Computer Network Security and Maintenance in Cloud Computing Environment

Authors

  • Wenbo Yang Henan Jinshu Intelligent Technology Co., Ltd. Zhengzhou 450000, Henan
  • Taixiang Guo Henan Jinshu Intelligent Technology Co., Ltd. Zhengzhou 450000, Henan
  • Peng Wu Henan Jinshu Intelligent Technology Co., Ltd. Zhengzhou 450000, Henan
  • Ye Zhao Henan Jinshu Intelligent Technology Co., Ltd. Zhengzhou 450000, Henan

Keywords:

Cloud computing environment, Computer network, Safety and Maintenance

Abstract

Although cloud computing technology has brought efficient utilization and flexible configuration of computing resources, the security issues of computer networks in its environment are becoming increasingly prominent. This article deeply analyzes the challenges faced by cloud computing, such as data transmission and storage security risks, insufficient security of cloud service providers, and lack of user security awareness. It proposes comprehensive maintenance strategies including strengthening the security capabilities of cloud service providers, applying data encryption technology, implementing data backup and recovery strategies, strengthening access control and security authentication, and enhancing user security education and training, aiming to build a secure and reliable cloud computing environment.

References

Guo, Y. (2025, May). IMUs Based Real-Time Data Completion for Motion Recognition With LSTM. In Forum on Research and Innovation Management (Vol. 3, No. 6).

Guo, Y., & Tao, D. (2025). Modeling and Simulation Analysis of Robot Environmental Interaction. Artificial Intelligence Technology Research, 2(8).

We, X., Lin, S., Pruś, K., Zhu, X., Jia, X., & Du, R. (2025). Towards Intelligent Monitoring of Anesthesia Depth by Leveraging Multimodal Physiological Data. International Journal of Advance in Clinical Science Research, 4, 26–37. Retrieved from https://www.h-tsp.com/index.php/ijacsr/article/view/158

Su, Z., Yang, D., Wang, C., Xiao, Z., & Cai, S. (2025). Structural assessment of family and educational influences on student health behaviours: Insights from a public health perspective. Plos one, 20(9), e0333086.

Yang, Y. (2025). Research on Site Reliability Optimization Technology Based on Synthetic Monitoring in Cloud Environments.

Wang, J., Dong, J., & Zhou, L. (2025). Research on Short-Video Platform User Decision-Making via Multimodal Temporal Modeling and Reinforcement Learning: Deep Learning for User Decision Behavior. Journal of Organizational and End User Computing (JOEUC), 37(1), 1-24.

Tang, Z., Feng, Y., Zhang, J., & Wang, Z. (2026). SVD-BDRL: A trustworthy autonomous driving decision framework based on sparse voxels and blockchain enhancement. Alexandria Engineering Journal, 134, 433-446.

Lu, K., Sui, Q., Chen, X., & Wang, Z. (2025). NeuroDiff3D: a 3D generation method optimizing viewpoint consistency through diffusion modeling. Scientific Reports, 15(1), 41084.

Zhang, T. (2025). A Knowledge Graph-Enhanced Multimodal AI Framework for Intelligent Tax Data Integration and Compliance Enhancement. Frontiers in Business and Finance, 2(02), 247-261.

Bi, Y., & Su, T. (2025). A secure access method in English education network based on edge computing. Alexandria Engineering Journal, 128, 1125-1133.

Xie, J., Zhang, L., Cheng, L., Yao, J., Qian, P., Zhu, B., & Liu, G. (2025). MARNet: Multi-scale adaptive relational network for robust point cloud completion via cross-modal fusion. Information Fusion, 103505.

Downloads

Published

2026-01-29

How to Cite

Yang, W., Guo, T., Wu, P., & Zhao, Y. (2026). Computer Network Security and Maintenance in Cloud Computing Environment. International Journal of Advance in Applied Science Research, 5(1), 23–28. Retrieved from https://h-tsp.com/index.php/ijaasr/article/view/228

Issue

Section

Articles