Security of intelligent edge computing:a survey

With the rise of edge computing,more and more attentions have been paid to security issues of edge computing.The basic concepts,system architecture and the relationship between edge computing and other computing paradigms were introduced.Then the security threats to edge computing were analyzed,and...

Full description

Saved in:
Bibliographic Details
Main Authors: Xingshuo AN, Guixing CAO, Li MIAO, Shubo REN, Fuhong LIN
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2018-07-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018181/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530414718517248
author Xingshuo AN
Guixing CAO
Li MIAO
Shubo REN
Fuhong LIN
author_facet Xingshuo AN
Guixing CAO
Li MIAO
Shubo REN
Fuhong LIN
author_sort Xingshuo AN
collection DOAJ
description With the rise of edge computing,more and more attentions have been paid to security issues of edge computing.The basic concepts,system architecture and the relationship between edge computing and other computing paradigms were introduced.Then the security threats to edge computing were analyzed,and the security technology of edge computing was discussed for these security threats.Finally,the technologies of intrusion detection,access control,defense strategy and key management in edge computing were summarized and the further research directions were pointed out.
format Article
id doaj-art-ef20e8d19f1a4b93a2c4a77f6b81b6f8
institution Kabale University
issn 1000-0801
language zho
publishDate 2018-07-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-ef20e8d19f1a4b93a2c4a77f6b81b6f82025-01-15T03:04:31ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012018-07-013413514759595024Security of intelligent edge computing:a surveyXingshuo ANGuixing CAOLi MIAOShubo RENFuhong LINWith the rise of edge computing,more and more attentions have been paid to security issues of edge computing.The basic concepts,system architecture and the relationship between edge computing and other computing paradigms were introduced.Then the security threats to edge computing were analyzed,and the security technology of edge computing was discussed for these security threats.Finally,the technologies of intrusion detection,access control,defense strategy and key management in edge computing were summarized and the further research directions were pointed out.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018181/edge computingsecurity technologysystem framework
spellingShingle Xingshuo AN
Guixing CAO
Li MIAO
Shubo REN
Fuhong LIN
Security of intelligent edge computing:a survey
Dianxin kexue
edge computing
security technology
system framework
title Security of intelligent edge computing:a survey
title_full Security of intelligent edge computing:a survey
title_fullStr Security of intelligent edge computing:a survey
title_full_unstemmed Security of intelligent edge computing:a survey
title_short Security of intelligent edge computing:a survey
title_sort security of intelligent edge computing a survey
topic edge computing
security technology
system framework
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018181/
work_keys_str_mv AT xingshuoan securityofintelligentedgecomputingasurvey
AT guixingcao securityofintelligentedgecomputingasurvey
AT limiao securityofintelligentedgecomputingasurvey
AT shuboren securityofintelligentedgecomputingasurvey
AT fuhonglin securityofintelligentedgecomputingasurvey