Development of Computer Network Security Based on Cloud Computing

Cloud computing not only provides convenience for users, but also brings certain information security threats to users. How to effectively protect the user’s information security has become one of the core issues of network security. This paper analyzes the problems and reasons of network security in cloud computing environment, and points out the main ways to improve network security. This paper analyzes the network security problems in the cloud computing environment, and discusses the information security technology in the network. This paper studies the definition, characteristics, classification and core technology of cloud computing security, analyzes the security risk of cloud computing network, and puts forward the cloud computing network security model and security level evaluation method from different angles. Level experiment results show that the network security model in cloud environment is feasible, computing can fully meet the development requirements of the current network information age, and effectively standardize the network security operation environment. The results show that: in 2016, the number of articles related to cloud computing is at least 2653, and in 2020, the number of articles related to cloud computing is at most 6438.


Introduction
Cloud computing has become the real trend of computer IT service mode, which provides costeffective and scalable processing. At the same time, software defined network (SDN) has been widely used in computer network for its advantages of flexible network management services and reducing operating costs. When providing enterprise IT services, there seems to be a trend that these two technologies go hand in hand. Cloud computing brings us the convenience of sharing network resources, but the potential network security risks can not be underestimated.
With the continuous development of information technology, many experts have studied computer network security. For example, some domestic teams have studied secure network coding technology, introduced the concept, characteristics, network security meaning and security status of cloud computing, and proposed the application of data center cluster technology to improve performance and capability by reducing the number of cloud database clicks. This paper discusses the network security 2 problems in the cloud computing environment, and puts forward some suggestions and suggestions to strengthen the network security. This paper proposes a storage security framework, including encrypted storage scheme and data structure. In this framework, the encrusted server can not understand any plain text information and can complete dynamic operation in a short time. The encryption algorithm and data storage structure are simple and easy to maintain. In order to prevent unauthorized data access, a distributed cloud data security scheme is proposed. This paper summarizes some important work in intrusion detection system, and focuses on the research of intrusion detection system, in order to protect intrusion detection system from the impact of threat environment. In order to protect users effectively, we should maintain the expansion ability, increase the number, and quickly reduce the number. Depending on the amount of resources, access to the system level and / or its purposes and characteristics can be isolated. In the intrusion detection system based on virtual machine, the migration between different tsnd implementations across multiple platforms is used, which makes it a better alternative to intrusion detection. Cloud computing and network security are combined to study the "cloud" firewall technology. This paper compares the "cloud" firewall with the traditional firewall, and further studies the cloud computing, architecture and vitalization technology in the "cloud" firewall [1]. Some experts have studied the departmentalization of improved AES encryption algorithm in cloud computing, selected neural network as the research object, put forward the concept and concept of computer network system security domain, to maintain economic development and social stability. This paper proposes a design method of network chat system based on socket and cloud computing technology. Java socket is customized by sun for Java language, which is used to develop network applications. This paper introduces the important concepts of socket interface and cloud computing technology, analyzes socket communication mechanism in principle, and studies the application of java socket. In order to improve the security and efficiency of data storage in communication network chat, an improved method of cloud computing technology is added based on the application of socket technology [2]. Some experts have studied the design and implementation of cloud platform vitalization security test system, and proposed a new privacy protection computing technology, that is, using implicit security model in cloud computing. In the proposed technology, data is divided into multiple partitions and stored on an independent cloud server. When the user wants to perform the calculation on the data, he sends a signal to the server, and the server performs the required calculation. This paper first summarizes the security problems of virtual machine, and then discusses and analyzes the security problems existing in the virtual network based on Xen platform. Finally, a new virtual network framework is proposed to control the communication between virtual machines deployed on physical machines, which has high security. It is proved that the privacy of user data can be maintained when the master data storage server does not collude. This can be guaranteed by using an independent cloud provider. This technology eliminates the requirement of key management and has high efficiency and practicability [3]. Although the research results of computer network security are quite abundant, there are still some deficiencies in the development of computer network security under the background of cloud computing.
In order to study the development of computer network security based on cloud computing, this paper establishes a network model through the research of computer network security, and the results show that computer network security is very important.

Computer Network Security
2.1.1. Security Ontology. Ontology in the field of security is called security ontology, which is "based on the security aspect of information system, and can be used as a container to extract information system security requirements from information sources" [4]. At present, the research of security ontology is still in its infancy at home and abroad [5]. At present, the main research direction of security ontology is the security ontology of trust relationship and risk assessment in information 3 system, as well as the security ontology related to e-commerce [6]. While cloud computing brings convenience to users and improves the efficiency of resource utilization, due to the complex architecture of cloud system, its dynamic management mode, powerful computing power and storage scale will also face new security problems [7]. Cloud computing security is an important branch of system reliability, and also the main attribute of the actual system operation [8]. The data storage mode of cloud computing belongs to cloud storage [9]. This outsourcing storage and computing mode is implicit for third-party customers, because the data will not be stored on the customer's local server, which increases more unacceptability [10]. Safety requirements include three aspects: first, similar security requirements, mainly including usability, confidentiality and integrity requirements; second, similar system threats, such as the source, mode and intensity of threats; third, similar asset values, such as the separation of important assets and other non important assets.

