E-Commerce Network Security Based on Big Data in Cloud Computing Environment

被引:0
作者
Zeng, Yifu [1 ,2 ]
Ouyang, Shuosi [3 ]
Zhu, Tuanfei [1 ,2 ]
Li, Chuang [4 ]
机构
[1] Changsha Univ, Coll Comp Engn & Appl Math, Changsha 410022, Hunan, Peoples R China
[2] Changsha Univ, Hunan Prov Key Lab Ind Internet Technol & Secur, Changsha 410022, Hunan, Peoples R China
[3] Hunan Vocat Coll Commerce, Sch Accounting, Changsha 410205, Hunan, Peoples R China
[4] Hunan Univ Technol & Business, Sch Comp Sci, Changsha 410205, Hunan, Peoples R China
关键词
SERVICE PLATFORM; INNOVATION;
D O I
10.1155/2022/9935244
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The popularization and development of big data and cloud computing in e-commerce still face a series of problems, among which the most prominent one is security. How to establish an effective risk assessment system in the cloud computing environment is the primary concern of e-commerce enterprises. This article mainly discusses the network security of e-commerce based on big data in cloud computing environment. Because the servers of the cloud computing platform are deployed on a global scale, all the above nine processes can be carried out in real time, thereby improving the operational efficiency of the enterprise. Moreover, in large-scale e-commerce applications, according to probability statistics, the distribution of all these process steps must be uniformly distributed. Cloud computing is the commercial realization of computing resources, which is essentially a producer-consumer model. Cloud computing can balance the load to the greatest extent and solve various inconsistencies that may exist in the process of data processing. Balanced conflict greatly improved the solution. The speed, at which the case process runs, maximizes the potential of cloud computing on a commercial level. This article makes an effective investigation of information assets in various aspects. In this article, the comprehensive risk value of the system was calculated as 4.4. According to the risk level, this article sets up the electronic commerce system's physical security and access and data backup control vulnerability to resolve problems; another big data reflect is also not allowed to ignore. In view of these problems, this article proposes corresponding improvement strategies responsibility allocation.
引用
收藏
页数:8
相关论文
共 24 条
  • [1] Outlook on moving of computing services towards the data sources
    Akhbar, Farzaneh
    Chang, Victor
    Yao, Yulin
    Mendez Munoz, Victor
    [J]. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2016, 36 (04) : 645 - 652
  • [2] Network Service Chaining in Fog and Cloud Computing for the 5G Environment: Data Management and Security Challenges
    Chaudhary, Rajat
    Kumar, Neeraj
    Zeadally, Sherali
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (11) : 114 - 122
  • [3] Cloud service platform of electronic identity in cyberspace
    Chen, Bing
    Tan, Chengxiang
    Zou, Xiang
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (01): : 413 - 425
  • [4] SCALABLE AND FLEXIBLE MASSIVE MIMO PRECODING FOR 5G H-CRAN
    Chen, Na
    Rong, Bo
    Zhang, Xinran
    Kadoch, Michel
    [J]. IEEE WIRELESS COMMUNICATIONS, 2017, 24 (01) : 46 - 52
  • [5] A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures
    Chen, Zhijiang
    Xu, Guobin
    Mahalingam, Vivek
    Ge, Linqiang
    James Nguyen
    Yu, Wei
    Lu, Chao
    [J]. BIG DATA RESEARCH, 2016, 3 : 10 - 23
  • [6] A policy-oriented secured service for the e-commerce applications in cloud
    Dhar, M. S. Murali
    Manimegalai, R.
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2018, 22 (5-6) : 911 - 919
  • [7] Edge Computing-Based Security Framework for Big Data Analytics in VANETs
    Garg, Sahil
    Singh, Amritpal
    Kaur, Kuljeet
    Aujla, Gagangeet Singh
    Batra, Shalini
    Kumar, Neeraj
    Obaidat, M. S.
    [J]. IEEE NETWORK, 2019, 33 (02): : 72 - 81
  • [8] E-Commerce Model Based on the Internet of Things
    Hsu, Li-Fu
    [J]. ADVANCED SCIENCE LETTERS, 2016, 22 (10) : 3089 - 3091
  • [9] CFSF: On Cloud-Based Recommendation for Large-Scale E-commerce
    Hu, Long
    Lin, Kai
    Hassan, Mohammad Mehedi
    Alamri, Atif
    Alelaiwi, Abdulhameed
    [J]. MOBILE NETWORKS & APPLICATIONS, 2015, 20 (03) : 380 - 390
  • [10] Kar A.K., 2015, Global Journal of Flexible Systems Management, V16, P191, DOI [10.1007/s40171-015-0093-1, DOI 10.1007/S40171-015-0093-1]