Academic Journal of Computing & Information Science, 2022, 5(4); doi: 10.25236/AJCIS.2022.050413.
Intelligent Equipment Academy, Shandong University of Science and Technology, Tai'an, Shandong, 271001, China
With the rapid development of computers and the Internet, cloud computing network technology is widely used in all aspects of the world with its powerful data processing capabilities. While it promotes people's convenient life, it also faces many security issues. Aiming at the network security risks and threats under cloud computing, briefly describe cloud computing technology, analyze the types and characteristics of network security under cloud computing, and clarify the importance of network security under cloud computing. Research and analyze the implementation strategy and development direction of network security technology under cloud computing, in order to promote the development of cloud computing network security technology in the future.
Cloud computing network; Network security technology; Implementation Strategy
Lixin Liu. Network Security Technology Based on Cloud Computing. Academic Journal of Computing & Information Science (2022), Vol. 5, Issue 4: 71-74. https://doi.org/10.25236/AJCIS.2022.050413.
 Liu Zhichao. Application status and countermeasures of network security technology based on cloud computing environment [J]. Overview and trend of Network Security, 2017 (12): 16743.
 Zhang Hao. Talking about computer network security in cloud computing environment [J]. Network Security Technology and Application, 2020 (10): 93-94.
 Wang ran. On Network Security and measures under Cloud Computing [J]. Electronic Technology and Software Engineering, 2018 (1): 224, 225.