Proceedings of the 2015 4th National Conference on Electrical, Electronics and Computer Engineering

Information Security Technology under Cloud Computing Technology

Authors
XiaoJin Zhao
Corresponding Author
XiaoJin Zhao
Available Online December 2015.
DOI
10.2991/nceece-15.2016.205How to use a DOI?
Keywords
Cloud computing; Information security;
Abstract

With the coming of information era, cloud computing has become a strong pillar for important management, storage, etc. in modern society development. In people's development course, its application has also been in unprecedented development speed. In the process of this development, through collecting summary of global information, it further completed the response construction of modern economic globalization so as to realize the definition of the overall information through comprehensive information construction, which completes the final guidance of cloud computing information. In the application development of information computing, it can also further perfect the comprehensive construction of cloud computing application information security and promote global security implementation. Based on information security applications, this paper gives a brief analysis on information security technology application in cloud computing technology.

Copyright
© 2016, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2015 4th National Conference on Electrical, Electronics and Computer Engineering
Series
Advances in Engineering Research
Publication Date
December 2015
ISBN
10.2991/nceece-15.2016.205
ISSN
2352-5401
DOI
10.2991/nceece-15.2016.205How to use a DOI?
Copyright
© 2016, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - XiaoJin Zhao
PY  - 2015/12
DA  - 2015/12
TI  - Information Security Technology under Cloud Computing Technology
BT  - Proceedings of the 2015 4th National Conference on Electrical, Electronics and Computer Engineering
PB  - Atlantis Press
SP  - 1157
EP  - 1160
SN  - 2352-5401
UR  - https://doi.org/10.2991/nceece-15.2016.205
DO  - 10.2991/nceece-15.2016.205
ID  - Zhao2015/12
ER  -