New Network Security Based on Cloud Computing

Author(s):  
Weili Huang ◽  
Jian Yang
2021 ◽  
Vol 2083 (4) ◽  
pp. 042084
Author(s):  
Xi Wang ◽  
Lei Shi

Abstract Nowadays, computer networks are widely used. Besides the convenience, people also feel the pressure of network viruses and hackers. At present, in the process of fighting against network security threats, traditional defense measures have been difficult to meet. Therefore, in order to meet the needs of computer network security under cloud computing technology, and for the future of cloud computing high-quality network storage system can be gradually optimized. In this paper, from the cloud computing and network security storage system two aspects of the computer network security storage performance analysis and design; Then from the design framework, through careful design, to ensure the reliability and security of data upload, storage.


Author(s):  
Kimaya Arun Ambekar ◽  
Kamatchi R.

Cloud computing is based on years of research on various computing paradigms. It provides elasticity, which is useful in the situations of uneven ICT resources demands. As the world is moving towards digitalization, the education sector is expected to meet the pace. Acquiring and maintaining the ICT resources also necessitates a huge amount of cost. Education sector as a community can use cloud services on various levels. Though the cloud is very successfully running technology, it also shows some flaws in the area of security, privacy and trust. The research demonstrates a model in which major security areas are covered like authorization, authentication, identity management, access control, privacy, data encryption, and network security. The total idea revolves around the community cloud as university at the center and other associated colleges accessing the resources. This study uses OpenStack environment to create a complete cloud environment. The validation of the model is performed using some cases and some tools.


2016 ◽  
Vol 6 (3) ◽  
pp. 15-31 ◽  
Author(s):  
Usha Divakarla ◽  
K. Chandrasekaran

Trust is the common factor of any network security. In cloud, trust is the major factor as this trust develops a relation between the user and resource of the service provider. To develop a strong trust there has to be a strong trust path between two entities. The model proposed builds a strong trust path between two important entities in cloud namely user and resources of the service provider. The trust path thus built strengthens the security of the resources as well as the authentication of the user. The implementation proved that trust model developed is more efficient in terms of computation time.


2019 ◽  
Vol 1 (2) ◽  
pp. 15
Author(s):  
Huang Jie

Security threats and shows abnormality about security, safety, privacy and trust as network security-related data, in short, security-related data. Apparently, the first step to detect network attacks and intrusions is to collect the security-related data. In this paper, we will present a lot of approaches to solving Networks and Information Security issues. We survey network security in LTE technologies, Vehicular Ad-Hoc Network, and security in Wireless Sensor Network. Internet of Things. In this paper, we describe many methods in Information Security. Is consist of Information Security in Big Data and Cloud Computing.


Sign in / Sign up

Export Citation Format

Share Document