Security of intelligent edge computing:a survey
With the rise of edge computing,more and more attentions have been paid to security issues of edge computing.The basic concepts,system architecture and the relationship between edge computing and other computing paradigms were introduced.Then the security threats to edge computing were analyzed,and...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2018-07-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018181/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530414718517248 |
---|---|
author | Xingshuo AN Guixing CAO Li MIAO Shubo REN Fuhong LIN |
author_facet | Xingshuo AN Guixing CAO Li MIAO Shubo REN Fuhong LIN |
author_sort | Xingshuo AN |
collection | DOAJ |
description | With the rise of edge computing,more and more attentions have been paid to security issues of edge computing.The basic concepts,system architecture and the relationship between edge computing and other computing paradigms were introduced.Then the security threats to edge computing were analyzed,and the security technology of edge computing was discussed for these security threats.Finally,the technologies of intrusion detection,access control,defense strategy and key management in edge computing were summarized and the further research directions were pointed out. |
format | Article |
id | doaj-art-ef20e8d19f1a4b93a2c4a77f6b81b6f8 |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2018-07-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-ef20e8d19f1a4b93a2c4a77f6b81b6f82025-01-15T03:04:31ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012018-07-013413514759595024Security of intelligent edge computing:a surveyXingshuo ANGuixing CAOLi MIAOShubo RENFuhong LINWith the rise of edge computing,more and more attentions have been paid to security issues of edge computing.The basic concepts,system architecture and the relationship between edge computing and other computing paradigms were introduced.Then the security threats to edge computing were analyzed,and the security technology of edge computing was discussed for these security threats.Finally,the technologies of intrusion detection,access control,defense strategy and key management in edge computing were summarized and the further research directions were pointed out.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018181/edge computingsecurity technologysystem framework |
spellingShingle | Xingshuo AN Guixing CAO Li MIAO Shubo REN Fuhong LIN Security of intelligent edge computing:a survey Dianxin kexue edge computing security technology system framework |
title | Security of intelligent edge computing:a survey |
title_full | Security of intelligent edge computing:a survey |
title_fullStr | Security of intelligent edge computing:a survey |
title_full_unstemmed | Security of intelligent edge computing:a survey |
title_short | Security of intelligent edge computing:a survey |
title_sort | security of intelligent edge computing a survey |
topic | edge computing security technology system framework |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018181/ |
work_keys_str_mv | AT xingshuoan securityofintelligentedgecomputingasurvey AT guixingcao securityofintelligentedgecomputingasurvey AT limiao securityofintelligentedgecomputingasurvey AT shuboren securityofintelligentedgecomputingasurvey AT fuhonglin securityofintelligentedgecomputingasurvey |