Advertisement

The Realization Path of Network Security Technology Under Big Data and Cloud Computing

  • Nan KangEmail author
  • Xuesong ZhangEmail author
  • Xinzhou ChengEmail author
  • Bingyi FangEmail author
  • Hong JiangEmail author
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 550)

Abstract

This paper studies the cloud and big data technology based on the characters of network security, including virus invasion, data storage, system vulnerabilities, network management etc. It analyzes some key network security problems in the current cloud and big data network. Above all, this paper puts forward technical ways of achieving network security. Cloud computing is a service that based on the increased usage and delivery of the internet related services, it promotes the rapidly development of the big data information processing technology, improves the processing and management abilities of big data information. With tie rapid development of computer technology, big data technology brings not only huge economic benefits, but the evolution of social productivity. However, serials of safety problems appeared. How to increase network security has been become the key point. This paper analyzes and discusses the technical ways of achieving network security.

Keywords

Network security Big data Cloud 

References

  1. 1.
    Zhou, X., Lu, L.: Application and operation of computer network security prevention under the background of big data era. Netw. Secur. Technol. Appl. 05, 24–30 (2017)Google Scholar
  2. 2.
    Sun, H., Jia, R.: Research on enterprise network information security technology system in the context of big data. Commun. Technol. 50(02), 334–339 (2007)Google Scholar
  3. 3.
    Xu, L., Cheng, X., Chen, Y., Chao, K., Liu, D., Xing, H.: Self-optimised coordinated traffic shifting scheme for LTE cellular systems. In: 1st EAI International Conference on Self-Organizing Networks, pp. 67–75. Springer Press, Beijing (2015)CrossRefGoogle Scholar
  4. 4.
    Gao, M.: Network security technology in big data environment. Inf. Commun. 01, 158–159 (2017)Google Scholar
  5. 5.
    Xu, L., Zhao, X., Yu, Y., et al.: Data mining for base station evaluation in LTE cellular systems. In: 3rd International Conference on Signal and Information Processing, Networking and Computers, pp. 356–364. Springer Press, Chongqing (2017)Google Scholar
  6. 6.
    Xu, L., Chen, Y., Schormans, J., et al.: User-vote assisted self-organizing load balancing for OFDMA cellular systems. In: 22nd IEEE International Symposium on Personal Indoor and Mobile Radio Communications, pp. 217–221. IEEE Press, Toronto (2011)Google Scholar
  7. 7.
    Wang, F.: Discussion on network information security in the context of big data. Digital Technol. Appl. 05, 210 (2016)Google Scholar
  8. 8.
    Xu, L., Luan, Y., Cheng, X., et al.: Telecom big data based user offloading self-optimisation in heterogeneous relay cellular systems. Int. Jo. Distrib. Syst. Technol. 8(2), 27–46 (2017)CrossRefGoogle Scholar
  9. 9.
    Zhou, H.: Application of cloud computing technology in computer secure storage. Netw. Secur. Technol. Appl. (10):78–79 (2017)Google Scholar
  10. 10.
    Xu, L., Zhao, X., Luan, Y., et al.: User perception aware telecom data mining and network management for LTE/LTE-advanced networks. In: 4rd International Conference on Signal and Information Processing, Networking and Computers, pp. 237–245. Springer Press, Qingdao (2018)Google Scholar
  11. 11.
    Xu, L., Luan, Y., Cheng, X., Xing, H., Liu, Y., Jiang, X., Chen, W., Chao, K.: Self-optimised joint traffic offloading in heterogeneous cellular networks. In: 16th IEEE International Symposium on Communications and Information Technologies, pp. 263–267. IEEE Press, Qingdao (2016)Google Scholar
  12. 12.
    Huang, Y.: Network information security control mechanism and evaluation system in the context of big data. Inf. Comput. (Theor. Ed.) 20, 201–202 (2016)Google Scholar
  13. 13.
    Xu, L., Cheng, X., et al.: Mobility load balancing aware radio resource allocation scheme for LTE-advanced cellular networks. In: 16th IEEE International Conference on Communication Technology, pp. 806–812. IEEE Press, Hangzhou (2015)Google Scholar
  14. 14.
    Xu, L., Luan, Y., Cheng, X., et al.: WCDMA data based LTE site selection scheme in LTE deployment. In: 1st International Conference on Signal and Information Processing, Networking and Computers, pp. 249–260. CRC Press Taylor & Francis Group, Beijing (2015)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Unicom Cloud Data Limited Liability CompanyChina United Network Communications CorporationBeijingPeople’s Republic of China
  2. 2.Network Technology Research InstituteChina United Network Communications CorporationBeijingPeople’s Republic of China

Personalised recommendations