원문정보
초록
영어
In the age of e-commerce, the issue of information leakage of internet users is a wide concern. The e-commerce enterprises should be prepared to deal with network data processing security, and to avoid various inconveniences led by the loss of data information. In this study, the "business to customer" (B2C) cloud data processing model is taken as an example to propose a security countermeasure for network data processing based on cloud computing platform. The cloud network computing model is adopted for the automated processing on B2C network data. Based on the network overlapping relationship and model settings, the security workflow of the cloud data computing processing is built. Moreover, the overlapping network plan and flow network technique are considered as the basis of the model, and a diversified security control platform is created by combining with modeling tools.
목차
1. Introduction
2. Current Status of Information Security of E-Commerce Websites
3. Survey on Customer Information Leakage of Jingdong Mall
4. Application of Computing Model of E-Commerce Cloud Network Security
4.1 Basic Model of Overlapping Relationship
4.2 Delay Time Distance
4.3 Relation between Three Network Plans
5. Security Control Platform Based on Framework Manager
5.1 Modeling Cloud Data Security
5.2 Cloud Technology Application
6. Conclusions
Acknowledgements
References
