STEMM Institute Press
Science, Technology, Engineering, Management and Medicine
Data Management and Security Strategies of Smart Libraries in the Cloud Computing Environment
DOI: https://doi.org/10.62517/jike.202604103
Author(s)
Zhou Yang
Affiliation(s)
Library of Guizhou University of Finance and Economics, Guizhou, Guiyang, China
Abstract
With the in-depth integration of cloud computing and smart libraries, the scale of library data has expanded exponentially, bringing severe challenges to data management efficiency and security. This study aims to construct a scientific data management and security protection system for smart libraries in the cloud environment. Methods include using bibliometric analysis to sort out the research status of domestic and foreign related fields, adopting case study method to analyze the application problems of 8 typical cloud-based smart libraries, and establishing an evaluation index system based on analytic hierarchy process (AHP). The research process involves three stages: data demand analysis, management model construction, and security strategy verification. The results show that the constructed "cloud-edge-end" integrated data management model can improve data processing efficiency by 32.5%, and the multi-dimensional security strategy combining access control and data encryption can effectively reduce security risks by 68%. This study provides theoretical support and practical reference for the digital transformation of smart libraries.
Keywords
Cloud Computing; Smart Library; Data Management; Security Strategy
References
[1] Li J, Zhang H. Research on cloud computing-based smart library data storage model[J]. Journal of Library Science in China, 2022, 48(3): 45-58. [2] Wang Y, Chen L. Analysis of data security risks and protection measures for smart libraries in cloud environment[J]. Library and Information Service, 2021, 65(12): 78-89. [3] Zhang Q, Liu X. Construction of data lifecycle management system for academic libraries under cloud computing[J]. Journal of Academic Libraries, 2023, 41(2): 91-102. [4] Zhao W, Sun J. Application of blockchain technology in smart library data sharing[J]. New Technology of Library and Information Service, 2022, 38(5): 36-47. [5] Chen G, Yang M. Research on access control model of smart library user data based on RBAC[J]. Library Work and Study, 2021, (8): 56-64. [6] Huang Z, Zhou L. Empirical study on cloud computing application in public libraries[J]. Library Development, 2022, (4): 105-116. [7] Zhu Y, Wu S. Data encryption technology and its application in smart library[J]. Information Science, 2021, 39(7): 145-153. [8] Lin H, Guo J. Research on emergency response mechanism of smart library data security incidents[J]. Journal of Library and Information Science, 2023, 48(3): 67-78. [9] Xu C, Zheng Y. Review of foreign research on smart library data management[J]. Foreign Library Trends, 2022, (2): 34-45. [10] Gao F, Deng X. Application of zero-trust security model in smart library[J]. Network Security Technology and Application, 2021, (11): 89-92. [11] Liu M, He K. Design of distributed data backup system for smart libraries[J]. Computer Engineering and Applications, 2022, 58(15): 234-242. [12] Wang Q, Zhang S. Research on user data privacy protection of smart libraries based on homomorphic encryption[J]. Library and Information Work, 2023, 67(7): 59-68. [13] Chen J, Li D. Analysis of factors influencing the application effect of cloud computing in smart libraries[J]. Journal of Library Management, 2021, (6): 43-52. [14] Zhang Y, Zhao L. Construction of smart library data security evaluation index system[J]. Journal of Information, 2022, 41(5): 123-131. [15] Sun M, Liu P. Research on collaborative management mechanism of inter-library data under cloud computing[J]. Library Tribune, 2023, 43(4): 89-98.
Copyright @ 2020-2035 STEMM Institute Press All Rights Reserved