Netinfo Security ›› 2022, Vol. 22 ›› Issue (7): 55-63.doi: 10.3969/j.issn.1671-1122.2022.07.007

Previous Articles     Next Articles

Research on Data Security Threats and Protection of Key Technologies in Cloud Environment

YU Chengli1, ZHANG Yang2,3, JIA Shijie2,3()   

  1. 1. China Academy or Industrial Internet, Beijing 100854, China
    2. Institute of Information Engineering, University of Chinese Academy of Sciences, Beijing 100093, China
    3. University of Chinese Academy of Sciences, Beijing 100049 China
  • Received:2022-03-16 Online:2022-07-10 Published:2022-08-17
  • Contact: JIA Shijie E-mail:jiashijie@iie.ac.cn

Abstract:

With the rapid development of cloud computing technology, the cloud has gradually become the main way to store data. Cloud storage owns massive storage space, which provides storage, management and other services and enables the users to access the cloud data at any time without limitations by location or device factors. However, after outsourcing data to the cloud, users usually lose their physical control over data, and data security has become the key factor to restrict the development of the cloud computing market. This paper started with the security threats faced by data in the cloud environment, followed by data security requirements. Then, this paper summarized and described the key technologies of the protection technologies for cloud data. Finally, current challenges and future research trends in the field of cloud data security were introduced, so as to promote the cloud data protection system.

Key words: cloud computing, data security threats, data security protection

CLC Number: