Computer Network Security and Maintenance in Cloud Computing Environment
Keywords:
Cloud computing environment, Computer network, Safety and MaintenanceAbstract
Although cloud computing technology has brought efficient utilization and flexible configuration of computing resources, the security issues of computer networks in its environment are becoming increasingly prominent. This article deeply analyzes the challenges faced by cloud computing, such as data transmission and storage security risks, insufficient security of cloud service providers, and lack of user security awareness. It proposes comprehensive maintenance strategies including strengthening the security capabilities of cloud service providers, applying data encryption technology, implementing data backup and recovery strategies, strengthening access control and security authentication, and enhancing user security education and training, aiming to build a secure and reliable cloud computing environment.
References
Guo, Y. (2025, May). IMUs Based Real-Time Data Completion for Motion Recognition With LSTM. In Forum on Research and Innovation Management (Vol. 3, No. 6).
Guo, Y., & Tao, D. (2025). Modeling and Simulation Analysis of Robot Environmental Interaction. Artificial Intelligence Technology Research, 2(8).
We, X., Lin, S., Pruś, K., Zhu, X., Jia, X., & Du, R. (2025). Towards Intelligent Monitoring of Anesthesia Depth by Leveraging Multimodal Physiological Data. International Journal of Advance in Clinical Science Research, 4, 26–37. Retrieved from https://www.h-tsp.com/index.php/ijacsr/article/view/158
Su, Z., Yang, D., Wang, C., Xiao, Z., & Cai, S. (2025). Structural assessment of family and educational influences on student health behaviours: Insights from a public health perspective. Plos one, 20(9), e0333086.
Yang, Y. (2025). Research on Site Reliability Optimization Technology Based on Synthetic Monitoring in Cloud Environments.
Wang, J., Dong, J., & Zhou, L. (2025). Research on Short-Video Platform User Decision-Making via Multimodal Temporal Modeling and Reinforcement Learning: Deep Learning for User Decision Behavior. Journal of Organizational and End User Computing (JOEUC), 37(1), 1-24.
Tang, Z., Feng, Y., Zhang, J., & Wang, Z. (2026). SVD-BDRL: A trustworthy autonomous driving decision framework based on sparse voxels and blockchain enhancement. Alexandria Engineering Journal, 134, 433-446.
Lu, K., Sui, Q., Chen, X., & Wang, Z. (2025). NeuroDiff3D: a 3D generation method optimizing viewpoint consistency through diffusion modeling. Scientific Reports, 15(1), 41084.
Zhang, T. (2025). A Knowledge Graph-Enhanced Multimodal AI Framework for Intelligent Tax Data Integration and Compliance Enhancement. Frontiers in Business and Finance, 2(02), 247-261.
Bi, Y., & Su, T. (2025). A secure access method in English education network based on edge computing. Alexandria Engineering Journal, 128, 1125-1133.
Xie, J., Zhang, L., Cheng, L., Yao, J., Qian, P., Zhu, B., & Liu, G. (2025). MARNet: Multi-scale adaptive relational network for robust point cloud completion via cross-modal fusion. Information Fusion, 103505.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Wenbo Yang, Taixiang Guo, Peng Wu, Ye Zhao

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
