Paper
6 May 2024 Design of network terminal data security protection system in cloud computing environment
Yongqing Liu, Qiang Li, Yanbin Jiao, Youyong Chen, Ming Cheng
Author Affiliations +
Proceedings Volume 13107, Fourth International Conference on Sensors and Information Technology (ICSI 2024); 131072T (2024) https://doi.org/10.1117/12.3029328
Event: Fourth International Conference on Sensors and Information Technology (ICSI 2024), 2024, Xiamen, China
Abstract
In the cloud computing environment, network terminal data has the characteristics of large quantity and real-time changes. In order to ensure the security of network terminal data, a network terminal data security protection system is designed in the cloud computing environment. The system includes hardware modules such as intrusion detection, vulnerability scanning, and cloud security management, which can ensure that only authorized users can access data and achieve recognition and prevention of malicious behavior. On the basis of hardware design, a hybrid encryption algorithm is adopted to encrypt network terminal data, further improving system performance and security, and protecting data security in cloud computing environments. The experimental test results show that the system has a low false alarm rate, a high malicious attack blocking rate, and a malicious attack detection rate, which can effectively ensure the security of network terminal data.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Yongqing Liu, Qiang Li, Yanbin Jiao, Youyong Chen, and Ming Cheng "Design of network terminal data security protection system in cloud computing environment", Proc. SPIE 13107, Fourth International Conference on Sensors and Information Technology (ICSI 2024), 131072T (6 May 2024); https://doi.org/10.1117/12.3029328
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Computer security

Data storage

Cloud computing

Computing systems

Design

Information security

Back to Top