The realization path of network security technology under big data and cloud computing

0Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper studies the cloud and big data technology based on the characters of network security, including virus invasion, data storage, system vulnerabilities, network management etc. It analyzes some key network security problems in the current cloud and big data network. Above all, this paper puts forward technical ways of achieving network security. Cloud computing is a service that based on the increased usage and delivery of the internet related services, it promotes the rapidly development of the big data information processing technology, improves the processing and management abilities of big data information. With tie rapid development of computer technology, big data technology brings not only huge economic benefits, but the evolution of social productivity. However, serials of safety problems appeared. How to increase network security has been become the key point. This paper analyzes and discusses the technical ways of achieving network security.

Author supplied keywords

Cite

CITATION STYLE

APA

Kang, N., Zhang, X., Cheng, X., Fang, B., & Jiang, H. (2019). The realization path of network security technology under big data and cloud computing. In Lecture Notes in Electrical Engineering (Vol. 550, pp. 570–577). Springer Verlag. https://doi.org/10.1007/978-981-13-7123-3_66

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free