Affiliation:
1. 1 Henan Fiance University , Zhengzhou , , China
Abstract
Abstract
As information technology increasingly develops, cloud computing has become an emerging computer network technology, which brings great convenience to network life. In order to ensure network security while fully enjoying this convenience, this paper established the laboratory cloud platform and network topology using the single node deployment mode of Openstack, obtained the software system architecture by applying B/S three-tier architecture model for laboratory development, and finally constructed cloud computing system of the laboratory by integrating encryption technology, digital signature technology, fingerprint recognition technology and dynamic password technology. After functionality, security and performance tests of the laboratory cloud platform, the application effect indicates that, some functional modules of the platform are in line with the desired results, the operation success rate is up to 100%, a 64G server can assume the operation of about 22 virtual machines, the number of server receiving and processing reaches 33 per second, and the throughput climbs up to 980,000 bytes per second. Therefore, it is concluded that with the support of cloud computing, the laboratory basically meets the desired use demand, which can effectively intercept unauthorized operation instructions, and get good carrying capacity and load capacity while strengthening network security.
Subject
Applied Mathematics,Engineering (miscellaneous),Modeling and Simulation,General Computer Science
Reference32 articles.
1. Tak, A., Mhdo, B., Ghh, C., et al. (2022). Unlocking digital technologies for waste recycling in industry 4.0 era: A transformation towards a digitalization-based circular economy in Indonesia. Journal of Cleaner Production.
2. Frantz, D., Hostert, P., Rufin, P., et al. (2022). Revisiting the Past: Replicability of a Historic Long-Term Vegetation Dynamics Assessment in the Era of Big Data Analytics. Remote Sensing, 14(3), 597.
3. Li, J., Qiao, Z., Zhang, K., et al. (2021). A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing. Sensors, 21(1), 288.
4. Liu, Y., Ren, L. (2022). The Influence of Artificial Intelligence Technology on Teaching under the Threshold of “Internet+”: Based on the Application Example of an English Education Platform. Wireless Communications and Mobile Computing.
5. Sharma, A., Kaur, S., Singh, M. A. (2021). Comprehensive review on blockchain and Internet of Things in healthcare. Transactions on Emerging Telecommunications Technologies.