earticle

논문검색

A Study on Security Technique of Cloud Data Processing in Electronic Commerce

초록

영어

In the age of e-commerce, the issue of information leakage of internet users is a wide concern. The e-commerce enterprises should be prepared to deal with network data processing security, and to avoid various inconveniences led by the loss of data information. In this study, the "business to customer" (B2C) cloud data processing model is taken as an example to propose a security countermeasure for network data processing based on cloud computing platform. The cloud network computing model is adopted for the automated processing on B2C network data. Based on the network overlapping relationship and model settings, the security workflow of the cloud data computing processing is built. Moreover, the overlapping network plan and flow network technique are considered as the basis of the model, and a diversified security control platform is created by combining with modeling tools.

목차

Abstract
 1. Introduction
 2. Current Status of Information Security of E-Commerce Websites
 3. Survey on Customer Information Leakage of Jingdong Mall
 4. Application of Computing Model of E-Commerce Cloud Network Security
  4.1 Basic Model of Overlapping Relationship
  4.2 Delay Time Distance
  4.3 Relation between Three Network Plans
 5. Security Control Platform Based on Framework Manager
  5.1 Modeling Cloud Data Security
  5.2 Cloud Technology Application
 6. Conclusions
 Acknowledgements
 References

저자정보

  • Wei Dai School of Economics and Management, Hubei Polytechnic University, Huangshi 435003, Hubei, P.R. China
  • Xuefang Zhang School of Economics and Management, Hubei Polytechnic University, Huangshi 435003, Hubei, P.R. China
  • Peng Hu School of Mathematics and Physics, Hubei Polytechnic University, Huangshi 435003, Hubei, P.R. China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.