{"title":"Risk Management of E-Commerce Security in Cloud Computing Environment","authors":"Yan Li, Junfeng Li","doi":"10.1109/ICMTMA50254.2020.00172","DOIUrl":null,"url":null,"abstract":"The emergence of cloud computing technology has changed the traditional business economic model and provided convenience for the application of e-commerce in the financial field. This paper uses cloud computing as the entry point to analyze the security of e-commerce in a cloud computing environment in detail. It also proposes relevant solutions to how e-commerce can ensure the security of its own data in the context of cloud computing. At the same time, it also pays attention to reducing the user's perception of information security risks from the user's perspective, and improving the user's trust, satisfaction and loyalty to the information system.","PeriodicalId":333866,"journal":{"name":"2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMTMA50254.2020.00172","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The emergence of cloud computing technology has changed the traditional business economic model and provided convenience for the application of e-commerce in the financial field. This paper uses cloud computing as the entry point to analyze the security of e-commerce in a cloud computing environment in detail. It also proposes relevant solutions to how e-commerce can ensure the security of its own data in the context of cloud computing. At the same time, it also pays attention to reducing the user's perception of information security risks from the user's perspective, and improving the user's trust, satisfaction and loyalty to the information system.