The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2023
DOI: 10.1109/access.2023.3279409
|View full text |Cite
|
Sign up to set email alerts
|

Research on Secure Cloud Networking Plan Based on Industry-Specific Cloud Platform

Qian Wang,
Zhuo Wang,
Wei Wang

Abstract: The current domestic cloud platform, including China Mobile's public cloud and DICT private cloud, cannot satisfy the needs of high-end clients in many industries, such as ''government, public security, education, healthcare, finance, transportation, power, and large enterprises''. Those specifics are: customization, ''data cannot be stored out of the local city'', ''must meet the Chinese safety standard of Classified Protection of Cybersecurity Version 2.0 Third Level (CPCv2.0 Lv.3) '', strong isolation and e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Continuous investment in research and resource costs is necessary. Additionally, the unified collection and secure management [10] of data during the integration of metrics, logs, and chains require ongoing research and development.…”
Section: System Application Deployment Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Continuous investment in research and resource costs is necessary. Additionally, the unified collection and secure management [10] of data during the integration of metrics, logs, and chains require ongoing research and development.…”
Section: System Application Deployment Resultsmentioning
confidence: 99%
“…User authentication and authorization are key components in ensuring secure access within a multi-tenant management system [10]. The Kubernetes ID token authentication mechanism effectively verifies user identity and integrates with LDAP for unified user authentication management, enabling authentication within the cluster [4].…”
Section: 4authorization Managementmentioning
confidence: 99%