Affiliation:
1. School of Marxism, Xi’an Fanyi University, Xi’an710105, Shaanxi, China
Abstract
To effectively improve the security and accuracy of computer information storage, a computer security problem and legal system based on cloud computing are proposed. Firstly, this article details the evolution of cloud computing, its characteristics, architecture, and application status of cloud computing in detail. Second, we discussed security strategies to ensure the confidentiality and integrity of cloud computing information, focuses on the data encryption technology of cloud data security, and designs and implements the data backup and recovery system based on the cloud platform. The core layers of the system are the system layer and data operation layer. The system uses multithreading technology based on epoll and thread pool to improve the efficiency of data transmission. At the same time, the basic visual page is realized, and users can use the page to create a convenient operating system. Finally, the system is built in the laboratory environment and tested as a whole. The test results show that through the performance comparison with the current commonly used systems, it is found that the system in this paper has a certain improvement in data transmission rate, but the utilization rate of node CPU is as high as 40%, which leads to certain requirements for node CPU performance. Therefore, the system meets the functional requirements proposed in the design. Compared to the existing system, its performance has been found to meet the actual requirements of use, proving that the system is accessible and efficient.
Subject
General Mathematics,General Medicine,General Neuroscience,General Computer Science
Reference28 articles.
1. An exhaustive research on the application of intrusion detection technology in computer network security in sensor networks;Y. Wang;Journal of Sensors,2021
2. Security and privacy challenges in cloud computing: a review;M. S. K. Yelpale;Journal of Cybersecurity and Information Management,2020
3. A large-scale analysis of https deployments: challenges, solutions, and recommendations;Q. Hu;Journal of Computer Security,2020
4. A comprehensive survey on authentication and privacy-preserving schemes in vanets;P. Mundhe;Computer Science Review,2021
5. Three byte-based mutual authentication scheme for autonomous Internet of Vehicles;M. Adil;IEEE Transactions on Intelligent Transportation Systems,2021
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献