Application of Network Security Technology Based on
Big Data in Cloud Computing
Master of Cyber Security
NAME:YUAN GUAN
Student ID:s2187022
INTRODUCTION
• With the continuous development of technology, the application of network
security technology combined with big data in cloud computing is popular, but
data leakage happens from time to time, so in this case, data integrity is crucial.
This study analyzes the recent advances in this field and explores a range of
methods and techniques.
• We delve into the results of the hybrid evolution and jump of computer
technologies such as distributed computing, utility computing, load balancing,
parallel computing, network storage, hot backup redundancy and virtualization.
Specifically, the research design deals with SIEM and firewalls.
Problem statement
• With the advent of the rapidly evolving digital age, cloud computing has changed
our lives. Technological innovation has also drawn public attention to data
security and privacy protection due to potential risks such as unauthorized access,
data leakage, security information exposure, and privacy disclosure. Technological
innovation has also drawn public attention to data security and privacy protection
due to potential risks such as unauthorized access, data leakage, security
information exposure, and privacy disclosure. To minimize damage, organizations
must be aware/aware of the information security and privacy protection challenges
in cloud computing and adopt available countermeasures to minimize risks.
RQ&RO
• RQ:
•How to ensure the security of big data in the process of transmission and storage?
•Can the security of big data in cloud computing be guaranteed by setting multi-layer firewall?
• RO:
•To identify the challenges of information security & privacy protection in terms of Could Computing.
•To master out the relation between data protection and information security within the organisation
structure.
LITERATURE REVIEW
Since large amounts of data are transmitted over the network and stored in
specific cloud services, there are some vulnerabilities that can be exploited by
malicious actors. Thus, confidentiality is critical for users to store private data
in the cloud
Scholars have used a combination of quantitative and qualitative methods to
analyze the three cloud computing models and calculate the average score of
common vulnerability scoring systems.
Research design
Phase 2 (RO 2)
Phase 1 (RO 1- )
Literature review
Data
Validated
Validated Validated validation gathering* areas
Challenges Data Collection Valideted
Relation Countermeasure
Challenges
Method
• Mixed-Methods Approach:
Quantitative&qualitative
Exploration phase &main research phase
Research Significant & Conclusion
With the continuous expansion of data scale, network
security issues are becoming more and more serious.
Through the study of network security, promote the
innovation of information security technology, promote
the development of science and technology. Society can
better protect sensitive information of enterprises and
individuals, maintain trade secrets, and improve the level
of commercial privacy protection.
References
• Zamfiroiu, A., Petre, I., & Boncea, R. (2019, September). Cloud computing vulnerabilities analysis. In Proceedings of the 2019 4th
International Conference on Cloud Computing and Internet of Things (pp. 48-53).
• Jiang, S. (2018, April). Research on Risk Evaluation of Information Security Based on Cloud Computer. In Proceedings of the 2018
1st International Conference on Internet and e-Business (pp. 152-157).
• Huang, Z., & Zhou, J. (2018, September). Design of Network Security Attack and Defense Target Range System Based on Cloud
Computing. In Proceedings of the 2018 International Conference on Information Hiding and Image Processing (pp. 5-8).
• bt Yusof Ali, H. B., bt Abdullah, L. M., Kartiwi, M., & Nordin, A. (2018, December). Risk Assessment for Big Data in Cloud: Security,
Privacy and Trust. In Proceedings of the 2018 Artificial Intelligence and Cloud Computing Conference (pp. 63-67).
• Fellah, H., Mezioud, C., & Batouche, M. C. (2020, March). Mobile cloud computing: Architecture, advantages and security issues.
In Proceedings of the 3rd International Conference on Networking, Information Systems & Security (pp. 1-9).
• Mohammed, T. A., & Mohammed, A. B. (2020, September). Security architectures for sensitive data in cloud computing.
In Proceedings of the 6th International Conference on Engineering & MIS 2020 (pp. 1-6).
• Carrega, A., & Repetto, M. (2019, November). Data Log Management for Cyber-Security Programmability of Cloud Services and
Applications. In Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race (pp. 47-52).
• Hagemann, T., & Katsarou, K. (2020, December). A systematic review on anomaly detection for cloud computing environments.
In Proceedings of the 2020 3rd Artificial Intelligence and Cloud Computing Conference (pp. 83-96).
• Maohong, Z., Aihua, Y., & Hui, L. (2018, October). Research on security and privacy of big data under cloud computing
environment. In Proceedings of the 2nd International Conference on Big Data Research (pp. 52-55)
• Zhang, S., Qu, Y., & Wang, P. (2022, April). Design of cloud computing data center security system based on Virtualization
environment. In Proceedings of the 3rd Asia-Pacific Conference on Image Processing, Electronics and Computers (pp. 137-145).
Thank you