1(5): 25-29.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd