云计算环境下网络安全关键技术研究现状与展望——基于CiteSpace知识图谱的分析
Research Status and Prospect of Network Security Key Technologies in Cloud Computing Environment—Based on the Analysis of CiteSpace Knowledge Map
DOI: 10.12677/aam.2025.146300, PDF,    科研立项经费支持
作者: 张羽芳, 王振龙, 陈星源, 蔡万林, 陈海杏, 庞正武*:广西民族大学数学科学学院,广西 南宁
关键词: 云计算网络安全技术CiteSpaceCloud Computing Network Security Technology CiteSpace
摘要: 我国信息技术的跨越式发展催化云计算技术规模化应用,其通过资源虚拟化、弹性扩展和服务交付模式创新,推动传统集中式IT架构向分布式架构演进,实现软硬件资源解耦与服务化转型,成为驱动新基建和数字化转型的核心技术引擎。本文选取中国知网(CNKI)数据库以“云计算”和“网络安全”为主题检索筛选得到2057篇文献,并借助CiteSpace可视化分析软件绘制发文时间及发文量、关键词突现、关键词时区等知识图谱探究云计算环境下网络安全技术发展脉络;通过发文作者、关键词共现、关键词时间线等知识图谱对云计算环境下的网络安全关键技术的热点变更和趋势进行深入分析。结果表明,云计算网络安全攻防技术正进入常态化研究阶段,重点涵盖数据存储、网络、虚拟化和身份认证等领域。随着应用普及,数据泄露、账户安全和访问控制等风险凸显,推动网络安全技术朝着多元化、深度化和智能协同防御方向发展。因此,只有通过智能防御、加密技术、身份认证和多层防护等措施,才能构建安全可靠的云计算网络环境,促进网络安全关键技术的发展。
Abstract: The leapfrog development of information technology in China has catalyzed the large-scale application of cloud computing technology. Through resource virtualization, elastic scalability, and innovation in service delivery models, IT promotes the evolution of traditional centralized IT architectures to distributed architectures, achieving decoupling of software and hardware resources and service-oriented transformation, and has become the core technical engine driving new infrastructure and digital transformation. In this paper, 2057 papers were retrieved and screened from the China National Knowledge Infrastructure (CNKI) database with the themes of “cloud computing” and “cyber security”, and knowledge graphs such as publication time and volume, keyword emergence, and keyword time zone were drawn with the help of CiteSpace visualization analysis software to explore the development context of cyber security technology in the cloud computing environment; the hotspots, changes and trends of key cyber security technologies in the cloud computing environment were analyzed through knowledge graphs such as authors, co-occurrence of keywords and keyword timelines. The results show that cloud computing network security attack and defense technologies are entering a regular research stage, with a focus on areas such as data storage, networking, virtualization, and identity authentication. With the widespread application, risks such as data leakage, account security and access control have become more prominent, driving the development of cyber security technology towards diversification, depth and intelligent collaborative defense. Therefore, only through measures such as intelligent defense, encryption technology, identity authentication and multi-layered protection can a secure and reliable cloud computing network environment be built to promote the development of key cyber security technologies.
文章引用:张羽芳, 王振龙, 陈星源, 蔡万林, 陈海杏, 庞正武. 云计算环境下网络安全关键技术研究现状与展望——基于CiteSpace知识图谱的分析[J]. 应用数学进展, 2025, 14(6): 55-63. https://doi.org/10.12677/aam.2025.146300

参考文献

[1] 沈昌祥, 张焕国, 冯登国, 等. 信息安全综述[J]. 中国科学(E辑: 信息科学), 2007(2): 129-150.
[2] 窦青嵩. 关于对计算机“云计算”技术现状及发展的几点探讨[J]. 电子技术与软件工程, 2015(16): 193.
[3] 程开固. 网络安全技术在云计算背景下的实现路径研究[J]. 网络安全技术与应用, 2015(2): 102-103.
[4] 王伟, 高能, 江丽娜. 云计算安全需求分析研究[J]. 信息网络安全, 2012(8): 75-78.
[5] 蒋志刚. 计算机信息网络安全技术及发展方向的探讨[J]. 电子元器件与信息技术, 2020, 4(6): 18-19.
[6] 徐丽娟, 李慧平. 大数据计算机网络安全技术分析[J]. 网络安全技术与应用, 2025(2): 63-65.