[go: up one dir, main page]

Liu et al., 2022 - Google Patents

Network Security Technology Based on Cloud Computing

Liu et al., 2022

View PDF
Document ID
10381606552681081782
Author
Liu L
et al.
Publication year
Publication venue
Academic Journal of Computing & Information Science

External Links

Snippet

With the rapid development of computers and the Internet, cloud computing network technology is widely used in all aspects of the world with its powerful data processing capabilities. While it promotes people's convenient life, it also faces many security issues …
Continue reading at www.francis-press.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Gill et al. Security and privacy aspects of cloud computing: a smart campus case study
Kazim et al. A survey on top security threats in cloud computing
Bamrara Evaluating database security and cyber attacks: A relational approach
Shajan et al. Survey of security threats and countermeasures in cloud computing
Kofahi et al. Identifying the top threats in cloud computing and its suggested solutions: a survey
Salutina et al. Cybersecurity, Risk Management and Monitoring of Digital and Infocommunication Development of the Company
Arunkumar et al. A review on cloud computing security challenges, attacks and its countermeasures
Kumar et al. A survey on cloud computing security threats, attacks and countermeasures: A review
Lemoudden et al. A Survey of Cloud Computing Security Overview of Attack Vectors and Defense Mechanisms.
Shyam et al. Achieving Cloud Security Solutions through Machine and Non-Machine Learning Techniques: A Survey.
GB2608435A (en) System and method for managing transparent data encryption of database
Qudratovich Main Internet threats and ways to protect against them
Mahato et al. Cybersecurity Challenges and Threats: The Risks in Digital World
Liu Network Security Technology Based on Cloud Computing
Yassin et al. Cyber security risk assessment for determining threats and countermeasures for banking systems
Nadjar et al. A case study on the multi-vector data breach on astoria
Singh et al. A hybrid model for cyberspace security
Safhi et al. Major Security Threats and Attacks that Facing Cloud Computing with the Main Defence Strategies
Zhu et al. Study on security of electronic commerce information system
Gopal et al. Secure Cloud Computing: Mitigating Network Vulnerabilities
Eneh et al. Cybersecurity Strategy to Curb Data Insecurity and DDoS Attacks on e-government for National Development
Fengxuan et al. Research on service security reinforcement scheme based on application gateway
Ramachandran et al. Big data in cloud computing-A defense mechanism
Karimli Cloud risks and solutions review
Pasupuleti et al. Secure Database Authentication from Vulnerability Detection using Encryption Mode of Standardization