Research on Cloud Computing Security Technology under Computer Big Data Network

In this paper, a parameter estimation-based security access integration method for computer network smart data is designed. The scale of data clustering is determined according to the distribution and evolution characteristics in the clustering process. Finally, this paper proposes a new security ac...

Full description

Saved in:
Bibliographic Details
Published in:2023 IEEE 3rd International Conference on Electronic Technology, Communication and Information (ICETCI) pp. 1686 - 1691
Main Authors: Zhou, Qiang, Ou, Wenjisi, Zheng, Wei
Format: Conference Proceeding
Language:English
Published: IEEE 26.05.2023
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In this paper, a parameter estimation-based security access integration method for computer network smart data is designed. The scale of data clustering is determined according to the distribution and evolution characteristics in the clustering process. Finally, this paper proposes a new security access control scheme. The system uses local abnormal factors to judge non-safe data and eliminates abnormal data according to the judgment results. The system sorts and outputs the factors that may have abnormal data points in the current time window. The Java object-oriented programming language is used. The network attack will be divided into fuzzy measures of DoS attack and non-DoS attack, and finally, the results of various attacks will be displayed. Simulation results show that this paper's entire access control scheme is highly feasible. The proposed algorithm has a high recognition rate.
DOI:10.1109/ICETCI57876.2023.10176710