id author title date pages extension mime words sentences flesch summary cache txt cord-015861-lg547ha9 Kang, Nan The Realization Path of Network Security Technology Under Big Data and Cloud Computing 2019-03-12 .txt text/plain 2169 128 47 title: The Realization Path of Network Security Technology Under Big Data and Cloud Computing This paper studies the cloud and big data technology based on the characters of network security, including virus invasion, data storage, system vulnerabilities, network management etc. Cloud computing is a service that based on the increased usage and delivery of the internet related services, it promotes the rapidly development of the big data information processing technology, improves the processing and management abilities of big data information. In the mobile cloud system model, the grid architecture that relies on local computing resources and the wireless network to build cloud computing, which will select the components of data flow graph to migrate to the cloud, Computer data processing cloud computing formula modeling, fGðV; EÞ; si; di; jg is the given data flow applications, assuming that the channel capacity is infinite, the problem of using cloud computing technology to optimize big data information processing is described as follows maxmax xi;yi;jxi;yi;j ./cache/cord-015861-lg547ha9.txt ./txt/cord-015861-lg547ha9.txt