Skip to main content
Top

2018 | OriginalPaper | Chapter

Cloud Computing Data Security Protection Strategy

Authors : Yu Wei, Yongsheng Zhang

Published in: Cloud Computing and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing is a computing model that has emerged in recent years. It is of great significance for promoting massive information data calculations. We store large amounts of data in the cloud and use algorithms to make huge computations on large-scale data centers on the Internet. Big data cloud computing resources have a huge amount of information, which can provide convenient and fast computing while being a new type of storage. Due to the large amount of data that needs to be processed by cloud computing, many information processing methods are involved, and customer privacy data is difficult to be effectively protected in the cloud computing environment. Therefore, the protection of information security in the cloud computing environment becomes more important. Based on the analysis of the data security problems in the big data cloud computing environment, this paper analyzes the security protection of big data cloud computing data, which is of great significance for promoting the establishment of a complete data security system, and can also be further promoted the useful of cloud computing.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Gong, C.C., Xiao, Y., Li, M.F.: Review of cloud computing security research. J. Shenyang Aerosp. Univ. 34(4), 1–17 (2017) Gong, C.C., Xiao, Y., Li, M.F.: Review of cloud computing security research. J. Shenyang Aerosp. Univ. 34(4), 1–17 (2017)
2.
go back to reference Yang, X.: Improvements and applications of the range and efficiency of homomorphic encryption algorithms. Comput. Eng. Des. 38(2), 318–322 (2017) Yang, X.: Improvements and applications of the range and efficiency of homomorphic encryption algorithms. Comput. Eng. Des. 38(2), 318–322 (2017)
3.
go back to reference Xin, S.Y., Zhao, Y., Lin, L.: Research on the trustworthy proof method of IaaS environment. Comput. Eng. 38(5), 117–119 (2012) Xin, S.Y., Zhao, Y., Lin, L.: Research on the trustworthy proof method of IaaS environment. Comput. Eng. 38(5), 117–119 (2012)
4.
go back to reference Feng, H.Y., Zhao, F.Y.: Research on dynamic data integrity detection supported in cloud storage services. J. Small Microcomput. Syst. 35(2), 239–243 (2014)MathSciNet Feng, H.Y., Zhao, F.Y.: Research on dynamic data integrity detection supported in cloud storage services. J. Small Microcomput. Syst. 35(2), 239–243 (2014)MathSciNet
5.
go back to reference Xin, M.Y., Fan, L.: Research on data security strategy in cloud computing environment. J. Chifeng Univ. (Nat. Sci. Ed.) 33(22), 26–27 (2017) Xin, M.Y., Fan, L.: Research on data security strategy in cloud computing environment. J. Chifeng Univ. (Nat. Sci. Ed.) 33(22), 26–27 (2017)
6.
go back to reference Wu, Y.M., Xu, J., Pan, X.: Application of OGSA-DAI 4.0 in scientific data sharing platform. Comput. Appl. Softw. 29(1), 131–133 (2012) Wu, Y.M., Xu, J., Pan, X.: Application of OGSA-DAI 4.0 in scientific data sharing platform. Comput. Appl. Softw. 29(1), 131–133 (2012)
7.
go back to reference Wang, X.R.: Data security analysis under big data cloud computing environment. Intell. Comput. Appl. 7(6), 171–172 (2017) Wang, X.R.: Data security analysis under big data cloud computing environment. Intell. Comput. Appl. 7(6), 171–172 (2017)
8.
go back to reference Xie, J.L.: Research on data security in cloud computing. Decis. Inf. (36), 307 (2017) Xie, J.L.: Research on data security in cloud computing. Decis. Inf. (36), 307 (2017)
9.
go back to reference Yang, C.: Big data and cloud computing: innovation opportunities and challenges. Int. J. Digit. Earth 10(1), 13–53 (2017)CrossRef Yang, C.: Big data and cloud computing: innovation opportunities and challenges. Int. J. Digit. Earth 10(1), 13–53 (2017)CrossRef
10.
go back to reference Meng, L.J.: Research on cloud storage and data recovery based on cloud platform. Comput. Knowl. Technol. (14), 3230–3232 (2016) Meng, L.J.: Research on cloud storage and data recovery based on cloud platform. Comput. Knowl. Technol. (14), 3230–3232 (2016)
11.
go back to reference Kuang, S.H., Li, B.: Analysis of cloud computing architecture and application examples. Comput. Digit. Eng. 38(3), 60–63 (2010) Kuang, S.H., Li, B.: Analysis of cloud computing architecture and application examples. Comput. Digit. Eng. 38(3), 60–63 (2010)
Metadata
Title
Cloud Computing Data Security Protection Strategy
Authors
Yu Wei
Yongsheng Zhang
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-00006-6_34

Premium Partner