| Issue |
ITM Web Conf.
Volume 78, 2025
International Conference on Computer Science and Electronic Information Technology (CSEIT 2025)
|
|
|---|---|---|
| Article Number | 03004 | |
| Number of page(s) | 10 | |
| Section | Intelligent Systems and Computing in Industry, Robotics, and Smart Infrastructure | |
| DOI | https://doi.org/10.1051/itmconf/20257803004 | |
| Published online | 08 September 2025 | |
Research on The Application of Cloud Computing Technology in Network Security Storage
School of Electronics and Information Technology, Sun Yat-sen University, Guangzhou, Guangdong, China
With the rapid development of cloud computing technology, its innovative application in the field of network security has become an important breakthrough to cope with the inadequacy of traditional security protection means. This article will systematically analyze the key technology system of cloud computing in network security, and will discuss the implementation mechanism and evolution path of core technologies such as authentication, data encryption and key management, compare the advantages and disadvantages of multiple authentication modes such as cryptographic authentication, API authentication and biometrics, as well as summarize the groundbreaking applications of hybrid encryption and format-preserving encryption, and other innovative solutions in data security protection. Meanwhile, by studying the practice cases in typical fields such as finance and e-commerce, the study reveals the application efficacy of cloud computing security technology in enterprise data protection and privacy enhancement. The study shows that cloud computing builds a dynamic defense system through the fusion of distributed storage architecture and intelligent algorithms, but continuous innovation is needed in quantum security algorithm migration, key lifecycle management and other aspects. This article provides theoretical references and technical route guidelines for building a new generation of cloud network security fusion system.
© The Authors, published by EDP Sciences, 2025
This is an Open Access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.