Access Security.
Compared with ordinary network access, cloud system is faced with more user access, which makes access authentication and authorization audit become the key to deploy security policy. Managers need to customize reasonable configuration to meet the relevant access requirements. However, due to the imperfection of the management mechanism, the system internal managers can access the virtual machine management system through malicious software, and then steal illegal resources. For physical access security, common threats include cold start attack and hardware tampering. These attacks can maliciously delete specific kernel modules, such as virus monitoring system, firewall and so on, so that the protection ability of the system is reduced. Therefore, it is necessary to reasonably supervise and control the special authority of administrators to prevent the occurrence of such security incidents. The common method is to force the configuration of external security access control list.

Cloud Computing Security Status Assessment.
The key of cloud computing security state assessment is to determine the security indicators in the cloud system, so as to reasonably integrate different types of index information, and finally get the evaluation value that can fully reflect the security state of the cloud system. For complex system state evaluation, there are hidden Markov evaluation method, service stability evaluation method, fuzzy composition operator evaluation method, probability density trust relationship evaluation method, fuzzy comprehensive hierarchy evaluation method, system availability evaluation method and so on.

Network Model
Random linear network coding is mainly divided into two stages: coding and decoding. In the coding stage, the system randomly combines the information sent by the source, and randomly selects all the coefficients from the finite field. In the decoding stage, the Gauss elimination method is used to solve the linear equations, and then the original message sent by the source node is restored to the destination node. Suppose that the original message to be sent by the source node is m. before sending the message, the source node first divides the message M into L generations, each generation has m messages, and each message is represented by a vector of length n. then the original message M can be expressed as, as shown in formula (1): Isomorphic: Metamorphism can be divided into multiplicative isomorphic and additive isomorphic. Suppose there is a function K. given two variables 1t and 2T, there is a function at the same time. If equation (1) holds , then the function K is said to satisfy multiplication, as shown in equation (2-3): If the message is contaminated, it will be discarded. If it is not polluted, it will be saved. After receiving m linearly independent messages, the destination node decodes and restores the messages sent by the source node by Gaussian elimination method, and obtains the original messages sent by the source node to the destination node. Finally, the first m columns of the generated matrix are expressed as s, and the last n columns are expressed as Z. According to equation (2)(3), m original messages sent by the source node can be decoded, as shown in equation (4):

Experimental Object Extraction
The research objectives include three aspects: one is to analyze the changes of information service mode, process and service organization form of digital academic resources in the cloud environment, and make clear the security requirements of digital academic resources information service in the cloud environment; the other is to establish the digital academic information resources cloud service by using the relevant theories and management methods of service chain and combining with the characteristics of digital academic resources information cloud service. On this basis, the guarantee scheduling method of digital academic resources cloud service chain in cloud environment is established. Third, set the key quality indicators of cloud services, and ensure the security of digital academic resources information services by establishing service monitoring.

Experimental Analysis
When evaluating the security status of the actual cloud system, due to the complex working environment, vulnerable to external attacks, the data fluctuates greatly in the process of monitoring data collection. Considering the working state and external environment of the cloud system, the fluctuation of monitoring indicators mainly comes from two aspects: on the one hand, the external attack on the cloud system is random, and in the process of system operation, the attack on the cloud system is random; on the other hand, in the process of obtaining the monitoring indicators of the cloud system, the quality of the monitor will change with the growth of time, and its tracking ability will also increase. In the actual work process, the monitoring data will be affected by environmental noise and other factors, so the monitoring data will have a certain volatility, and the reliability of the data will be reduced. In the process of cloud system security assessment, the fluctuation of its monitoring indicators will not affect the assessment accuracy of the security assessment model, and the accuracy error of the security assessment model mainly comes from the influence of external environmental noise and other factors. Therefore, it is necessary to calculate the reliability of monitoring indicators.

Cloud Computing Security
Security is the most concerned problem in business and academic circles. According to the National Institute of standards and Technology (NIST) cloud computing research report, security is one of the most important obstacles in cloud computing research. As shown in Table 1. Table 1 Research popularity of cloud computing security articles It can be seen from the above that in 2016, the number of articles related to cloud computing was at least 2653, and in 2020, the number of articles related to cloud computing was at most 6438.

Performance Testing
The purpose of this test is to compare and analyze the time-consuming of opencast ordinary cloud and open stack Security Cloud in the login process. Because the network transmission speed has a great influence on the test results, in order to make the test results scientific and reasonable, this test adopts the LAN environment with the maximum transmission speed of 100Mbps, and there is no irrelevant data interaction in the test process. In this test, the time recording function is set at the beginning and end of the system login processing to record the login processing time, which does not include the user input time. A total of three single tests were carried out, and the specific results are shown in Table 2.  Figure 2. Cloud LAAS layer trusted access protocol performance test It can be seen from the above that the average time for the first trial landing of opencast ordinary cloud is 0.23s, and the average time for the second trial landing of open stack security cloud is 0.13s, so the performance of open stack security cloud is better than that of opencast ordinary cloud.

Conclusion
The adoption and promotion of cloud computing is threatened by the unsolved security problems of cloud providers and cloud users. In this article, we will show how vitalization can improve the security of cloud computing by protecting the integrity of client virtual machines and cloud infrastructure components. In particular, we propose a new architecture, advanced cloud protection systems (ACPs), to ensure the security of cloud resources. This paper analyzes the key technologies and characteristics of cloud computing, and expounds the main aspects of cloud computing security. This paper analyzes the security technology of cloud computing, and puts forward the corresponding countermeasures to solve the security problems of cloud computing. Cloud computing security is a relatively new field. Due to the rapid development of cloud computing technology, its application is more and more extensive and in-depth. Therefore, many enterprises are engaged in the research of cloud computing.