Research on Computer Network Security Vulnerabilities and Encryption Technology in Cloud Computing Environment

被引:0
|
作者
Peng P. [1 ]
机构
[1] Admission Office, Guilin Institute of Information Technology, Guangxi, Guilin
关键词
Continuous authentication; Dynamic assessment model; Homomorphic encryption; Network security vulnerability; Optimal control policy;
D O I
10.2478/amns-2024-0171
中图分类号
学科分类号
摘要
Inadequate network security defense measures threaten the information and property security of the state and the public, and how to safeguard network security is of vital practical significance. This paper proposes a dynamic security threat assessment model and a robust optimal control strategy to improve the efficiency of detecting network vulnerabilities and the accuracy of detecting network threats in a cloud computing environment. It also protects the privacy of the user's identity through a multi-factor continuous authentication method, encrypts and protects the user's data using a homomorphic encryption algorithm, and strengthens the ability of computers to resist intrusion. Three case studies are conducted to verify the effectiveness of the proposed technical approach: dynamic assessment of security threats, control policy, authentication, and network encryption. The results show that in the network vulnerability control policy and authentication case study, when adding the control policy Tk = 40, the percentage of network normal nodes, malicious nodes and restorer nodes are 0.98, 0.02, and 0.009, respectively, and the encrypted plaintext ASCII value is distributed in [0,60] in an unordered manner, and the network is in a very desirable security state. Real-time accurate assessments of network security state can be provided by cloud computing-based network security vulnerability and encryption technology. © 2023 Peng Peng, published by Sciendo.
引用
收藏
相关论文
共 50 条
  • [1] Research on Applied Technology for Computer Network Security Under Cloud Computing Environment
    Xu, Haili
    4TH INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING FOR ADVANCED TECHNOLOGIES (ICMEAT 2015), 2015, : 529 - 532
  • [2] Computer Network Security Research under Cloud Computing Environment
    Ren, Qiong
    Tao, Jun
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 890 - 893
  • [3] Research on Computer Network Security and Encryption Technology
    Wang, Yanjun
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 111 - 114
  • [4] Research on Data Security Technology in Cloud Computing Environment
    Lei, Gang
    Luo, Fu
    Chen, Jianchen
    2023 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY, ITIOTSC 2023, 2023, : 42 - 45
  • [5] Research on the Security of Computer Network under Cloud Computing
    Luo, Lei
    Ge, Wei
    PROCEEDINGS OF THE 2018 3RD INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2018), 2018, 78 : 278 - 281
  • [6] Research on the design of computer network security defense system applying cloud computing technology
    Wang J.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [7] Research on Computer Network Security Based on Data Encryption Technology
    Zhang, Yicong
    Zhou, Shujun
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 1383 - 1387
  • [8] Research on the Computer Network Security Problems under the Cloud Computing
    Zhang, Ran
    2015 SSR International Conference on Social Sciences and Information (SSR-SSI 2015), Pt 2, 2015, 11 : 830 - 834
  • [9] The Application of Network Security Technology in Computer Laboratory based on Cloud Computing
    Wang Liangliang
    2019 4TH INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2019), 2019, : 104 - 107
  • [10] Research on Application Value of Data Encryption Technology in Computer Network Security
    Meng, Xiaoli
    MODERN COMPUTER SCIENCE AND APPLICATIONS II (MCSA 2017), 2017, : 13 - 18