Practice on edge cloud security of telecom operators
Abstact: In the peak period of operator edge cloud construction, in order to realize the “three synchronization” construction strategy, the network edge cloud construction and operation and maintenance management mode were expounded, the security risks and security construction requirements of netwo...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2023-04-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2023096/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530857190326272 |
---|---|
author | Le ZHANG Hongyuan MA |
author_facet | Le ZHANG Hongyuan MA |
author_sort | Le ZHANG |
collection | DOAJ |
description | Abstact: In the peak period of operator edge cloud construction, in order to realize the “three synchronization” construction strategy, the network edge cloud construction and operation and maintenance management mode were expounded, the security risks and security construction requirements of network edge cloud were discussed firstly.Then, the limitations of the security construction mode in the edge cloud scenario for the traditional cloud were analyzed.Finally, an innovative network edge cloud security construction plan was proposed, and the province’s edge cloud security construction was carried out uniformly.The comparison was completed from the perspective of practical application, and the advantages of the innovative edge cloud construction plan was verified. |
format | Article |
id | doaj-art-ba199cb282a746fea095f4f5b361d04b |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2023-04-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-ba199cb282a746fea095f4f5b361d04b2025-01-15T02:58:52ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012023-04-013916517259569144Practice on edge cloud security of telecom operatorsLe ZHANGHongyuan MAAbstact: In the peak period of operator edge cloud construction, in order to realize the “three synchronization” construction strategy, the network edge cloud construction and operation and maintenance management mode were expounded, the security risks and security construction requirements of network edge cloud were discussed firstly.Then, the limitations of the security construction mode in the edge cloud scenario for the traditional cloud were analyzed.Finally, an innovative network edge cloud security construction plan was proposed, and the province’s edge cloud security construction was carried out uniformly.The comparison was completed from the perspective of practical application, and the advantages of the innovative edge cloud construction plan was verified.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2023096/5Gedge cloudnetwork securitytoB businessUPF security |
spellingShingle | Le ZHANG Hongyuan MA Practice on edge cloud security of telecom operators Dianxin kexue 5G edge cloud network security toB business UPF security |
title | Practice on edge cloud security of telecom operators |
title_full | Practice on edge cloud security of telecom operators |
title_fullStr | Practice on edge cloud security of telecom operators |
title_full_unstemmed | Practice on edge cloud security of telecom operators |
title_short | Practice on edge cloud security of telecom operators |
title_sort | practice on edge cloud security of telecom operators |
topic | 5G edge cloud network security toB business UPF security |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2023096/ |
work_keys_str_mv | AT lezhang practiceonedgecloudsecurityoftelecomoperators AT hongyuanma practiceonedgecloudsecurityoftelecomoperators |