Research on Computer Network Security Vulnerabilities and Encryption Technology in Cloud Computing Environment

被引:0
|
作者
Peng P. [1 ]
机构
[1] Admission Office, Guilin Institute of Information Technology, Guangxi, Guilin
关键词
Continuous authentication; Dynamic assessment model; Homomorphic encryption; Network security vulnerability; Optimal control policy;
D O I
10.2478/amns-2024-0171
中图分类号
学科分类号
摘要
Inadequate network security defense measures threaten the information and property security of the state and the public, and how to safeguard network security is of vital practical significance. This paper proposes a dynamic security threat assessment model and a robust optimal control strategy to improve the efficiency of detecting network vulnerabilities and the accuracy of detecting network threats in a cloud computing environment. It also protects the privacy of the user's identity through a multi-factor continuous authentication method, encrypts and protects the user's data using a homomorphic encryption algorithm, and strengthens the ability of computers to resist intrusion. Three case studies are conducted to verify the effectiveness of the proposed technical approach: dynamic assessment of security threats, control policy, authentication, and network encryption. The results show that in the network vulnerability control policy and authentication case study, when adding the control policy Tk = 40, the percentage of network normal nodes, malicious nodes and restorer nodes are 0.98, 0.02, and 0.009, respectively, and the encrypted plaintext ASCII value is distributed in [0,60] in an unordered manner, and the network is in a very desirable security state. Real-time accurate assessments of network security state can be provided by cloud computing-based network security vulnerability and encryption technology. © 2023 Peng Peng, published by Sciendo.
引用
收藏
相关论文
共 50 条
  • [21] Application of Computer Information Encryption Technology in Network Security
    Aimait, Aikebaier Jiang
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 32 - 34
  • [22] A cross encryption scheme for data security storage in cloud computing environment
    Kang, Haiyan
    Deng, Jie
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2023, 16 (01) : 1 - 10
  • [23] Research on the Virtualization Technology in Cloud Computing Environment
    Ding, Weimin
    Ghansah, Benjamin
    Wu, Yanyan
    INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH IN AFRICA, 2016, 21 : 191 - 196
  • [24] Computer Network Security and Technology Research
    Fan Yan
    Yang Jian-wen
    Cheng Lin
    2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 293 - 296
  • [25] Research of Computer Network Security Technology
    Tan, Juan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL, 2015, 125 : 736 - 740
  • [26] Cloud Computing Security Challenges, Threats and Vulnerabilities
    Sasubilli, Manoj Kumar
    Venkateswarlu, R.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 476 - 480
  • [27] The application of cloud computing technology in network data security
    Shi, Liang, 1600, TeknoScienze, Viale Brianza,22, Milano, 20127, Italy (28):
  • [28] The Application of Cloud Computing Technology in Network Data Security
    Shi, Liang
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 912 - 916
  • [29] Application of the Data Encryption Technology in the Computer Network Communication Security
    Hu, Xiaoling
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2020, 126 : 283 - 283
  • [30] The Application of Data Encryption Technology in Computer Network Communication Security
    Gong, Lina
    Zhang, Li
    Zhang, Wei
    Li, Xuhong
    Wang, Xia
    Pan, Wenwen
    2017 5TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION (CDMMS 2017), 2017, 1834