Paper
28 July 2022 Research on data security and privacy protection methods in cloud computing environment
Fulin Li
Author Affiliations +
Proceedings Volume 12303, International Conference on Cloud Computing, Internet of Things, and Computer Applications (CICA 2022); 123030X (2022) https://doi.org/10.1117/12.2642940
Event: International Conference on Cloud Computing, Internet of Things, and Computer Applications, 2022, Luoyang, China
Abstract
Cloud computing has received widespread attention and application in the industry due to its strong computing power and large storage capacity. However, while users enjoy the convenience brought by cloud computing technology, they inevitably face the challenge of data security, and how to ensure the privacy security of data in the cloud environment has become an urgent problem. Therefore, this paper investigates the privacy protection methods of data security based on cloud computing environment. This paper first analyses the architecture of cloud computing and the current threats. Then, it focuses on the principles of AES and SM2 algorithms, and on this basis, a hybrid encryption data security privacy protection scheme is proposed by combining the SM2 algorithm with the AES algorithm. Through experimental tests, the results demonstrate that the scheme improves the computational efficiency of encryption and decryption while effectively protecting the privacy and security of data transmission in the cloud environment.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Fulin Li "Research on data security and privacy protection methods in cloud computing environment", Proc. SPIE 12303, International Conference on Cloud Computing, Internet of Things, and Computer Applications (CICA 2022), 123030X (28 July 2022); https://doi.org/10.1117/12.2642940
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Clouds

Computer security

Symmetric-key encryption

Data storage

Computer architecture

Data transmission

Network security

Back to Top